20 Using the Prime system
Anti-intrusion control panels
Chapter
5
Using the Prime system
The Prime system can be accessed in the following ways:
•via keypad with a display (LCD) (Joy, Aria, nCode/G, Concept/G).
In which case the user can operate the system in two ways:
- through shortcuts (refer to paragraph 4-1 Keypad shortcuts);
- through the user code/menu (refer to paragraph 3-2 Methods of accessing the user
menu).
Refer to paragraph 6-6 Operations from LCD keypads.
•Via Alien keypad
in this case, the display provides the user with buttons, that with a single tap activate
functions and applications. For further details refer to paragraph 6-7 Operations via an
Alien keypad.
•Via proximity reader (nBy/S, nBy/X, built into the keypad)
in this case it is necessary to use a valid key and there is only one way of accessing the
system, as described in paragraph 7-3 Reader and key operations.
•Via telephone
during a call from/to the control panel itself or via an SMS message and valid code entry
(PIN).
Refer to paragraph 8-3 Operations via telephone.
•Via remote-control device
by pressing keys , ..., , as described in paragraph 7-2-1 Wireless keys (remote-
control keys).
•Via Web
by means of the integrated web-server on the PrimeLAN board (if installed) through any
browser (refer to paragraph 9-2 Access to and use of the Web interface).
•Via AlienMobile Application
in this case, users are provided with buttons, on the screen of their smartphones, which
activate functions and applications from remote locations (refer to ).
•Via Inim Cloud
by means of a browser, the user can access a customized web interface which provides all
the registered control panels.
5-1
Managing alarms
The Prime control panel will signal an alarm if one of the following events occurs:
• Zone alarm, when violation of a zone is detected.
• Zone tamper, when tamper (opening, dislodgement or delinquency) is detected on a device
that is connected to the terminals
• Peripheral tamper, when tamper (opening, dislodgement or delinquency) is detected on
one of the devices connected to the BUS (keypad, reader, expansion, sounder, GSM
communicator)
• Peripheral loss, when communication between the system and a peripheral device
connected to the BUS stops suddenly
• Control panel tamper, when tamper (opening, dislodgement or delinquency) is detected on
the control panel itself
In each of the following cases, the control panel will start the programmed alarm signalling
such as the activation of outputs, sounders, the sending of messages (SMS, email, push
notifications) or telephone calls.
These events will be saved to the events log.
The typical operations the user must perform in the event of alarms and/or tamper conditions are:
• Stop the ongoing alarms by deactivating the outputs related to the system alarm and
tamper events.
• Cancel the entire call queue and stop ongoing calls (if any).
• Delete the alarm and tamper memories.