Cencon User Manual PDF
Cencon User Manual PDF
Manual Conventions
Trademarks
Table Of Contents
3.1 Locks
3.1.1 Lock/Lock Operations Report
3.1.1.1 Activate Lock
3.1.1.2 Add Lock to a Collection
3.1.1.3 Add Lock to a Route
3.1.1.4 Add Users to a Bank Lock
3.1.1.5 Close a Lock
3.1.1.6 Close Locks With User Key
3.1.1.7 Close Locks Based on Verify of Open With Key
3.1.1.8 Delete Shelved Lock
3.1.1.9 Dispatch a Lock
3.1.1.10 Edit Lock Data
3.1.1.11 Export to File
3.1.1.12 Force Delete of Unshelved Lock
3.1.1.13 Import From File
3.1.1.14 Individual Lock Report
3.1.1.15 Manager Force Close w/o Seal
3.1.1.16 Map the Lock Location
3.1.1.17 Reassign
3.1.1.18 Reissue an Activate Key
3.1.1.19 Remove Users from a Bank Lock
3.1.1.20 Rename
3.1.1.21 Replace
3.1.1.22 Resynchronize the Cencon Database with Lock
3.1.1.23 Shelve Lock
3.1.1.24 Unassign an FLM Call
3.1.1.25 Undo Replace/Deleted Lock History Report
3.1.1.26 Update Activation of Gen2 Locks Activated in Compatibility Mode
3.1.1.27 Verify Shelve
3.1.2 Open Lock Log
3.1.3 Route Report
3.1.3.1 Route Lock Listing
3.1.4 Collections
3.1.4.1 Collection Lock Listing
3.1.5 Lock Open Alarm
3.1.6 Bank Branch Report
3.1.6.1 Bank Users Mini Reports
3.1.7 Lock Operations with Serial Connect
3.1.7.1 Activate FLM Mode
3.1.7.2 Shelve FLM Mode
3.1.7.3 Resynchronize Dispatching for FLM Mode
3.1.7.4 Set Access Between Single and Dual User for FLM Mode
3.1.7.5 Close Dispatch for FLM Mode
3.1.7.6 Activate Route Mode
3.1.7.7 Shelve Route Mode
3.1.7.8 Resynchronize Dispatching for Route Mode
3.1.7.9 Set Access Between Single and Dual User for Route Mode
3.1.7.10 Close Dispatch for Route Mode
3.1.7.11 Activate Bank Mode
3.1.7.12 Shelve Bank Mode
3.1.7.13 Resynchronize Users for Bank Mode
3.1.7.14 Set Access Between Single and Dual User for Bank Mode
3.1.7.15 Set Time Delay and Open Time Window for Bank Mode
3.1.7.16 View Bank Mode Users
3.1.7.17 Add Bank Mode Users
3.1.7.18 Delete Bank Mode Users
3.1.7.19 Set Lock Clock and Time Zone Daylight Savings Time Table
3.1.7.20 Create Lock Report
3.1.7.21 Create Lock Audit Report
3.1.8 Lock Operations with Serial Connect
3.1.8.1 Activate FLM Mode
3.1.8.2 Shelve FLM Mode
3.1.8.3 Resynchronize Dispatching for FLM Mode
3.1.8.4 Set Access Between Single and Dual User for FLM Mode
3.1.8.5 Close Dispatch for FLM Mode
3.1.8.6 Activate Route Mode
3.1.8.7 Shelve Route Mode
3.1.8.8 Resynchronize Dispatching for Route Mode
3.1.8.9 Set Access Between Single and Dual User for Route Mode
3.1.8.10 Close Dispatch for Route Mode
3.1.8.11 Activate Bank Mode
3.1.8.12 Shelve Bank Mode
3.1.8.13 Resynchronize Users for Bank Mode
3.1.8.14 Set Access Between Single and Dual User for Bank Mode
3.1.8.15 Set Time Delay and Open Time Window for Bank Mode
3.1.8.16 View Bank Mode Users
3.1.8.17 Add Bank Mode Users
3.1.8.18 Delete Bank Mode Users
3.1.8.19 Set Lock Clock and Time Zone Daylight Savings Time Table
3.1.8.20 Create Lock Report
3.1.8.21 Create Lock Audit Report
3.2 Users
3.2.1 Add a User
3.2.2 Add a Windows Logon User
3.2.3 Change User Information
3.2.4 Change Information for Multiple Users
3.2.5 Rename a User
3.2.6 Delete a User
3.2.7 Display Open Locks for a User
3.2.8 Select Users for an Operation
3.3 Customers
3.4 History
3.4.1 Activity Log
3.4.2 Archived Activity Log
3.4.3 Lock Log History
3.4.4 Archived Lock Log History
3.4.5 Deleted Lock History
3.4.6 User History
3.4.7 Archived User History
3.4.8 Archived Routes
3.4.9 Reporting
3.5 Keys
3.5.1 Initialize Audit Download Key
3.5.2 Initialize Lock User Key Clock
3.5.3 Reinitialize User Key
3.5.4 Key report
3.5.5 Initialize a Lock Time Set Key
3.5.6 Create a Retrieve Bank Users Key (Gen2)
3.6 Authorization
3.6.1 Authorization Role Report
3.6.2 Authorization Definitions
3.6.3 Regions
3.6.4 Change Configuration Settings
3.6.5 Preference Settings
3.6.6 Security Hardware Report
Appendix
Appendix A - Lock Error Codes
Appendix B - Lock Keypad Commands
Appendix C - Lock Displays and Prompts
Appendix D - System Process Overview
Appendix E - How to...
Activate Lock in FLM Mode (From Shelved Mode)
Activate Lock in ROUTE Mode (From Shelved Mode)
Activate Lock in BANK Mode (From Shelved Mode)
Activate Lock in ROUTE Mode (Already in FLM Mode)
Activate Lock in FLM Mode (Already in Route Mode)
FLM/Route Service Call
Pre-defined Routes
Retrieve and Report on Audit Download
Shelve Lock
Add Bank Users To Lock After Activation
Delete Bank Users from Lock
Appendix F - Determine Lock Level
Appendix G - Beta Expiration
Glossary
The Smart Keys needed for a particular operation will be shown beside the flowcharts that describe the operation.
The screens shown in the manual that speak to inserting a key in a reader may depict either the use of the 2-port USB Key Box
or the 4-port Key Reader in association with the PCI card.
Input to the PC will be shown in bold type.
The screen samples may not look exactly as they do on your system depending on which version of the Windows operating
system you are using. Some samples in this document are from Windows XP and some are from Windows Vista.
Highlighted items:
Note
Indicates a point to consider.
Important Note
Helpful Hint
Indicates a technique or method that works well.
Caution
Indicates the need for care and caution to be observed during a procedure or process.
Warning
Indicates the possibility of loss of data or system integrity.
Before reading the Cencon Getting Started Guide, you should be familiar with basic Windows concepts and techniques. For detailed
information, refer to your Windows documentation.
Cencon
Cencon S2000
PowerStar Technology
Smart Key
Adobe and Adobe Reader are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries.
Microsoft, Windows, Windows Server, Microsoft SQL Server, MapPoint, Word, and Excel are registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.
Notice: The information in this manual is subject to change without notice and does not represent a commitment on the part of the
Kaba Mas. Kaba Mas shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or
consequential damages resulting from the furnishing, performance or use of this material.
Version 4.1.0
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
User Operations
Added search items for users to the 'Find Users' dialog of the Cencon User Operations report:
Added search item for users who have exceeded their permitted total number of lock dispatches.
Added search item for user dispatch enabled starting date and ending date range.
Added search item for user key model.
Added search item for user is legacy import flag.
Added button to generate a random combination for Bank Mode users to the 'Add a New User' dialog.
Revised database operations for renaming a user to no longer require the internal creation of a temporary user while
renaming a user. The database manipulation for renaming a user has been set up in a stored procedure called
CENPWDV4_1_CHANGE_USERID for efficiency.
Added new table column: Is Legacy Import
This is a flag indicating that the lock is an import from a legacy version of Cencon, such as the CenBank 4 software. If a
bank mode user key is marked as being a legacy import, then reinitialization of the bank mode user key is not permitted,
as security data unavailable from the legacy system would be lost.
Fixed Issues
Corrected drop down list in 'Add a New User' dialog showing disabled roles. Disabled roles are no longer shown in the
drop down for user type in the 'Add a New User' dialog.
Restricted users to performing query of the user, user history, or user archive tables to querying only roles for which they
are authorized. Previously a blank query would result in users from other roles.
When using Change Multiple Users to edit region, region control is active, and one or more special supervisors is being
affected, a warning is displayed that setting the region will not affect special supervisors.
Added additional check to ReInitKey form to check for legacy CenBank keys being reinitialized without available correct
security data (not available for import from CenBank). This is based on the Is Legacy Import flag being set for the user.
Corrected initial placement of Create First Logon Form when first displayed.
Corrected memory leak of database object not being cleaned up in Create First Logon Form.
Fixed errors with restoring Windows logon users from the User History Report to the active user table.
Open Issues
The User Operations report sort of the user type is based off of the numeric security level identifier for the user. The user
role is not being used in the sort. This is to be changed in a following version of Cencon / Centran.
Added operation to display the routes containing the selected lock to the Lock Operations report and Lock report.
Added new table columns to the Lock database table:
Time Zone - This is the time zone that the lock was initialized to. Previously this value was not saved when a lock
was initialized with a daylight savings time table.
Low Battery Date - This is the date/time that a close seal was received that indicated that the Cencon Gen 2 lock
had a low clock battery. It is cleared upon receiving close seal indicating that the Cencon Gen 2 lock no longer has
a low clock battery.
Duress Date - This is the date/time that a close seal was received that indicated that the Cencon Gen 2 lock had
been opened under duress. It is cleared upon receiving close seal indicating that the Cencon Gen 2 lock was not
opened under duress.
Is Legacy Import - This is a flag indicating that the lock is an import from a legacy version of Cencon, such as the
CenBank 4 software.
Added the following fields to the Lock report:
Address 1
Address 2
City
State / Province
Postal Code
Country
Time Zone
Low Battery Date - This is the date/time that a close seal was received that indicated that the Cencon Gen 2 lock
had a low clock battery. It is cleared upon receiving close seal indicating that the Cencon Gen 2 lock no longer has
a low clock battery.
Duress Date - This is the date/time that a close seal was received that indicated that the Cencon Gen 2 lock had
been opened under duress. It is cleared upon receiving close seal indicating that the Cencon Gen 2 lock was not
opened under duress.
Is Legacy Import - This is a flag indicating that the lock is an import from a legacy version of Cencon, such as the
CenBank 4 software.
Added support for dynamically setting the lock name the same as the lock serial number while filling out fields in the
'Activate Lock' dialog.
Removed support for lock groups.
Added support for bank mode users to be independently set for different locks on one SA key while filling out fields in the
'Activate Lock' dialog. Optionally, the bank mode users can still be all set the same for the locks in the 'Activate Lock'
dialog.
Added dedicated 'Select User' dialog for use when browsing for a user, instead of making use of the User Operations
report.
In the 'Activate Locks' dialog, if the bank branch selection is changed and a bank mode lock is currently selected to edit
the properties, the bank user selection tab will be brought to the front.
Added Google Maps and Bing Maps as available options for mapping lock locations.
Added search items for locks to the 'Find Locks' dialog of the Lock Operations / Lock report:
Made 'Add to Route' operation work the same as 'Add to Collection'. The selected lock is added to the open route lock list
if one is open, otherwise the 'Select Route' dialog is displayed.
The 'Activate Locks' dialog browse for user operation should not show DS1963 based lock users if a Gen 1 lock is in the
list of locks being activated. This has been corrected.
The 'Activate Locks' dialog message displaying the bank key limits properly displays the available number based off of the
lock model.
Gen 1 lock: "You can add __ more bank users with a total limit of 32".
Gen 2 lock: "You can add __ more bank users with a total limit of 100."
The 'Add Users to Bank Locks' dialog no longer adds more users than is allowed for the lock when selecting 'Add All'.
Additionally a message at the bottom of the dialog displays the available number based off of the lock model.
Gen 1 lock: "You can add at most __ more bank mode users to the lock." with a total limit of 32.
Gen 2 lock: "You can add at most __ more bank mode users to the lock." with a total limit of 100.
The 'Activate Locks' dialog lock activation in single mode grays out the second user entry text box and browse button, if
the selected lock mode being activated is in single mode.
The 'Verify Shelve Locks' dialog now displays the number and mode of locks shelved in the same manner as the 'Activate
Locks' dialog shows locks activated.
The 'Export Locks to XML' dialog now displays the number and mode of locks exported in the same manner as the
'Activate Locks' dialog shows locks activated.
The 'Activate Locks' dialog now dynamically updates data in the lock list as the user enters in data for the currently
selected lock.
Allowing the dispatch of a DS1963 user key to a Gen 1 lock for activating or shelving a lock has been corrected.
The Lock Serial Communications Audit report now saves its location and size for next time it is opened.
The Lock Dispatch, Reassign, and Close dialogs are all now resizable, due to screen resolution issues when remoting in
from a separate system in Windows.
Locks with international addresses will correctly map using the Google, Bing, and MapQuest options. Added proper
support for Country portion of lock address. If you are using the Microsoft MapPoint software, that software only supports
specific areas depending on the version purchased.
Changed usage of the user's combination count. This value is now dynamically updated based off of the currently
dispatched locks. If any of the following operations are done affecting a user, the user's combination count will
automatically be corrected:
Dispatch
Reassign
Close
Force Delete
Restored Delete
Replace
Undo Replace
Unassign
Force Close
Corrected operation for updating descriptive data for a lock not also updating the data in open lock log records. This could
result in left over references to Regions and Customer IDs in the open lock log that does not match the lock. The
referenced Regions and Customer IDs could not be renamed or deleted until the lock was closed out.
Lock Report, Open Lock Report, and Collection Lock Reports don't give user any prompts before adding locks to a route,
which must have its lock listing open. These now prompt like Lock Operations now.
Show only DS1994 key users in selection list for Shelve Locks form when Gen1 lock is being shelved. Reject in Shelve
Locks form processing DS1963 users selected for dispatch to shelve locks that include a Gen1 lock.
Corrected dispatch issue with route lock report dispatching to the wrong route name if it was open to another route
previously to the current one.
The following lock operations were not properly checking the dispatch limit from the user authorizations for the user being
dispatched for the operation:
Activate
Update Activate
Shelve
When shelving a lock, if the FLM key that your attempt to dispatch to is disabled, you will get a message stating 'Shelve
Successful' but it will then fail for the key not being active. This has been corrected.
Corrected display of menu items based off of authorizations for current user. Restricted users were being displayed some
menu items that they were not authorized to use.
Corrected unauthorized lock modes from being displayed in the various lock reports. Previously if a user was not
authorized to query for a certain lock mode, and they did not specify a lock mode in their search criteria, they would see
all the lock modes. This is now limited to just what lock modes the user is authorized for.
Fixed unassigned Open Call specification does not cause the Flags tab to be painted in lock searches.
Fix incorrect column sorts in Log History, and Log Archive reports.
Added scrollbars to remote serial connect tab pages.
Fixed Deleted Lock History table context menu had Undo Replacement for unauthorized users.
Fixed issue with Close Lock form not closing a lock with the close seal unless the lock was looked up from the database
first. The close seal was being cleared when just the lock serial number and the close seal was entered, and Close was
selected. The entered close seal is now being read from the form before attempting to look up the lock and update the
form.
Fixed an error with the calculation of memory space needed for activating locks on a single red SA (DS1996) key. If more
locks were selected than the key would hold, the data written to the key to activate the locks would be corrupted.
Corrected issue with removing locks from Activate Lock dialog lock list while the list is scrolled resulting in an error.
Open Issues
If an existing shelved lock serial number is selected as a replacement lock, the Replace Lock operation is not
automatically delete the shelved entry for the replacement lock and place it in the lock history table. Instead, it displays a
warning, and the shelved entry has to be manually deleted before proceeding.
A database deadlock can occur if two database operations involving the route lock table occur within 2-3 milliseconds of
each other. This issue is being evaluated. One of the operations will fail, and the matching database transaction be rolled
back. The work around is to retry the failed operation. This should occur very infrequently, due to the timing required.
The Microsoft MapPoint Europe / North America mapping option is not supported by the 64 bit version of the Cencon
software. The Microsoft MapPoint software is only available in 32 bit. A 64 bit version is not currently available.
Added menu options to Lock Collections report that were available from the Lock Operations Report, to include:
Add To Route
Rename Lock
Add Users to a Bank Mode Lock
Remove Users from a Bank Mode Lock
Initialize a Key to Resynchronize Lock (Gen2)
Cancel a Resynchronize Lock Operation (Gen2)
Resynchronize the Database with Lock Data (Gen2)
Additionally, menu separators were added to be more consistent with other lock reports.
Added search filter to Lock Collections report.
Implemented search filter to be able to query Lock Collections report, as well as search based off of data related to the
locks contained by the different lock collections.
Fixed Issues
In the Collection Listing report, you had to manually refresh the report to see the locks that were added to the collection.
This has been changed to automatically refresh the report when a lock is added to the collection.
Route Operations
Corrected Route Listing Report row selection with mouse left down click toggling selection upon left up click.
Corrected error with archiving routes. The error was related to route names that had SQL control characters in them, and
had to be re-parsed.
Corrected consistency of operations menu and context menu.
Corrected left up click toggling row selection in Route Listing report.
Fixed Route Selection dialog for adding locks to a route did not resize it's controls correctly when the dialog was resized.
Fixed Cencon Lock Serial Communications form not remembering position between times it is opened.
Region Operations
Customer Operations
Fixed Issues
Reporting Operations
Fields in the key report for a bank user key that do not apply have been removed:
Updated Edit menu between different reports for consistency of user interface. The arrangement of menu items in the Edit
menu was not consistent between reports.
Disabled copy menus if no row or rows are selected in a report.
When a report or other dialog was minimized, and the icon for the report or dialog was selected from the Cencon main
screen, the report or dialog would remain minimized. This has been corrected. If an icon for a report or dialog is selected,
and that item is already open but minimized, the report or dialog will be brought back up to the front.
Key Report for Lock Time Set Key has been updated to match formatting used by Lock Serial Communications Audit
report.
Corrected report 'File->Save' vs. 'File->Save As' behavior. 'File->Save' would always work as 'File->Save As'. This has
been corrected.
Display of time values now indicates if the time was during DST.
Changed Audit, Audit Archive, Lock Log History, Archived Lock Log History, Deleted Lock History, User History, Archived
User History and Archived Route search pull downs to use information from the selected table. It was possible for regions,
customers, etc, to be referenced in the history tables that have since been deleted.
Fixed sort order for search form drop-downs that get their information from individual tables and removed extraneous
blank entry.
Changed search forms that are used for more than one report to display the help for the appropriate report.
Corrected how report menu items are updated, so that opening menus by sliding the cursor over or by using the arrow
keys works properly.
Fixed issue with sort of description field in Audit Report and Audit Archive Report not being intuitive.
Corrected sort by customer number being present in some reports, where that column is no longer displayed.
Corrected closing an archive dialog with the close button closing the parent report.
Changed the Key Report to display lock audit dumps even if there is invalid data. The invalid audit records are highlighted
in yellow.
Open Issues
The Audit report and Archived Audit reports sort the description field based off of the event type. This is due to the
description field being dynamically generated based off of the event type. The description field is not an actual database
field.
Authorizations
Added a Category column to the Authorization Definition report. The Authorization Definition report now displays Name,
Type, and Category.
Fixed Issues
Performance improvements have been made to the 'Add Operations to Role' dialog. The method used by the dialog to
query data from the Cencon database was inefficient, and this has been corrected.
'Edit Operation Data' is now disabled for operations that do not have any settings to be edited. The Close FLM / Route
operation and Dispatch FLM / Route operation are the only ones that can be edited.
There is not a separate Authorization Operation for creating a Windows Logon User, rather than a key based user.
CenTran
CenTran will now multi-thread incoming transaction processing. If multiple transactions are awaiting processing, they will
be processed simultaneously. This greatly improves performance if multiple transactions are being sent from different
sources.
Modified XML parsing used in CenTran to cache pre-parsed schema, instead of re-parsing it with each received file. This
reduces the overhead of the XML processing of received transactions, and improves performance.
Added support for new lock table fields in CenTran transactions and schema:
Time Zone
Low Battery Date - This is the date/time that a close seal was received that indicated that the Cencon Gen 2 lock
had a low clock battery. It is cleared upon receiving close seal indicating that the Cencon Gen 2 lock no longer has
a low clock battery.
Duress Date - This is the date/time that a close seal was received that indicated that the Cencon Gen 2 lock had
been opened under duress. It is cleared upon receiving close seal indicating that the Cencon Gen 2 lock was not
opened under duress.
Is Legacy Import - This is a flag indicating that the lock is an import from a legacy version of Cencon, such as the
CenBank 4 software.
Added support for new user table fields in CenTran transactions and schema:
Is Legacy Import - This is a flag indicating that the lock is an import from a legacy version of Cencon, such as the
CenBank 4 software.
Added check during startup of application to determine if the full version of the .NET 4 framework is correctly installed on
the host system. Displays a warning if not installed and exits before attempting to load libraries from the .NET 4
framework.
Fixed Issues
Corrected case insensitivity issue for Region, CustomerID, and Bank Branch name in CenTran transactions.
Changed CenTran to look up and use the database's representation of Region, Customer ID, and Bank Branch Names
when updating user, lock, and route records. This ensures that the text case matches the other entries in the database.
Corrected error with CenTran force close on Close Route operation. Corrected IfForcedClosed value being properly
converted from XML input, to accept either 1 or 'true' as valid.
Corrected the LED usage for prompting for keys.
Corrected issue with ASCII extended data values being invalid for XML data output by CenTran.
Fixed issue with zero length files being left in the input queue. These files are now automatically deleted after the
specified timeout for processing received files.
Corrected unauthorized lock modes from being returned in the various lock table queries. Previously if a user was not
authorized to query for a certain lock mode, and they did not specify a lock mode in their search criteria, they would see
all the lock modes. This is now limited to just what lock modes the user is authorized for.
CenconDBSetupUtility
Added attempt to search for an existing Cencon database installation under the selected database catalog, and if one is
found, it will fill in the user option for the database schema. This is to prevent customers from becoming confused about
database schema, and attempting multiple database setups under different schema.
Will now re-set up database table default column values and default constraints. If a default column constraint is not set
up correctly on the Cencon database, it will set it up.
Now has the option to resize the database files used for the selected database catalog. This is to improve performance,
rather than having multiple resize events occur during database operations.
Added both 32 Bit and 64 Bit versions of the CenconDBSetupUtility to the install disk. There were performance differences
between the two versions, depending on the type of operating system the host computer was.
Greatly improved performance of setting audit event strings in the Audit / Audit Archive tables. This was through the
addition of an Audit Event Name table (CENAUDEVENTNAME), which maps audit event codes to audit event names.
Added support for User Configuration table (CENPWDCONFIG). This table is used for user specific configuration settings.
Added support for new database views and indexes to support new Cencon / CenTran functionality.
Added check during startup of application to determine if the full version of the .NET 4 framework is correctly installed on
the host system. Displays a warning if not installed and exits before attempting to load libraries from the .NET 4
framework.
Modified check for Cencon database version in the CenconDBSetupUtility to correctly check build level of the database.
Added check in CenconDBSetupUtility to prevent maintenance option from being run on a non-matching version database.
Changed creation of schema to match usage of schema in Microsoft SQL 2005 and later. A database schema is no longer
required to be associated with a user.
Corrected incompatibility with using a case sensitive database collation on the selected Microsoft SQL database. The
database might or might not be case sensitive, depending on the selected database collation.
Corrected error with import of legacy users in CenconDBSetupUtility. Password was being incorrectly encrypted, even
though blank.
Modified CenconDBSetupUtility to require admin privileges to allow ODBC connections to be set up correctly.
Corrected issue with CenBank imports allowing blank user names. Added support to CenconDBSetupUtility to generate
automatic name if left blank from legacy CenBank software.
CenconDriverInstaller
Updated installation of 32 Bit / 64 Bit Cencon Key Box and Cencon PCIO card driver versions to 10.21.
Added check during startup of application to determine if the full version of the .NET 4 framework is correctly installed on
the host system. Displays a warning if not installed and exits before attempting to load libraries from the .NET 4
framework.
Open Issues
The driver installer does not upgrade the previous Cencon Key Box / Cencon PCIO card driver versions 10.10 to 10.21.
The Cencon / CenTran software maintains compatibility back to driver version 10.10.
CenconDBEstimator
The Cencon Database Estimator has been removed from the Cencon / CenTran 4.1 installation as being unneeded.
Documentation
Fixed Issues
Fixed titles on pages in the History section and Appendices of the Reference manual.
Version 4.1.1
Updated lock serial numbers for Cencon Gen 2 locks to the following lock ranges:
Locks that do not fall into these ranges of locks are Cencon Gen 1 locks.
Cencon Gen 2 locks are color coded on the reports in Cencon. Light blue indicates a fully activated Gen 2 lock. Light
gray indicates a Cencon Gen 2 lock activated as Cencon Gen 1 lock.
Version 4.1.2
Version 4.1.3
Fixed Issues
Modified database access to correct possible database deadlock while updating the lock dispatch log table. This involved
a change to how record locking was being done during dispatch, reassign, and close database transactions. Also modified
the Cencon database view CENPWD_LOGDISPATCH to be set as WITH (NOLOCK) to prevent the view from causing
unnecessary locking with operations unrelated to the user dispatches.
Modified database access to improve performance over a wide area network. This primarily affects wait times for loading
drop down menus.
Modified the lock shelve, shelve from pending shelve, force shelve, delete, and force delete operations to remove entries
for the affected lock from any routes.
Route Operations
Fixed Issues
Corrected Route Lock Report properly displaying the route name in the title and on printed reports. The route name was
not being displayed. The route name is now added to the default title for the Route Lock Report for display of the report
and for printing. The default title is first, then a dash separator, and then followed by the route name.
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Removed usage of groups with locks. The group field has been replaced by using regions.
Removed customer number from display in various dialogs. The customer number field usage has been replaced by
customer name.
Updated tool tips for user entry in various dialogs.
Added support for using an Oracle database management system to host a Cencon database.
Removed separate definition of database schema and catalog in database connection settings.
Fixed Issues
Corrected various issues with import of legacy files from previous version of Cencon and Cenbank software.
Corrected field length limits for user entry in various dialogs.
Corrected various issues with support for translation.
User Operations
Fixed Issues
Fixed lock serial numbers not having leading zeros out to 6 or 9 digits, depending on serial number size.
Fixed importing xml files issue about users and user locks not being correctly inserted.
Added UI fixes to Import XML file including clear form.
Fixed search window to display Userid as a search field.
Route Operations
Fixed Issues
Region Operations
Fixed Issues
Changed Regions to only be upper case for better compatibility with case sensitive database installations, such as Oracle.
Bank Branch Operations
Fixed Issues
CenTran
New Product
The CenTran Configuration Manager is installed with the CenTran service to facilitate installing, starting, stopping, and
uninstalling the CenTran service. It is used to assist users in managing the CenTran service, where CenTran no longer
has a direct user interface.
CenTran Agent
New Product
The CenTran Agent is a Windows service for installation at ATMs. It supports communications with a Cencon Gen 2 or
higher lock connected by USB to the ATM console computer. It supports the following functions:
Remote management of the Gen 2 lock across the ATM communications network.
Notification of events occurring at the Cencon Gen 2 or higher lock to installed ATM software.
Reading current lock status upon command from installed ATM software.
Notification of events occurring at the Cencon Gen 2 or higher lock to a CenTran web service to update the
Cencon database with the audit of events.
Automatic closure of dispatched calls in the Cencon database by accessing a CenTran web service.
CenconDBSetupUtility
Added support for using an Oracle database management system to host a Cencon database.
Added various user interface enhancements and additional data checking.
Regions are folded to upper case.
Userids are folded to upper case.
Empty routes are deleted.
Remove duplicate regions
Duplicate Userids are deleted.
User must be database server admin to run db setup utility.
CenconDriverInstaller
Added support for the Cencon USB Interface Box driver installation.
Added support for a silent driver installation, to support the Cencon Agent silent installation.
Open Issues
The driver installer does not upgrade the previous Cencon Key Box / Cencon PCIO card driver versions 10.10 to 10.21.
The Cencon / CenTran software maintains compatibility back to driver version 10.10.
Documentation
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Completely rewrote the Cencon reports under the .NET user interface libraries. The Cencon reports had been
implemented under the Microsoft Foundation Classes (MFC) for user interface. The change to using .NET allowed for
better error reporting from within the Cencon reports. The reports were the last Cencon user interface item to still be using
the older Microsoft Foundation Classes (MFC).
Added support for Oracle to require only a limited access logon. Database access to Oracle no longer supports a separate
schema, by customer request. The ODBC database access to Oracle must be using a default schema that contains the
Cencon database.
Fixed Issues
Corrected some user interface issues for adding locks to new routes and new collections.
Various small user interface corrections.
Added support for displaying network address column for locks in various reports, including search and sort support.
Added support for additional ranges of Gen 2 lock serial numbers under a million:
Any lock serial numbers over a million automatically indicate a Cencon Gen 2 lock, and are not compatible with software
prior to Cencon / Centran 4.0.
Note - This change was also included in the Cencon / Centran 4.1.1 patch release.
Fixed Issues
Corrected issue with replace lock. The flag for unassigned was not being cleared on new lock being added to the
database, if the lock being replaced was unassigned.
Route Operations
Fixed Issues
Added foreign key to Route Lock table in Cencon database to ensure data integrity.
CenTran
Added support for Lock Log Query Operations under web service:
Read lock log data by lock name / mode.
Read lock log data by lock serial number / mode.
Query lock log data.
Query lock log data count.
Query lock log history data.
Query lock log history data count.
Query lock log archive data.
Query lock log archive data count.
Added web service handler for cross domain browser request headers.
Changed web service calls to POST as appropriate, instead of GET, for proper implementation of REST model of web
service.
Added dedicated web service end point for Centran Agent support, to operate at a lower level of authentication.
Added initial HTTPS support for web service access using security certificates for encryption.
Added example configuration files for setting up Centran operations to install.
Implemented Centran support for outputting lock combinations in a format suitable for display.
Added support for Oracle to require only a limited access logon. Database access to Oracle no longer supports a separate
schema, by customer request. The ODBC database access to Oracle must be using a default schema that contains the
Cencon database.
Fixed Issues
Fixed check to installer HTA files to evaluate if Centran installer had already been run.
Corrected an issue with Centran reading an excessive number of lock audit records to evaluate events at a lock over
remote communications. This fix speeded up how fast the lock events are evaluated.
CenTran API
Added initial support for creating self signed certificates for easy configuration of Centran secure communications across
HTTPS.
CenTran Agent
Added statistics support for number of bytes sent to / received from the lock.
New Product
Adds HTML based client interface for Centran web service operations. This is used as a light weight web browser
replacement for Cencon. The intent is to facilitate customer integration of Centran into their business systems through a
web browser interface. This is an initial partial implementation of this product, to be distributed on the Centran installation
CD.
Provided support for transactions not supported by Centran web service as Centran file based transactions. This is
implemented using a proxy through the deployed web server. The web server has to be co-located with Centran for this to
operate correctly.
Adds a Javascript API for support the Centran web service transactions.
CenconDBSetupUtility
Documentation
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Corrected overly long string copy operations into limited size fields possibly resulting in an exception under Cencon /
Centran.
Fixed Issues
Corrected error with activation of Cencon Gen 2 lock with serial number under a million being activated using a red SA
key. The wrong combination was being dispatched, as for a Cencon Gen 1 lock instead of a Cencon Gen 2 lock. This
error was only present in the Cencon / Centran 4.1.5.2722 Beta. It was not present in previous versions.
CenTran
Enable Centran to use a key box managed by the Cencon Key Box Agent.
Added additional field to result record for transactions to indicate if a failed transaction was appropriate to be retried or not.
This is for support of the Centran Agent operations at an ATM.
Added file based support and web service support for the following transactions:
Add user key based on specified remote communications to a Cencon USB Key Box
Edit user key based on specified remote communications to a Cencon USB Key Box
Read user key based on specified remote communications to a Cencon USB Key Box
Delete User
Added file based support for the following transactions:
Query Lock Status Across Network
Query Lock Audits Across Network
Evaluate Lock Event Across Network
These items were previously only available under web service based transactions.
Added web service support for the following transactions:
Change User Name
Read User Data By Name
Read User Data By Key Serial Number
Update User Data
These items were previously only available under file based transactions.
Changed fields for identifying lock remote communications access to allow support for future alternate methods of
connecting.
Fixed Issues
Updated Centran schema because of ip addresses being passed by anyURI data type was not being validated.
Removed Centran support for changing Bank Mode user bank branch. This would invalidate the data on the user's key.
