PIMA Alarm Systems Ltd.
2.3.3 RFID accessory
RFID (Radio Frequency Identification) is a close distance technology that allows you to
operate devices carrying electronic readers, with accessories such as a key chain or tag,
that carry small transmitters.
To use RFID accessory, a special keypad with an RFID reader is required, e.g.,
RXN-410RFID.
Arming and disarming with an RFID tag/key chain is simple: just bring the accessory near
the keypad and the action is executed.
Depending on your system model, you can use up to 32/96/144 RFID tags or key chains.
A tag/key chain is given per user and is restricted according to the user authorizations. A
user can be forced to enter his/her code, every time they use the RFID device.
2.4 Disarming
Disarming the system is done the same as arming. See section 2.1.
Note, that if try to disarm and nothing happens, you may be trying to disarm outside your
disarming time frame. See “Disarming time ”, section 9.8.
2.4.1 Disarming with the Duress code
The Duress code is literally a code to be used in stress conditions.
Simply entering the code disarms the system, but also sends a silence alarm to the
Monitoring Station (if available) and an audible alarm via the programmed telephone.
To program the code, refer to section 9.3.
3. KEY #2: THE MEMORY LOG
The system logs various operations and alarms, chronologically. Every entry includes a
time stamp of the event, as well as the user (code) that executed it.
The operations that are logged are: arming, disarming, alarms, faults, code changing, time
changing, zone bypassing and more.
Part of the log is non-volatile (see Main Features on page 5).
To enter the memory screens: Master code