EasyManua.ls Logo

Fire King SHERLOCK - Introduction to Sherlock Lock System; Scope of the Document; Sherlock Lock Overview; Sherlock Lock Applications

Fire King SHERLOCK
22 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
OPERATOR’S MANUAL
1
The smartest safe lock in the business.
1.0 INTRODUCTION
Sherlock is an electronic lock package and this manual documents its operation.
1.1 SCOPE OF DOCUMENT
This manual provides all of the information you need to operate and administrate the Sherlock electronic lock.
This document specifically covers the keyed version of Sherlock supporting one or two doors. This document
provides the operating instructions for all users, up to and including the owner.
1.2 SHERLOCK OVERVIEW
Sherlock is an intelligent lock package made up of a display module (outer board), a lock control module
(inner board), power supply, and interconnecting cables. Electronic keys are assigned to employees, along
with PINs (personal identification numbers). Up to 27 keyed employee level users may be enrolled at one
time, plus managers and special purpose keys. Sherlock may be programmed to restrict access to the safe
using time delays and timelocks. An audit trail records all user activity. This log may be displayed or printed.
Sherlock supports advanced features such as timeout penalty for entering the wrong PIN too many times.
1.3 APPLICATIONS
Sherlock is designed for applications restricting safe access to certain hours with a log of user access.
Sherlock is setup to provide more restricted access to the high-value inner compartment while allowing
broader employee access to tills and change stored in the outer compartment. Sherlock requires an enrolled
key with a valid PIN number to grant access during authorized hours. Proper application of signs combined
with this technology provides maximum employee safety and theft protection. The audit trail is a log that can
be used to obtain a detailed history of employee activity to determine who entered the safe and when.
2.0 FEATURES
2.1 AUDIT TRAIL
The Audit Trail is a 2000 line record of operational history. Everything that any user does is recorded in this
log. This includes safe entry, door opening, and programming changes. The audit trail may be displayed or
printed. Employee keys and the Store Manager key may used to view the audit trail. The Area Manager and
Owner may also print the audit data.
2.2 TIME DELAY
The purpose of an inner door time delay is to protect employees during a robbery while still allowing con-
trolled access for legitimate purposes. Most robbers are not willing to stay in a store long enough for delay to
time out. They will take what they can from the outer compartment, but will leave drop money. Only the Owner
key has permission to edit the inner door delay (the factory default is 15 minutes).
When a delay is set, the
inner door may be accessed after the delay is satisfied by logging in a second time during a period called
the Access Time. Also programmable, the default access time is 5 minutes. Once the access time has
expired, the delay must once again be satisfied before the door may be accessed again.
Sherlock Keypad