Added support directly under Centran for automatically setting up URL access control list registration.
Added support directly under Centran for automatically setting up SSL certificate registration.
Added metadata line to Centran HTML management interface to not go into configuration mode when accessed by
Internet Explorer in intranet.
CenTran API
Fixed Issues
Removed usage / support for NCrypt encryption library due to compatibility requirement back to Windows Server 2003.
This limits the self signed certificate creation to older encryption libraries, which is not as secure. The requirement to
continue to support Windows Server 2003 was by customer request.
Updated Centran Configuration Manager to open Centran browser URL for management interface based on certificate
name set.
CenTran Agent
Added support for additional field in result record for transactions to indicate if a failed transaction was appropriate to be
retried or not.
New Product
Service to support remote Centran access to a Cencon USB Keybox across a network.
CenconDriverInstaller
Updated to Jungo driver level 11.0.0 for support of USB devices. This replaces Jungo driver level 10.2.1 from previous
releases of Cencon / Centran. This driver can not be used by earlier releases of software. This software release requires
the install / update of the Jungo driver. Note - An update to the Jungo driver level 11.1.0 for the next release is pending.
The updated Jungo driver level 11.0.0 adds Windows 8 compatiblity, as well as various bug fixes.
Documentation
Updated the Centran Programming Guide to match the new transactions for User Key transactions, etc.
Updated Cencon / Centran Getting Started Guide Oracle documentation.
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Fixed Issues
Fixed Issues
Modified database SQL operations to avoid database deadlocks for lock dispatch, reassign, close, assign, and unassign.
Also modified database view for user number of lock dispatches with log table to avoid database deadlocks. Evaluation of
database deadlocks for Oracle is still pending for a following beta release.
Updated database SQL operations to use a forward only cursor when possible to improve wide area network operations.
Evaluation of forward only cursors with Oracle is still pending for a following beta release.
Route Operations
Fixed Issues
Corrected force shelve lock, force delete lock, serial shelve lock, shelve lock and shelve pending lock operations not
removing the affected lock from entries in the route lock table.
CenTran
Added support for using named pipe to communicate configuration settings with the Centran service. The user interface
for the Centran Configuration Manager has been updated to include all of the Centran management operations. Note -
This provides an alternate method of managing Centran, instead of using the Centran web management interface. Due to
SSL not working correctly on Windows Server 2003, the web management interface is not available.
Fixed Issues
Corrected Centran threads for web service support not immediately cleaning up web service objects upon thread closing.
Web service objects were being cleaned up upon thread object finalizer, which would occur later.
Corrected default values for event log limit for Centran. The correct values are a limit of 50000 entries with a granularity of
1000 entries for truncating the event log.
Corrected .NET 4 launch condition requirement for install for Centran 32/64 bit. This was improperly set to .NET 3.5 SP1.
Updated Centran usage of SQL compact for event logging to version SQL Compact 4 SP1
Added support for using named pipe to communicate configuration settings with the Centran service. The user interface
for the Centran Configuration Manager has been updated to include all of the Centran management operations. Note -
This provides an alternate method of managing Centran, instead of using the Centran web management interface. Due to
SSL not working correctly on Windows Server 2003, the web management interface is not available.
Added support for limited self signed certificates to be generated for compatiblity with Windows Server 2003. Note - SSL
for Windows Server 2003 is not operating correctly with the limited certificates available to be generated on Windows
Server 2003.
CenTran Agent
Fixed Issues
Fixed Issues
CenconDriverInstaller
Updated to Jungo driver level 11.1.0 for support of USB devices. This replaces Jungo driver level 10.2.1 and 11.0.0 from
previous releases of Cencon / Centran. This driver can not be used by earlier releases of software. This software release
requires the install / update of the Jungo driver.
The updated Jungo driver level 11.0.0 and 11.1.0 adds Windows 8 compatiblity, as well as various bug fixes.
Documentation
Added release notes for Cencon / Centran 4.1.3 branch release to ongoing beta release.
Updated Centran Getting Started Guide with updated user interface for managing Centran.
Fixed Issues
Added missing image file for Cencon Getting Started Guide documentation for database setup.
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Cencon now recognizes a fixed life for the Version 4 beta release of 180 days after the date of creation by Kaba Mas.
Upon Cencon beta expiration, Cencon logon will be prohibited. Cencon will warn the user of impending beta expiration via
popup messages.
CenTran now recognizes a fixed life for the Version 4 beta release of 180 days after the date of creation by Kaba Mas.
Upon CenTran beta expiration, audit records reporting the CenTran beta expiration will be generated at CenTran startup.
Fixed Issues
Corrected operation to set time for a lock across a network not updating the lock record with a changed time zone id.
CenTran
Added support for using a local system named pipe to communicate with the Centran service. This is to support
applications running on the same computer as the Centran service, with minimal configuration required. The Centran API
has been updated to support this communications method.
Note: Centran web service transactions that are HTTP GET operations will default to the default dispatcher ID when
operating across a named pipe, as there is not a field to pass the dispatcher ID. This will be re-examined in a future
release.
Added support for the following remote lock management transactions to Centran and the Centran API:
Corrected evaluation of Centran's check for security data being correct. The reason for the security information not being
set up correctly was not being correctly identified.
Fixed Issues
Corrected the method by which the named pipe for communications of configuration data to Centran was being opened
and closed. The named pipe communications were not being closed properly and were timing out.
Corrected Centran Configuration Manager not updating the display of data after setting the default dispatcher.
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Enabled double buffering on Cencon .NET DataGridView based reports to improve repaint performance.
CenTran
Added support for the read key transaction to update the returned user record with the data as read from the key.
Added support for the read key transaction to return the user audit records from the key. Note: These audit records are a
different format from the audit records being returned from the Cencon audit table or the lock.
Added support for the following user table query transactions to Centran web service and the Centran API. Note: These
user table query transactions were previously only supported by XML file based operations.
When a transaction is initiated in a BETA version of CenTran that is within 60 days of expiration, an entry will be posted to
the Cencon database audit table and to the event log stating that the Centran BETA installation is near expiration.
When a transaction is initiated in a BETA version of CenTran that is past the BETA expiration date, an entry will be posted
to the Cencon database audit table and to the Centran event log stating that the Centran BETA installation has expired.
The requested transaction will be halted and a return code indicating failure due to the CenTran BETA expiration will be
returned to the transaction initiator.
Fixed Issues
Corrected a runtime error from occurring when displaying the Event Log via the Centran Configuration Manager after the
remote transaction "Set Lock Time Across Network" has been executed against a shelved lock.
Corrected the html links being generated as part of the Centran RSS Feed for lock events / errors.
CenconDBSetupUtility
Added primary key to legacy configuration database table for support of hot database backups.
Added primary key to log archive database table for support of hot database backups.
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Cencon Lock Operations report will automatically refresh and display the correct status after the Verify Shelve Locks
action.
Cencon reports can be refreshed using the F5 key.
Ctrl-F will initiate the Find function on Cencon reports.
CenTran
Added support to Centran to accept and use persistent agent connections. This is to avoid network connectivity issues
with clients running a Cencon Keybox Agent or an ATM console computer running a Centran ATM Agent being behind a
firewall.
Added support for Centran to check BETA expiration dates of Centran ATM Agents and Cencon Keybox Agents.
Added support for the following route transactions to Centran web service and the Centran API. Note: These route
transactions were previously only supported by XML file based operations.
Add a Route
Read a Route
Update a route
Delete a Route
Add Locks to a Route
Read Locks on a Route
Delete Locks from a Route
Dispatch All Locks on a Route
Dispatch Locks on a Route
Reassign All Locks on a Route
Reassign Locks on a Route
Close Locks on a Route
Route Table Query
Route Table Query Record Count
Route Lock Table Query
Route Lock Table Query Record Count
Added support for the following activity log transactions to Centran web service and the Centran API. Also added support
for additional search fields with activity log table searches. Note: These activity log transactions were previously only
supported by XML file based operations.
Centran Agent
Added support to initiate and maintain a persistent network connection with Centran. This is to avoid network connectivity
issues with the client being behind a firewall.
Added support to initiate and maintain a persistent network connection with Centran. This is to avoid network connectivity
issues with the client being behind a firewall.
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Added support for caching dialog combobox drop down data at Cencon startup. All drop down selections of region, bank
branch, and customer entries now have a button beside of them in dialogs to refresh the cached data as needed.
Updated dialog box drop downs for region, customer id, and bank branch to allow typing with suggestions from the list of
possible items. Users with very large sets of data were having problems selecting items due to the size of the drop down
list.
Made database query speed tuning improvements for sets of strings, to improve performance of retrieving large lists of
strings from the database. This affects the loading of dialogs.
Improved performance of database checks at Cencon startup, by making them operate in parallel (multi-threaded) to hide
network latencies for the individual database queries for checking each table. Each database table check operates in it's
own thread.
Changed versioning of Cencon Reference Manual and Centran 4 Programming Guide documentation to be versioned
based off of the program version.
Added text description of error codes to Cencon audit report record description display.
Added javascript fix for frame index scroll positon when reloading documentation page for Cencon Reference and Centran
programming guide.
Removed upper case SQL constraint for Cencon database region table.
Added support for Cencon Remote Shelve Change Key database configuration setting to control if a change key is
required to be in the lock for a remote shelve to be done. This is to require that some is at the lock for the lock to be
remotely shelved. This affects the remote shelve operation in Cencon and the remote shelve transaction in Centran.
A lock can now be added to the Shelve Locks dialog via the use of a search dialog. Additional locks can now be added to
the list of the Shelve Locks dialog after the initial selection of locks. The Shelve Locks dialog is now accessible from the
Locks section of the main Cencon panel.
Fixed Issues
Updated database query used during lock dispatch operations to correctly get the user dispatched combo count for from
the log table, without interfering with table locking.
Modified Cencon so that the Key Report for an SA shelve key with multiple locks, written in old versions of Cencon, will
display all locks.
Modified Cencon so the Key Report for an SA "init/shelve/add bank user/delete bank user" key will display the correct
value for the "Number of Locks On Key" value, even when multiple locks are contained on the SA key.
Fixed missing lock reboot after serial close of FLM mode lock from Cencon Lock Serial Communications dialog.
Modified Cencon so that on the Activate dialog, the Branch Users column of the Bank Users tab in the Activate Locks
dialog will be refreshed when either the Region or the Bank Branch Name fields are changed.
Modified Cencon so that:
On the key report for SA Shelve Key, the title for the column reporting the action date and time is labeled as Lock
Shelve Date instead of Lock Activation Date.
On the key report for SA Initialization and Shelve Keys, the date and time reported for the action performed at each
lock is now accurate.
Modified the Cencon lock rename function so that locks assigned to a route can be renamed.
Caution
The Centran XML Schema (CentranTransac.xsd) has grown larger than the previous default namespace buffer sizes
used by the Centran web service. The example configuration files for Centran have been modified to demonstrate
setting up the needed buffer sizes used by the Centran web service.
If you are using a previous Centran configuration file, you will need to adjust the specified buffer sizes in the same
manner as the new example configuration files, or use one of the new example configuration files and adjust as
needed.
CenTran
Added support for Cencon Remote Shelve Change Key database configuration setting to control if a change key is
required to be in the lock for a remote shelve to be done. This is to require that some is at the lock for the lock to be
remotely shelved. This affects the remote shelve operation in Cencon and the remote shelve transaction in Centran.
Moved Centran service named pipe configuration from being internally set up in a fixed manner to being set up under
configuration file.
Added support for the following query transactions to Centran web service and the Centran API:
The buffer sizes for the Centran web service had to be adjusted due to the size of the Centran XML schema. See the
above warning note about the Centran configuration files having to define larger buffer sizes for the Centran web service.
Made connection pool threads stop more gracefully and completely (stop open TCP connections and clear connection pool
thread pointers).
Corrected errors with Bank Branch back end functions, including incorrect check for authorization.
Added fault reporting for exceptions for the Centran web service. Previously there would not be a web service response
containing defails of the fault.
Corrected manner that XML validation was being done between threads in Centran. The previous manner of sharing the
xml reader settings was unsafe. Sharing the xml schema set is thread safe. Changed XML validation for files to use
Microsoft XML parser.
Removed duplicate code for Centran processing of dispatcher authorization.
Corrected audits created for error for updating lock.
Corrected audits created for error for unassigning lock.
Centran Agent
Frame the agent details structure sent to Centran by the agents to allow us to know whether the transmission failed.
Update Centran Agent and Cencon Key Box Agent documentation to switch from frames to using CSS.
Added Centran persistent connection information to Centran Agent installation documentation.
Enable changing of persistent connection parameters in the Centran Agents with the change configuration command and
display with the agent status command.
Fixed Issues
Ensure that the Centran and Cencon Key Box Agents wait for a device to be attached, so they know when to open their
pass-through ports.
Fix connection-closed check in pass-through processing for agents that was not being called frequently enough.
Added proper key box agent screen shots, delete unused images and update documentation for all three agents.
Made the .NET 3.5 Centran Agent reinstaller script check whether the driver needs to be replaced.
Change .NET 3.5 Centran Agent documentation to use CSS rather than frames for left-side navigation
Fixed Issues
Ensure that the Centran and Cencon Key Box Agents wait for a device to be attached, so they know when to open their
pass-through ports.
Fix connection-closed check in pass-through processing for agents that was not being called frequently enough.
Added proper key box agent screen shots, delete unused images and update documentation for all three agents.
Frame the agent details structure sent to Centran by the agents to allow us to know whether the transmission failed.
System tray application displays the persistent connection identifier for the key box agent.
Made the install/service activation functions atomic for the key box agent.
Replace the Cencon Key Box Agent System Tray Monitor icon with one that actually looks like a key box.
Add a Programs menu entry for starting the Cencon Key Box System Tray Monitor on installation.
Update Centran Agent and Cencon Key Box Agent documentation to switch from frames to using CSS.
Fixed Issues
Ensure that the Centran and Cencon Key Box Agents wait for a device to be attached, so they know when to open their
pass-through ports.
Fix connection-closed check in pass-through processing for agents that was not being called frequently enough.
Added proper key box agent screen shots, delete unused images and update documentation for all three agents.
Cencon API
Fixed Issues
Updated Centran SOAP API to have client connection clean up in function to handle possible exception occurring.
Corrected error with XML validation error list not being cleared between calls to Centran API.
Update CentranXMLInputOutputExample to allow the specification of TcpClient connections for remote lock and key box
operations.
Added support for new transactions as described above for Centran.
Fixed Issues
Corrected CenconDBSetupUtility not properly handling non default schema for Microsoft SQL database.
Change table names used in uppercasing Windows logon IDs in CenconDBSetupUtility to include schema qualification as
appropriate for database.
Version 4.1.5.3097
Notes
Translation of different versions of Cencon has to be completely redone. There are potential changes to the resource files and to
the XML string translation files that will not be correct or compatible between different versions of Cencon.
General Operations
Added support for Oracle to require only a limited access logon. Database access to Oracle no longer supports a separate
schema, by customer request. The ODBC database access to Oracle must be using a default schema that contains the
Cencon database.
Added Oracle instantclient drivers to Cencon / Centran installation.
Completely rewrote the Cencon reports under the .NET user interface libraries. The Cencon reports had been
implemented under the Microsoft Foundation Classes (MFC) for user interface. The change to using .NET allowed for
better error reporting from within the Cencon reports. The reports were the last Cencon user interface item to still be using
the older Microsoft Foundation Classes (MFC).
Removed usage of groups with locks. The group field has been replaced by using regions.
Removed customer number from display in various dialogs. The customer number field usage has been replaced by
customer name.
Updated tool tips for user entry in various dialogs.
Added support for using an Oracle database management system to host a Cencon database.
Removed separate definition of database schema and catalog in database connection settings.
Cencon reports can be refreshed using the F5 key.
Ctrl-F will initiate the Find function on Cencon reports.
Updated database SQL operations to use a forward only cursor to improve wide area network operations. This improves
performance and allows compatibility with newer Microsoft runtime libaries for Windows 8. Because of using forward only
database cursors, large reports on Cencon that do not fit into memory can not be scrolled through to load records as
needed. Only the initial set of records that could fit into the client system memory will be loaded and can be accessed.
Improved threading of Cencon reports to allow simultaneous report operations.
Made database query speed tuning improvements for sets of strings, to improve performance of retrieving large lists of
strings from the database. This affects the loading of dialogs.
Improved performance of database checks at Cencon startup, by making them operate in parallel (multi-threaded) to hide
network latencies for the individual database queries for checking each table. Each database table check operates in it's
own thread.
Added support for caching dialog combobox drop down data at Cencon startup. All drop down selections of region, bank
branch, and customer entries now have a button beside of them in dialogs to refresh the cached data as needed.
Updated dialog box drop downs for region, customer id, and bank branch to allow typing with suggestions from the list of
possible items. Users with very large sets of data were having problems selecting items due to the size of the drop down
list.
Expiration of BETA releases:
Cencon now recognizes a fixed life for the Version 4 beta release of 180 days after the date of creation by Kaba Mas.
Upon Cencon beta expiration, Cencon logon will be prohibited. Cencon will warn the user of impending beta expiration via
popup messages.
CenTran now recognizes a fixed life for the Version 4 beta release of 180 days after the date of creation by Kaba Mas.
Upon CenTran beta expiration, audit records reporting the CenTran beta expiration will be generated at CenTran startup.
Corrected compatibility issue with Microsoft SQL DATETIME format. This would only occur with French set as the
language for SQL Server system messages and French_CI_AI set as the database collation. This may be a potential
Microsoft SQL server bug.
Fixed Issues
Corrected various issues with import of legacy files from previous version of Cencon and Cenbank software.
Corrected field length limits for user entry in various dialogs.
Corrected various issues with support for translation.
Corrected overly long string copy operations into limited size fields possibly resulting in an exception under Cencon /
Centran.
Corrected report titles not being printed from reports.
Corrected .NET 4 launch condition requirement for install for Cencon 32/64 bit. This was improperly set to .NET 3.5 SP1.
Added the install file for updating operating system Root Certificate Authority cerficates to TrustedRootCAUpdates
directory on the install image for support of driver installation on legacy or out of date operating systems.
Enabled double buffering on Cencon .NET DataGridView based reports to improve repaint performance.
Corrected Cencon main window not receiving user focus when application is first being run.
Known Issues
There is a possibility of a database deadlock when using Oracle as your Database Management System (DBMS). This
can possibly occur if multiple database operations are happening simultaneously from multiple Cencon clients or from
Centran with multiple simultaneous transactions. This will be resolved in the next software release. Note - Previous
database deadlock issues involving Microsoft SQL have been resolved in this release.
User Operations
Added support for displaying network address column for locks in various reports, including search and sort support.
Added support for additional ranges of Gen 2 lock serial numbers under a million:
Any lock serial numbers over a million automatically indicate a Cencon Gen 2 lock, and are not compatible with software
prior to Cencon / Centran 4.0.
Note - This change was also included in the Cencon / Centran 4.1.1 patch release.
Added support for Cencon Remote Shelve Change Key database configuration setting to control if a change key is
required to be in the lock for a remote shelve to be done. This is to require that some is at the lock for the lock to be
remotely shelved. This affects the remote shelve operation in Cencon and the remote shelve transaction in Centran.
A lock can now be added to the Shelve Locks dialog via the use of a search dialog. Additional locks can now be added to
the list of the Shelve Locks dialog after the initial selection of locks. The Shelve Locks dialog is now accessible from the
Locks section of the main Cencon panel.
Fixed Issues
Fixed lock serial numbers not having leading zeros out to 6 or 9 digits, depending on serial number size.
Fixed importing xml files issue about users and user locks not being correctly inserted.
Added UI fixes to Import XML file including clear form.
Fixed search window to display Userid as a search field.
Fixed search window to display lock serial number as a search field.
Corrected some user interface issues for adding locks to new routes and new collections.
Corrected issue with replace lock. The flag for unassigned was not being cleared on new lock being added to the
database, if the lock being replaced was unassigned.
Modified database SQL operations to avoid database deadlocks for lock dispatch, reassign, close, assign, and unassign.
Also modified database view for user number of lock dispatches with log table to avoid database deadlocks. Evaluation of
database deadlocks for Oracle is still pending for a following release.
Corrected operation to set time for a lock across a network not updating the lock record with a changed time zone id.
Cencon Lock Operations report will automatically refresh and display the correct status after the Verify Shelve Locks
action.
Updated database query used during lock dispatch operations to correctly get the user dispatched combo count for from
the log table, without interfering with table locking.
Modified Cencon so that the Key Report for an SA shelve key with multiple locks, written in old versions of Cencon, will
display all locks.
Modified Cencon so the Key Report for an SA "init/shelve/add bank user/delete bank user" key will display the correct
value for the "Number of Locks On Key" value, even when multiple locks are contained on the SA key.
Fixed missing lock reboot after serial close of FLM mode lock from Cencon Lock Serial Communications dialog.
Modified Cencon so that on the Activate dialog, the Branch Users column of the Bank Users tab in the Activate Locks
dialog will be refreshed when either the Region or the Bank Branch Name fields are changed.
Modified Cencon so that:
On the key report for SA Shelve Key, the title for the column reporting the action date and time is labeled as Lock
Shelve Date instead of Lock Activation Date.
On the key report for SA Initialization and Shelve Keys, the date and time reported for the action performed at each
lock is now accurate.
Modified the Cencon lock rename function so that locks assigned to a route can be renamed.
Fixed a issue with remote communications to the Cencon Gen 2 lock. The check for the Cencon Gen 2 lock being
available for doing remote communications was sometimes timing out. Additionally, the delayed responses from previous
checks with the lock were being interpreted as errors in communications. The communications timeout for checking for the
Cencon Gen 2 lock responding has been extended and any delayed responses are now being handled correctly.
Fixed possible serial communications exception with Cencon / Centran with the lock, where the lock network connection
can be occupied by another application connecting at the same time as Cencon / Centran.
Fixed Cencon serial resync bank users operation with the Lock Serial Operations form from trying to download users from
lock with 0 users, causing exception in the progress bar.
Changed the serial activate of lock to save state of lock if fails to receive response for activate from lock. If the lock
receives the command but the connection prevents the response from being received by Cencon / Centran, the lock might
actually be activated. If not, the lock can be deleted back from the database. If the lock was actually activated, the user is
not locked out from the lock.
The remote serial shelve of the lock was not allowing a shelve if the lock was dispatched. Fixed serial shelve of lock to
also close the lock if it is dispatched. If the option to require a change key or remote administration enabled at the lock is
selected in Cencon / Centran, then the lock must have been dispatched and opened in order to insert the change key or
to enable remote administration.
Route Operations
Fixed Issues
Fixed Issues
CenTran
The setup of the Centran web service is done primarily by editing the Centran configuration file. The configuration file
defines the web service endpoints and settings to be used by Centran.
Setup of self signed security certificates for Centran is supported by the Centran Configuration Manager, however use of a
certificate authority server is recommended.
The Centran service continues to support XML file transactions and legacy file transactions.
Add user key based on specified remote communications to a Cencon USB Key Box
Edit user key based on specified remote communications to a Cencon USB Key Box
Read user key based on specified remote communications to a Cencon USB Key Box
Read key information based on specified remote communications to a Cencon USB Key Box
Delete User
Added support for the read key transaction to update the returned user record with the data as read from the key.
Added support for the read key transaction to return the user audit records from the key. Note: These audit records are a
different format from the audit records being returned from the Cencon audit table or the lock.
Added support for remote administration of a Cencon Gen 2 or higher lock across a network. Added support for the
following remote lock management transactions to Centran and the Centran API:
Region Add
Region Update
Region Read
Region Delete
Removed overwrite flag option on Customer Add as being unnecessary.
Added the following additional fields to the output lock records:
NetworkAddress
NetworkPort
DisplayIssuedComboUser1Seq1
DisplayIssuedComboUser1Seq2
DisplayIssuedComboUser1Seq3
DisplayIssuedComboUser2Seq1
DisplayIssuedComboUser2Seq2
DisplayIssuedComboUser2Seq3
CloseSealLength
BankModeUserNameArray
Added the following additional fields to the output audit records:
GroupName
Description
auditPK
User1Key
User2Key
LogonKey
LockTransactionCategory
LockTransactionType
LockTransactionEvent
LockCloseSeal
LockFullSealCount
IsLockClockBatteryIsLow
IsLockDuressComboUsed
IsLockCloseSealValid
LockAbbreviatedDeviceID
LockOpenTime
LockCloseTime
IsPossibleLockErrorOrIntrusion
LockAuditIndex
DatabaseLockAuditIndex
ClientIPAddress
LockIPAddress
Many of these additional fields is to support saving remotely network connected lock audit trails in the Cencon database.
Added support for Cencon Gen 2 Locks being dispatched, reassigned, and closed using the Centran legacy binary file
transactions. This is limited to identifying locks by lock names that are no longer than 10 characters and do not contain
any international characters. Any Cencon Gen 2 Locks with lock serial numbers a million or higher will have their lock
serial number reported back as 000000, since the longer serial numbers will not fit within the fields of the legacy binary
file transactions.
See Appendix D of the Centran 4 Programming Reference Manual for details of using the legacy binary file transactions
with Cencon Gen 2 locks.
Fixed Issues
Fixed check to installer HTA files to evaluate if Centran installer had already been run.
Corrected an issue with Centran reading an excessive number of lock audit records to evaluate events at a lock over
remote communications. This fix speeded up how fast the lock events are evaluated.
Added support directly under Centran for automatically setting up URL access control list registration.
Added support directly under Centran for automatically setting up SSL certificate registration.
Added metadata line to Centran HTML management interface to not go into configuration mode when accessed by
Internet Explorer in intranet.
Corrected Centran threads for web service support not immediately cleaning up web service objects upon thread closing.
Web service objects were being cleaned up upon thread object finalizer, which would occur later.
Corrected .NET 4 launch condition requirement for install for Centran 32/64 bit. This was improperly set to .NET 3.5 SP1.
Updated Centran usage of SQL compact for event logging to version SQL Compact 4 SP1
Corrected evaluation of Centran's check for security data being correct. The reason for the security information not being
set up correctly was not being correctly identified.
Corrected a runtime error from occurring when displaying the Event Log via the Centran Configuration Manager after the
remote transaction "Set Lock Time Across Network" has been executed against a shelved lock.
Corrected the html links being generated as part of the Centran RSS Feed for lock events / errors.
Corrected update route correctly auditing changing a route customer ID.
Corrected web service search of log and lock tables not checking the mode restrictions for the user authorization to
restrict what mode of lock data is returned.
Corrected file based transactions not checking the following user authorization attributes:
Current dispatcher for transaction authorization role not having log on authorization set.
Current dispatcher for transaction being disabled from logging on.
Current dispatcher for transaction being outside of their enabled start / end period for access.
Failed transactions were not always being audited. Several instances of this have been corrected.
Corrected Centran API not returning the record counts correctly from user table query record count transactions.
Corrected the default dispatcher ID set for use with Centran having to be upper case for use with Oracle.
Added fault reporting for exceptions for the Centran web service. Previously there would not be a web service response
containing defails of the fault.
Corrected audits created for error for updating lock.
Corrected audits created for error for unassigning lock.
Corrected Centran Service startup at computer operating system startup not able to start processing because of not being
able to access the database. The Centran Service will retry to start processing in the event of the database being
unreachable, the Cencon Keybox not being ready yet on the USB bus, or the Cencon Keybox not being present.
Corrected Centran potentially reading an input transaction file while the file is still being written by the 3rd party
application. Centran will now poll for the input transaction file being available for exclusive access, and then read the
transaction file. This allows a much lower delay time to be set for Centran before attempting to read an input transaction
file. It also ensures that an input transaction file is read correctly by Centran.
Fixed the Evaluate Lock Event Across Network transaction from preventing access to the key box for other concurrent
transactions with Centran.
Fixed possible exception from Centran when cleaning up the remote serial connection for operations with a lock across a
network.
New Product
The CenTran Configuration Manager is installed with the CenTran service to facilitate installing, starting, stopping, and
uninstalling the CenTran service. It is used to assist users in managing the CenTran service, where CenTran no longer
has a direct user interface.
Added support for using named pipe to communicate configuration settings with the Centran service. The user interface
for the Centran Configuration Manager has been updated to include all of the Centran management operations. Note -
This provides an alternate method of managing Centran, instead of using the Centran web management interface. Due to
SSL not working correctly on Windows Server 2003, the web management interface is not available.
Added initial support for creating self signed certificates for easy configuration of Centran secure communications across
HTTPS.
Added support for limited self signed certificates to be generated for compatiblity with Windows Server 2003. Note - SSL
for Windows Server 2003 is not operating correctly with the limited certificates available to be generated on Windows
Server 2003.
Fixed Issues
Corrected the method by which the named pipe for communications of configuration data to Centran was being opened
and closed. The named pipe communications were not being closed properly and were timing out.
Corrected Centran Configuration Manager not updating the display of data after setting the default dispatcher.
CenTran API
Updated Centran SOAP API to have client connection clean up in function to handle possible exception occurring.
Corrected error with XML validation error list not being cleared between calls to Centran API.
Update CentranXMLInputOutputExample to allow the specification of TcpClient connections for remote lock and key box
operations.
Added support for new transactions as described above for Centran.
New Product
Adds HTML based client interface for Centran web service operations. This is used as a light weight web browser
replacement for Cencon. The intent is to facilitate customer integration of Centran into their business systems through a
web browser interface. This is an initial partial implementation of this product, to be distributed on the Centran installation
CD.
Provided support for transactions not supported by Centran web service as Centran file based transactions. This is
implemented using a proxy through the deployed web server. The web server has to be co-located with Centran for this to
operate correctly.
Adds a Javascript API for support the Centran web service transactions.
Added support for using an Oracle database management system to host a Cencon database. Added support for Oracle
to require only a limited access logon. Database access to Oracle no longer supports a separate schema, by customer
request. The ODBC database access to Oracle must be using a default schema that contains the Cencon database.
Updated warning for database version. SQL Server 2008 R2 and higher or Oracle 10g and higher is supported. Older
database versions are not supported.
The User must be database server admin to run CenconDBSetupUtility against Microsoft SQL.
Added various user interface enhancements and additional data checking.
Windows logon Userids are folded to upper case.
Empty routes are deleted.
Remove duplicate regions.
Duplicate Userids are deleted.
Added additional reporting of DBMS driver and operating system.
Added primary key to legacy configuration database table for support of hot database backups.
Added primary key to log archive database table for support of hot database backups.
Fixed Issues
Removed usage / support for NCrypt encryption library due to compatibility requirement back to Windows Server 2003.
This limits the self signed certificate creation to older encryption libraries, which is not as secure. The requirement to
continue to support Windows Server 2003 was by customer request.
Updated Centran Configuration Manager to open Centran browser URL for management interface based on certificate
name set.
Corrected CenconDBSetupUtility not properly handling non default schema for Microsoft SQL database.
Change table names used in uppercasing Windows logon IDs in CenconDBSetupUtility to include schema qualification as
appropriate for database.
CenconDriverInstaller
Updated to Jungo driver level 11.1.0 for support of USB devices. This replaces Jungo driver level 10.2.1 and 11.0.0 from
previous releases of Cencon / Centran. This driver can not be used by earlier releases of software. This software release
requires the install / update of the Jungo driver.
The updated Jungo driver level 11.0.0 and 11.1.0 adds Windows 8 compatiblity, as well as various bug fixes.
Documentation
Fixed bad reference links to related lock operations from software operation entries. Added missing references for related
Gen 2 Swing Bolt lock operations from software operation entries.
An Enterprise / Multi-Server License Kit also is available - p/n 201194. This kit option includes all items in the Single Server
Option and all 3 Mode Authorization Licenses shown above. A Cencon 4 Enterprise / Multi-Server License Certificate is provided instead
of the Single Server License Certificate. The Installation Key and Dispatch Kits are still required for implementation and are still ordered
separately.
If you are missing any of the above items, contact Kaba Mas Technical Support at 1 (800) 950-4744.
The Cencon software controls access to Cencon locks in either or both of the following methods:
Access is further controlled by the advanced-design electronic keys known as Smart Keys. Once the lock is active in any of the modes,
an opening can only occur with an OTC or RAC + the corresponding Smart Key. This dual token requirement of a physical device plus
that user's known 6-digit number for opening the lock ensures security. If one of the two access tokens are compromised or lost, either
the key or the combination, the lock remains secure. Audit information on locks, keys, and software may only be accessed by
administrative personnel using the highest level of security safeguards. These audit records cannot be altered by anyone, not even those
people who are granted the highest level of security in the system.
It is important that you understand how the entire system operates, even though many of the operations will be carried out by other
personnel. Before you start using the program, be sure to read the next few pages. They tell you what this package includes, the
equipment you need to use the software, and they identify the components of the system and describe the people who will be working
with them.
The Cencon 4 software allows an unlimited number of unique Software Logon User types, called Roles, depending on what group of
menu options the user should be given access to. Prior to Cencon 4 software, there have been only 3 different levels of access
(Dispatcher, Supervisor, and Special Supervisor), which are described below as examples. The software has several other default Roles,
such as Reporting and Bank Mode Only, for example. The use of some of these default roles allows functions that were previously
unique to auxiliary programs used with the Cencon locks (CenBank, CenDemo, Key Maintenance Utility, Activation Only) to be
incorporated into the Cencon software, yet controlled to certain personnel. Although the default Roles are not changeable, any type of
Logon User can be uniquely customized by copying the default role and renaming it as a new role. Each Logon Users can either use an
initialized black Smart Key + his or her chosen password to access the software, or access can be allowed when the user is logged into
the Windows Operating System using Windows Authorization. At least one Special Supervisor logon key is required to be created in the
system, though all other software logon users can choose to use Windows Authorization or a black Logon key. The software logon keys
cannot be used at the Cencon lock to open it. Below, the 3 Logon User types that were used in previous Cencon versions are
described, as an example of what each role may have with the software. For more information on creating and using Roles see sect.
3.6.1 on Authorization Definitions.
1.3.2.1 Dispatcher
The Dispatcher works directly with the Cencon software to issue lock combinations and direct the operations of the FLM and
Route personnel (Bank users are not dispatched). Locks are opened and secured through a coordinated effort between the
Dispatcher and an FLM or Route person. Each Dispatcher is permitted access to only certain sections of the Cencon program,
depending on how the authorization levels are defined for certain activities.
1.3.2.2 Supervisor
The Supervisor directs the operations of the Dispatchers. The Supervisor normally has access to levels in the Cencon software
that are not available to Dispatchers, including the viewing of activity records and the creation of service routes. Each Supervisor
is permitted access to only certain sections of the Cencon software, depending on how the authorization levels are defined for
certain activities.
The PC-Based Computer System is actually comprised of hardware and software components. Cencon 4 supports both the Cencon PCI
Adapter Card and the Cencon Key Box. The Cencon PCI Adapter Card is installed into an open PCI adapter slot inside the PC. The
Cencon Key Box is installed by attaching its cable to any USB port on your computer. These devices contain information which serves
as unique identification for a specific company's system.
Note
If a single company needs multiple stand-alone PC systems set up or multiple Cencon dispatching clients on the same network,
multiple PCI Adapter Cards or Key Boxes can be issued to the same company with the same unique security code for that company
burned into the device.
The Cencon PCI Adapter Card includes a second piece of hardware called the Smart Key Reader, consisting of 4 Smart Key
ports. The key reader connects to the Cencon Adapter Card. Ports 0, 1 and 2 are configured as "read only" ports and are used for
reading software logon keys only. Port 3 is used to create new keys and read audit keys. Because there are 2 versions of the Smart Key
Reader, the location of Port 3 is described in 2 different ways: if the reader is the grey-colored, non-RoHS version (p/n 202019), Port 3
is the farthest from the key reader's cable. If the reader is the enclosed, black, RoHS-version (p/n 202212), Port 3 is the port on the far
right-hand side.
Note
The non-RoHS version of the 4-port key reader (shown below on the left) is compatible with both older, plastic-fob keys and newer,
metal fob keys. The RoHS version of the 4-port key reader (shown below on the right) is only compatible with the metal fob keys.
The 2-port Cencon Key Box allows use of both metal and plastic-fob keys.
Shown above: P/N 202019. Non-RoHS-version Key Shown Above: P/N 202212. RoHS-version Key
Reader Reader
The Cencon Key Box has two Smart Key ports, each having a green and a red status light. The blue LED in the middle is a power
indicator when the unit is plugged in via the USB cable. A flashing green light indicates the port where the key needs to be inserted.
Typically, the left-side port is used for reading an install key or a software logon key. The right-side port is used for creating or reading
the audits from user keys or red SA keys. If there is an error reading the key, the red light is illuminated.
FCC Notice
CENCON KEY BOX
MODEL 202201
The Cencon Key Box is manufactured by Kaba Mas LLC, 749 W. Short Street, Lexington, KY, 40508, U.S.A., 859-253-4744,
HTTP://www.kaba-mas.com. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including
interference that may cause undesired operation.
The software component is the PC-based Cencon 4 software. The software is designed to align itself with the internal software of the
locks in generating unique One Time Combinations. Software functions also include the following:
User Management
Lock Management
Lock Activation/Shelving
Reports and Auditing
In order to logon to the system, an authorized Logon User's Smart Key would be inserted into the Key Reader, and the authorized user's
password must be entered. Instead of using a software logon key, a Windows user can be set up in the Cencon 4 software and be
validated by Windows Authentication. Any user who is given Cencon software logon authority can logon and use the Cencon program.
The Cencon locks are highly-secured, advanced-design locks. The original design was first developed for use on United States
Government safes containing classified material. There are currently 2 different models of the Cencon lock series that will operate in
conjunction with the Cencon 4 Software. They are as follows:
Cencon Gen2
Cencon Gen1 (previously known simply as Cencon S2000)
Even though the locks are electromechanical, they require no wiring or batteries for opening the lock because they are self-powered.
Power is generated by turning the dial knob on the lock to the left (counter-clockwise). After several turns of the knob, enough power is
generated to allow the microprocessor in the lock to function. Combinations are then entered by pressing the numeric keys on the lock
keypad, and a Smart Key is then presented to the lock's key reader. The software in the lock aligns itself with the PC software in
generating unique One-Time-Combinations from the moment the lock is activated in FLM or Route mode.
Those users who are familiar with the operation of the Gen1 lock will notice few differences if operating the Gen2 lock as they did the
Gen1 lock. However, many product enhancements exist with the Gen2 lock that are dependent on the type of PC equipment used to
activate the lock.
See Chapter 4 - Cencon Locks for detailed information on the Cencon lock hardware.
Note
It is important to note that any lock may be activated in two or more modes simultaneously (of the 3 modes not including shelved
mode). These different modes in a lock can either all be controlled by the same company or by 2 or 3 different companies. Also
note, once a certain company has activated one of the modes from their software, no other company can be in control of that
particular mode until that mode's current controller deactivates (shelves) their control of that mode.
Shelved Mode
The Cencon lock opens on the fixed combination of 50-25-50 and does not require a key of any kind. This is the default factory
mode that all new locks are in when they are shipped from Kaba Mas. It is also the mode that locks are placed in when they are
completely shelved (i.e., all active modes) from service, i.e., they are not being used operationally as a security device.
Note
The Shelved Mode Combination can be changed to something other than 50-25-50. See "Change Shelved Mode
Combination" in the System Start-Up section of this manual.
Route Mode
The Cencon lock requires the correct Route key and the correct OTC to open. After access is gained, the door closed, and the
lock bolt extended, the Route key is presented to the lock to receive a Close Seal number. The Route mode user records and
later relays the Close Seal to a Software Logon User. Multiple combinations may be issued to a Route Key as needed. In
addition, the combinations to a predetermined list of locks (a route) may be issued to the Route person at the start of the work
period. In this case the Close Seal numbers are automatically recorded in the Route person's Personal Identifier key when each
lock is closed. At the end of the route the Close Seal numbers can be downloaded from the key into the Cencon computer or can
be entered manually one by one, from a menu. If Two Person Integrity (TPI) is required, Route Mode may be set to require two
different keys and combinations to open the lock (Route Mode with Dual Access).
FLM Mode
FLM Mode is similar to Route Mode, but typically each FLM user is only dispatched a single one-time-combination at a time.
When the FLM user receives the Close Seal, a call is made to the Software Logon User, who enters the Close Seal into the
Cencon software, freeing the FLM key to be dispatched to the next site which needs service. This mode is useful where the
containers or locks may require periodic unscheduled maintenance. By default it is not possible to give more than one combination
at a time to a particular FLM user, though this can be modified. This mode may also be set to require Two Person Integrity (FLM
Mode with Dual Access).
Bank Mode
This is a special mode which allows the lock to be accessed by persons other than regular service personnel (typically bank
employees) when the container is located at a bank. In Bank Mode, the lock will open repeatedly when using the confidential
combination each unique to different authorized Bank user key, and will not issue a close seal number. Rather than receiving a
close seal number, after the door is closed and the lock is secure, the Bank Mode User's key is presented to the lock to write a
close audit record to the lock and the key. The bank personnel may change their combinations when desired by a simple
procedure. Again, Two Person Integrity is an option (Bank Mode with Dual Access).
Bank locks may be set to operate with Time Delay when they are activated. If a lock is activated with Time Delay, the lock will
only open after the Time Delay has expired and before the Window to Open (the time allowed after the Delay time to Open the
lock before the lock resets) expires. When a lock is activated in Time Delay mode, the time delay applies to all Bank mode users.
The maximum number of audit record lines that can be stored in a Cencon lock is around 500, depending on the access modes used,
the type of lock and the type of audit records. After that limit is reached, the audit file will wrap around and begin overwriting the oldest
records. Because the audit storage capacity in the Gen2 lock exceeds the storage capacity of the SA key, in order to view the oldest
audit records, it may be necessary to directly connect the lock to a Cencon software PC using a special cable. However, typically an
auditor is most concerned about the most recent set of records, so the SA key audit proves to be more than sufficient.
Note
An open and a corresponding close operation are recorded in 1 audit record line if performed by the same key, when used with a
lock in Single Mode; therefore, the maximum number of opens and closes in the Cencon lock could be twice the number of audit
lines; therefore it could be more than 1000 audit records.
Smart Keys are used by people who work with the Cencon system, whether it be at the PC using the software program or at the lock. A
Smart Key is actually a Dallas Semiconductor electronic device imbedded in a plastic or metal fob. The keys are designed to be carried
on a key ring like a traditional key. The keys are placed in the key reader attached to the PC and are initialized with unique data. The
lock also has a key reader, where the Smart Key is presented, resulting in data verification and the writing of programming or audit
records. These sophisticated electronic keys can securely hold large amounts of both temporary and permanent information.
There are many key type designations, shown in the chart below, which can be classified into 3 different categories: Lock Users,
Software Users, or Data Transfer Keys.
The Lock User and Software User keys are sometimes known as Personal Identifier (PI) Keys. They are called Personal Identifier
Keys because they uniquely identify the owner of the key once they have been added to the system. The PI keys are meant to be
programmed to 1 individual for audit purposes and are not meant to be shared, or else security will be compromised.
The Data Transfer keys are programmed at the Cencon software to be used at the lock for a particular function, and then brought back
to the Cencon software. Although the Data Transfer keys are usually loaned to a particular employee who already has a Lock User key,
the Data Transfer keys are not programmed with any restriction that requires any certain Lock User to only be able to use them.
Kaba Part Abbreviation Description Category Compatibility Color Shape Button Type
202020 F FLM mode personnel Lock User Gen1 & Gen2 Blue teardrop (bent) DS1994
202022 R Route mode personnel Lock User Gen1 & Gen2 Yellow teardrop (bent) DS1994
202023 B Bank mode personnel Lock User Gen1 & Gen2 Green (Teal) teardrop (bent) DS1427
202024 L Logon to Cencon (Ex: D, S, SS) Software User all Cencon S/W versions Black teardrop (bent) DS1991
212030 A Additional logon to KMU Software User KMU software only Orange teardrop (bent) DS1429
202021 SA Supervisor Audit Data Transfer Gen1 & Gen2 Red teardrop (bent) DS1996
202202 IS Install Cencon 4 Software Data Transfer Cencon 4 & above only Orange hourglass (flat) DS1963S
202226 CS Clock Set Data Transfer Gen2 + Cencon 4 only White hourglass (flat) DS1922L
202224 RS Re-Sync Data Transfer Gen2 + Cencon 4 only Dark Grey hourglass (flat) DS1963S
202220 F* FLM mode personnel Lock User Gen2 + Cencon 4 only Blue hourglass (flat) DS1963S
202222 R* Route mode personnel Lock User Gen2 + Cencon 4 only Yellow hourglass (flat) DS1963S
202223 B* Bank mode personnel Lock User Gen2 + Cencon 4 only Green hourglass (flat) DS1963S
*Note - Old vs. New Lock User Button Types (DS1994 / DS1427 vs. DS1963S)
The button types used in the historic F, R, and B keys (DS1994 + DS1427) are being phased out due to aging irreplaceable
equipment by the manufacturer. Kaba Mas will continue to sell this version of the keys for several more years. This version of the
F, R, and B keys will continue to work on both Gen1 and Gen2 locks.
Future Availability: The DS1963S buttons will use the same colors as the historic F, R, and B keys, but can be differentiated by the
shape of the key fob. They are not supported on Gen 1 locks or in Gen 2 locks activated in Compatibility Mode. The hour-glass
shaped F, R, and B keys which use DS1963S buttons will only work with Gen2 locks activated in Full Gen2 Mode (activated with a
USB Key Box).
Customers should tag and label the keys with the type of key and the user name that is defined in the system.
The Lock User keys maintain internal audit trails which record opening and closing times. The DS1994 and DS1427 keys contain internal
clocks which are set at the PC when the key is initialized for a specific user and when the Initialize Lock User Key Clock
operation is performed. The DS1963 key audits are time-stamped using the clock found in the Gen2 lock.
Note
In the Cencon 4 software, the logon key is only accessed during the logon process. To change the effective user, and/or region, one
must log out of Cencon and log back in with the desired key in the reader.
The Smart Keys used with Cencon provide a two-tiered approach to system security by requiring not only that anyone who opens a lock,
or accesses system data on the computer has a key, but also that it is the correct type and has been properly initialized. For Lock User
keys, the key is also used to provide a communications link between the central computer and the locks it controls. An audit trail of the
Lock User key's activity is maintained inside the key itself.
The device that makes this possible is the Dallas Semiconductor iButton™ electronic device. This is the device in the key that looks like
a watch battery. Yet, it is much more. Inside the stainless steel container there is a battery, and, in some models, a quartz crystal driven
timekeeping system that provides real-time clock capabilities. Each key also has a unique serial number built into it that can be read but
never changed. For more detailed information about the iButton™, you can refer to the Dallas Semiconductor web site at www.maxim-
ic.com.
The iButton™ device is mounted in a convenient plastic or metal housing that allows it to be carried on a key chain and also provides a
handle for inserting the key into the key reader at the PC or on the lock. When the key is inserted into the key reader, electrical
connection is established between the internal electronics and the lock. Once the data communication is established, the lock can read
data from the key and save the time and other data into the key's memory. Which function the lock performs depends partially on which
type of key is inserted and what mode the lock is in.
The memory in the key is used to transfer data from the computer to the lock and from the lock to the computer. The data read from the
key by the lock is used to assure that the key's user is authorized to perform the requested function. Data is also stored in the key by
the lock, such as the data from a lock audit download to an SA key. The key can then be read by the computer to provide a record of
lock activity.
Another function of some of the keys is to provide a time stamped record of activities performed at the lock. For Gen1 locks, this is done
by using the real-time clock capability of the key. Power for the key is from a lithium battery inside the key which can last up to ten
years, depending on frequency of use and temperature variations. The battery is used to run the quartz crystal that provides the time
base for the real-time clock but is not necessary for the memory functions. For Gen2 locks, the audit times and dates recorded to the
lock and the keys come from the real-time clock in the lock, no matter what type of Lock User Key is used.
The Smart Keys used with Cencon also have limits on the number of records that can be stored in them. The maximum for each key is
determined by the amount of memory in the key and the type of records stored. For example, the SA key can hold several hundred audit
record lines, depending on how the lock was configured and the types of audits. (Note that the SA key can only hold the records for a
single lock at a time). Lock User Keys will also hold between 15-30 audit record lines of information, depending on the access modes
used, the type of lock and the type of audit records. After that limit is reached, the audit file will wrap around and begin overwriting the
oldest records. Because each audit record line could contain both an open time and a close time if opened by the same key in single
access mode, this equates to a maximum number of open and close records on a Lock User Key between 30-60 event records.
Note
Date and Time Values
All dates displayed by the Cencon software are in the international standard format defined by ISO (ISO 8601).
For example, "29th of December 2009", in this international format is displayed as 2009-12-29.
The international standard notation for the time of day is hh:mm:ss where:
hh is the number of complete hours that have passed since midnight (00-23)
mm is the number of complete minutes that have passed since the start of the hour (00-59)
ss is the number of complete seconds since the start of the minute (00-59).
Region
Region Data Access Control is a security option available within the Cencon software. Region Control is active when the
checkbox displayed in the 'Change Configuration Settings' screen has been selected. If the Region Control option is turned Off,
then the Region field is optional data for locks, users, and routes, and lock users are not restricted from being dispatched to
certain locks based on the region, nor are Logon users restricted to what data they can see and manage based on the region. If
Region Control is turned On, it gives Cencon the ability to group users, locks, and routes into specific regions and then limit each
user's access to only the users, locks and routes in their region. Every Cencon logon user would be assigned to either a Global
region or Local region. The classification of a Global region or Local region does not alter the restriction that a lock user assigned
to a region can never be dispatched to a lock assigned to a different region. Assignment to a Global region vs. a Local region
affects what a Cencon logon user (i.e. Dispatcher, Supervisor, etc.) can see and manage within the Cencon System. Special
Supervisors are always assigned to a global region, by default.
Only have access to users, locks and routes in their own region.
Do not have access to the region maintenance functions.
May only create users, locks, and routes in their region.
Can never dispatch a lock user to a lock in a different region.
Have access to all users, locks and routes, regardless of the region.
Can never dispatch or reassign a lock user in 1 local region to a lock in a different region.
Even lock user that is designated as Global can only be dispatched to locks that are designated as Global, not to locks with
any local region.
A global logon user is required to select the region to be used for activating or shelving locks before the locks to be
activated or shelved are specified. FLM/RSPs to be used in the activate or shelve process must belong to the region
selected by the dispatcher.
A global logon user can change the region assigned to any user, lock, or route.
Database Preparation
A common example of how region control can be used is that several existing regional databases within a particular
company, all using the same PCI security code and Company ID, could be merged to form a single common database
accessed by all users. The logon users at the various branches could be given local regional access, which would allow
them to only see, manage, and add locks and users within their local region. The IT managers would only have 1 central
database to manage and support rather than multiple regional databases. Customers should contact Kaba Mas for
assistance or advice on this process.
Company ID
The value entered for this field is set during the original software installation and can be any four-digit number you wish to identify
your company. You should choose a number that is, in some way, meaningful to your company, and yet complex. Once this ID is
set, you cannot change it. You should also record this number, and keep it in a secure location, since the number is no longer
visible during or after logging in to the Cencon 4 software. If you are a branch of a larger company, or you are upgrading, you
must enter the Company ID that has already been chosen for your company. If you are planning to activate locks from Cencon
running on a networked PC, the Company ID must be the same on all systems involved in the process.
Customer Names
The Customer Name is a unique identifier that allows optional grouping of locks, users, and routes (usually for specific customers).
This is especially useful when a single company is servicing locks for multiple customers. Customer Names can also provide a
way of grouping Locks that have similar characteristics, such as belonging to a branch bank, or being located in a certain
geographical area, or any grouping that the organization controlling the locks finds useful.
Caution
Electrostatic Discharge (ESD): Kaba Mas locks and PCI cards are well protected from ESD damage once they are
installed, but can be damaged during the installation process if proper precautions are not observed. When handling the
locks, follow these precautions:
Everything on and around work stations which might come into contact with ESD sensitive devices should be
conductive and connected to earth ground through a resistor. The purpose of the resistor is to prevent electrical
shock in case something should come in contact with a voltage source.
The technicians installing the locks and PCI cards should also be "grounded." Technicians can wear conductive
wrist bands with "alligator" clips connected to a convenient source for earth ground. The stainless steel plate on
the wrist band should directly contact the technician's skin.
When handling the back covers of Cencon locks and the PCI cards, do not directly touch the electronic
components.
Handle the covers by the edges, being careful not to touch the connectors. Eliminate the use of all unnecessary
plastics, paper, and synthetics during installation.
In addition, all locks and PCI cards are shipped with static shielding material (that do not generate static charges)
and an antistatic sleeve covering the cable end.
Do not install the back cover assembly until the flex cable connectors have been seated into their proper
positions. Touching these cables transmits ESD from the technician's body through the cables to the electronic
components of the back cover.
Operators may become statically charged in a normal working environment. Inserting keys or just touching the Key
Readers on the Cencon Key Box may cause the computer’s Operating System (OS) to disconnect from the Cencon Key
Box. In this instance, un-plug and re-plug the USB cable between the computer and the Cencon Key Box. In addition,
an ESD strike may cause the Cencon 4 software to malfunction. In this case, re-start the Cencon 4 software and
continue your operation.
When you start the Cencon system, you may need to identify the database connection, depending on how the Cencon system
configuration data is set.
5. If you see the following window, you have not selected a Cencon database:
Select "Database Connection Settings" to access the dialogs which allow you to identify the appropriate Cencon database.
If the input field for "Set this ODBC Connection as fixed database logon" is checked, Cencon remembers the database
connection for the next time the program is loaded.
Select the button labeled "Select ODBC Data Source" to select the ODBC connection for the database to be used with the
Cencon system.
Select the Catalog tab if you need to modify the database catalog name:
Select the Schema tab if you need to modify the database schema:
If using the default schema of "dbo" with one of the versions of Microsoft SQL Server, (i.e. Microsoft SQL Server 2000,
2005, 2005 Express, etc) you do not have to update the schema name.
Continue with "Logon to the Cencon System". You can also refer to the "Cencon 4 Getting Started Guide" for additional details.
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon 4 Reference Manual
2.2 Logon to the Cencon System
The Cencon startup window controls access to configuration settings and logon:
See the Cencon Getting Started Guide for details on the "Cencon Key Box Settings" and the "Database Connection Settings" functions.
Cencon allows a user to logon using either an authorized black Software Logon User key (such as Dispatcher, Special Supervisor, etc.).
Additionally, a user may logon using their authorized Windows logon password.
1. To logon using a key, select Logon to Cencon with Key. Insert the black key in the proper port. If the key is recognized as
valid, enter the password as requested:
Remember that this field is case sensitive and recognizes spaces as well as characters.
Note
You cannot logon to the system using a nickname, or a user ID. You must use the password specified for the key in the
key reader. The key in the key reader identifies the user trying to log onto the Cencon System.
Hint
If a window is displayed indicating that the User ID doesn't pass authority check, first check to make sure that the
appropriate key is in the reader and that the reader is properly connected.
2. To logon using a Windows Logon password, select Logon to Cencon with Windows Logon. Note that the Windows user
name must already be set up as a user within Cencon (in the same manner as a user key).
Caution
The Cencon logon key is only accessed during the logon process. Once you are logged on, you should remove your
key from the key reader and secure the key. You should also be sure to close Cencon when you leave the PC, as
recommended by the following message:
After a successful logon, the Cencon Main Menu window is displayed. Some of the items may not be displayed on your system
depending on your user authority settings.
Accelerator Keys
The following accelerator keys are programmed to access functions on the main window:
F1 = Help
Ctrl + A = Activate Locks
Ctrl + D = Dispatch Locks
Ctrl + K = Close Locks with Key
Ctrl + L = Lock Operations
Ctrl + R = Route Report
Ctrl + S = Close Lock
Ctrl + U = Add User Keys
Ctrl + W = Add Windows Logon User
Favorites:
Cencon gives you quick access to functions you use often by letting you add them to a Favorites group at the top of the main
window. Cencon saves this Favorites information separately for each Cencon user.
The Favorites group is initially empty. You add a function to your Favorites group by dragging its icon from its home group and
dropping it in Favorites, or by right-clicking on the icon and selecting "Add Operation To Favorites Group" from the popup menu.
A new copy of the icon will appear in the Favorites group.
You delete a function from Favorites by dragging its icon out of the Favorites group and dropping it, or by right-clicking on the
icon and selecting "Remove Operation From Favorites" from the popup menu.
Note
The drag-and-drop method of adding functions to and removing functions from the Favorites group is not available under
Windows XP. Instead, you must use the popup menu method.
Lock operations:
Note
The most commonly used functions (Dispatch, Reassign, and Close) are available via 2 methods. These are (A) by direct
access from clicking the icons on the main menu, which requires typing in the lock name or lock serial number, and (B)
from within the Lock reports, which allows you to search for the specific lock, right-click the line of that lock, and choose
from basic operations to perform on that lock. Within this document, most of these basic functions are shown accessed
via the icon on the main menu; however, depending on your operational use of the software, you may discover that leaving
the Lock Operations report open, searching for the locks from there, and performing all dispatching and closing by right-
clicking improves your personal daily efficiency.
User operations:
History operations:
Key operations:
System operations:
These functions are access options pertaining to functions for customizing and maintaining your Cencon system.
Note
If any operational item is not displayed or is displayed in gray (disabled), that item is not available to the current user (usually
because they are not authorized to access the function). Security of the Cencon system is based on the key in the key reader, the
function being requested, and the authorization role assigned to the function by the manager who installed or customized your
software. Refer to the Authorization Functions chapter for more detailed information.
Note
If you are operating a Cencon lock and -dL appears on the display during an operation, it indicates that you should dial Left
(Counter Clockwise). The purpose is both to give the lock additional power and to ensure the lock bolt is fully extended.
CW= Clockwise; CCW = Counter Clockwise
Special Note: Please refer to section 4.3 for Cencon Swing Bolt Operations.
Each Cencon Lock is shipped from the factory in Shelved Mode. The One Time Combination feature which requires a Smart Key is not
available when the lock is shelved. Instead, the Shelved Mode combination is used to open the lock without any Smart Key. The
default Factory Combination is set to 50-25-50. Practice opening the lock in shelved mode with the default factory combination until
you are comfortable with its operation. The default combination may be changed, in which case the new combination would be used to
open the lock while in Shelved Mode. The correct opening procedure for a shelved lock is:
1. Power Lock → EC
Turn the dial to the left (CCW) until the letters EC (Enter Combination) appear in the display window.
4. Open Door
5. Close Door
6. Extend Bolt
Turn the dial a minimum of one complete rotation to the left (CCW) to extend the bolt.
Note
After opening and closing any lock, you should always check to ensure that the lock is physically relocked (i.e., bolt fully extended
and locked in place) by turning the dial to the right. If the bolt does not retract, you can be assured the lock is secured.
Helpful Hint
At any point while entering the combination during an opening sequence, if you notice that an incorrect number was pressed on
the keypad, you may clear the entire operation and start again by pressing the star ( * ) key. This allows you to return to the EC
prompt without getting a wrong try error (lightning bolt).
When the combination is incorrectly entered, a lightning bolt error will flash on the display (with no other numbers
following it). To clear this error and start again, press and hold the star ( * ) key. Even in Shelved Mode, it is
important to avoid getting 5 wrong combination attempts in a row without a successful opening in between because
the lock will be put into Lock-Out condition, displaying, "LCO." Clearing the LCO condition in Shelved Mode requires
waiting 5 minutes and then entering the correct combination.
Gen2 Locks
If there is a problem with the battery in the Gen2 lock when a lockout occurs, the lock must have power for the full
timeout period. The display will alternately flash -dL and LCO to indicate this.
For Cencon Locks with a code level of 71, or greater, you may change the Shelved Mode combination. You may change the default
Factory Combination of 50-25-50 to a new combination to be used while the lock is still in Shelved Mode.
You can find how to determine the lock code level of a Cencon lock in Appendix E - Determine Lock Level.
This is an option that is only available while the lock is in Shelved Mode and is intended only for temporary use after the ATM is
deployed but before the lock is activated. It is not recommended to keep the Cencon lock in this Shelved Mode condition, due to lack
of security and control.
Warning
If this combination is lost or forgotten, there is no alternate way to open the lock. Also, while in Shelved Mode, the Gen1 lock
records no audits of lock openings. A Gen2 lock records data and time of openings; however, of course, there is no user
recorded in the audit for these openings.
Once you have changed the combination for the first time, you have the ability to change the combination again to a different Shelved
Mode combination or back to the Factory combination of 50-25-50.
Note
Once a lock is "activated" in any mode, the Shelved Mode combination returns to the Factory Default of 50-25-50.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) is displayed.
4. Open Door
Insert the change key into the change key socket on the back of the lock.
Warning
Do not close the door. Leave the door open during this process until you are comfortable opening the lock with the
new combination.
6. Extend Bolt
Turn the Dial to the left (CCW) to extend the bolt.
7. Power Lock →
Turn the dial to the left (CCW) until (Change Key symbol along with Enter Combination) is displayed.
8. → Press #8 → EcF
Press the # button followed by 8. EcF (Enter combination, Factory) will be displayed.
Warning
Record the new combination and store it in a secure place. If this combination is lost or forgotten, there is no alternate way
to open the lock.
12. POC → Remove Change Key → EOP
Remove the change key. EOP (End OPeration) is displayed.
Allowed Length in CenTran 3.x & 4 with .TI Supported Length in Cencon 4 & CenTran 4
Field Name
/ .TO Files with XML Files
Lock Serial
6 digits 9 digits
Number
If you are using the CenTran 4 XML transaction files, the allowed field lengths are the same as the length supported in Cencon. Please
refer to the CenTran 4 Programming Guide found on the Kaba Mas website for more information. http://www.kabamas.com
Depending on how you are using Cencon, certain information must be predefined so that it is available for selection
during the process of creating users and activating locks. This data includes:
Bank Branches: If you are going to create any Bank users or locks, you must first define the Bank Branches
to which they will be assigned using the Bank Branch Report.
User Types: If you want to assign a customized authorization role to any new users, you need to create the
new user roles before creating the users. See User Authorization for more information.
Region Definitions: If you are going to use Region control, you should first define your regions using the
Region Report.
Customer ID: If you are going to assign a Customer ID to your users or locks, you should first define the
Customers using the Customer Report.
FLM, Route, and Bank users are the personnel that will perform operations at the Cencon lock. It is necessary to add these personnel
before Activating locks, because lock activation requires having one or more of these personnel in the system. You can add the FLM
technicians, Route personnel, and Bank users at this time as well, again using the following procedure.
The following steps are only meant to provide a minimal overview of the procedure. See Add a User for detailed information.
1. Start the Cencon program and logon as a user, such as the SS key, who has the authority to add new users.
3. From the Search For Users Dialog select Search. (Press the Enter key to select Search to avoid using your mouse.)
4. When the User I.D. Report displays, select Operations > Add a User.
5. The "Add a New User" dialog opens. Insert the new user's key into the key reader.
8. Enter the User Password if this is a Software Logon Key. (The password is not required for FLM, Route, and Bank users).
10. If this is a bank user, select a Bank Branch and enter a enter a Bank User ID.
11. Select the Access Control tab to enter the appropriate access control restrictions for the user. If you are creating a supervisor or
dispatcher key, this will control the times that the user can access the PC system (Special Supervisors always have access). If
this is an FLM, Route, or Bank user, the information will control the times when the user can gain access to the locks.
Warning
If you define time access windows for your system users, be sure to take into consideration time orientation changes if
applicable (i.e., Standard Time to Daylight Savings and vice versa). Your PC system will automatically adapt for these time
changes, but the time windows carried in the keys will be off by an hour when your PC system goes to a different time
orientation. To alleviate this problem, you can have a +1 hour and -1 hour allowance in your time window. If security
measures will not tolerate this type of allowance in the window, each user's key must be brought back to the system for
updating when the time changes. The function in the PC Software that is used to update the keys is Change User
Information function and is found in the User Operations Report. For more detail see the section on Change User
Information.
Caution
If you are using the time window capabilities of the system and you have a centralized dispatch center, keep in
mind that accommodations will have to be made when adding FLM and Route Personnel to the system whose
keys will be distributed to different time zones. The Window Opening Information will have to be adjusted by the
difference (+/-) between the dispatch center and the time zone where the key will be sent.
13. The User Created window opens. Click on "Yes" to add another user or "No" to exit.
Repeat steps 5 through 12 for any additional users that you would like to add at this time.
Once FLM and/or Route users are added to the system, they can be assigned to activate new locks or be dispatched to existing locks.
Note
The lock serial number can be obtained from the lock itself by powering the lock and pressing # 2.
The mode in which the lock will be activated
Any of the Optional Data about the ATM that you want stored in the database: address/location, Customer Name, ATM Serial #,
etc.
There are a number of different activation scenarios, examples of which are covered later in this document. How you will activate the
lock will depend on the following information:
Detailed procedures for activating locks are found under Activate Locks. In addition to these areas of reference, detailed procedural flow
charts can be found in the Appendices.
The general flow of an activation can be summarized here. See also the System Process Flow Charts section of the manual.
You must first activate the lock in the PC system by programming a red SA key. The SA key is used to transfer information from the
Cencon PC System to the Cencon Lock. You also will need the User ID of the FLM or Route Person who will be activating the lock
(FLM and/or Route mode activation only).
Once you activate the lock in the PC system, you will need all of the following components to activate the actual lock:
The above items are taken to the Cencon lock and used to activate it. After the procedure to activate the lock at the lock is completed,
the activation call needs to be 'closed' in the PC system. The person who activated the lock should relay the close seal number to the
dispatch center so that the call can be closed. This 'close seal' number is either a two or four digit number that, when entered into the
program, tells the software that the activation call has been completed. The lock has been activated and is ready to be used for regular
dispatches.
Note
The Lock Operations icon on the main screen opens a version of the Lock Report which has been optimized for load
performance. This report offers the same functions as the full Lock Report but displays only a minimal subset of the data. Plus, for
your convenience, the Lock Operations report includes the dispatched user ID and the combination for each currently open call.
Thus it should be your primary tool for working with locks.
3.1.3.1 Route Listing Report - Displays the locks associated with a specific route.
Browse to add locks to the route. This allows you to select locks from the lock report that you want added to the route.
Remove the selected lock(s) from the route.
Select users to service the route.
Dispatch the locks on the route.
Reassign the locks on the route.
Close the locks on the route by menu, by manually entering close seals.
Close the locks on the route by key, by reading close seals off of the dispatched route user's key.
Display detailed information about the selected lock. See also 3.1.1.14 Individual Lock Report.
Hint
The Lock reports are special cases in that the Lock Operations report is a subset of the full Lock report and is optimized to display
and scroll quickly. Always use the Lock Operations report for accessing lock functions unless the additional data in the full report
is needed.
The display of each report is performed in a separate task from other Cencon processes. A report remains on the screen until you close
it or exit. Cencon Report screens contain a Title Bar, Menu Bar, Column Headings, a grid that displays columns and rows of data,
vertical and horizontal scroll bars, and a status bar. You may re-size, move or hide the panel and columns.
General Operation:
The report generation may be cancelled at any time by closing the report window.
Other Cencon functions may be used while the report is being generated.
Operations on already displayed data may be performed while the report is being generated.
Although Cencon's report generation process is optimized to communicate as efficiently as possible across networks, it is
important to limit the amount of data displayed in order to achieve optimal performance. Cencon allows the user to filter the
report data by displaying a Search screen before the report is generated (for the Lock Log, Locks, Users, Activity Log, and
Customer reports).
The Search screen may be used to request specific ranges and types of data and thus reduce the amount of data communicated
through the network.
Some of the search dialogs have a large number of search parameters available for use. These dialogs have the parameters
split up into categories on different tabs of the dialog. If a tab of a search dialog has one or more search parameters entered on
that tab, and the contents of the tab are not immediately visible, then the tab will be highlighted in light green. This is to allow
easy determination of where search parameters have been entered in the various tabs of the search dialogs.
The search dialogs can remember and reload the previously entered search parameters. This option is enabled with a check box
on each of the search dialogs.
The search dialogs include the option of searching for "exact" matches or "starts with" matches. For example, if "Exact" is
selected and a lock name of "lock1" is entered, the report will only display information for the lock named "lock1". If "Exact" is
not selected and "lock1" is entered, the report displays data for all locks whose names start with "lock1" (lock12, lock12345, etc.).
The following status messages are displayed in the bottom right corner of each report:
Status
Description
Icon
The report has finished processing but not all of the data fit into the computer's memory. When
you scroll outside of the loaded data, additional records will automatically be accessed and some
of the existing data will be removed to make room.
An error has occurred and only part of the data is displayed. Check your network and database
status and rerun the report.
The user has started an operation and the report has stopped loading to avoid interference (and
additional overhead) to the operation.
The number of records for the report. Displayed only briefly during startup processing.
An informational message is displayed at the bottom left of the report screen to indicate the number of matching records, the
number of records which fit into memory, and the range of records shown in the display.
Example:
Cencon Data Table Reports also have color coding in order to differentiate types of activity and report field attributes. The following
legend describes the meaning of colors in the Cencon Reports:
White - Field cannot be edited. (In the case of Lock Reports = lock currently not dispatched; in User Report = user
not currently dispatched.)
Yellow - Field can be edited. (Only found in the Route Listing Report.)
Light Red - Indicates an error condition. (In the case of Lock Reports = Gen2 lock currently has a ReSync key issued to it.
Cannot dispatch.)
Green - Indicates success. (In the case of Lock Reports = lock currently dispatched; in User Report = user
currently dispatched.)
Grey - Not applicable. (This field is not applicable to this lock or this user, for instance the Dual Mode User
column for a lock in Single Mode.)
Important Note
Color coding is also used in the Lock Report and User Report to differentiate between different generations of locks and keys,
which determines their compatibility with each other and with other functions in the software.
In the Lock Report, the Lock Name field will either be white, grey, or blue.
White = Gen1 lock
Grey = Gen2 lock activated in Compatibility Mode
Blue = Gen2 lock activated in Full Gen2 Mode
In the User Report, the User Name field will either be white or blue.
White = Current version of the F, R, or B key (DS1994 or DS1427).
Blue = Future version of the F, R, or B key (DS1963S).
The software will display an error if an operation that is only possible with one version of lock is attempted with a different version
of lock. For instance, if you attempt to dispatch a user highlighted in Blue (DS1953S key) to a lock that is highlighted in White
(Gen1) or Grey (Compatibility Mode). To filter a report for a certain version of lock, use the radio button for Lock Model on the
search screen, since the color coding for the lock name is not able to be sorted from the report.
Menu Bar
The Menu Bar contains the commands for operations that may be performed on the report. Some Menu Bar options are specific to
each type of report, but some are common to all reports. From the displayed screen you can use the "File" menu to print the report or
to save it to a file. You can also use the "Edit" menu to copy the report data to paste into another file or to convert to a graphic HTML
format. In most of the reports, you can also sort the report data by selectable criteria.
File - Select the File command to display a drop-down list of file options.
Edit - Select the Edit command to display a drop-down list of edit options.
Hint
To Refresh the data on the report, as alternative methods from using selecting the Refresh option from the Edit drop-down
along the report Menu, simply press Control + Z.
A 3rd method to Refresh the report is pressing the F5 key.
Font - Select the Font command to display a drop-down list of font options.
Choose Font - Display the Font panel to allow you to select a Font and specify its characteristics.
Sort - The Sort command displays a drop-down list of the options available for sorting the report data. The options contain a 'By
[column_name]' entry for each column in a report. See the 'Column Headings' section of the specific report topic for column names.
See the "Column Headings" section of this topic for another way to sort report data.
Note that sorting from this menu is a toggle operation - if the data is not sorted on this column, the first click sorts it and a subsequent
click undoes the sort. If the data is already sorted by clicking on the column header, clicking on the column name also undoes the sort.
Format - Because you may alter the widths of columns, change the order of columns and hide columns, Cencon stores the current
form of the columns when you close a report and restores the report to the same format the next time you display it. The "Format"
menu item allows you to restore the size and order of columns to their default definitions.
Restore Default Column Widths - Restore all columns to their default widths.
Restore Default Column Order - Restore all columns to their default order.
View - Select the View command to display a drop-down list of the View options.
Status Bar - Click the Status Bar option to toggle display of the status bar. If the status bar is to be displayed the a check
mark appears beside the option.
Help - Select the Help command to display a drop-down list of the Help options.
Help Topics - Display Help text for the report. You may also display the Help text by pressing the "F1" key.
Kaba Mas Technical Support - Open the Kaba Mas Technical Support web page in a web browser window.
Column Headings
The grey area at the top of each column contains the name of the column. Click the column heading to perform an operation on the
entire column.
To resize a column, place the cursor on the right boundary of the column where it changes to a splitter cursor (↔) to allow you to
operate on the right boundary. You may increase or decrease the width of a column, drag the right boundary of the column heading by
placing the cursor on the right boundary and holding the left mouse button down. You may set a column width to the size of the longest
text in the column by placing the cursor on the right boundary and double-clicking the left mouse button.
To hide a column, drag the right boundary to the left boundary. If a column completely overlays another column then there will be small
gap at the top of the column boundary. You may reveal the overlaid column by placing the cursor over the right side of the boundary
and dragging the boundary to the right. If you place the cursor over the left side of the boundary then dragging the boundary to the
right expands the column to the left rather than revealing the hidden column.
To move a column, position the cursor within the column heading, hold down the left button and drag the left edge of the move cursor
to the left edge of the destination column heading. If you are moving the column left then it will be moved to the right of destination
column. If you are moving the column right then it will be moved to the left of the destination column.
Cencon remembers the appearance of the columns and maintains it in subsequent displays of the report. You may use the "Format"
menu item to restore the columns to their default appearance.
To order rows by the data in a column, click on the column heading. An "Up Arrow" icon appears in the column heading to indicate
ascending sequence and the rows appear in ascending order by the selected column. Click the column heading again to change the
sort order to descending sequence and a "Down Arrow" icon appears in the column heading. Subsequent clicks on the sort column
alternates between ascending and descending sequence.
If the report data is displayed on the screen and there are more lines than can be shown in the body display box, a vertical scroll bar
will appear on the panel to allow you to scroll hidden lines into view. Most of the reports are also wider than the viewable screen shows.
You can use the left and right scroll bar at the bottom of the window to shift data left and right for viewing. You can also maximize the
window to show more data.
Status Bar
The Status Bar appears at the bottom of a report panel if the option has been selected by the View command on the Menu Bar. The left
side of the Status Bar displays a message that shows the number of rows in the report.
Keyboard
Although the mouse is the primary means of navigating through and selecting entries in the reports, the keyboard can also be used for
these purposes.
Up Arrow, Down Arrow, Page Up, Page Down, Home and End - These keys allow the user to navigate through the
report, selecting a single record. When used with the Shift key, these keys allow the user to select multiple adjacent records.
When used with the Ctrl key, these keys allow the user to navigate through the report and to then select multiple non-adjacent
records one at a time using the space bar.
F10 - Opens the File dropdown menu. When used with the Shift key, F10 opens the popup context menu for the record or
records currently selected in the report. Once a menu is opened, it can be navigated through using the arrow keys.
These reports list information pertaining to Cencon locks. The Lock Operations report is a subset of the full Lock report and is optimized to display and scroll quickly. Always use the Lock Operations report for
accessing lock functions unless the additional data in the full report is needed. The following Search screen is displayed prior to generating the report to allow filtering for specific lock records:
The tabs in the search screen will be highlighted if they contain search settings that are not immediately visible.
Upon selecting 'OK', the locks matching the given search parameters will be displayed. Depending on the number of matching locks and the speed of your database connection, it may take several seconds for the
locks to be displayed. You can still do operations with the report even while locks are still being loaded into memory. If your computer does not have enough memory to keep all of the locks in memory, then the
report will fetch locks as needed depending on the portion of the report you are looking at. If this occurs, then the word 'Partial' will be displayed on the report status bar.
Common lock functions may be performed on a selected lock using the Operations drop-down menu or by clicking the right mouse button to display a popup menu. Other lock functions are accessed from the
Administration drop-down menu. The menu items are enabled depending on the status of the selected lock and the authority of the user. Items which are not authorized for the current user are displayed in grey in
the drop-down menu and are not displayed at all in the popup menu.
Note that operations are enabled/disabled based on whether they are appropriate for the selected locks.
Activate Lock
Reissue an activate Key
Update a Gen 2 lock activated as Gen 1
Shelve Lock
Verify Shelve
Delete Shelved Lock
Reset Pending Shelve State (Bank Locks) - Allows you undo the shelving of a bank lock (and to reissue a shelve key for a bank lock if it is lost).
Force Delete of Unshelved Lock
Replace
Rename
Manager Force Close w/o Seal
Import Locks From an XML File
Export the Selected Locks to an XML File
Add Users to a Bank Mode Lock
Remove Users From a Bank Mode Lock
Resynchronize the Database with a Lock
Remote Serial Operations with Lock (Gen2)
Note
Some functions require the selection of a lock or multiple locks before the menu item is available. Other functions are not dependent on the highlighting of any lock before the function shows that it is available to
select (for example: Activate Locks, ReSync the database with Gen2 lock data, read close seals from a key, etc.)
Note
Multiple locks (and multiple modes) can be programmed for activation at the same time on the same SA key (red). The maximum number of
locks/lock modes that can be activated on one SA key depends on several factors including which modes are activated, the version of the lock, and (if
Bank mode is being activated) the number of Bank mode users. Typically, it is not recommended to attempt to exceed more than 15 lock activations
on the same SA key. In some scenarios, an error will display when attempting to program the SA activation key for fewer locks, and in other cases,
the error would not display until many more lock activations were attempted on the same key.
Bank Branches: If you plan to activate Bank locks, you must first define the Bank Branches to which they will be assigned
using the Bank Branch Report.
Bank User: If you plan to activate Bank locks, you must add at least two bank users in the lock's assigned bank branch. See
Add users.
FLM or Route User: If you plan to activate FLM or Route locks, you must add at least 1 lock user of that mode to dispatch
when creating the lock activation key. See Add users.
Region Definitions: If you plan to use Region control, you should first define your regions using the Region Report.
Customer ID: If you plan to assign a Customer ID to your locks, you should first define the Customers using the Customer
Report.
From the Administration Menu of a Lock Report, click on Activate Locks. Note that if region control is active, the current logon user's region is
automatically assigned to the new locks.
To add new locks, press Add Lock for each different lock serial number to be added. This function creates an entry in the lock list and automatically fills
in a default value for the Lock Name. To remove an entry from the list, highlight the appropriate row and press Remove Lock.
Select a row in the list of locks shown on the left-hand side of the screen, and enter the data for the lock on the right-hand side of the screen (Entries are
required for the items in bold text on the Activation menu):
1. Enter the numeric Serial Number of the Lock. The lock serial number can be found on the original box in which the lock was shipped or by
powering the lock and then pressing # 2.
Caution
Ensure that the Serial Number is entered in this field correctly, or else the SA activation key will give an error at the lock when
attempting to activate it. Lock Serial Numbers may be from 6 to 9 digits. Any 0s in the first digits of the serial number can be
ignored when typing the number into this field.
Hint
Since Cencon users often assign the lock name to be the same as the lock serial number, the lock name field is automatically updated to
match the serial number as you enter it. The lock name may be changed after the serial number is entered.
Caution
Lock Names are very critical in the Cencon System. They are case sensitive and can be up to sixty-four (64) characters in
length.
Hint
The Activate function does not look at the selected lock(s) in the lock report.
However, if you are reactivating a lock which is in a shelved state or which is active in another mode, you do not have to reenter the lock's data;
Cencon can look it up and fill it in for you. To use this feature, enter the serial number or name of the existing lock and press the "Search for
Lock" button.
3. For the Lock Mode, select the desired mode from each of the drop-down list boxes. FLM, Route, and Bank modes can be activated from this
panel. A choice of Single User Access would mean that the Lock will require only a single combination and Personal Identifier Key to open the lock.
If Dual User Access is chosen, the lock will require two combinations and Personal Identifier Keys to open the lock. Any combination of the three
modes can be activated with the same key.
4. Optionally enter data about this lock or ATM in the remaining fields. The Lock Description/Location information and the User-Defined Lock fields
allow up to 4 lines of 40 characters each. This information remains with the lock until it is shelved, although any of this data is able to be changed.
Mapping Considerations
Cencon supports mapping of lock locations using Microsoft MapPoint and the MapQuest, Google Maps, and Bing Maps internet
services. These applications require accurate location information.
3. Enter a Bank Mode Time Window (optional). The second part of activating with Time Delay is the Window to Open. This specifies the
amount of time, in minutes (from 1 to 99), in which a user must re-insert their key to open the lock after the Time Delay has expired. If the
lock is not opened before the Window to Open elapses, the lock resets and the combination(s) and key(s) must be repeated, the time delay
elapsed and then the lock opened.
Note: The Time Delay and Time Window values must be either both zero or both non-zero.
Gen2 Locks
If there is a problem with the battery in the Gen2 lock while a time delay is processing, the lock must have power for the full time delay
period. The display will alternately flash -dL and the remaining time to indicate this.
4. Click on the "Bank Users" tab, on the right-hand side of the form. The Branch Users list displays all the users in the selected Bank
Branch. Select and add the desired users to the Selected Users list.
Note: You must select at least two users and at least two users must not have time window restrictions.
Note: Cencon Gen1 locks are limited to 32 bank users and Gen2 locks are limited to 100 bank users.
The Apply User Selection to All Bank Locks check box automatically sets the bank users for all the bank locks being activated to the
users in the list (even if users have already been assigned to individual locks). If you do not check this box, the selected users are only
assigned to the currently selected lock.
6. Select the Test Open Mode (on the left-hand side of the activation screen.) This specifies the type of user being dispatched to test that the lock
can be opened after activation.
7. If the lock is not being dispatched to test activation in Bank mode, you must dispatch a specific FLM or Route user to open the lock the first time.
Enter the User Name (two names if dual user was selected). The Browse button can be used to select names from the User report.
8. Enter a Region designation for the lock(s) if Region Control function is turned On, and the logon user has a Global region designation. If the logon
user has a local region, the lock(s) will be activated with that particular region designation. If the Region Control is Off, the Region field is optional.
9. The Lock TimeZone field will default to the Time Zone setting of the PC. If the lock(s) being activated will be located in a different time zone,
this field can be modified.
Once you have reviewed your data and are ready to proceed with activation, insert a red SA key into the reader and click on Activate Locks. The
system issues the combination(s) that will open the Lock(s) the first time after the Lock Activation process is successful. The following sample window
displays a lock being activated in Bank mode and another lock being activated in FLM, Route, and Bank modes, with a Bank user being selected for the
activation.
Note
If you are activating more than one lock from the same SA key, multiple lock combinations will be shown.
Record the combination(s) to be issued to the FLM or RSP who will be activating the lock.
Note
If a newly activated lock is already active in an existing mode, the lock must be opened in the existing mode in order to activate the new mode. If
Cencon determines that this is necessary, the following prompt is displayed:
If you select Yes, Cencon displays a prompt for you to enter a collection name:
If you enter a name and press OK, Cencon creates and displays a collection of the new and existing locks from which you can perform the required
dispatches.
The SA Key is now ready to be taken to the Lock(s) for activation at the lock. If you have performed the activate from a lock report, press F5 on the Lock
Report screen to refresh the report and display the correct state for the activated lock(s).
Note
If a lock has not yet been activated in any mode, the lock is currently operating in Shelved Mode and can be opened using the Shelved Mode
combination. However, if a lock is already activated in one mode and you are activating it in another mode, a person who can access the lock in the
active mode will be required to open it so that it can be activated in another mode. This activity will require the dispatching of a service call for the
person who will be required to open the lock.
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon 4 Reference Manual
3.1.1.2 Add Lock to a Collection
Cencon 4 provides the ability to create a named collection of locks. Each lock report provides an operational function named "Add to
Collection" which is enabled when one or more locks are selected (also available from the popup menu which appears when you right-
click on a lock in the report).
If a Lock Collection Listing report is open, Cencon asks if you want to add the selected lock or locks to the open collection lock
list. If you click on Yes, the selection is automatically added to the open collection.
If a Lock Collection Listing report is not open (or if you select to not add the selection to the open collection lock list), the following
form is displayed:
To add the selected locks to a collection, click on a collection name to select it and press Add Locks. The dialog also allows for the
creation of a new collection and the display of the locks in an existing collection.
If a Route Lock Listing report is open, Cencon asks if you want to add the selected lock or locks to the open route lock list. If you
click on Yes, the selected locks are automatically added to the open route.
If a Lock Route Listing report is not open (or if you select to not add the selection to the open route lock list), the following form is
displayed:
To add the selected locks to a route , click on a route name to select it and press Add Locks. The dialog also allows for the creation
of a new route and the display of the locks in an existing route .
Note
Cencon Gen1 locks support a maximum of 32 bank users which may be assigned user IDs in the range 00 - 79. Cencon Gen2
locks support a maximum of 100 bank users which may be assigned user IDs in the range 0 - 999,999.
From a lock report, select one or more active bank locks (as long as they are in the same Bank Branch). Then from the Administration
drop-down menu, choose Add Users to a Bank Mode Lock menu item. The following dialog is displayed:
When a lock is selected in the "Selected Bank Locks" list, the available users (users in the lock's bank branch which have not yet been
added to the lock) are displayed in the "Available Users" list. The users may be selected (moved to the "Selected Users" list) by
pressing "Add", "Add All", or by double-clicking on a user name. The selected users list may be changed using the Remove and
Remove All buttons. Press OK to write the SA key with the information for adding all the selected users to all the locks.
See 4.2.13 Add Bank Users to Lock for details on using the SA key at the lock to add the users.
See 4.3.13 Add Bank Users to Lock for details on using the SA key at a Gen 2 Swing Bolt lock to add the users.
See Section 3.1.1.25 for information on removing users from bank locks.
1. Select an open lock from one of the lock reports and then choose Close from the operations menu (or click on the Close Lock
icon on the main Cencon window). You may also right-click on a lock in a lock report and select Close from the popup menu.
If the main window icon was used, enter the name or serial number of the lock, and select the mode. Optionally, use the
appropriate Find By function to display the information for the lock.
2. Enter the two-digit or four-digit Close Seal of the Lock (relayed by the service person).
Note
An error message is displayed if you enter an incorrect close seal and the Lock will not be closed. The default dispatcher
and supervisor authorizations allow three successive attempts to close a call. After a third unsuccessful entry the system
requires a Special Supervisor to close the lock. The number of close attempts can be customized by modifying the
authorization definitions for the dispatcher, supervisor, and other any roles besides the Special Supervisor.
3. Click on Close Lock. If the close seal was entered correctly, the program displays a message to indicate that the Lock has
been closed.
Note
The Close Result for a normal close is "Lock call closed" (Gen1 and Gen2 locks).
For Gen2 locks only:
The Close Result for a lock with a triggered duress alarm is "Lock call closed. Close seal indicates
duress."
The Close Result for a lock with a low/dead/removed battery or with a clock which has not been set is "Lock call
closed. Close seal indicates low clock battery or clock not set."
1. Insert the user's key into the appropriate port of the key reader.
2. Click the Close Lock With Key icon on the main Cencon screen or open one of the lock reports and select Close Locks With User Key from the
Operations menu.
Cencon reads the lock information from the key and displays the locks which have been closed as shown below:
Note
The close with key process uses the event time stamp from the lock (stored with the close seal on the key) to determine the valid seals. If the lock has
a bad battery or the clock is not set, this time will be incorrect and you will receive a message indicating that there are no valid close seals on the key. If
you see this message, you must enter the close seal manually in the right column of this form.
If you need to process a different user's key, insert the key into the reader and press Read Close Seals from Key.
If the key contains the close seal for the lock, the close seal is displayed as shown above (for lock 941090). If the seal is not on the key, select the lock,
and enter the seal in the Close Seal field.
3. If you do not want to close one of the displayed locks, select the lock and press the Remove Lock from Being Closed button. The lock will remain in
the list but its background will be grey.
4. Press the Close Locks toolbar button to close those locks which have close seals.
An error message is displayed if you enter an incorrect close seal, and the Lock will not be closed. The locks which were not closed because of an error
condition are highlighted in red. Place the mouse cursor over the highlighted lock name to display the specific error message.
If the close seal was entered correctly, the program displays a message to indicate that one or more listed locks have been closed:
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon 4 Reference Manual
3.1.1.7 Close Locks Based on Verify of Open With Key
Every time a lock is dispatched, the call must be closed when the service work is completed. Normally, a Close Seal is retrieved from the lock by the service
person at the time the lock is closed. This function allows the dispatcher to close a call without a close seal by using the audit information on the key to verify
that the lock was opened.
Note
This menu item is one of the carry-over functions from the Activation Only software, a program designed to meet the needs of companies who install,
activate, and test the lock on ATMs in a factory environment. The primary purpose of this function is to allow the lock bolt to stay retracted while the empty
ATM is in transit to the field, and yet be able to have this call closed in the software (once the required open-only record is found on the key). This allows the
safe door of the ATM to be shut but not locked during shipping. After the ATM arrives at its intended destination and is bolted to the floor, the first Lock User
who extends the lock bolt and powers the lock will be asked to present the FLM or Route key. A close seal will display on the lock; however, this close seal
does not need to be entered into the software because this menu item was already used to close this lock.
In the normal day-to-day operation of most companies using this function would not be recommended and should be restricted to only the Special
Supervisor role.
To close a service call without a close seal, complete the following steps:
If you need to process a different user's key, insert the key into the reader and press Read Audits from Key.
Note
This function cannot be used if the key contains valid close seals. If you see the following message, press OK and select the Close
Lock with Key function to perform the close.
4. To view the information for a lock, select it in the list on the left side of the window.
5. Press the Close Locks toolbar button.
Warning
The analysis of the audit data on the key involves comparison of the dispatch time on the Cencon system and the open time from the key. To
insure accurate comparisons, the time on the key must be reasonably close to the system time. Cencon displays an error message if the two
times differ by more than 5 minutes.
Hint
If a Lock is simply being temporarily removed from service, you should only shelve the lock, not delete it, so that any information
that has been input into the database about this lock can remain with the lock file. That way, if the lock is reactivated, the data will
not need to be reentered.
5. Click on Individual Lock Report if you want to view the lock details before completing the operation.
6. Click on Delete Shelved Lock to finish the deletion.
7. A Delete successful message should be displayed.
Warning
If an active lock is accidentally deleted, the lock record goes to the Lock History file and can be restored back to the Lock
Report. (See Section 3.4.5 Lock History Report). However, if the information in the Lock History file is no longer available for
whatever reason, any active lock that was deleted may have to be drilled.
1. To access the dispatch dialog, select a closed lock from a lock report and then right-click and select the dispatch menu item or
press the Dispatch Lock icon on the main Cencon window. The Dispatch Lock form is displayed:
2. If the main window icon was used, enter the name or serial number of the lock and then use the appropriate Find function to
display the information for the lock. This information is automatically filled in if the lock was selected from a lock report.
3. You can optionally click the Individual Lock Report button to display details on the status of the specified lock.
4. Enter the User ID of the person who will be assigned to the call. You may also click on the Browse button to select a user from
the User ID report.
5. If the Lock is in dual mode (requiring two users), enter the second User ID. Note that if one of the users has time windows set
up, the other user must have time windows and the two sets of time windows must overlap.
6. Second Line Maintenance Call - Cencon provides a lock open alarm function which allows you to display a list of those
locks have been open within a set time window (see Lock Open Alarm). If this dispatch is in FLM mode and is going to cause
the lock to possibly be open for an extended period, check the Dispatch as Second Line Maintenance Call option to
indicate that the lock open alarm process should ignore this open lock (when the Ignore Locks Open for Second Line
Maintenance check box is selected on the alarm setup form). Typically, first line service calls are for basic maintenance or
problems that are easily resolved. The option to designate a dispatch as a Second Line Maintenance Call is not available in
Route mode.
7. Click on Dispatch to proceed with the dispatch. The system will display the next One Time Combination(s) that will open the
lock.
Relay this information to the service personnel for opening of the lock.
Note
The combination issued is only valid for the user to whom it is issued. It is not possible to issue the next one-time-only
combination for this same Lock until you have closed this service call.
When the lock is successfully dispatched, the Close Lock button is enabled. Click on the Close Lock button to open the Close
Lock form for this lock. Press Exit to close the Dispatch Lock form.
Note
Editing data on a lock will not change the lock information in historical reports, such as past records in the Activity Log. However,
data changed on the Lock Information tab for an open lock will be changed in the corresponding Open Lock Log record, as well.
Note
You may select a maximum of 200 locks to be edited.
1. Select one or more locks in one of the Lock Reports and then choose "Edit Lock Data" from the drop-down or popup menu.
The selected locks are shown in the list on the left of the dialog. Clicking on a lock name updates the information in the window
with the data for that lock.
2. Modify the desired data fields by checking the corresponding check box and entering new data. Note that the data will be
changed for all the selected locks. Select "Update all modes of all locks" if you also want all modes of each lock to
be updated.
Mapping Considerations...
Cencon supports mapping of lock locations using the following online Internet mapping services:
MapQuest
Google Maps
Bing Maps
These applications require accurate location information.
5. Select a location and file name for the XML file and click Save.
The status message provides a summary of the export:
Warning
A Cencon lock XML file that is created is only intended for importing into another database within the same company (using the
same security information.) The file should not be opened or used for any other purpose than importing into that company's
Cencon software. Failure to heed this warning may result in data loss and drilling of containers.
This function is helpful for database cleanup of lock files by a manager in cases where there is no physical, active lock with this lock
serial number in a customer's system. For example, a lock serial number may have been typed in incorrectly during the activation
process, thereby creating an SA activation key and a lock file on the system both of which are useless. Another example is a lock that
was destroyed and is no longer able to be used or shelved. It is recommended to control the access to this function to the highest
level of managers.
Danger
This feature should be used with great care since you will be bypassing all the functions of Cencon which synchronize lock
operations.
5. Click on a lock row to display the lock details on the right section of the window.
6. Select a lock and click on Remove Lock from List to prevent an import of that lock.
7. click on Add Locks to Cencon Database to perform the import.
8. "Imported successfully" or an error message is displayed in the Result column for each lock.
Warning
A Cencon lock XML file that is created is only intended for importing into another database within the same company (using the same security information.) The file should not be
opened or used for any other purpose than importing into that company's Cencon software. Failure to heed this warning may result in data loss and drilling of containers.
From any of the lock reports, select the lock you want to display additional information on. Right-click on the lock, and select Individual Lock Report.
A window is displayed that looks similar to the following. The information displayed will vary depending on what information has been entered for the lock
and if the lock is open or not.
Danger
This feature should be used with great care since you will be bypassing the functions of Cencon which synchronize lock
operations. The ability to access this function should be limited to only managers with the highest authority who have been fully
trained to know when using this function is appropriate.
If managers habitually allow locks to be forced closed and the dispatched combination not used, the risk is very great that
containers will need to be drilled because the Cencon system is not being used as instructed. Out-of-synch situations often result
in drilling when combined with lost combinations, lost keys, and abuse of the force close function.
5. Click on Individual Lock Report if you want to view the lock details before completing the operation.
6. Click on Close Lock to finish the Force Close operation. A Close successful message should be displayed once you verify that
this is what you truly want to do.
MapQuest
Google Maps
Bing Maps
Each of the above products requires that accurate address information be entered in the proper data fields for each selected lock. Use
the Preferences dialog (on the main Cencon window) to select the desired mapping software.
To display lock locations on a map, select a lock from one of the lock reports, and then choose Display the Lock Location on a
Map.
Note
MapQuest, Google Maps, and Bing Maps only support display of one location at a time on the map.
If the address information appears to be sufficient to locate the lock, Cencon passes the data to the mapping program for display. Refer
to the mapping software's documentation for information on using the specific mapping product.
Mapping Considerations
The Dispatcher can also temporarily "unassign" an FLM user from an FLM service call; however, the unassign function must be
accessed via the lock report. (See 3.1.1.24 Unassign an FLM Call). Typing in an asterisk on the Reassign user field no longer
unassigns the call as in previous versions. The unassign option is designed for use when a user has accidentally been dispatched to
the wrong lock and must be freed up to service the correct lock.
Select an open lock from one of the lock reports and then choose the Reassign menu item or click on the Reassign icon on
the main window.
If the main window icon was used, enter the name or serial number of the lock and then use the appropriate Find function to
display the information for the lock.
The Name of the user to whom the service call is currently assigned is displayed, along with the lock combination. If the Lock
was assigned in Dual mode, both names and both combinations are displayed.
Enter the new User Names(s) in the appropriate Name fields to reassign the call (or use the Browse function to select a user
name).
Click on Reassign.
If the reassign is successful, the system displays the combination(s) for the new user(s).
Note
Note that both combinations (the user originally dispatched and the user who was reassigned) have the ability to open the lock.
However, only the combination that is entered first will actually open the lock. Once a combination is entered, the other
combination will be invalid and will not open the lock. Only one Close Seal is able to be retrieved from the lock for a given call, no
matter how many different users to which the call was reassigned.
From a lock report, select any one of the locks which should be on the activation key (the software does not allow you to select
multiple lock for this function - just select any one of the locks and the software will automatically search for any others that were
activated on that same SA key based on the original time the SA key was programmed and the lock status). Click on the Administration
Menu, followed by Reissue Activate Key for Locks. The following dialog is displayed. Note that all the locks which were on the
original key are displayed.
If the list is correct, insert an SA key into the reader and press OK. The message "SA Key Reissued" is displayed when the key is
ready.
Any locks that have been successfully activated, which is evident in the software because the audit count is 2 or higher, will not allow a
Reissue of an Activation Key. Furthermore, any locks that were imported from a previous version of Cencon or CenBank software will
not allow a Reissue of an Activation Key, even if the audit count is still at 1.
Note
The original combination(s) dispatched in to the FLM or Route Lock User Key during the activation process will still work after the
Reissued Activation SA key is used. If the activation combination(s) were not written down, they can be obtained via the Individual
Lock Report or Lock Operations Report.
From a lock report, select one or more bank locks within the same Bank Branch ID, and then select the "Administration/Remove Users
from a Bank Lock" menu item. The following dialog is displayed:
When a lock is selected in the "Selected Bank Locks" list, the users currently assigned to the lock are displayed in the "Lock Users" list.
The users may be selected (moved to the "Users to be Removed" list) by pressing "Remove" or by double-clicking on a user name.
The "Users to be Removed" list may be changed using the Restore and Restore All buttons. Press OK to write the SA key with the
information for removing all the selected users from all the locks.
Note
This function displays an error if you try to delete all the users (or all but 1 user for a lock in dual mode). You must have at least
the minimum number of users required to open the lock.
See 4.2.14 Bank Mode - Remove Users for details on using the SA key at the lock to remove the users.
See 4.3.14 Bank Mode - Remove Users for details on using the SA key at a Gen 2 Swing Bolt lock to remove the users.
Caution
If an SA key is programmed in the software to Delete Bank Users the manager should ensure that the key is properly
used successfully at all of the intended locks. If any errors display during the process of reading the Delete Users SA
key a second SA key initialized for Bank Mode User Table Download (see section 3.5.6 Initialize a Key to Retrieve the
Bank Users from a Lock) should be used at the lock and read in the software. If the Delete Bank Users key was not
used successfully at the intended locks, it is possible that the particular Bank User Key(s) can still open the lock, even
though the software shows that an SA key was created to delete the key(s) from the lock.
See Section 3.1.1.24 for information on adding additional Bank Mode Lock Users to bank mode locks.
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon 4 Reference Manual
3.1.1.20 Rename Lock
This menu option allows you to rename a lock.
To rename a lock:
Warning
A Cencon Lock that is to be replaced must NOT be deleted from the Cencon system. The Lock must be seen as active in the PC
system and closed (i.e., no combination dispatched) to be properly replaced.
To replace a lock:
Note
The lock serial number will automatically be changed for all active modes of the lock.
6. If the Lock Mode is not Bank, enter the RSP/FLM User ID that you want to do the replacement of the lock.
7. Insert an SA key into the key reader.
8. Click on Replace Lock.
9. The combination for opening the lock is displayed as shown below (the combination will be blank for Bank Mode):
10. Record the combination and select Exit to close the window.
Note
You can undo the replacement of a lock, where the lock being replaced was in error.
The data for the lock being replaced is kept in the lock history table with the original serial number, and placed in a lock status of
'Replaced'.
To undo the lock replacement, delete the new lock and use the Undo Replace function in the Lock History Report.
Note
This feature is only available for Cencon Gen2 locks.
This function allows you to resynchronize the misaligned audit count in the software for a Gen2 lock with the actual audit count of the
lock. The resynchronization occurs by retrieving data from the lock with the grey ReSync key and then reading this key in the software
which updates the corresponding information in the Cencon database. This procedure consists of the following:
(See 4.2.18 Resynchronize the Database with a Lock for details on using the key at a Gen 2 lock.)
(See 4.3.18 Resynchronize the Database with a Lock for details on using the key at a Gen 2 Swing Bolt lock.)
5. Insert the returned key into the key reader and select Resynchronize the Database with Lock Data (Gen2) from the
Administration menu. (It does not matter if any lock or locks are selected when reading the ReSync key since the software
knows which lock to update based on the information on the key.) A status message is displayed when the database update is
complete and the red background color in the lock report is removed.
Note
Once a ReSync key has been issued for a particular lock and mode that is not already dispatched, that lock in the lock report
signifies this condition by being highlighted in light red. The lock will not allow a new dispatch to occur for a particular mode while
that lock and mode are in the resynchronize state (when a ReSync key has been programmed for that lock, but has not yet been
returned and read in the software.)
If the ReSync key was issued on a lock that was already dispatched, the lock remains highlighted green. In this condition, be
aware that the a combination dispatched may or may not open the lock, and if the combination was used, the data on the returned
ReSync key may be invalidated depending on the order of events.
At the time the SA key is prepared, a combination is dispatched (if FLM or Route mode is being shelved) to be used to open the lock to perform the shelving.
The shelving combination, the prepared SA Key, a valid Lock User Key (FLM, Route, or Bank mode), and a Change Key are then used to perform the shelving
procedure on the Lock.
To program the shelve key, first specify the lock modes to shelve using the Shelve Locks dialog, which can be entered in one of the following ways:
Directly from the Cencon Main Window 2.3 Main Window by clicking the Shelve Locks icon located in the Locks section. The Shelve Locks dialog
is displayed with no locks listed:
Lock modes to be shelved can be added to the Shelve Locks dialog by repeatedly using one of the following techniques:
Highlighting locks on a lock report and selecting the Shelve Locks function under the Administration menu item.
Clicking Add Lock on the Shelve Locks dialog to invoke the Shelve Lock Selection dialog where lock modes to shelve can be selected by serial
number or by lock name plus lock mode:
To select lock modes by serial number, which will return a lock for each mode that has the specified serial number and is eligible for shelving:
1. Click the Serial Number radio button.
2. Enter a serial number in the Serial Number text box.
3. Click OK.
4. All lock modes with the specified serial number that are eligible for shelving will be added to the Shelve Locks dialog.
To select lock modes by lock name and lock mode, which will return all lock modes that have the same serial number as the specified lock name
and mode and are eligible for shelving:
1. Click the Lock Name radio button.
2. Enter a lock name in the Lock Name text box.
3. Click on the desired lock mode.
4. Click OK.
5. All lock modes that have the same serial number as the specified lock name and mode and are eligible for shelving will be added to the
Shelve Locks dialog.
Additional lock modes can be added to the Shelve Locks dialog by repeatedly performing the techniques described for specifying lock modes to shelve until
Write Shelve Lock Key is clicked.
When the list of lock modes to shelve is complete the shelve key can be programmed:
The SA Key is now ready to be taken to the Lock(s) for shelving at the lock.
(See section 4.2.10 Shelve Lock (at Lock) for details using the key at a lock.)
(See section 4.3.10 Shelve Lock (at Lock) for details using the key at a Gen 2 Swing Bolt lock.)
Once shelving at the lock has been completed, the SA Key must be returned to the PC System to verify the process for each lock shelved.
Note
If a lock was opened and closed but not shelved while it was opened, another combination must be issued to the FLM or Route Person as a Service Call. This
dispatch will change the lock status from Pending Shelve back to Active; however, the shelving key that was previously created is still valid to be used. The
lock can then be opened again and the shelving can be completed.
Note
If a lock is being shelved in all modes, the Shelved Mode combination returns to the Default Factory Combination of 50-25-50.
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon 4 Reference Manual
3.1.1.24 Unassign an FLM Service Call
An FLM Lock User can be "unassigned" from an FLM service call. This option is designed for use when a user has accidentally been
dispatched to the wrong lock and must be freed up to service the correct lock. To unassign a service call, complete the following steps:
Select an open lock from one of the lock reports and then choose the Unassign menu item. This operation pertains only to FLM
mode locks; the menu item is disabled for Route mode locks.
The Name of the user to whom the service call is currently assigned is displayed, along with the lock combination. If the Lock
was assigned in Dual mode, both names and both combinations are displayed.
Click on Unassign Lock.
If the unassign is successful, the system displays a message in the Result area of the Unassign window.
Caution
Unassigning a FLM user from a call does not cancel the call. The lock is still in an open status in the
software. In fact, be aware that if the FLM user was told the combination before the unassign occurred, the
FLM technician could still use the combination to open the lock. Once a combination is dispatched to a user,
the only way to prevent that user's combination from working at the lock is to reassign the combination to a 2nd
user, and have the 2nd user open the lock with that combination before the 1st user.
Note
When an FLM lock is in an unassigned state, the next time a user needs to service that lock, the Reassign function must
be used. Even if the original user that had been unassigned opens the lock, the lock still must be reassigned (or assigned
back to the original user) in order to close the call. See section 3.1.1.17 Reassign a Service Call for details on the
Reassign function.
The following operations result in an entry in the Deleted Lock History report:
Restore the Lock (Selected Mode Only), This function attempts to restore only the lock data on the selected line (does
not look for other modes of the same lock). This function handles restoring a lock for the following four different cases:
Closed FLM or Route Mode Lock. The following dialog is displayed with information about the closed lock:
Open FLM or Route Mode Lock. The following dialog is displayed with information about the open lock:
Route Mode Lock Open on one or more route sequences. The following dialog is displayed with information
about the open route mode lock and the route sequences:
Bank Mode Lock. The following dialog is displayed with information about the bank mode lock:
To restore the lock, select the Restore button. You may have to select users to dispatch to the lock if the lock is already open.
This occures in a manner similar to reassigning a lock. In this case, the combinations for the users for the restored lock will be
displayed in the dialog.
Undo the Replacement of the Lock (All Modes). Use this function on locks with a Status of "Replaced" to undo (restore)
the replacement of all modes of the selected lock.
Note
You must first close the call generated in the shelving process before you attempt to verify the shelving of a lock.
This process completes the shelving of a Lock in the software by reading the contents of the red SA Key that was used to shelve the Lock. After
a Lock is shelved, the Close Seal must be reported first, and then the SA key needs to be returned so that shelving can be verified at the PC
System. Once shelving for a lock is verified, the lock status is changed from Pending Shelve to Shelved. To verify the shelve of a Lock:
1. Insert the red SA key used to shelve the lock into the key reader.
2. Open a lock report.
3. Select the Administration Menu. (It is not necessary to highlight any locks since the software will read the key to determine which
locks are being verified.)
4. Select Verify Shelve Lock. The SA key is read and the Verify Shelve dialog is displayed. If the key contains valid shelve data, the
verify shelve process is automatically performed.
The locks which have been shelved by the SA key are displayed in the dialog as shown below:
5. If you need to process a different SA key, insert the key into the Key Reader and click on Read Shelve Lock Key.
If the process is successful, the message "Locks shelved successfully" is displayed, and the database records for the Locks shelved through the
use of the Supervisor Audit Key are placed in the "Shelved" mode. These Locks cannot be used again until the "Activate Lock" process is used
to re-activate them.
Note
If a lock was opened and closed but not shelved while it was opened, another combination must be issued to the FLM or Route Person as a
Service Call. This dispatch will change the lock status from Pending Shelve back to Active; however, the shelving key that was previously
created is still valid to be used. The lock can then be opened again and the shelving can be completed.
This report lists information pertaining to open locks. It displays the open lock log data table within the Cencon database. When a lock is dispatched, an entry for the lock is placed in
the open lock log data table within the Cencon database. When a lock is closed, the entry for that open lock is moved to the lock log history data table within the Cencon database.
To view the Open Lock Log report, select Lock Log Report from the main Cencon Window. The following Search screen is displayed prior to generating the report to allow filtering
for specific lock records:
The tabs in the search screen will be highlighted if they contain search settings that are not immediately visible.
Upon selecting 'OK', the locks matching the given search parameters will be displayed. Depending on the number of matching locks and the speed of your database connection, it
may take several seconds for the locks to be displayed. You can still do operations with the report even while locks are still being loaded into memory. If your computer does not have
enough memory to keep all of the locks in memory, then the report will fetch locks as needed depending on the portion of the report you are looking at. If this occurs, then the word
'Partial' will be displayed on the report status bar.
Operations may be performed on the locks on this list using the following procedure:
1. Select a lock by left-clicking on the desired row in the report. Multiple locks may be selected by holding the Ctrl key while left-clicking (not all operations are available for
groups of locks). Click on the Operations menu to access the supported functions for the selected lock(s).
2. Operations may also be selected from the popup menu obtained by right-clicking on the desired row in the report.
Close
Close Locks With User Key
Close Locks Based on Verify of Open With Lock User Key
Close Lock with Remote Serial Operation (Gen2)
Reassign
Unassign
Edit Lock Data
Individual Lock report
Display the lock location on a map
Add to Collection
Add to Route
Rename
Replace
Manager Force Close w/o Seal
Force Delete of Unshelved Lock
Remote Serial Operations with Lock (Gen2)
From the main window, click on Route Report. The following Search screen is displayed prior to generating the report to allow
filtering for specific routes:
The tabs in the search screen will be highlighted if they contain search settings that are not immediately visible.
Upon selecting 'OK', the routes matching the given search parameters will be displayed. The fields on the 'Routes' tab of the search
dialog are compared against the routes in the Cencon database. The fields on the 'Route Locks' tab of the search dialog is compared
against the data associated with the locks on the route, such as the user ID to dispatch, open and close date on the route, and route
sequence. The fields in the remaining tabs of the search dialog are compared against the locks contained within the routes in the
Cencon database. If the search parameters for one or more locks within a route matches, then that route will be returned as part of the
result of the search.
Depending on the number of matching routes and the speed of your database connection, it may take several seconds for the routes to
be displayed. You can still do operations with the report even while routes are still being loaded into memory. If your computer does not
have enough memory to keep all of the routes in memory, then the report will fetch routes as needed depending on the portion of the
report you are looking at. If this occurs, then the word 'Partial' will be displayed on the report status bar.
The operations menu provides access to a set of operations unique to the Route Report as shown below:
Add Route
This operation allows you to add a new route. You can do this by selecting Add a Route from the Operations menu.
You will need to enter a name for the route you want to create. Optionally you can set a customer ID and region ID. If you are
using region control, and currently logged in as a Global user, you will need to set the region ID to match the region assigned
to the locks you are going to place on the route. If the current dispatcher is restricted to a local region, then that region will
automatically be assigned to a new route being created. Once you have set up the information for the new route, click the OK
button.
This operation allows you to edit the information for an existing route. You will need to first select the route you want to edit
from the report. Then select Edit Route Data from the Operations menu. A dialog similar to the following is displayed.
Edit the information for the route as desired, and then click on OK. A confirmation message will be displayed for the update of
the route.
Delete Route
This operation allows you to delete an existing route. You will need to first select the route you want to delete from the report.
Then select Delete Route from the Operations menu. A dialog similar to the following will be displayed.
Select Yes to proceed with deleting the route. If the route has locks open, they can still be closed out from the Lock Report or
the Open Lock Log Report. If the route is later recreated with the same name, any open locks on the route will automatically
be added back to the report.
Rename Route
This operation allows you to rename an existing route. You will need to first select the route you want to rename from the
report. Then select Rename Route from the Operations menu. A dialog similar to the following is displayed.
Enter a new name and press OK to proceed with renaming the route.
Route Lock Listing
This operation allows you to display a report of the locks on a route, as well as manage the locks on a route. You will first
need to select the route you want to display from the report. Then select Route Lock Listing from the Operations menu.
The Route Listing Report will be displayed for the route you selected. See section 3.1.3.1 Route Listing Report for details on
using the Route Listing Report. An alternative method is to double-click on the route you want to display. This operates in the
same manner as selecting the option from the Operations menu.
Archive Routes
Enter the number of days for the archive (based on the last date the locks on the route were dispatched) and press OK to proceed to
the confirmation screen:
The records are copied to the Route Archive table and removed from the Route table.
Note
Import of legacy route files (.RTE) has been removed from Cencon. This function is still present in the Cencon Database Setup
Utility. This is done in the following manner:
1) Run the Cencon Database Setup Utility, select your database as needed, and select Maintenance only. In the following
screens, do not select to update tables, etc.
2) In the screen to import Cencon 1.5x files, check the box to import files. You will then see the options to import files.
3) Select the directory to import files from and select only the route file type to be imported.
4) Select Next until you get to selecting a region to import the routes to. Select the region you want to assign to the imported
routes.
5) Select Next until you get to the final summary screen for the operations to be done. Check the operations to be done and then
click on Start to import the route files.
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon 4 Reference Manual
3.1.3.1 Route Listing Report
The Route Listing Report is used to display the details of a route of locks, and to allow administration of a route. It provides support for the following operations:
Open the Route report from the main Cencon window by clicking on Route Report.
Open the route you want to display, by selecting the route name and double-clicking on it.
Alternatively, you can select the route name and right-click on it. A popup menu will be displayed. From the popup menu, select Route Lock Listing. A window
similar to the following will be displayed:
Note
The Route Listing report will update its colors depending on the status of the report. If a lock is not open, then the lock name and RSP user ID can be edited, as
well as its route sequence number. Fields that can be edited are shown in yellow. If a lock is open, then the lock will be highlighted in green. The field for the
close seal of the lock will be in yellow, indicating that field can be edited for entering the close seal of the lock.
White - Indicates a lock is closed and that the field can't be edited.
Green - Indicates a lock is open.
Yellow - Indicates a field can be edited. If a lock is open, the close seal can be entered. If a lock is not open, then the RSP ID can be entered, or the lock
name or sequence can be changed.
Red - Indicates that an error occurred with the last operation attempted against the lock, or that the lock is already open on another route with the same
sequence number. The reason for the error with the lock will be displayed in the Result field of the report.
Light Blue - If the lock name is highlighed in light blue, this indicates that the lock is a Gen 2 lock.
A variety of common operations can be done with the report, to include printing, saving in various formats, and sorting the contents of the report. You can refer to
these common report operations in section 3.0 Reports.
The following window shows the set of operations unique to the Route Listing Report:
Browse To Add Lock To Route
This operation allows you to add locks to the route. 1 route listing report must be currently open to add locks to it. From the Operations menu, select
Browse To Add Lock To Route. Alternatively, click on the Add Locks button on the tool bar. The Lock Report will be displayed, with the search
automatically set up for route mode locks. If region control is active, the region will automatically be set up as the same region as is assigned to the route.
From the lock report, select a lock or a group of locks and then press Operations followed by Add to Route. If you add a lock multiple times, it will be
added using the next route sequence number. A single lock can only have up to three dispatches on a route.
This operation allows you to delete a lock from the route. Select a lock within the route. From the Operations menu, select Remove Lock From
Route. Alternatively, select a lock within the route and right-click on the lock. Select Remove Lock From Route from the popup menu. A third method
is to select a lock within the route and press the Delete key on your keyboard. The lock you have selected will be deleted from the route.
Set Users
This sets the RSP user names to the selected locks on the route. If no locks are selected, then this will set the entered RSP user names to the entire route.
If the route locks are open, then this can be done using Reassign. From the Operations menu, select Set Users. The following window will be
displayed:
If all the locks on the route are in single mode, then the second RSP user field will be disabled in the window. If one or more locks on the route are in dual
mode, then both RSP user fields will be enabled. Enter the RSP user ID that you want to assign to the route and click on OK.
Dispatch
This dispatches the route to the currently assigned RSP users. If RSP users are not assigned, or if RSP users are not the same for the entire route, then
the Set Users window will be displayed to prompt you for the RSP User IDs to dispatch. After you set the users, then the route will be updated with the
combinations dispatched to the RSP users.
From the Operations menu, select Dispatch. Alternatively, click on the Dispatch button on the toolbar. The window similar to the following will be
displayed.
Reassign
This operation reassigns open locks on the route to another RSP user ID(s). You can reassign the entire route, or just part of the route. The report will
update with the new RSP user IDs and their combinations.
To reassign part of a route, select those locks on the route you want to reassign. Alternatively, leave all the locks unselected, and the entire route will be
reassigned. From the Operations menu, select Reassign, or click on Reassign in the toolbar. The Set Users dialog will be displayed, allowing you to
enter the new RSP user IDs you are wanting to reassign the route locks to. Click on Set Users and the report will be updated with the new RSP user IDs
and the assigned combinations.
Note
Note that both combinations have the ability to open the lock. However, only the combination that is entered first will actually open the lock. Once a combination is
entered, the other combination will be invalid and will not open the lock. Only one Close Seal can be retrieved from the lock for the opening.
Close
This operation allows you to close the locks on the route by entering in the close seals for the locks. This is done by first entering in the close seals into the
yellow edit field in the report, in the Seal column. The close seal must be for the correct route sequence of the lock, if the lock has been dispatched
multiple times on the route.
If a lock route sequence has been skipped by the personnel dispatched to the lock, then the skipped sequence can be "forced closed" by entering 'F' for the
close seal. When you enter 'F' for a close seal, it will automatically be expanded to 'FF' or to 'FFFF'. You can not force close the last sequence of a lock
on a route.
Once you have entered the close seals for the locks you are going to close, open the Operations menu and select Close, or click on Close in the
toolbar. If any close seals are incorrect, then the lock will be highlighted in red and the error displayed in the Result field. If this occurs, you will need to
re-enter the correct close seal, and try to close the lock again.
This operation allows you to close the locks on a route by reading the close seals from the RSP user's key. You will need to place the RSP user's key into
the key reader in order to read the lock close seals from the key. From the Operations menu, select Close with Key, or click on Close with Key in
the toolbar.
This operation allows you to display details on an individual lock on the route. Select a lock on the route. Then, from the Operations menu, select
Individual Lock Report. Alternatively, you can right-click on a lock, and select Individual Lock Report from the popup menu. A report window is
displayed detailing the status of the selected lock. See the Individual Lock Report for details on the individual lock report.
Copy / Paste
These Edit operations allow you to copy and paste locks between routes, or to copy the locks on a route to another application. Select the locks on the
route you want to copy, and select Copy from the Edit menu. Then open the route you want to copy the locks to, from the Route report, or create a new
route as desired. Then select Paste from the Edit menu. The copied locks will be pasted into the other route.
You can also copy locks from the report using Copy As HTML from the Edit menu. This allows you an easy way to paste locks from a route into
Microsoft© Excel or Word, and preserve the formatting of the data. However, this method is not supported for copying locks between routes. The Copy
operation must be used for that.
The Collection Report is used to display and manage collections of locks. Lock Collections can be created with a combination of any
locks in any modes and can be used for any purpose the user sees fit. One use of a collection is the type of customer who activates
many locks at a time on 1 given SA key for locks being staged in an office or a manufacturing facility. After the activation process is
completed, the user may want to re-dispatch another test opening combination to 1 Lock User Key for all those locks simultaneously
rather than dispatching each lock individually. Collections may also be used to manage locks in a particular geographic grouping, a
customer grouping, or locks that have the same standard service day.
From the main window, click on Lock Collections. The following Search screen is displayed prior to generating the report to allow
filtering for specific lock records:
The tabs in the search screen will be highlighted if they contain search settings that are not immediately visible.
Upon selecting 'Find Collections', the collections matching the given search parameters will be displayed. The fields on the 'Collections'
tab of the search dialog are compared against the collections in the Cencon database. The fields in the remaining tabs of the search
dialog are compared against the locks contained within the collections in the Cencon database. If the search parameters for one or
more locks within a collection matches, then that collection will be returned as part of the result of the search.
Depending on the number of matching collections and the speed of your database connection, it may take several seconds for the
collections to be displayed. You can still do operations with the report even while collections are still being loaded into memory. If your
computer does not have enough memory to keep all of the collections in memory, then the report will fetch collections as needed
depending on the portion of the report you are looking at. If this occurs, then the word 'Partial' will be displayed on the report status bar.
The operations menu provides access to a set of operations unique to the Collection Report as shown below:
Add Collection
This operation allows you to add a new Collection. You can do this by selecting Add a Collection from the Operations
menu.
Enter a name for the collection you want to create. The Owner name is automatically initialized to the name of the current
Cencon user. Once you have set up the information for the new collection, click on OK.
Change Owner
This operation allows you to change the owner for an existing Collection. You will need to first select the Collection you want to
edit from the report. Then select Change Owner from the Operations menu. A dialog similar to the following is displayed.
Edit the Owner Name and then click on OK. A confirmation message is displayed.
Delete Collection
This operation allows you to delete an existing Collection. You will need to first select the collection you want to delete from
the report. Then select Delete Collection from the Operations menu. A dialog similar to the following will be displayed.
Copy Collection
This operation allows you to copy an existing Collection to a new collection. You will need to first select the collection you want
to copy. Then select Copy Collection from the Operations menu. A dialog similar to the following will be displayed.
Enter a name of the new collection and optionally change the default owner name. Select OKs to proceed with copying the
Collection. The following confirmation message indicates success:
Display Locks for a Collection
This operation allows you to display a report of the locks in a Collection, as well as manage the locks in a Collection. You will
first need to select the Collection you want to display from the report. Then select Display Locks for a Collection from
the Operations menu. The Collection Listing Report is displayed for the collection you selected. See section 3.1.4.1
Collection Locks Report for details on using this report. An alternative method is to double-click on the collection you want to
display. This operates in the same manner as selecting the option from the Operations menu.
Operations Menu:
The operations of the Collection Locks report are the same as for the Lock Report/Lock Operations Reports except for the following:
If either of the dispatch all locks functions is selected, the Dispatch User Selection window allows you to select the name(s) of the users for the dispatch:
Enter a user (or users if you have any dual mode locks) and press OK to dispatch the locks. The locks are all dispatched to the selected user and the combinations
displayed as shown in the example below:
This operation allows you to add locks to the open collection. From the Operations menu, select Browse to Add Locks to Collection. Alternatively, select the lock
(or locks) you want to add, right-click on the selection, and click on Browse to Add Locks to Collection. The Lock Operations Report is displayed (preceded by the
search form). From the lock report, select a lock or a group of locks and then press Operations followed by Add to Collection. You will be asked if you want to add
the selected locks to the open collection (if a collection lock report screen is currently displayed.) If you click on "Yes", the selection is automatically added to the open
collection. If you click on "No", Cencon opens the collection selection form which allows you select an alternate collection.
This operation allows you to delete a lock from a collection. Select a lock within the collection. From the Operations menu, select Remove Lock From Collection.
Alternatively, select a lock within the collection and right-click on the lock. Select Remove Lock From Collection from the popup menu. The lock you have selected
is deleted from the collection.
Administration Menu - The Administration Menu is the same as that of the Lock Reports:
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon 4 Reference Manual
3.1.5 Lock Open Alarm
The Lock Open Alarm allows you to display a list of those locks which have been open within a set time window. The Lock Open Alarm
Settings form allows you to select the desired time constraints and to create a filter which specifies which locks are allowed to trigger
the alarm. An automatic check is made at intervals specified in the Setup dialog.
The open lock interval check function is active if Start Alarm has been pressed in the Lock Open Alarm dialog. When the interval
expires the Lock Open Alarm dialog window appears with a listing of the locks which have an open time within the set time window.
Press Start Alarm to continue.
If the alarm has not been started, the Refresh Results toolbar button may be used to to manually initiate a status check.
Note
To work with one of the displayed locks, double-click on its row. Cencon will open the Lock Operations report for the selected lock.
Setup Alarm
This operation allows you to select the open time window and to create a filter which specifies that the time window is only
checked for a certain set of locks. There are also control settings which can cause the alarm window to be hidden while the
alarm is running and which remember the settings between uses of the alarm function.
The Ignore Locks Open Longer than value tells the alarm to ignore locks which have been open longer than this time
value. The ignore feature is not active if all three values are zero. An error is displayed if the ignore time is more recent than
the limit time.
The Ignore Locks Open for Second Line Maintenance option prevents the monitoring of locks which were dispatched
as second line maintenance calls (calls which are known in advance to require an extended period of open time for
maintenance). If this box is checked, locks dispatched as second line maintenance calls will not trigger an open alarm.
The Hide Lock Open Alarm Form While Alarm Is Running check box makes the form invisible until there are open
locks to display. If you want to view the form while it is hidden, click on the Lock Open Alarm icon on the main window.
Note
If you select the check box Start the Lock Open Alarm When Cencon Starts, the "Hide" selection is ignored when
Cencon starts to insure that you aware the alarm is running.
The Update Interval specifies how often the software checks the open locks for the criteria you have specified. This value
must be greater than zero minutes.
Example:
If you want to know when any locks have been open for more than 8 hours but don't care about older opens from a month
ago, set the "Check for Locks Open Longer than" Hours value to 8 and the "Ignore Locks Open Longer than" Day value to
30. Select a time interval at which Cencon should refresh the lock status, such as every 15 minutes.
Once you have set up the information for the alarms, click on OK.
Start Alarm
Stop Alarm
Page
Refresh Results
The Bank Branch Report is used to display and manage Bank Branches. All Bank mode locks and Bank users must be assigned to a
Bank Branch. Each bank mode user's numeric ID is unique within their assigned Bank Branch.
To create or maintain Bank Branch data, select Bank Branch Report from the main Cencon Window. The Find Bank Branches
window allows you to specify information for searching for particular bank branches:
Upon selecting 'OK', the bank branches matching the given search parameters will be displayed in the report.
The operations menu provides access to a set of operations unique to the Bank Branch Report as shown below:
Add a Branch
This operation allows you to add a new Bank Branch. You can do this by selecting Add a Branch from the Operations
menu.
The following dialog is displayed:
Enter a Name, Branch ID, and Customer ID (optional) for the bank branch you want to create. Once you have set up the
information for the new branch, click OK.
Change Customer ID
This operation allows you to edit the information for an existing Bank Branch. You will need to first select the Bank Branch you
want to edit from the report. Then select Change Customer ID from the Operations menu. A dialog similar to the
following is displayed.
Select the desired Customer ID and then click on OK. A confirmation message is displayed when the update is complete.
Delete Branch
This operation allows you to delete one or more Bank Branches. You will need to first select the Bank Branch(es) you want to
delete from the report. Then select Delete Branch from the Operations menu. A dialog similar to the following will be
displayed.
Select OK to proceed with the deletion.
This operation allows you to display a report of the locks in a Bank Branch, as well as manage the locks in a Bank Branch.
You will first need to select the Bank Branch you want to display from the report. Then select Display the Locks in the
Branch from the Operations menu (or by right-clicking on the desired Bank Branch). A Lock Operations Report is
generated to display the locks assigned to the selected Bank Branch.
This operation allows you to display a report of the users in a Bank Branch, as well as manage the users in a Bank Branch.
You will first need to select the Bank Branch you want to display from the report. Then select Display the Users in the
Branch from the Operations menu (or by right-clicking on the desired Bank Branch). A User Report is generated to display
all the users assigned to the selected Bank Branch.
The Bank Branch Report is used to display and manage Bank Branches. All Bank mode locks and Bank users must be assigned to a Bank Branch. Each bank mode user's numeric ID is unique within
their assigned Bank Branch.
To create or maintain Bank Branch data, select Bank Branch Report from the main Cencon Window. The Find Bank Branches window allows you to specify information for searching for
particular bank branches:
A variety of common operations can be done with the report, to include printing, saving in various formats, and sorting the contents of the report. You can refer to these common report operations in
Reports.
The operations menu provides access to a set of operations unique to the Bank Branch Report as shown below:
The Bank Branch Report is used to display and manage Bank Branches. All Bank mode locks and Bank users must be assigned to a Bank Branch. Each bank mode user's numeric ID is unique within
their assigned Bank Branch.
To create or maintain Bank Branch data, select Bank Branch Report from the main Cencon Window. The Find Bank Branches window allows you to specify information for searching for
particular bank branches:
A variety of common operations can be done with the report, to include printing, saving in various formats, and sorting the contents of the report. You can refer to these common report operations in
Reports.
The operations menu provides access to a set of operations unique to the Bank Branch Report as shown below:
This operation allows you to display a report of the locks in a Bank Branch, as well as manage the locks in a Bank Branch. You will first need to select the Bank Branch you want to display from
the report. Then select Display the Locks in the Branch from the Operations menu (or by right-clicking on the desired Bank Branch). A Lock Operations Report is generated to display
the locks assigned to the selected Bank Branch.
This operation allows you to display a report of the users in a Bank Branch, as well as manage the users in a Bank Branch. You will first need to select the Bank Branch you want to display
from the report. Then select Display the Users in the Branch from the Operations menu (or by right-clicking on the desired Bank Branch). A User Report is generated to display all the
users assigned to the selected Bank Branch.
Note
This feature is only available for Cencon Gen 2 locks.
This function allows you to communicate with a Gen 2 lock using a serial connection to your PC through a Cencon Serial Adapter. The serial connection
can be directly through a Cencon Lock USB Serial Interface Box. It can also be through a network connection, through a Cencon Lock Network Serial
Interface Box.
Alternatively, it can be through the network connection provided by the Centran Agent service running on an ATM console computer connected to the Gen
2 lock with a Cencon USB ATM Lock Adaptor.
The user interface allows you to retrieve information from the lock and perform most of the lock operations which are normally done with keys (such as
activate, shelve, set the time, etc.).
Warning
Operators may become statically charged in a normal working environment if they are not wearing a ground strap. In this case the USB
communications may stop working, un-plug and re-plug the USB cable between the computer and the USB Interface Box to resume
operation. It is recommended that operators working on the inside of the ATM or in a factory connecting to the Gen 2 10 pin connector to
always wear a wrist strap to prevent possible ESD damage from occurring while using the USB Interface Box.
Connect a USB cable between your PC and the Cencon Lock USB Serial Interface Box. The Cencon Lock USB Serial Interface Box may have to
have drivers installed. This can be done automatically through Windows Update. The Cencon Lock USB Serial Interface Box will be displayed as
USB Serial Port.
Connect the 10 pin Cencon lock serial cable between the Cencon Lock USB Serial Interface Box and the Cencon lock.
Start Cencon and select Lock Operations with Serial Connect.
To connect to the lock:
Directly through a serial cable - click in the Connection box and select the type of connection you are using (Communications Port
(COM1) for this example). You will need to have connected the lock using a Cencon Lock USB Serial Interface Box to a USB port on your
computer. Each serial communications port on your computer will be listed in the drop-down selection in the form.
Through a network connection - type the lock's network address in the Connection box at the top of the form. You will need to have
connected the lock using a Cencon Lock Network Serial Interface Box to your network, and configured it as needed using the Cencon Lock
Network Serial Interface Box Utility. If a network port other than the default needs to be set, then that can be entered after the network
address, separated by a colon:
Note
When you connect to a lock using a network connection, the network address and port used to connect up to that lock will automatically
be saved to the Cencon database. To connect back up to that lock at a later date, you can select that lock from one of the Cencon
reports and select Remote Serial Operations With Lock (Gen2). The Lock Operations With Serial Connect form will be
displayed and the previously used network address will be used to connect to the lock. You can also close out a dispatch to the lock in
the same manner, by selecting Close Lock With Remote Serial Operation (Gen2) from the report's operation menu.
Toolbar functions:
Refresh/Connect to Lock
Connect to the attached lock and update the status displayed for the connected lock.
Set Lock Clock
Set the time in the lock, based off of the time on your host computer. If one or more modes are active from your software, this will also set the
daylight savings time transition table for each mode based off of the selected time zone. A form will be displayed to select the time zone for each
authorized active mode.
Lock Report
Display a report similar to the Cencon Individual Lock report but also including additional information which can only be accessed through the direct
connection. This report will display the current status of the lock and information for each active mode of the lock.
Audit Report
Display a standard Cencon lock audit report. This report displays all the available audits since it is not subject to the memory limitations of storing
the audits on the SA key.
Note
In order to read the status of a lock, set the clock, generate a lock report, or generate an audit report, you must have authorization to access the lock. If
the lock is shelved, then anyone can set the clock or get an audit report from the lock. If one or more modes are active on the lock, then you must have
control of at least one of the modes of the lock to get information from the lock. Each lock mode may be under the control of a different company, and
each mode has it's own security implemented. If you attempt to access a lock that you don't control one of the modes of, you will not be able to read
information from the lock. Additionally, you will only be able to access information specific to the lock modes you control and the audit trail of the lock.
FLM Mode
Activate FLM Mode
Shelve FLM Mode
Resynchronize Dispatching for FLM Mode
Set Access Between Single and Dual User for FLM Mode
Close Dispatch for FLM Mode
Route Mode
Activate Route Mode
Shelve Route Mode
Resynchronize Dispatching for Route Mode
Set Access Between Single and Dual User for Route Mode
Close Dispatch for Route Mode
Bank Mode
Activate Bank Mode
Shelve Bank Mode
Resynchronize Users for Bank Mode
Set Access Between Single and Dual User for Bank Mode
Set Time Delay and Open Time Window for Bank Mode
View Bank Mode Users
Add Bank Mode Users
Delete Bank Mode Users
Note
When activating a lock mode using the serial connection to the lock, a change key must be inserted into the back of the lock to validate
that you have physical access to the lock. Other functions such as shelving the lock, setting access between single and dual user, and
reading the status of the lock do not require a change key to be inserted in the back of the lock. This is because the security of the serial
communications for the activated mode has already been set up during activation.
Successful activation:
The lock FLM mode is now active, and can have users dispatched to open it.
Note
Once you have shelved a lock mode using the serial connection to the lock, you can not reactivate the lock mode without having physical
access to the back of the lock to insert a change key. This is because the security of the serial communications for a mode being
activated is set up during activation of the lock mode. When shelving a mode, that security for the mode is already set up. You can
shelve a mode remotely, however you must have physical access to the inside of the lock container to insert in a change key into the
back of the lock to reactivate the lock.
Note
If the configuration option to require a change key be present in the lock for remote shelve is set, you will not be able to remotely shelve
the lock across a remote connection without first having someone present to open the lock and insert a change key. In the case of the
Cencon Gen 2 swing bolt lock, you can alternatively open the lock and enter #50 at the lock to allow remote administration of the lock.
See Change Configuration Settings to set this configuration option in the Cencon database.
This operation reads the current dispatching status of the lock and updates the Cencon database entry for the lock to match. It will ensure
that the Cencon database matches the lock in the case of having to recover from a backup of the database.
Note
You can not resynchronize the Cencon database dispatching with the Cencon Gen 2 lock while a call is dispatched to the lock. If you
have a call open to the lock and the lock is out of synchronization with the Cencon database, you will need to do a Manager Auto-Close
w/o Close Seal to close out the call first. You would then resynchronize the Cencon database with the lock. After resynchronizing the
Cencon database with the lock you would be able to dispatch to the lock again.
The lock FLM mode has been resynchronized, and can have users dispatched to open it.
This operation sets the lock between needing a single user or needing dual users to open the lock, and also updates the Cencon database as
needed.
To set access between single and dual users for the the attached lock in FLM mode:
Note
You can not change single or dual user access while a call is dispatched to the lock. You will need to wait until the call has been
completed first. After the call has been completed, you will be able to change the access between single user or dual user being required
to open the lock.
Form for selecting single or dual user mode access on the lock:
The lock FLM mode has been set between single and dual user mode.
This operation reads the status and the audit trail of the lock, determines if a valid dispatch has opened and closed the lock, and closes out
the dispatch to the lock in the Cencon system. This is primarily intended for locks connected remotely on a network, to allow dispatches to
locks to be closed out in a convenient and secure manner without having to call in a close seal from the lock.
Note
The lock must be completely closed for this operation to work. If the bolt is retracted, the door sensor indicates the container door is open
(if connected), or the change key is in the lock, then the dispatch to the lock can't be closed out in this manner.
Note
When activating a lock mode using the serial connection to the lock, a change key must be inserted into the back of the lock to validate
that you have physical access to the lock. Other functions such as shelving the lock, setting access between single and dual user, and
reading the status of the lock do not require a change key to be inserted in the back of the lock. This is because the security of the serial
communications for the activated mode has already been set up during activation.
Successful activation:
The lock Route mode is now active, and can have users dispatched to open it.
Note
Once you have shelved a lock mode using the serial connection to the lock, you can not reactivate the lock mode without having physical
access to the back of the lock to insert a change key. This is because the security of the serial communications for a mode being
activated is set up during activation of the lock mode. When shelving a mode, that security for the mode is already set up. You can
shelve a mode remotely, however you must have physical access to the inside of the lock container to insert in a change key into the
back of the lock to reactivate the lock.
Note
If the configuration option to require a change key be present in the lock for remote shelve is set, you will not be able to remotely shelve
the lock across a remote connection without first having someone present to open the lock and insert a change key. In the case of the
Cencon Gen 2 swing bolt lock, you can alternatively open the lock and enter #50 at the lock to allow remote administration of the lock.
See Change Configuration Settings to set this configuration option in the Cencon database.
This operation reads the current dispatching status of the lock and updates the Cencon database entry for the lock to match. It will ensure
that the Cencon database matches the lock in the case of having to recover from a backup of the database.
Note
You can not resynchronize the Cencon database dispatching with the Cencon Gen 2 lock while a call is dispatched to the lock. If you
have a call open to the lock and the lock is out of synchronization with the Cencon database, you will need to do a Manager Auto-Close
w/o Close Seal to close out the call first. You would then resynchronize the Cencon database with the lock. After resynchronizing the
Cencon database with the lock you would be able to dispatch to the lock again.
The lock Route mode has been resynchronized, and can have users dispatched to open it.
This operation sets the lock between needing a single user or needing dual users to open the lock, and also updates the Cencon database as
needed.
To set access between single and dual users for the the attached lock in Route mode:
Note
You can not change single or dual user access while a call or a route is dispatched to the lock. You will need to wait until the call or route
has been completed first. After the call or route has been completed, you will be able to change the access between single user or dual
user being required to open the lock.
Form for selecting single or dual user mode access on the lock:
The lock Route mode has been set between single and dual user mode.
This operation reads the status and the audit trail of the lock, determines if a valid dispatch has opened and closed the lock, and closes out
the dispatch to the lock in the Cencon system. This is primarily intended for locks connected remotely on a network, to allow dispatches to
locks to be closed out in a convenient and secure manner without having to call in a close seal from the lock.
If the route mode lock has been dispatched to multiple sequences on a route, then this operation will close out route sequences as well. If a
route sequence has been skipped at the lock, then that route sequence will be force closed as needed in the route dispatch.
Note
The lock must be completely closed for this operation to work. If the bolt is retracted, the door sensor indicates the container door is open
(if connected), or the change key is in the lock, then the dispatch to the lock can't be closed out in this manner.
Note
You will need to first select a bank branch to assign the Bank mode lock to before selecting users to add to the lock. The list of users
available to add to the lock is determined by the bank branch that the lock is assigned to. If you change what bank branch the lock is
assigned to, any prior user selections will be cleared.
The lock Bank mode is now active, and users assigned to the Bank mode lock can change their combinations and open it.
Note
Once you have shelved a lock mode using the serial connection to the lock, you can not reactivate the lock mode without having physical
access to the back of the lock to insert a change key. This is because the security of the serial communications for a mode being
activated is set up during activation of the lock mode. When shelving a mode, that security for the mode is already set up. You can
shelve a mode remotely, however you must have physical access to the inside of the lock container to insert in a change key into the
back of the lock to reactivate the lock.
Note
If the configuration option to require a change key be present in the lock for remote shelve is set, you will not be able to remotely shelve
the lock across a remote connection without first having someone present to open the lock and insert a change key. In the case of the
Cencon Gen 2 swing bolt lock, you can alternatively open the lock and enter #50 at the lock to allow remote administration of the lock.
See Change Configuration Settings to set this configuration option in the Cencon database.
This operation reads the current user table of the lock and updates the Cencon database entry for the lock to match. It will ensure that the
Cencon database matches the lock in the case of having to recover from a backup of the database.
Note
If a user that is assigned access to the bank mode lock is not in the Cencon database, that user can not be resynchronized as having
access in the Cencon database. This might occur if the database had to be recovered from a backup that did not have the users set up yet.
It could also occur if the users were removed from the lock by key, the users deleted from the Cencon database, and the remove user key
was never used at the lock. If this occurs, you will need to add the users back to the Cencon database and then resynchronize the bank
mode lock user table with the Cencon database again.
This operation sets the lock between needing a single user or needing dual users to open the lock, and also updates the Cencon database as
needed.
To set access between single and dual users for the the attached lock in Bank mode:
Note
You can not change single or dual user access while a call is dispatched to the lock. You will need to wait until the call has been
completed first. After the call has been completed, you will be able to change the access between single and dual user required.
Form for selecting single or dual user mode access on the lock:
The lock Bank mode has been set between single and dual user mode.
This operation sets the time delay period after a bank mode user enters their combination and presents their key to the lock for the user to
be able to actually open the lock. This operation also sets the time window that the user can open the lock once the time delay period has
elapsed. The option to set a time delay before opening and a time window to open is available only to Bank mode.
To set the time delay and open time window for the the attached lock in Bank mode:
Form for entering the time delay and open time window for the lock:
The lock Bank mode time delay and open time window has been set.
Select the Bank Users tab on the Serial Connect form. The display shows the users currently assigned to the lock.
Note
This tab displays the users currently assigned to the Bank mode lock based off of the Cencon database. If the Cencon database is not up
to date with the lock, then you can resynchronize the Cencon database with the lock using the Resynchronize Users for Bank Mode
operation.
Form displaying the current users for the Bank mode lock:
Select the Bank Users tab on the Serial Connect form. The display shows the users currently assigned to the lock.
Select the Add Users button on the Bank Users tab. The display shows the form for adding users to the lock.
Select which users you want to add to the lock from the list of available users.
Select the Apply Adding Users To Lock button on the Bank Users tab. The selected users will be added to the lock.
Note
This tab displays the users currently assigned to the Bank mode lock based off of the Cencon database. If the Cencon database is not up
to date with the lock, then you can resynchronize the Cencon database with the lock using the Resynchronize Users for Bank Mode
operation.
Form displaying the current users for the Bank mode lock:
Select the Bank Users tab on the Serial Connect form. The display shows the users currently assigned to the lock.
Select the Delete Users button on the Bank Users tab. The display shows the form for deleting users from the lock.
Select which users you want to delete from the lock from the list of users assigned access to the lock.
Select the Apply Deleting Users From Lock button on the Bank Users tab. The selected users will be deleted from the lock.
Note
This tab displays the users currently assigned to the Bank mode lock based off of the Cencon database. If the Cencon database is not up
to date with the lock, then you can resynchronize the Cencon database with the lock using the Resynchronize Users for Bank Mode
operation.
Form displaying the current users for the Bank mode lock:
Form used to select users to delete from the Bank mode lock:
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon System Reference Manual
3.1.7.19 Lock Operations with Serial Connect - Set Lock Clock and Time Zone Daylight Savings
Time Table
Set Lock Clock and Time Zone Daylight Savings Time Table
This operation sets the time in the lock, based off of the time on your host computer.
Note
Only the active modes you are authorized to set the time zone daylight savings time tables on will be updated. If you do not have authorization
to update the appropriate active modes on the lock, or the modes on the lock are controlled by another company, you will not be able to update
those modes.
To set the clock and time zone daylight savings time tables for the lock modes:
Select the Set Clock button on the Lock Operations with Serial Connect toolbar.
If the lock has modes active, the clock will be set and any modes you have authorization to set will have their daylight savings time table
updated. The Set Clock form will be displayed to select the time zone for each authorized active mode. Select the time zones for the
different modes as needed, and then press the Set Clock And Daylight Savings Time Tables button. This will set the clock on the
lock and also set the daylight savings time transition table for each mode based off of the selected time zone.
Dialog for selecting the time zones to use to update the lock clock and time zone daylight savings time tables:
If no modes are active, this will only set the clock on the lock. The clock on the lock will be set based off of the system time on your host
system. If no modes are active, then daylight savings time data will not be saved at the lock. The only dialog displayed will be to indicate
success or failure to set the clock on the lock.
If no modes are active, only the clock will be set. You will see only the following message stating that the clock was set:
This operation reads the status of the lock as well as the status of each mode of the lock. It also reads the database information for each
mode of the lock from the Cencon database. It then displays a report similar to the Cencon Individual Lock report but also including additional
information which can only be accessed through the direct connection. This report will display the current status of the lock and information for
each active mode of the lock. This report can be long, depending on the number of authorized active modes on the lock.
Select the Lock Report button on the Lock Operations with Serial Connect toolbar.
A report of the status of the lock will be displayed.
Note
Only information for the lock modes that your company controls will be displayed. If your company does not control any of the active lock
modes on the lock, then you will not be able to display any of the mode information for that lock.
Lock Report:
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon System Reference Manual
3.1.7.21 Lock Operations with Serial Connect - Create Lock Audit Report
Create Lock Audit Report
This operation reads the status of the lock as well as the audit trail of the lock. It then displays a report similar to the report from a supervisor audit
key, however there is no size restriction on the number of audits. This report can be long, depending on the number of audits on the lock.
Select the Audit Report button on the Lock Operations with Serial Connect toolbar.
A report of the audit trail from the lock will be displayed.
Note
If the lock has one or more modes active and your company does not control any of the active lock modes on the lock, then you will not be able
to download audit information from the lock.
Note
If the lock is opened in Factory/Shelved mode and then activated using the lock serial connection, the audit of the following bolt close will
indicate it is a Factory/Shelved mode close. This is because the bolt close is associated with the open that occurred while the lock was in
Factory/Shelved mode.
Note
This feature is only available for Cencon Gen 2 locks.
This function allows you to communicate with a Gen 2 Swing Bolt lock using a USB connection to your PC through the Breakout Box. The USB connection
is directly through a Cencon Swing Bolt Breakout Box. It can also be through a network connection, as through ATM machine’s PC. The user interface
allows you to retrieve information from the lock and perform most of the lock operations which are normally done with keys (such as activate, shelve, set the
time, etc.).
Warning
Operators may become statically charged in a normal working environment if they are not wearing a ground strap. In this case the USB
communications may stop working, un-plug and re-plug the USB cable between the computer and the Breakout Box to resume operation. It
is recommended that operators working on the inside of the ATM or in a factory connecting to the Gen 2 Swing Bolt Breakout Box to always
wear a wrist strap to prevent possible ESD damage from occurring while using the Breakout Box.
Connect a USB cable between your PC and the Cencon Swing Bolt Breakout Box. The Cencon Swing Bolt Breakout Box may have to have drivers
installed. This can be done by going to the Drivers folder located on the Cencon software CD. The Cencon Swing Bolt Breakout Box will be displayed
as Cencon USB ATM Lock Adapter.
Start Cencon and select Lock Operations with Serial Connect.
To connect to the lock:
Directly through a USB cable - click in the Connection box and select the type of connection you are using (Cencon USB ATM Lock
Adapter) for this example). You will need to have connected the lock using a USB cable from the Cencon Swing Bolt Breakout Box to a USB
port on your computer. Each communications port on your computer will be listed in the drop-down selection in the form.
Through a network connection - type the lock's network address in the Connection box at the top of the form. You will need to have
connected the lock using a Cencon Lock Network Serial Interface Box to your network, and configured it as needed using the Cencon Lock
Network Serial Interface Box Utility. If a network port other than the default needs to be set, then that can be entered after the network
address, separated by a colon:
Note
When you connect to a lock using a network connection, the network address and port used to connect up to that lock will automatically be
saved to the Cencon database. To connect back up to that lock at a later date, you can select that lock from one of the Cencon reports
and select Remote Serial Operations With Lock (Gen2). The Lock Operations With Serial Connect form will be displayed and the
previously used network address will be used to connect to the lock. You can also close out a dispatch to the lock in the same manner, by
selecting Close Lock With Remote Serial Operation (Gen2) from the report's operation menu.
Toolbar functions:
Refresh/Connect to Lock
Connect to the attached lock and update the status displayed for the connected lock.
Set Lock Clock
Set the time in the lock, based off of the time on your host computer. If one or more modes are active from your software, this will also set the daylight
savings time transition table for each mode based off of the selected time zone. A form will be displayed to select the time zone for each authorized
active mode.
Lock Report
Display a report similar to the Cencon Individual Lock report but also including additional information which can only be accessed through the direct
connection. This report will display the current status of the lock and information for each active mode of the lock.
Audit Report
Display a standard Cencon lock audit report. This report displays all the available audits since it is not subject to the memory limitations of storing the
audits on the SA key.
Note
In order to read the status of a lock, set the clock, generate a lock report, or generate an audit report, you must have authorization to access the lock. If
the lock is shelved, then anyone can set the clock or get an audit report from the lock. If one or more modes are active on the lock, then you must have
control of at least one of the modes of the lock to get information from the lock. Each lock mode may be under the control of a different company, and
each mode has it's own security implemented. If you attempt to access a lock that you don't control one of the modes of, you will not be able to read
information from the lock. Additionally, you will only be able to access information specific to the lock modes you control and the audit trail of the lock.
FLM Mode
Activate FLM Mode
Shelve FLM Mode
Resynchronize Dispatching for FLM Mode
Set Access Between Single and Dual User for FLM Mode
Close Dispatch for FLM Mode
Route Mode
Activate Route Mode
Shelve Route Mode
Resynchronize Dispatching for Route Mode
Set Access Between Single and Dual User for Route Mode
Close Dispatch for Route Mode
Bank Mode
Activate Bank Mode
Shelve Bank Mode
Resynchronize Users for Bank Mode
Set Access Between Single and Dual User for Bank Mode
Set Time Delay and Open Time Window for Bank Mode
View Bank Mode Users
Add Bank Mode Users
Delete Bank Mode Users
Note
When activating a lock mode using the USB connection to the Breakout Box, the virtual change key must be activated by powering up the
lock and entering #50 on the keypad. Then you must power up the lock and enter 50-25-50 and open the lock holding the bolt open to
enable Remote Administration on the lock. Other functions such as shelving the lock, setting access between single and dual user, and
reading the status of the lock do not require the virtual change key to be initiated on the lock. This because the security of the serial
communications for the activated mode has already been set up during activation.
Successful activation:
The lock FLM mode is now active, and can have users dispatched to open it.
Note
Once you have shelved a lock mode using the USB connection to the lock, you can not reactivate the lock mode without having physical
access to the back of the lock to initiate the virtual change key. This is because the security of the serial communications for a mode being
activated is set up during activation of the lock mode. When shelving a mode, that security for the mode is already set up. You can shelve
a mode remotely, however you must have physical access to the inside of the lock container as well as to initiate the virtual change key into
the back of the lock to reactivate the lock.
Note
If the configuration option to require a change key be present in the lock for remote shelve is set, you will not be able to remotely shelve the
lock across a remote connection without first having someone present to open the lock and insert a change key. In the case of the Cencon
Gen 2 swing bolt lock, you can alternatively open the lock and enter #50 at the lock to allow remote administration of the lock. See Change
Configuration Settings to set this configuration option in the Cencon database.
This operation reads the current dispatching status of the lock and updates the Cencon database entry for the lock to match. It will ensure that
the Cencon database matches the lock in the case of having to recover from a backup of the database.
Note
You can not resynchronize the Cencon database dispatching with the Cencon Gen 2 lock while a call is dispatched to the lock. If you have
a call open to the lock and the lock is out of synchronization with the Cencon database, you will need to do a Manager Auto-Close w/o
Close Seal to close out the call first. You would then resynchronize the Cencon database with the lock. After resynchronizing the Cencon
database with the lock you would be able to dispatch to the lock again.
The lock FLM mode has been resynchronized, and can have users dispatched to open it.
This operation sets the lock between needing a single user or needing dual users to open the lock, and also updates the Cencon database as
needed.
To set access between single and dual users for the the attached lock in FLM mode:
Note
You can not change single or dual user access while a call is dispatched to the lock. You will need to wait until the call has been completed
first. After the call has been completed, you will be able to change the access between single user or dual user being required to open the
lock.
Form for selecting single or dual user mode access on the lock:
The lock FLM mode has been set between single and dual user mode.
This operation reads the status and the audit trail of the lock, determines if a valid dispatch has opened and closed the lock, and closes out the
dispatch to the lock in the Cencon system. This is primarily intended for locks connected remotely on a network, to allow dispatches to locks to
be closed out in a convenient and secure manner without having to call in a close seal from the lock.
Note
The lock must be completely closed for this operation to work. If the bolt is retracted, the door sensor indicates the container door is open (if
connected), or the change key is in the lock, then the dispatch to the lock can't be closed out in this manner.
Note
When activating a lock mode using the USB connection to the Breakout Box, the virtual change key must be activated by powering up the
lock and entering #50 on the keypad. Then you must power up the lock and enter 50-25-50 and open the lock holding the bolt open to
enable Remote Administration on the lock. Other functions such as shelving the lock, setting access between single and dual user, and
reading the status of the lock do not require the virtual change key to be initiated on the lock. This because the security of the serial
communications for the activated mode has already been set up during activation.
Successful activation:
The lock Route mode is now active, and can have users dispatched to open it.
Note
Once you have shelved a lock mode using the USB connection to the lock, you can not reactivate the lock mode without having physical
access to the back of the lock to initiate the virtual change key. This is because the security of the serial communications for a mode being
activated is set up during activation of the lock mode. When shelving a mode, that security for the mode is already set up. You can shelve
a mode remotely, however you must have physical access to the inside of the lock container as well as to initiate the virtual change key into
the back of the lock to reactivate the lock.
Note
If the configuration option to require a change key be present in the lock for remote shelve is set, you will not be able to remotely shelve the
lock across a remote connection without first having someone present to open the lock and insert a change key. In the case of the Cencon
Gen 2 swing bolt lock, you can alternatively open the lock and enter #50 at the lock to allow remote administration of the lock. See Change
Configuration Settings to set this configuration option in the Cencon database.
This operation reads the current dispatching status of the lock and updates the Cencon database entry for the lock to match. It will ensure that
the Cencon database matches the lock in the case of having to recover from a backup of the database.
Note
You can not resynchronize the Cencon database dispatching with the Cencon Gen 2 lock while a call is dispatched to the lock. If you have
a call open to the lock and the lock is out of synchronization with the Cencon database, you will need to do a Manager Auto-Close w/o
Close Seal to close out the call first. You would then resynchronize the Cencon database with the lock. After resynchronizing the Cencon
database with the lock you would be able to dispatch to the lock again.
The lock Route mode has been resynchronized, and can have users dispatched to open it.
This operation sets the lock between needing a single user or needing dual users to open the lock, and also updates the Cencon database as
needed.
To set access between single and dual users for the the attached lock in Route mode:
Note
You can not change single or dual user access while a call or a route is dispatched to the lock. You will need to wait until the call or route
has been completed first. After the call or route has been completed, you will be able to change the access between single user or dual
user being required to open the lock.
Form for selecting single or dual user mode access on the lock:
The lock Route mode has been set between single and dual user mode.
This operation reads the status and the audit trail of the lock, determines if a valid dispatch has opened and closed the lock, and closes out the
dispatch to the lock in the Cencon system. This is primarily intended for locks connected remotely on a network, to allow dispatches to locks to
be closed out in a convenient and secure manner without having to call in a close seal from the lock.
If the route mode lock has been dispatched to multiple sequences on a route, then this operation will close out route sequences as well. If a
route sequence has been skipped at the lock, then that route sequence will be force closed as needed in the route dispatch.
Note
The lock must be completely closed for this operation to work. If the bolt is retracted, the door sensor indicates the container door is open (if
connected), or the change key is in the lock, then the dispatch to the lock can't be closed out in this manner.
Note
You will need to first select a bank branch to assign the Bank mode lock to before selecting users to add to the lock. The list of users
available to add to the lock is determined by the bank branch that the lock is assigned to. If you change what bank branch the lock is
assigned to, any prior user selections will be cleared.
The lock Bank mode is now active, and users assigned to the Bank mode lock can change their combinations and open it.
Note
Once you have shelved a lock mode using the USB connection to the lock, you can not reactivate the lock mode without having physical
access to the back of the lock to initiate the virtual change key. This is because the security of the serial communications for a mode being
activated is set up during activation of the lock mode. When shelving a mode, that security for the mode is already set up. You can shelve a
mode remotely, however you must have physical access to the inside of the lock container to initiate the virtual change key into the back of
the lock to reactivate the lock.
Note
If the configuration option to require a change key be present in the lock for remote shelve is set, you will not be able to remotely shelve the
lock across a remote connection without first having someone present to open the lock and insert a change key. In the case of the Cencon
Gen 2 swing bolt lock, you can alternatively open the lock and enter #50 at the lock to allow remote administration of the lock. See Change
Configuration Settings to set this configuration option in the Cencon database.
This operation reads the current user table of the lock and updates the Cencon database entry for the lock to match. It will ensure that the
Cencon database matches the lock in the case of having to recover from a backup of the database.
Note
If a user that is assigned access to the bank mode lock is not in the Cencon database, that user can not be resynchronized as having
access in the Cencon database. This might occur if the database had to be recovered from a backup that did not have the users set up yet.
It could also occur if the users were removed from the lock by key, the users deleted from the Cencon database, and the remove user key
was never used at the lock. If this occurs, you will need to add the users back to the Cencon database and then resynchronize the bank
mode lock user table with the Cencon database again.
This operation sets the lock between needing a single user or needing dual users to open the lock, and also updates the Cencon database as
needed.
To set access between single and dual users for the the attached lock in Bank mode:
Note
You can not change single or dual user access while a call is dispatched to the lock. You will need to wait until the call has been completed
first. After the call has been completed, you will be able to change the access between single and dual user required.
Form for selecting single or dual user mode access on the lock:
The lock Bank mode has been set between single and dual user mode.
This operation sets the time delay period after a bank mode user enters their combination and presents their key to the lock for the user to be
able to actually open the lock. This operation also sets the time window that the user can open the lock once the time delay period has elapsed.
The option to set a time delay before opening and a time window to open is available only to Bank mode.
To set the time delay and open time window for the the attached lock in Bank mode:
Form for entering the time delay and open time window for the lock:
The lock Bank mode time delay and open time window has been set.
Select the Bank Users tab on the Serial Connect form. The display shows the users currently assigned to the lock.
Note
This tab displays the users currently assigned to the Bank mode lock based off of the Cencon database. If the Cencon database is not up
to date with the lock, then you can resynchronize the Cencon database with the lock using the Resynchronize Users for Bank Mode
operation.
Form displaying the current users for the Bank mode lock:
Select the Bank Users tab on the Serial Connect form. The display shows the users currently assigned to the lock.
Select the Add Users button on the Bank Users tab. The display shows the form for adding users to the lock.
Select which users you want to add to the lock from the list of available users.
Select the Apply Adding Users To Lock button on the Bank Users tab. The selected users will be added to the lock.
Note
This tab displays the users currently assigned to the Bank mode lock based off of the Cencon database. If the Cencon database is not up
to date with the lock, then you can resynchronize the Cencon database with the lock using the Resynchronize Users for Bank Mode
operation.
Form displaying the current users for the Bank mode lock:
Select the Bank Users tab on the Serial Connect form. The display shows the users currently assigned to the lock.
Select the Delete Users button on the Bank Users tab. The display shows the form for deleting users from the lock.
Select which users you want to delete from the lock from the list of users assigned access to the lock.
Select the Apply Deleting Users From Lock button on the Bank Users tab. The selected users will be deleted from the lock.
Note
This tab displays the users currently assigned to the Bank mode lock based off of the Cencon database. If the Cencon database is not up
to date with the lock, then you can resynchronize the Cencon database with the lock using the Resynchronize Users for Bank Mode
operation.
Form displaying the current users for the Bank mode lock:
Form used to select users to delete from the Bank mode lock:
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon System Reference Manual
3.1.8.19 Lock Operations with Serial Connect - Set Lock Clock and Time Zone Daylight Savings Time
Table
Set Lock Clock and Time Zone Daylight Savings Time Table
This operation sets the time in the lock, based off of the time on your host computer.
Note
Only the active modes you are authorized to set the time zone daylight savings time tables on will be updated. If you do not have authorization to
update the appropriate active modes on the lock, or the modes on the lock are controlled by another company, you will not be able to update those
modes.
To set the clock and time zone daylight savings time tables for the lock modes:
Select the Set Clock button on the Lock Operations with Serial Connect toolbar.
If the lock has modes active, the clock will be set and any modes you have authorization to set will have their daylight savings time table
updated. The Set Clock form will be displayed to select the time zone for each authorized active mode. Select the time zones for the different
modes as needed, and then press the Set Clock And Daylight Savings Time Tables button. This will set the clock on the lock and also
set the daylight savings time transition table for each mode based off of the selected time zone.
Dialog for selecting the time zones to use to update the lock clock and time zone daylight savings time tables:
If no modes are active, this will only set the clock on the lock. The clock on the lock will be set based off of the system time on your host
system. If no modes are active, then daylight savings time data will not be saved at the lock. The only dialog displayed will be to indicate
success or failure to set the clock on the lock.
If no modes are active, only the clock will be set. You will see only the following message stating that the clock was set:
This operation reads the status of the lock as well as the status of each mode of the lock. It also reads the database information for each mode
of the lock from the Cencon database. It then displays a report similar to the Cencon Individual Lock report but also including additional
information which can only be accessed through the direct connection. This report will display the current status of the lock and information for
each active mode of the lock. This report can be long, depending on the number of authorized active modes on the lock.
Select the Lock Report button on the Lock Operations with Serial Connect toolbar.
A report of the status of the lock will be displayed.
Note
Only information for the lock modes that your company controls will be displayed. If your company does not control any of the active lock
modes on the lock, then you will not be able to display any of the mode information for that lock.
Lock Report:
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon System Reference Manual
3.1.8.21 Lock Operations with Serial Connect - Create Lock Audit Report
Create Lock Audit Report
This operation reads the status of the lock as well as the audit trail of the lock. It then displays a report similar to the report from a supervisor audit
key, however there is no size restriction on the number of audits. This report can be long, depending on the number of audits on the lock.
Select the Audit Report button on the Lock Operations with Serial Connect toolbar.
A report of the audit trail from the lock will be displayed.
Note
If the lock has one or more modes active and your company does not control any of the active lock modes on the lock, then you will not be able
to download audit information from the lock.
Note
If the lock is opened in Factory/Shelved mode and then activated using the lock serial connection, the audit of the following bolt close will
indicate it is a Factory/Shelved mode close. This is because the bolt close is associated with the open that occurred while the lock was in
Factory/Shelved mode.
This function displays a report containing functions for maintaining the users on your Cencon system.
Under Users, click on User Operations. The following search dialog is displayed:
Enter optional values to search for particular users and press Search to display the User Report. Note that the search process automatically swaps date start and end values if you
accidentally enter an end date which is earlier than the start date.
Lock Users who are disabled from being dispatched due to access control dispatch limits are highlighted in light red. This can be due to either a time limitation placed on the user, or a
limit on the total number of dispatches allowed to that user. These dispatch limits are configured under the access control tab when adding a user or editing the key for a user. See
section 3.2.1 Add a User for details on setting these values.
Logon Users who may not perform any Cencon operations because they are assigned to a role that has been disabled are also highlighted in light red. See section 3.6.1 Authorization
Roles for details on disabling and enabling roles.
A variety of common operations can be done with the report, to include printing, saving in various formats, and sorting the contents of the report. You can refer to these common report
operations in section 3.0 Reports.
The following operations are available from the User Operations Menu:
Add a User
Rename a User
Delete a User
Depending on how you are using Cencon, certain information must be predefined so that it is available for selection
during the process of creating users. This data includes:
Bank Branches: If you are going to create any Bank users you must first define the Bank Branches to which
they will be assigned using the Bank Branch Report.
User Types: If want to assign a customized authorization role to any new users, you need to create the new
user roles before creating the users. See User Authorization for more information.
Region Definitions: If you are going to use Region control, you should first define your regions using the
Region Report.
Customer ID: If you are going to assign a Customer ID to your users you should first define the Customers
using the Customer Report.
To add a New User, complete the following steps from the User Report:
1. Select Operations and click on Add a New User. The Add a New User window is displayed:
The second tab of the dialog allows you to set up time restrictions and frequency of use limitations:
2. Enter a name for the User (maximum of 64 characters).
Caution
User names are very critical in the Cencon System. They are case sensitive and can be up to sixty-four (64)
characters in length. However, if you are using Centran 2 in conjunction with your Cencon system, you need to
consider that the Centran User name field is limited to 20 characters.
3. Use of the Nickname field is optional. Enter a Nickname for the User if desired.
Caution
Nickname can be up to sixty-four (64) characters in length. However, if you are using Centran in conjunction
with your Cencon system, you need to consider that the Centran Nickname field is limited to 10 characters.
4. For User Type, select the appropriate type from the drop-down list box. If you select Bank as the user type, additional bank
specific fields are displayed:
Bank Branch
Select the branch to which the user should be assigned.
Bank User ID
Enter a numeric value for the user's Bank User ID. This value must be unique within the Bank Branch.
Bank Combination
The default bank user combination is "50 25 50". If you want to change the default for this user, enter the six digits of a
new combination.
Combination must be changed at the lock
Select this check box if you want to require that the user change their combination the first time the key is used at the
lock.
Random
Select this button to generate a random bank user combination. A new random combination will be generated each time
the button is selected.
Note
If a user type has been disabled, it will not appear in the User Type drop-down list box for user addition operations. You will
also see a error message appear if there are no enabled user types that you are authorized to create users with.
5. For User Password, enter a password for the User. For a logon user, this password will be used for logon to Cencon in
conjunction with the user key. The software logon keys (i.e. Dispatcher, Supervisor, Special Supervisor) require a password to be
set for logon. For lock user keys (i.e. FLM, Route, or Bank), the password is optional.
Note
For FLM/RSP Users, the password is stored in the User ID table without encryption, for use by third-party systems working
with Cencon or Centran. Cencon Logon users (i.e. Dispatchers, Supervisors, Special Supervisors) passwords are
encrypted in the User ID table and are not accessible by third-party systems.
6. Access Control - The group of fields on the Access Control tab are used to define a time slot, or a series of time slots, during
which the user is authorized to operate Cencon locks. If this group of fields is left blank, the user will have unrestricted time
access to the locks. Otherwise, users can be assigned time windows in which they have authorized access to the locks. There
can be different times for different days of the week or multiple windows on particular days. Up to three sequences of days and
times can be entered for each user. You may also specify that the user is only authorized for limited number of dispatches or
within a specified date range.
Warning
If you define time access windows for your system users, be sure to take into consideration time orientation changes if
applicable (i.e., Standard Time to Daylight Savings and vice versa). Your PC system will automatically adapt for these time
changes, but the time windows carried in the keys will be off by an hour when your PC system goes to a different time
orientation. To alleviate this problem, you can have a +1 hour and -1 hour allowance in your time window. If security
measures will not tolerate this type of allowance in the window, each user's key must be brought back to the system for
updating when the time changes. The function in the PC Software that is used to update the time windows in the keys is
Change A User ID and is found on the User ID/Key Maintenance Menu under the Special Supervisor's functions. For more
detail see the following section on Change A User ID.
Caution
If you are using the time window capabilities of the system and you have a centralized dispatch center, keep in
mind that accommodations will have to be made when adding FLM and Route Personnel to the system whose
keys will be distributed to different time zones. The Window Opening Information will have to be adjusted by the
difference (+/-) between the dispatch center and the time zone where the key will be sent.
There are three fields used to define the user's access windows.
This defines which days of the week the user is authorized to open locks. It can be from one to all seven days. Place
the cursor on each box you want to select and press the spacebar to select that day or just click on the box with the
mouse pointer.
Start Time
Duration
This field is the length of the time period (in hours and minutes) that the user is authorized to access the locks. This is
not the "end time" for the authorized access period.
Dispatches Allowed
This field limits the number of times the user may be dispatched to a lock. The user is disabled from further dispatches
when this limit is reached. Set to "0" to allow unlimited dispatches (the default). The user's current dispatch count is
compared to the entered value. Thus, it is possible for the user to be immediately disabled if their current dispatch count
(viewable on the Key Report) is greater than or equal to the entered value. This value may be changed to control future
user access.
This field specifies a date range during which the user is enabled for dispatches. If the boxes are not checked, the user
is always enabled based on the time windows settings. The user is authorized beginning on the Start Date and is not
authorized on or after the End Date.
Note
If the user access windows fields are left blank, the user will have unrestricted access to the lock or PC System.
7. If region control is active, and the current dispatcher is not restricted to a local region, then the region ID can be selected from a
drop-down list of regions. This determines what region the new user is assigned to. If the current dispatcher is assigned to a
local region, then any users created by that dispatcher are automatically assigned to the same region.
Regions Usage
Region control is a method of controlling what locks and FLM/RSP IDs can be viewed or accessed by different Cencon
logon users.
Regions also control which locks that FLM/RSP IDs can be dispatched to. FLM/RSP IDs can not be dispatched to locks
assigned to a different region.
This is done by assigning a region ID to locks and users. A region ID is a name up to 64 characters long. There is a table
of region IDs that is maintained to keep track of what regions have been defined.
There are two types of regions: Global and Local. A Cencon logon assigned to a global region can view and administer
any lock and FLM/RSP ID in the system. A Cencon logon assigned to a local region can only view and administer locks
and FLM/RSP IDs with the same assigned region. The type of region only affects what Cencon logon users can view. It
make no difference as to how regions are used for lock operations.
Assume you have two regions: Lexington which is a global region, and Richmond which is a local region.
DispatcherRich can only see and dispatch the locks assigned to region Richmond - LockRich1, LockRich2. DispatcherRich
can also only see and dispatch the users assigned to region Richmond - FLMUserRich1, FLMUserRich2.
The FLM IDs FLMUserLex1 and FLMUserLex2 can only be dispatched to the locks assigned to the same Lexington region
- LockLex1, LockLex2.
The FLM IDs FLMUserRich1 and FLMUserRich2 can only be dispatched to the locks assigned to the same Richmond
region - LockRich1, LockRich2.
Click on Yes to return to the Add User window. To enter additional Users, repeat the above steps until all desired Users are
added.
You can search for existing users registered on your network with your current Windows logon domain. To do this, click the
Search/Refresh User List button.
The data field is populated with users registered on your network. There may be a noticeable time delay while this data is being
displayed depending on the network access speed and the number of users. You can enter a name or partial name and then
select to search for entries matching that name. Only the name will be used in the search. The domain searched for is always
your current Windows logon domain. If you leave the entered name blank, you will get all users for the current domain.
Note
Depending on the number of users on your network and the number you wish to add as Cencon users, it may be more
efficient to export all active users to a spreadsheet and create a SQL script to import them to Cencon. Contact Kaba Mas
technical support for assistance.
The following is an example of searching for a name or partial name from the current Windows logon domain:
To change information on a user, complete the following steps from the User Report:
Right-click on the highlighted row, and select Change User Information. The "Edit User" window is displayed for the selected user
ID.
The User Information and Access Control data is modified in the same manner as for the Add a User procedure.
To change information on a group of users, complete the following steps from User Report menu:
1. Highlight users by holding down the Control key and clicking the rows of the selected users.
2. Right-click on the selected group, and choose Change Information for Multiple Users as in the following example:
3. Edit the data. For more information on these fields, refer to 3.2.1 Add a User. Note that the new data will replace the existing data for all the selected users.
4. Click on Update All Selected Users to process the entered information. In this example, Cencon will update the Service Branch and Customer ID for all the selected users. A
confirmation message similar to the following is displayed:
To rename a user, select a user in the User Report and then press Rename a User in the Operations menu. The following dialog
displays some of the data for the selected user and allows you to enter a new name:
Note
You cannot delete a user if there are open locks assigned to that user.
Select a user in the User Report and then click on Delete a User. The "Delete a User" window displays the user's name and asks
for verification of the deletion:
Note
If the user's key is in the reader, it is erased as part of this operation. If you later perform a Restore User operation
from the User History Report and do not have the key inserted at that time, the key may be unusable because the
necessary security information and the time widows are not restored.
Insert the user's key and press OK. If you do not insert the user's key, the user is deleted from Cencon but the information on the key
is not reset, as in the following:
Select a user in the User Report and then select Display Open Locks for the Selected User from the Operations menu. This
automatically opens the Lock Operations Report to display only those locks open for the selected user. See Lock Operations Report for
details on that report.
The Select Users dialog is initially displayed with the list of users matching the criteria required for the operation the user is being
selected for. For example, if dispatching an FLM lock assigned to a region, and region control is active, the list of users displayed will
match that lock mode and region. The Select Users dialog is resizable to assist with displaying the list of users. An example of the
Select Users dialog is displayed below:
The users matching the given search parameters will be read in from the database. Depending on the speed of your connection, the
performance of your database server, and the number of matching users, it may take several seconds for the users to be read into
memory. You can select users or change search parameters even while users are still being loaded into memory.
To select a user or users, click on the displayed row for that user, and click on 'Select User(s)'. The dialog will close and the selected
user or users will be filled into the form for your current operation. You can also double-click on your desired user, and that will
automatically select that user and close the Select Users dialog.
If you need to narrow the list of displayed users down further, you can modify or add to the search parameters for selecting the user.
You can any additional search parameters under the 'Fields', 'Ranges', or 'Keys' tabs. These tabs for search parameters will be
highlighted if they contain search settings that are not immediately visible. Once you have entered in your additional search parameters,
click on the 'Refresh' button. The 'User Selection' tab will be selected if it is not already. The users from the Cencon database matching
your search parameters will be read into memory and displayed. Examples of the available search parameters are shown below:
This function allows you to add new customer data records, update existing records, delete a record, or find a record.
Cencon provides no processing functions for the Customer Data other than to maintain the data table and to display the data stored
there. The data items have labels that imply the type of data stored but Cencon does not impose any limitations or validity checks to
the data.
To create or maintain Customer Data, select Customer Report from the main Cencon Window. The Find Customers window
allows you to specify information for searching for particular customers:
The tabs in the search screen will be highlighted if they contain search settings that are not immediately visible.
The Customer ID field may be searched either for an exact match or for a value containing the entered text, depending on the "Return
exact matches for the Customer ID." checkbox. The Customer Number is only searched for an exact match. All other fields are
searched for values which contain the entered search text.
A variety of common operations can be done with the report, to include printing, saving in various formats, and sorting the contents of
the report. You can refer to these common report operations in section 3.0 Reports.
The following operations are available from the Customer Report Operations Menu:
Add a Customer
Select this operation to open the Add a Customer window:
Delete a Customer
This function deletes the selected customer.
Microsoft MapPoint 2006. MapPoint is a commercially available product and is not included in the Cencon 4 software
package.
Several free internet mapping services (an active internet connection is required):
MapQuest
Google Maps
Bing Maps
Use the Preferences dialog (on the main Cencon window) to select the desired mapping software.
Mapping Considerations...
To display customer locations on a map, select one or more customers from the Customer Report and then choose Map the
selected Customer Locations.
If the address information appears to be sufficient to locate the customer, Cencon passes the data to the mapping program for
display. Refer to the mapping software's documentation for information on using the specific mapping product.
Also note that some lines are highlighted in light blue. These are audit events downloaded from Cencon Gen 2 locks that have been stored in the Cencon database audit table. You can see how these audit
events specify a lock name followed by 'Lock Event:' and then followed by a description of the lock event.
The only Operations for this report are Archive and Statistics.
Selecting Archive opens the following window:
Enter the number of days for the archive and press OK. The records are copied to the Activity Log Archive and removed from the Activity Log.
Selecting Statistics opens the Reporting form, which allows the user to gather statistics on the Activity Log and the Archived Activity Log data.
Sample report:
This report lists a history of the lock closing data. Each time a lock is closed, the record from the Open Locks data table is moved to the Lock Log History
data table. Thus, the two reports have the same initial search screen and report format. See the List Open Locks report for more information.
To view the Lock Log History report, select Lock Log History Report from the main Cencon Window. The following Search screen is displayed prior to
generating the report to allow filtering for specific lock records:
The tabs in the search screen will be highlighted if they contain search settings that are not immediately visible.
Upon selecting 'OK', the locks matching the given search parameters will be displayed. Depending on the number of matching locks and the speed of your
database connection, it may take several seconds for the locks to be displayed. You can still do operations with the report even while locks are still being
loaded into memory. If your computer does not have enough memory to keep all of the locks in memory, then the report will fetch locks as needed
depending on the portion of the report you are looking at. If this occurs, then the word 'Partial' will be displayed on the report status bar.
Enter the number of days for the archive and press OK. The records are copied to the Lock Log History Archive and removed from the Lock Log History.
The User History table maintains a record of who was previously using a key, and the time period that they were assigned to the key.
This allows audit dumps from locks to correctly show the user name according to who was using a key at the time the event occurred.
If you rename what user has a certain key, then there needs to be a way to look up whether it was the old user or the new user that did an activity at a lock. This is
based off of the time of the event. If the event occurred prior to the starting date for the current user of the key, then the key and date is compared against the User
History Log table. The user from the key's history is displayed if that person was assigned to the key when the event occurred.
Additionally, if the key is no longer in the User table because the user was deleted from the system, then there needs to be a way to look up the key for displaying lock
audit events that occurred prior to that person being deleted. In this instance also, where the key can't be found in the User table, the key is looked up in the User
History Log table.
The following search dialog appears for the User History Report, if the User History Report is not already open. If the User History Report is already open, then it
remains with it's previous contents.
This search dialog allows you to specify search criteria for which users you want to have displayed by the report. The "Fields" tab is shown above.
The search dialog also has a check box to allow you to select if you want the search settings you enter to be saved for next time you open the report. This also specifies
that you want the sort settings to be saved for the report. If this checkbox is not selected, then your previous search settings will not be restored next time you open the
report.
There are additional search settings on the "Ranges" tab of the search dialog. This is displayed by clicking on the "Ranges" tab.
This tab allows you to select to search by certain ranges of values. This includes being able to specify a range of combinations currently issued to the user, and ranges
of dates for the creation, deletion, and last used date of the user.
Once you are satisfied with the search criteria that you want for the User IDs, click on Search to display the result of the search. The report is displayed as follows:
Note
The User ID History report has the deletion date field set for the users. This is different from the User ID report, where this field will always be blank.
Depending on the number of records resulting from the search, the report may take some time to finish loading records. You can still conduct operations, close the
report, etc, while the report is still loading records. While the report is loading records, a status indicator at the bottom of the report will display Loading in red. Once the
report finishes loading records, this indicator will change to green and show Done.
If the number of records resulting from the search are too big to fit safely into local memory, then the report status indicator will display in yellow Partial. If this occurs,
you can still look at the entire results of the report, but not all of it can be stored locally at the same time. The report will fetch and unload records as needed to display
the section of the report you scroll to. The status bar at the bottom of the report will indicate your position in the report and the number of records currently in memory.
A variety of common operations can be done with the report, to include printing, saving in various formats, and sorting the contents of the report. You can refer to these
common report operations in section 3.0 Reports.
The operations menu provides access to a set of operations unique to the User History Report.
Archive Report
Enter the number of days for the archive and press OK. The records are copied to the User History Archive and removed from the User History.
Reactivate User
Selecting Reactivate User restores the selected user (or users) to Cencon. If the user's key is on the reader and the user has time windows defined, the
time windows are written to the key. The following message indicates successful restoration of a deleted user:
The following search dialog appears for the Archived User History Report, if it is not already open. If the Archived User History Report is already open, then it remains
with it's previous contents.
This search dialog allows you to specify selection criteria for the users you want to have displayed in the report. The "Fields" tab is shown above.
The search dialog also has a check box to allow you to select if you want the search settings you enter to be saved for next time you open the report. This also specifies
that you want the sort settings to be saved for the report. If this checkbox is not selected, then your previous search settings will not be restored next time you open the
report.
There are additional search settings on the "Ranges" tab of the search dialog.
This tab allows you to select to search by certain ranges of values. This includes being able to specify a range of combinations currently issued to the user, and ranges
of dates for the creation, deletion, and last used date of the user.
Once you are satisfied with the search criteria that you want for the Users, click on Search to display the result of the search. The report is displayed as follows:
Note
The Archived User History report has the deletion date field set for the users. This is different from the User ID report, where this field will always be blank.
Depending on the number of records resulting from the search, the report may take some time to finish loading records. You can still conduct operations, close the
report, etc, while the report is still loading records. While the report is loading records, a status indicator at the bottom of the report will display Loading in red. Once the
report finishes loading records, this indicator will change to green and show Done.
If the number of records resulting from the search are too big to fit safely into local memory, then the report status indicator will display in yellow Partial. If this occurs,
you can still look at the entire results of the report, but not all of it can be stored locally at the same time. The report will fetch and unload records as needed to display
the section of the report you scroll to. The status bar at the bottom of the report will indicate your position in the report and the number of records currently in memory.
A variety of common operations can be done with the report, to include printing, saving in various formats, and sorting the contents of the report. You can refer to these
common report operations in section 3.0 Reports.
The only Operation supported by this report provides the ability to restore an archived route. The Restore function fails with an error if
any of the archived route locks are not in the Cencon database.
To list the archived routes, select Archived Route Report from the main Cencon window. The Find Archived Routes window
allows you to specify information to be used to search for particular archived routes:
When 'OK' is selected, the archived routes matching the given search parameters will be displayed in the report.
Dispatches
This is dispatches of either FLM or Route mode locks.
Force Delete of Unshelved Lock
This is force deletes of unshelved FLM, Route, or Bank mode locks.
Manager Force Close w/o Seal
This is the action of a manager doing a force close without a close seal of an FLM or Route mode lock. This is not the
same as a lock route sequence being skipped.
Lock Activations
This the activation of an FLM, Route, or Bank mode lock.
Lock Shelves
This is the shelve of an FLM, Route, or Bank mode lock.
Depending on the event type and category selected, the event type can be reported on for any lock mode. The results that are
evaluated as zero values can be excluded, using the Ignore The results for the different lock modes can optionally be combined into a
single value, using the Combine Lock Mode Results To Single Column check box.
The results from the search of the Activity Log and the Archived Activity Log data is returned based on the selected category:
Year
This separates out the events into the year that the event occurred.
Month
This separates out the events into the month that the event occurred, i.e. January through December.
Week of Year
This separates out the events into the week of the year that the event occurred. There are 52 weeks in a year.
Day of Week
This separates out the events into the day of the week that the event occurred, i.e. Sunday through Saturday.
Hour of Day
This separates out the events into the hour of the day that the event occurred, i.e. 00 to 23.
Region
This separates out the events based on the assigned regions of the affected locks.
Customer ID
This separates out the events based on the assigned customer ID of the affected locks.
ATM Serial Number
This separates out the events based on the assigned ATM serial number of the affected locks.
Dispatcher
This separates out the events based on the dispatcher who did the operation causing the event on the Cencon/Centran
software.
Lock User
This separates out the events based on the lock user assigned to the operation causing the event.
Route
This separates out the events based on the route the lock was assigned to.
The results returned by the search for the event can be sorted by the name of the category, lock mode, or by the totaled values. The
results can be sorted either ascending or decending.
The scope of the results can be filtered by search fields. These search fields are found on the Filter tab of the Reporting form.
Filter Tab:
The table of results from the search are displayed on the Results tab of the Reporting form. These results can be printed or saved in
multiple formats.
Results Tab:
The chart of results from the search are displayed on the Graph tab of the Reporting form. This chart can be printed or saved in
multiple formats.
You can also modify the format and color of the chart, using the options to the right side of the chart.
Graph Tab:
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon Version 4 System Reference Manual
3.5.1 Initialize Audit Download Key
This option allows you to prepare a Supervisor Audit Key for use in auditing a Lock. To initialize an SA Key, insert an SA Key into the
key reader and click on Initialize Audit Download Key in the main Cencon window. The following is displayed:
If the key will be used to access the audit data from a Bank Mode lock, click on the check box and select the lock's Bank Branch name
as in the following:
Caution
To retrieve an audit from a Lock, you must always initialize the SA key first. Failure to do so could cause
unpredictable results in your audit.
The Display Key Report button opens the Key Report for the key in the reader.
See 4.2.9 Retrieve Audit Download From Lock for details on using the key at the lock.
See 4.3.9 Retrieve Audit Download From Lock for details on using the key at a Gen 2 Swing Bolt lock.
Note
This process does not need to be performed to update the time in the keys for a change to Daylight Savings Time or back to
Standard Time. The Cencon PC System will automatically accommodate for that type of time change when reading the audit times
for a user key.
To initialize the clock in a Lock Key, insert a lock Key into the key reader and click on Initialize Lock User Key Clock in the main
Cencon window. The following is displayed:
The Display Key Report button opens the Key Report for the key in the reader. The Read Key button is used to reread the key in
the reader if you change keys.
Note
An alternative method of updating the time in keys is by using the Key Maintenance Utility (KMU). For more information on the
KMU see the Kaba Mas web site at: www.kabamas.com
Caution
To reinitialize a user key, insert the key into the key reader and click on Re-initialize User Key in the main Cencon window. The
following is displayed:
The Display Key Report button opens the Key Report for the key in the reader. The Read Key button is used to reread the key in
the reader if you change keys.
The top of the Key Report displays basic information about the key:
The center of the Key Report displays information on the key's user from the Cencon database:
The bottom of the Key Report displays audit data from the key:
User Key Times
The Close times from lock user keys are only accurate within plus or minus 32 seconds. If more exact times are
desired, use the times from a lock audit.
For example, the open and close times for the second event in the above screen image are both 2009-07-06
13:35:47. This is the result of an open and close occurring less than 32 seconds apart.
The following section of the lock audit report provides details as the current activation status of the lock:
Note the "User" items which indicate the key(s) used to open the lock to perform the activation:
The first line has "Not Set" for both User Key 1 ID and User Key 2 ID. Since FLM mode was the first mode activated on the lock,
the Factory Combination was used for the initial opening and no key was required.
The second line indicates that Bank mode was activated at a later time. The key "00000030D922", user ID "f" was used to open
the lock to start the Bank activation procedure. If the FLM mode had been "dual", two FLM keys would have been required and
there would be an entry under User Key 2 ID also.
The following table provides descriptive information for the lock audit.
Consecutive Failed
Beginning of a lock out (LCO) due to 5 repeated incorrect factory
Attempts Limit (NOTE: in
combos, incorrect FLM, Route, or Bank user combos, or incorrect
Lock previous software
bank user combos presented when changing combo. See
versions, audit was shown
"Troubleshooting Single Lighting Bolt."
as "3/5 Attempts")
Lock Clock Set Key Used A white Clock Set key was used at the lock
Factory/Shelved Mode
Lock The lock was opened with the factory/shelved mode combination
Open
Factory/Shelved Mode
Lock The lock factory/shelved mode combination was changed
Combo Changed
Lock opening by user key in the listed mode (or 1 of the 2 users in
FLM*/Route*/Bank* Open Only
dual mode)
initial close seal retrieval by a user key if the last audit record
FLM*/Route*/Bank* Close Only
written was not an opening by this same user key
FLM*/Route*/Bank* Open/Close A consecutive open and a close record by the same user key
FLM*/Route* Close seal retrieval Subsequent close seal retrieval by FLM or Route user key (#4)
Time Zone And DST A clock set key was used to update the time zone information and
FLM/Route/Bank
Transition Table Updated DST transition table for the mode
Shelve FLM (or Route or Mode listed was shelved (deactivated); added to main audit trail in
SA Key
Bank) Gen2 ("ShL")
SA Key Add User Add Bank mode users to the user table ("Add")
SA Key Delete User Delete Bank mode users from the user table ("dEL")
FLM (or Route or Bank) The activation was updated from Compatibility mode to full Gen2
SA Key
Update Activation mode for the listed mode ("UPA")
Door found open when checking for closed door (after bolt gets
External Sensor Door Open
extended and lock powered up.)
External Sensor Remote Disable Asserted Remote disable signal found asserted when lock was powered up.
Serial (Shelved The lock clock was anonymously updated via serial communications
Clock Write
Mode) (if no modes active)
Serial (Shelved Activate FLM (or Route or Listed mode was activated via serial communications while the lock
Mode) Bank) Mode was in Factory/Shelved mode
Serial (Kaba Mas) Clock Write Kaba Mas updated the lock clock via serial communications
Serial (FLM, Route Time Zone And DST Listed mode's time zone info and DST transition table were updated
or Bank) Transition Table Updated via serial communications
Serial (FLM, Route Access Configuration Listed mode's access configuration (single user access / dual user
or Bank) (Single/Dual) Written access) was changed via serial communications
The mode's close seal (or close confirmation) was retrieved via
Serial (FLM, Route
Confirm Close serial communications that had not yet been obtained by a key in
or Bank)
that mode.
Serial (Bank) Users Added Bank mode users added via serial communications
Serial (Bank) Users Deleted Bank mode users deleted via serial communications
Time Delay Configuration Bank mode time delay configuration was changed via serial
Serial (Bank)
Written communications
You can use the following guidelines to interpret the contents of the Supervisor Audit Key Report.
The header information will include the lock serial number which does not change.
For Gen2 locks the time of the audit stored in the lock and the user key is standardized to the lock time, no matter what the time
in the key is programmed to.
For Gen1 locks, even if the time in the keys have been programmed incorrectly, the audits will still be stored in the order of
when the keys were physically presented to the key reader. The most recent events will always be at the top, and the oldest
events will be at the bottom.
If the same key opens and closes the call in single mode, the 2 events will be shown on the same line.
If the lock is opened in dual mode, one line will show an open without a close by the first user key, and the second line will
show an open and a close by second user key.
In single mode, if one key opens the call and another key gets the close seal, this will show on two separate lines.
If a line shows a close time without an open time, first look at the close seal. If the close seal is the same as the previous line,
the user had simply entered the #4 command at the lock to retrieve the last close seal.
Each lock audit identifies users by their key serial number. When an audit is read by your system, any user keys that are
currently enrolled in your system will display the User ID for that key rather than the key serial number.
Keys that have been deleted from your system should still display the User ID based off of your User ID History, beginning
with Cencon version 2. Keys deleted out from previous versions of Cencon will not have the User ID maintained in this
fashion.
If a deleted key is reused, then the time of the event from the lock audit will be used to determine if the previous name or
the current name should be displayed.
If a key was enrolled by a different Cencon or CenBank system for use with the lock, and the key is not in your Cencon
System database, then it will show only as the key serial number.
Audits may appear slightly different depending on the code level of your Cencon lock and which version of the Cencon software
the SA key was prepared vs. the version the SA key was read in.
For Gen2 locks, for a complete audit history of the maximum records stored in the lock, use the Interface Kit, and refer to the
"Lock Operations with Serial Connect" section of the Reference Manual.
Note
Check that the time on your PC is correct when initializing the DS1922 key.
Since the clock in the DS1922 key has a known drift of about 2 minutes a month, you should plan to reinitialize
time set keys regularly.
Note
This process does not need to be performed to update the time in the lock for a change to Daylight Savings Time or back to
Standard Time. The lock automatically accommodates for that type of time change.
To initialize a time set key, insert the white DS1922 Key into the key reader and click on Initialize Key to Set Lock Time in the
main Cencon window. The following is displayed:
The Display Key Report button opens the Key Report for the key in the reader. The Read Key button is used to reread the key in
the reader if you change keys.
The Key information box displays the current time zone and time from the key. The Set Time Zone To selection defaults to the time
zone set on the PC.
To initialize a key, select the desired time zone and press the Initialize Key button. A confirmation message is displayed:
See 4.2.16 Set the Lock Time for details on using the time set key at a lock.
See 4.3.16 Set the Lock Time for details on using the time set key at a Gen 2 Swing Bolt lock.
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon Version 4 System Reference Manual
3.5.6 Create a Retrieve Bank Users Key (Gen2)
To retrieve the list of bank users assigned to a Gen 2 lock, insert a red SA Key into the key reader and click on Create a Retrieve Bank Users Key (Gen2) in the
main Cencon window. The following is displayed:
Click on Initialize Key. A confirmation message is displayed. To use this key at a lock, see 4.2.17 Retrieve Bank Users From Lock. To use this key at a Gen 2 Swing Bolt
lock, see 4.3.17 Retrieve Bank Users From Lock.
The Display Key Report button opens the Key Report for the key in the reader. The Read Key button is used to reread the key in the reader if you change keys.
The unified authorization concept places all authorization information for the Cencon family of applications in the Cencon database.
These authorizations are then used in a standardized manner by all Cencon applications for all operations.
The addition of user authorization tables in the database allows for the configuration of the program interface and permitted functionality
to be specified uniquely for each user regardless of where they are physically logged on. The authorizations for a particular user are
established by assigning a Role when the user is created. The specific tasks the user may perform are the Role Definitions which are
associated with that Role. Cencon provides a default set of Roles and associated Role Definitions. Custom Roles may be created and
deleted using the menus on the Authorization Role Report.
The following sections on Roles and Role Definitions contain examples on using the authorization functions to create and change user
roles.
Roles
The authorization tables define a set of authorization roles by name, such as Supervisor, Dispatcher, Key Maintenance User, Activate
Only, etc. A maintenance dialog is provided for customer modifications to these standard definitions.
Role Definitions
Each authorization role has matching entries in a table defining what functions that authorization will have displayed in the user
interface and which Cencon functions the assigned user may perform.
Special Supervisors
Special Supervisors always have access to all system operations independent of authorizations. This user role is needed to
maintain Cencon if no authorizations are defined and to change authorizations. At least one special supervisor key must always
be defined and no role operations are permitted.
The default roles may not be modified or deleted. They may, however, be copied and the copy can be modified. The following is an
overview of the significant activities authorized for each of the default user roles. To see the full list of authorizations, double-click on
the role name in this report.
Supervisor Highlights:
Activate, Shelve, dispatch, reassign, map, rename, replace, resync, set clock, update data, delete, and close locks
Create, modify, and delete user information and users (except for special supervisor and supervisor)
Import and Export lock information
Create, edit, and delete customers, bank branches, regions, collections, and routes
Key reports
View and archive all Cencon reports (users, locks, lock log, regions, customers, activity log, etc.).
Dispatcher Highlights:
Dispatch, reassign, map, rename, replace, resync, set clock, update data and close locks
Add customers, bank branches, regions, collections, and routes
Change limited user data
Key reports
View and archive all Cencon reports (users, locks, lock log, regions, customers, activity log, etc.).
Reporting Highlights:
View and archive all Cencon reports (users, locks, lock log, regions, customers, activity log, etc.).
Activate, Shelve, map, rename, replace, and update data for bank locks
Add customers, bank branches, regions, and collections (bank related only)
Create, modify, and delete bank user information and bank users
View and archive all Cencon reports (users, locks, lock log, regions, customers, activity log, etc.).
Activate, Shelve, dispatch, reassign, map, rename, replace, set clock, update data, delete, and close locks
Create, modify, and delete user information and users (FLM, Route, and Bank only)
Import and Export lock information
Create, edit, and delete customers, bank branches, regions, collections, and routes
Key reports
View and archive all Cencon reports (users, locks, lock log, regions, customers, activity log, etc.).
The Operations menu provides access to the maintenance functions for this data:
As an example, assume you want to create a new role which only allows the user to dispatch, reassign and close FLM locks. From the
Authorization Role Report, select Add Role. The Add Role dialog is displayed. Enter a descriptive Role Name ("FLM Dispatcher" for
this example) and some optional descriptive text:
Press Create to add the custom role to Cencon. The new role is now displayed in the Authorization Role Report:
The next step is to assign the specific tasks users assigned to this role may perform. This is done using the Role Definition Report
which opens automatically as the new role is created. To access the Role Definition Report for other roles, double-click on the Role
name or click on the Role and select Role Definition Listing from the Operations menu. The Role Definition Report initially contains only
the Logon role (and the only available operation is Add) since the new role has not been assigned any other permitted tasks:
A role may not be deleted if there are any users assigned to it:
Copy Role
Sample Role Copy dialog:
Enter a name for the new role and an optional description. Press Copy to create the new role and copy all the authorization
definitions from the existing role to the new role:
Enable Role
Allows the role to operate normally.
Disable Role
Disables all users assigned to the role such that they may not perform any Cencon operations.
For example, the above report indicates that the Dispatcher Plus role is authorized to change the user nickname for Bank, FLM and
Route type users but not for any other users.
Add
Use the Add dialog to add additional operations. For example, the following Add dialog gives our Dispatcher Plus role the
authorization to also change the nickname for Special Supervisors:
Note
Types which have already been added to the current role, as well as those operations for which all the related types have
already been added, are marked as selected in the Add Operation to Role dialog; these selections cannot be changed in
this dialog.
Default Dispatch/Close Limits For All New Roles: Some operations (dispatch and close lock in FLM and Route mode)
have common associated values which can be set. The associated values are 'Number of simultaneous dispatches allowed for
FLM/Route keys' and 'Allowed number of failed attempts to close a specific FLM/Route lock':
Delete
Removes the selected task from the role. A verification dialog is displayed.
This report allows you to add, edit and delete regions defined for the Cencon system.
The use of Region control can be enabled or disabled from the Update Configuration File function.
Region control is a method of controlling what locks and FLM/RSP IDs can be viewed or accessed by different Cencon logon
users.
This is done by assigning a region ID to locks and users. A region ID is a name up to 64 characters long. There is a table of region
IDs that is maintained to keep track of what regions have been defined.
There are two types of regions: Global and Local. A Cencon logon assigned to a global region can view and administer any lock
and FLM/RSP ID in the system. A Cencon logon assigned to a local region can only view and administer locks and FLM/RSP IDs
with the same assigned region. The type of region only affects what Cencon logon users can view. It make no difference as to
how regions are used for lock operations.
Additionally, regions control which locks that FLM/RSP IDs can be dispatched to. FLM/RSP IDs can not be dispatched to locks
assigned to a different region.
Example:
Assume you have two regions: Lexington which is a global region, and Richmond which is a local region.
DispatcherRich can only see and dispatch the locks assigned to region Richmond - LockRich1, LockRich2.
DispatcherRich can also only see and dispatch the users assigned to region Richmond - FLMUserRich1, FLMUserRich2.
The FLM IDs FLMUserLex1 and FLMUserLex2 can only be dispatched to the locks assigned to the same Lexington
region - LockLex1, LockLex2.
The FLM IDs FLMUserRich1 and FLMUserRich2 can only be dispatched to the locks assigned to the same Richmond
region - LockRich1, LockRich2.
Click on Regions under the System Category on the main window. The following Search screen is displayed prior to generating the
report to allow filtering for specific region records:
Upon selecting 'OK', the regions matching the given search parameters will be displayed. Depending on the number of matching
regions and the speed of your database connection, it may take several seconds for the regions to be displayed. You can still do
operations with the report even while regions are still being loaded into memory. If your computer does not have enough memory to
keep all of the regions in memory, then the report will fetch regions as needed depending on the portion of the report you are looking
at. If this occurs, then the word 'Partial' will be displayed on the report status bar.
1. Click on Change Configuration Settings. The Update Configuration Data window is displayed.
Region Control
This field indicated if you want to use region control or not. If you don't want to use region control, leave this box unchecked. If
you do want to use region control, check this box. Region control is a method of controlling what locks and FLM/RSP IDs can
be viewed or accessed by different Cencon logon users.
This is done by assigning a region ID to locks and users. A region ID is a name up to 64 characters long. There is a table of
region IDs that is maintained to keep track of what regions have been defined.
There are two types of regions: Global and Local. A Cencon logon assigned to a global region can view and administer any
lock and FLM/RSP ID in the system. A Cencon logon assigned to a local region can only view and administer locks and
FLM/RSP IDs with the same assigned region. The type of region only affects what Cencon logon users can view. It make no
difference as to how regions are used for lock operations.
Additionally, regions control which locks that FLM/RSP IDs can be dispatched to. FLM/RSP IDs can not be dispatched to locks
assigned to a different region.
Example
Assume you have two regions: Lexington which is a global region, and Richmond which is a local region.
DispatcherRich can only see and dispatch the locks assigned to region Richmond - LockRich1, LockRich2.
DispatcherRich can also only see and dispatch the users assigned to region Richmond - FLMUserRich1,
FLMUserRich2.
The FLM IDs FLMUserLex1 and FLMUserLex2 can only be dispatched to the locks assigned to the same Lexington
region - LockLex1, LockLex2.
The FLM IDs FLMUserRich1 and FLMUserRich2 can only be dispatched to the locks assigned to the same Richmond
region - LockRich1, LockRich2.
Enable Cencon Lock Remote Shelve to Require a Change Key Be Present In The Lock
This field indicates if you want to require that a change key be present in the lock in order to shelve the lock remotely, such as
across a network. This is used if you want to require that someone is present at the lock when you are remotely shelving the
lock.
This field affects remotely shelving a lock with Cencon as well as Centran. In the case of Cencon, if a change key is not
present in the lock and this flag is set, then an error message will be displayed. In the case of Centran and this same
circumstance occurs, an error code will be returned.
This field designates the number of days allowed to pass before a nickname for a user expires and must be changed to a
different nickname. Nicknames can be designated for FLM and Route personnel for added security purposes. If not using
nicknames in the system or you do not wish to define an expiration time for nicknames, set the value to 0.
These fields designate the column titles to be used when they are displayed on a lock report.
These fields designate the column titles to be used when they are displayed on a lock report.
3. Click on OK.
Mapping Software
Specifies which mapping software to use for displaying geographic locations.
MapPoint is a licensed Microsoft product. It allows you to display multiple locations on a single map.
MapQuest, Google Maps and Bing Maps are free internet services that display a single location on a map. An active
internet connection is required to use these.
Language
Specifies the language translation used for window text and messages.
The Cencon Locks operate in conjunction with the Cencon Software. From a functional standpoint, all Cencon locks offer the same
basic capabilities. For more than a decade, the Cencon lock which we now refer to as Gen1, has met and exceeded the market's
needs.
Those users who are familiar with the operation of the Gen1 lock will notice few differences if operating the Gen2 lock as they did the
Gen1 lock. However, many product enhancements exist with the Gen2 lock that are dependent on the type of PC equipment used to
activate the lock. A few highlights are as follows:
Compatibility Mode occurs when the Gen2 lock's mode is activated from Cencon software using a PCI card (FLM or Route) or from the
CenBank software (Bank Mode).
Clock is in the lock, providing more accurate audit times and provide a consistent basis for all keys servicing that lock
Time-stamped audits of factory mode activity.
bEC indicates upon power-up that clock battery is low or dead (after up to 9 years).
cEC notifies user when the clock has been reset to 1/1/2000 after battery was removed/replaced.
Clearing Lock Out is easier (now any authorized key + combo can clear the LCO after the penalty period is complete).
Connector for Door Contact Switch and Remote Disable function input to the lock.
Pressing Keypad Prompts (#7x) displays helpful information to the field user: which modes are active; current GMT date/time;
last open record and activation record by mode; key serial number & type; etc.
Faster Downloading of Audit records to SA key.
More audit memory storage, new audit types, and clearer audit descriptions.
Back Cover can be returned to Kaba Mas for firmware upgrades in the future.
Lock will not continue to display "IPI" after mode shelved or factory reset, when the key forgot to get its last close seal
Improved ESD-resistance to the memory.
To take advantage of its full range of features, the Gen2 lock would need to be originally activated from the Cencon 4 software using a
new USB Key Box. Alternatively, if Gen2 locks were originally activated in compatibility mode and then later imported into Cencon 4
which used the USB Box, an "update activation key" could be programmed and taken to the lock in order to reinitialize it into full Gen2
Mode.
Gen2 Features Available in full Gen2 Mode (all of the Gen2 Features Available in Compatibility Mode plus the following):
Battery Notes
All time window processing and audit time stamps are based on the time maintained in the lock.
The cEC prompt is a modified "Enter Combination" prompt which indicates that the clock has not been set. If you see
this prompt, use the Cencon software to create a clock set key (see Initialize Lock Time Set Key for details).
The bEC prompt is a modified "Enter Combination" prompt which indicates that the clock battery needs replacing.
When selecting a user to change the battery, choose a user who does not have time windows restrictions. If using a
bank user key to open the lock and a time delay is set, the lock will honor the delay but will require additional power
ups during the delay period (each power up cycle provides about 2 minutes of time).
The method for powering locks is to turn the dial to the left (counter-clockwise), using full wrist turns, until EC appears. Please note
that on the new Swingbolt Cencon Locks you power the lock by turning the dial briskly in any direction, until EC appears.
When performing operations that involve opening the lock, you have an approximate 40-60 second window in which to enter the
combination(s) and present the key order to get OPr and open the lock. If any delay in activity occurs during that window which might
cause the lock to get low on power, you should dial left to "repower" lock. Especially in dual mode, it is sometimes necessary to power
the lock before entering the second combination to ensure that the lock does not power down during the operation. If the lock loses
power, the operation must be restarted.
After opening and closing any lock, you should always check to ensure that the lock is physically relocked (i.e., bolt fully extended and
locked in place) by turning the dial to the right for a Deadbolt lock. If the bolt does not retract, you can be assured the lock is secured.
For a Swingbolt Lock you close the container door and turn the boltworks handle to verify locking.
CW= Clockwise; CCW = Counter Clockwise for Deadbolt Locks. Turn the dial briskly in any direction for
Swingbolt Locks.
Note
When performing operations that involve opening the lock, you have an approximate 40-60 second window in which to enter the
combination(s) and present the key(s) in order to get OPr and open the lock. If any delay in activity occurs during that window
which might cause the lock to get low on power, you should dial left to "repower" the lock. Especially in dual mode, it is sometimes
necessary to power the lock before entering the second combination to ensure that the lock does not power down during the
operation. If the lock loses power, the operation must be restarted.
Note
If -dL appears on the lock display at anytime during an operation, it indicates that you should dial Left (CCW) for Deadbolt Locks.
If -dL appears on the lock display at anytime during an operation, it indicates that you should turn the dial briskly in any direction
for Swingbolt locks.
Note
After opening and closing a Deadbolt lock, you should always check to ensure that the lock is physically relocked (i.e., bolt fully
extended and locked in place) by turning the dial to the right. If the bolt does not retract, you can be assured the lock is secured.
For a Swingbolt Lock you close the container door and turn the boltworks handle to verify locking.
The user will require a second dispatched combination (FLM and Route modes) to open the lock, close the door, and extend the bolt to
obtain the close seal (FLM and Route mode) or close confirmation (Bank mode). This second combination is obtained by the dispatcher
by performing a Manager Force Close w/o Seal followed by a dispatch.
In order to dial to the EC prompt to enter the second combination to reopen the lock and allow the door to be closed, the user must
dial clockwise to bypass the OPd prompt.
After EC is displayed, the user enters the second combination and presents the key in the normal manner. At this point, the lock
automatically closes out the last call. An example of the lock audit for this is:
FLM, Open
Sensor - door open
FLM, Open/Close
It is the responsibility of the safe manufacturer to secure the Door Contact Switch and associated cables to prevent tampering.
1. Power Lock → EC
Turn the dial left (CCW) until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Shelved Mode Combination → OPr
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the current Shelved
Mode combination, whether it be the Factory Combination of 50-25-50 or a new Shelved Mode combination, by sequentially
pressing those digits on the lock keypad. The LCD will display the numbers as the combination is entered. When the
combination has been correctly entered, the LCD will read OPr, meaning "OPen right."
3. OPr → Retract Bolt
Turn the dial to the right (CW) to retract the bolt.
4. Open Door
5. Close Door
6. Extend Bolt Turn the dial a minimum of one complete rotation to the left (CCW) to extend the bolt.
Note
You can only change the Shelved Mode combination while operating in Shelved Mode. Once a lock is "activated" in any mode, the
Shelved Mode combination returns to the Factory Default of 50-25-50.
1. Power Lock → EC
Turn the Dial to the left (CCW) until "EC" (Enter Combination) is displayed.
2. EC → Enter Shelved Mode Combination → OPr
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the current Shelved
Mode combination (either 50-25-50 or a changed Shelved Mode combination) by sequentially pressing those digits on the lock
keypad. The numbers will be displayed on the LCD as they are entered. When the combination has been correctly entered, the
LCD will read OPr, meaning "OPen right."
3. OPr → Retract Bolt
Turn the Dial to the right (CW) to retract the bolt.
4. Open Door
5. Insert Change Key
Insert the change key into the change key socket on the back of the lock.
6. Extend Bolt
Turn the Dial to the left (CCW) to extend the bolt. Do not close the door.
7. Power Lock →
Turn the dial to the left (CCW) until (the Change Key symbol along with Enter Combination) is displayed.
8. → Press #8 → EcF
Press the "#" button followed by the "8" button. EcF (Enter current Factory combination) will be displayed.
9. EcF → Enter Current Shelved Mode Combination → EnF
Enter the current shelved mode combination, "EnF" (Enter new Factory combination) will be displayed.
10. EnF → Enter New Combination → CnF
Select and enter the new combination. "CnF" (Confirm new Factory combination) will be displayed.
Note
The new Shelved Mode combination should be recorded and stored in a secure area.
1. Power Lock → EC
Power the Lock by turning the dial to the left (CCW) until EC appears in the display window.
2. EC → Press #2 → Sn- xx xx xx or Sn- xxx xxx xxx
Press # followed by 2.
For Gen1 locks: The lock will display Sn- (Serial number) followed by the serial number, displaying two digits at a time. If the
Lock Serial Number is 998877, "Sn-", then "99", then "88", then "77" will be displayed.
For Gen2 locks: The lock will display Sn- (Serial number) followed by the serial number, displaying three digits at a time. If
the Lock Serial Number is 1000022, "Sn-", then "001", then "000", then "022" will be displayed.
Note
As long as the Gen2 serial number starts with 000 (3 zeros) you can enter this Gen2 serial number into versions of Cencon and
CenBank software released before 2009, by ignoring the first 3 digits and typing in only the last 6 digits. If your Gen2 lock serial
number begins the first 3 digits with 001 or higher, you must be using Cencon version 4.0 or higher to activate the lock.
Note
This display can be canceled by pressing the asterisk (*) key, or it will automatically be canceled when the lock powers down.
A Dispatcher activates the lock at the PC using the software program and the red SA key. An FLM or Route Person physically goes to
the lock to complete the activation, using the initialized SA key, a blue F or yellow R key, change key and an activation combination
obtained from the Dispatcher.
Note
If the lock is already active in another mode, a service call must be issued for that mode so that the lock can be opened for the
new activation.
A Change Key is required for this procedure. This is a tool that will normally be in the possession of the FLM or Route Service Person.
The change key has two prongs that, when extended, fit securely into the change key holes on the back of the lock body. Any change
key may be used in any Cencon Lock. The change key is not encoded or unique in any way.
This process should be followed when the lock is not currently activated in any mode; that is, it is in Shelved Mode.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Shelved Mode Combination → OPr
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the current Shelved Mode combination. This could either be the default Factory Combination of 50-25-50 or a unique
combination that was set while the lock was in Shelved Mode. OPr (OPen right) is displayed.
3. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
4. Open Door
5. Insert Change Key
Extend the prongs on the change key and insert it into the change key socket on the back of the Lock.
6. Extend Bolt
With the door open, turn the dial to the left (CCW) to extend the bolt.
7. Power Lock →
Turn the dial to the left (CCW) until (the Change Key symbol along with Enter Combination) appears in the display
window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When is
displayed, key in the current Shelved Mode combination. Again, this could either be the default Factory Combination of 50-25-50
or a unique combination that was set while the lock was in Shelved Mode. ISA (Insert Supervisor Audit key) is displayed.
9. ISA → Insert and Hold SA Key → Ini
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Ini (Initializing) with a flashing bar
over the "n" while the information is being processed.
10. Ini → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
11. POC → Remove SA Key & Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. OPr (OPen right) is displayed.
12. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
13. Extend Bolt
Turn the Dial to the left (CCW) to extend the bolt.
14. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
15. EC → Enter Activation Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the activation combination. This is the combination that was issued at the PC software. IPI (Insert Personal Identifier) is
displayed.
16. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid FLM or Route key. OPr is displayed.
Note
If you have activated the lock in Dual Access Mode, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the Close Seal number for this
opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To remove a two-digit close seal from the display, turn the dial to the left (CCW) until EOP appears. To stop the display of
a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the display of the close
seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted in the opening and closing operations.
To Activate an FLM or Route Lock Mode from an Active FLM or Route Mode:
This procedure should be used when the lock has already been activated in at least one mode, either FLM or Route, and you wish to
activate the other Cencon operating mode.
Note
Since the Lock has already been activated in one Mode and you are activating another, you will be required to meet someone at
the Lock who has the authority to open it.
Required Items: Default Factory Combination, Change Key, SA Key, Activation Combination, F or R Key, Service
Call Combination and F or R Key for Active Mode.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Service Call Combination for Active Mode → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key in the one time
combination that is already active. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert the Personal Identifier Key for the mode that is already active into the Lock's key reader. OPr (OPen right) is
displayed.
4. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
5. Open Door
6. Insert Change Key
Extend the prongs on the change key and insert it into the change key socket on the back of the Lock.
7. Extend Bolt
With the door open, turn the dial left (CCW) to extend the bolt.
8. Power Lock →
Turn the Dial left (CCW) until (the change key symbol along with Enter Combination) appears in the display window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the Default Factory
Combination of 50-25-50. ISA (Insert Supervisor Audit key) is displayed.
10. ISA → Insert and Hold SA Key → Ini
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Ini (Initializing) with a flashing bar
over the "n" while the information is being processed.
11. Ini → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
12. POC → Remove SA Key & Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. OPr (OPen right) is displayed.
13. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
14. Extend Bolt
With the door open, turn the dial left (CCW) to extend the bolt.
15. Power Lock → IPI
Turn the Dial CCW until IPI (Insert Personal Identifier) appears in the display window.
16. IPI → Insert Personal Identifier Key → cxx or Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the Close Seal number for this
opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To remove a two-digit close seal from the display, turn the dial to the left (CCW) until EOP appears. To stop the display of
a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the display of the close
seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the Close Seal number for this
opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To remove a two-digit close seal from the display, turn the dial to the left (CCW) until EOP appears. To stop the display of
a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the display of the close
seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
This procedure should be used when the lock has already been activated in Bank mode and you wish to activate another Cencon
operating mode.
Note
Since the Lock has already been activated in one Mode and you are activating another, you will be required to meet someone at
the Lock who has the authority to open it.
Required Items: Default Factory Combination, Change Key, SA Key, Activation Combination, F or R Key, Bank
User Combination and B Key for Active Mode.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Bank User Combination for Active Mode → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key in the one time
combination that is already active. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert the Personal Identifier Key for Bank mode into the Lock's key reader. OPr (OPen right) is displayed.
4. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
5. Open Door
6. Insert Change Key
Extend the prongs on the change key and insert it into the change key socket on the back of the Lock.
7. Extend Bolt
With the door open, turn the dial left (CCW) to extend the bolt.
8. Power Lock →
Turn the Dial left (CCW) until (the change key symbol along with Enter Combination) appears in the display window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the Default Factory
Combination of 50-25-50. ISA (Insert Supervisor Audit key) is displayed.
10. ISA → Insert and Hold SA Key → Ini
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Ini (Initializing) with a flashing bar
over the "n" while the information is being processed.
11. Ini → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
12. POC → Remove SA Key & Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. OPr (OPen right) is displayed.
13. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
14. Extend Bolt
With the door open, turn the dial left (CCW) to extend the bolt.
15. Power Lock → IPI
Turn the Dial CCW until IPI (Insert Personal Identifier) appears in the display window.
16. IPI → Insert Personal Identifier Key → EOP (End of OPeration)
At IPI insert a valid Bank key to confirm the lock is closed and to display EOP (End of OPeration)
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the Close Seal number for this
opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To remove a two-digit close seal from the display, turn the dial to the left (CCW) until EOP appears. To stop the display of
a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the display of the close
seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
25. cxx or Cxx xx → Record Activation Close Seal
This Close Seal number should be called in to the Dispatch Center to close the activation call.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the one time combination. When the final number of the combination is keyed, the display will prompt IPI (Insert Personal
Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid FLM or Route key in the lock's key reader. OPr (OPen right) is displayed.
4. Opr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
5. Open Door
6. Perform Operations
Perform the service or route operations for the lock.
7. Close Door
8. Extend Bolt → IPI
Extend the bolt and secure the lock by turning the dial left (CCW). When the lock is fully locked, the display will prompt IPI
(Insert Personal Identifier).
9. IPI → Insert Personal Identifier Key → cxx or Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the Close Seal number for this
opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To remove a two-digit close seal from the display, turn the dial to the left (CCW) until EOP appears. To stop the display of
a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the display of the close
seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter 1st Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key in the one time
combination. When the final number of the combination is keyed, the display will prompt IPI (Insert Personal Identifier).
3. IPI → Insert 1st Personal Identifier Key → EC2
At IPI insert the first valid FLM or Route key in the Lock's key reader. For Dual Mode EC2 (Enter Combination 2) will be
displayed.
4. EC2 → Enter 2nd Combination → IP2
At EC2 key in the second valid combination. IP2 (Insert Personal Identifier 2) will be displayed.
5. IP2 → Insert 2nd Personal Identifier Key → OPr
At IP2 insert the second valid FLM or Route key. OPr (OPen right) will be displayed.
6. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
7. Open Door
8. Perform Operations
Perform the service or route operations for the lock.
9. Close Door
10. Extend Bolt → IPI
Extend the bolt and secure the lock by turning the dial left (CCW). When the lock is fully locked, the display will prompt IPI
(Insert Personal Identifier).
11. IPI → Insert Personal Identifier Key → cxx or Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the Close Seal number for this
opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To remove a two-digit close seal from the display, turn the dial to the left (CCW) until EOP appears. To stop the display of
a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the display of the close
seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening or closing operations. In the case where a lock is
operating in Dual Mode, two records will be written for the closing even though only one key is required to retrieve the
close seal and end the call.
1. Power Lock → EC
Power the lock by turning the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. Press #4 → IPI
Press # followed by 4. IPI (Insert Personal Identifier) will be displayed.
3. IPI → Insert Personal Identifier Key → cxx or Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the last Close Seal number
issued for the previous FLM or Route Mode opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the last Close Seal
number issued for the previous FLM or Route Mode opening.
Note
To remove a two-digit close seal from the display, turn the dial to the left (CCW) until EOP appears. To stop the display of a four-
digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the display of the close seal, it will
automatically disappear when the lock powers down.
The lock always keeps track of how many times it has been opened (Total Audit Count) no matter in which mode the opening occurred,
including Shelved Mode, FLM, Route, and Bank. To learn the Total Audit Count, press the pound symbol, “#,” followed by the “3”
whenever “EC” is displayed on the LCD. The display will flash two sets of numbers alternately on the screen. When taken as one four-
digit number, this represents the Total Audit Count. For instance, if the LCD flashes “AC-” then “00” followed by “07,” the lock has a
Total Audit Count of “0007,” meaning the lock has been opened seven times in all modes combined. This display can be cancelled by
pressing the asterisk (*) button. The Total Audit Count does not reset when the lock is shelved. Once the counter exceeds 9999
openings, the Gen2 lock begins displaying more digits.
To retrieve the audit count for a Mode activation period, a valid PI key is required. The type of Personal Identifier key inserted in the
key reader will tell the lock which Audit Count to show.
Note
In current versions of the lock the audit counts are initialized when a lock is activated. This allows you to retrieve the audit count
for the last activated time period for a specific mode. In older versions the counts are reset when the lock is shelved; therefore,
previous activation period counts are not available.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. Press ## → IPI
Press the pound (#) button twice. The display will prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → SC- xx xx or SS- xx xx
At IPI insert a valid FLM or Route key in the Lock's key reader. SC will display if the lock is active . SS will display if the lock is
shelved. The display will then indicate the Audit Count for the Mode of the key that was inserted, displayed two digits at a time.
Note
This display can be canceled by pressing the asterisk (*) button, or it will automatically be canceled when the lock powers down.
To Obtain the Total Audit Count for All Modes (Including Shelved Mode):
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. Press #3 → AC- xx xx
AC- will display followed by the total audit count for all modes, displayed two digits at a time.
Note
This display can be canceled by pressing the asterisk (*) button, or it will automatically be canceled when the lock powers down.
A 5 minute delay will be imposed if more than five (5) #0 operations are done in 5 minutes (a 'dLY' prompt is
displayed). Either wait for the delay to elapse or open the lock to clear the count and reset the delay.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Press #0 → -dL or ISA
Press the pound (#) button followed by the 0 button.
3. -dL → ISA (Gen2 locks only)
For Gen2 locks, the -dL (dial Left) prompt will be displayed indicating that the user is required to dial counter-clockwise (CCW)
to supply additional power to the lock before the ISA (Insert SA key) prompt is displayed.
4. ISA → Insert and Hold SA Key → Aud
ISA will be displayed. Insert and hold the initialized Supervisor Audit key in the lock's key reader. The lock will display Aud
(Audit in Progress) with a flashing bar over the "u" while the Audit Download is being processed.
5. Aud → EOP
Continue to hold the SA Key in the reader until EOP (End of OPeration) is displayed.
Note
You must periodically turn the dial to maintain power during this time.
We will need a change key for these procedures, which is a tool that will normally be in the possession of the FLM or Route Service
Person. The change key has two prongs that, when extended, fit securely into the change key holes on the rear of the lock body. Any
change key may be used in any Cencon lock. The change key is not encoded or unique in any way.
Note
Keep in mind that the lock may or may not be activated in Bank Mode. Bank Mode can only be shelved through the Cenbank
System or through Cencon 4.0 or later version of the Cencon software.
This procedure should be used when you want to shelve any combination of FLM, Route Mode, or Bank Mode (Cencon 4.0 or later
only).
Note
The designation of how many modes are to be shelved, and which ones, occurs at the PC using the Cencon software. That
information is written to an SA key which is then used in this process.
If you will be shelving ALL active modes, this process will return the lock to Shelved Mode where it will open with the Factory
Combination of 50-25-50.
Required Items: Blue F or Yellow R Key, Shelving Combination, Change Key, Red SA Key
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Shelving Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the one time shelving combination. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert Key → OPr
At IPI insert the key for the mode being shelved into the Lock's key reader. OPr is displayed.
Note
If the lock is activated for Dual Combination Access, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
8. Power Lock →
Turn the dial to the left (CCW) until (the Change Key symbol along with EC) appears in the display window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the default Factory
Combination of 50-25-50. ISA is displayed.
10. ISA → Insert SA Key → POC
After the Factory Combination has been correctly entered, the ISA symbol, meaning "Insert Supervisor Audit" key will be
displayed. Insert the Supervisor Audit Key in the Lock's key reader and continue to hold it there until POC is displayed.
11. POC → Remove SA Key AND Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. OPr is displayed.
12. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
13. Close Door
14. Extend Bolt
Turn the dial to the left (CCW) to extend the bolt.
15. Power Lock → IPI
Turn the dial to the left (CCW) until IPI (Insert Personal Identifier) appears in the display window.
16. IPI → Insert Personal Identifier Key → cxx or Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen1 locks: The lock will display cxx (close seal) where xx is a two-digit number that is the Close Seal number for this
opening.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
Note
If the lock has been shelved in ALL active modes, you should at this time test the opening of the lock with the Default
Factory Combination of 50-25-50.
This procedure should be used when you want to shelve any combination of FLM, Route Mode, or Bank Mode (Cencon 4.0 or later
only).
Note
The designation of how many modes are to be shelved, and which ones, occurs at the PC using the Cencon software. That
information is written to an SA key which is then used in this process.
If you will be shelving ALL active modes, this process will return the lock to Shelved Mode where it will open with the Factory
Combination of 50-25-50.
Required Items: Teal B Key, User Key Combination, Change Key, Red SA Key
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter User Key Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the one time shelving combination. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert Key → OPr
At IPI insert the key for the mode being shelved into the Lock's key reader. OPr is displayed.
Note
If the lock is activated for Dual Combination Access, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
8. Power Lock →
Turn the dial to the left (CCW) until (the Change Key symbol along with EC) appears in the display window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the default Factory
Combination of 50-25-50. ISA is displayed.
10. ISA → Insert SA Key → POC
After the Factory Combination has been correctly entered, the ISA symbol, meaning "Insert Supervisor Audit" key will be
displayed. Insert the Supervisor Audit Key in the Lock's key reader and continue to hold it there until POC is displayed.
11. POC → Remove SA Key AND Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. OPr is displayed.
12. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
13. Close Door
14. Extend Bolt
Turn the dial to the left (CCW) to extend the bolt.
15. Power Lock → IPI
Turn the dial to the left (CCW) until IPI (Insert Personal Identifier) appears in the display window.
16. IPI → Insert Personal Identifier Key → EOP (End of OPeration)
At IPI insert a valid Bank key to confirm the lock is closed and to display EOP (End of OPeration)
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
Note
If the lock has been shelved in ALL active modes, you should at this time test the opening of the lock with the Default
Factory Combination of 50-25-50.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Shelved Mode Combination → OPr
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the current Shelved Mode combination. This could either be the default Factory Combination of 50-25-50 or a unique
combination that was set while the lock was in Shelved Mode. OPr (OPen right) is displayed.
3. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
4. Open Door
5. Insert Change Key
Extend the prongs on the change key and insert it into the change key socket on the back of the Lock while OPr is displayed.
6. Extend Bolt
With the door open, turn the dial to the left (CCW) to extend the bolt.
7. Power Lock →
Turn the dial to the left (CCW) until (the Change Key symbol along with Enter Combination) appears in the display
window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the current Shelved Mode combination. Again, this could either be the default Factory Combination of 50-25-50 or a unique
combination that was set while the lock was in Shelved Mode. ISA (Insert Supervisor Audit key) is displayed.
9. ISA → Insert and Hold SA Key → InI
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display InI (InItializing) with a flashing bar
over the "n" while the information is being processed.
10. InI → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
11. POC → Remove SA Key & Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. OPr (OPen right) is displayed.
12. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
13. Extend Bolt
Turn the Dial to the left (CCW) to extend the bolt.
14. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
15. EC → Enter Default User Combination → IPI
Enter the default user combination of 50-25-50 for User 00. The lock will prompt IPI (Insert Personal Identifier key) on the
display.
Note
To determine the code level of your lock, see Appendix F.
Note
If a flashing lightning bolt appears on the display, the combination was not confirmed properly. Reset by pressing the * key
and rekey the operation.
Warning
For security purposes, you should define your own values for User Combinations in your Cenbank system.
Note
If a flashing lightning bolt appears on the display, the combination was not confirmed properly. Reset by pressing the * key
and rekey the operation.
Note
It is a good practice to dial the new combinations and open the lock at least once after initially setting them, before closing
the door and extending the bolt.
Note
An Audit record is created each time a key is inserted during the opening and closing operations. These are reported as “Open
Time” and “Close Time” on the Audit Log Reports.
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon System Reference Manual
4.2.12 Open Lock - Bank Mode
Open/Close a Single User Lock - No Delay
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the bank user's combination. When the final number of the combination is keyed, the display will prompt IPI (Insert Personal
Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid B key in the lock's key reader. OPr (OPen right) is displayed.
4. Opr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
5. Open Door
6. Perform Operations
Perform the service or bank operation.
7. Close Door
8. Extend Bolt → IPI
Extend the bolt and secure the lock by turning the dial left (CCW). When the lock is fully locked, the display will prompt IPI
(Insert Personal Identifier).
9. IPI → Insert Personal Identifier Key → EOP
Insert the Personal Identifier B Key again to record the lock closure. The lock will verify a completed closure by storing the date
and time for the close in the B key and displaying EOP (End of Operation).
Note
An Audit record will be created each time a key is inserted during the opening and closing operations. These will be
reported as “Open Time” and “Close Time” on the Audit Log Reports.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the bank user's combination. When the final number of the combination is keyed, the display will prompt IPI (Insert Personal
Identifier).
3. IPI → Insert Personal Identifier Key → dxx
Insert the User’s Personal Identifier B Key into the key reader. dxx (delay xx) will be displayed showing the amount of time
delay remaining before the lock can be opened.
4. dxx → Wait for Time Delay → IPI
When the programmed delay time has elapsed, the lock will prompt with IPI (Insert Personal Identifier).
Note
It may be necessary to power the lock again before you will get the IPI prompt.
Note
If the Window to Open expires before the lock is opened, it will reset itself and the entire open procedure must be repeated,
including the delay time.
7. Open Door
8. Perform Operations
Perform the service or bank operation.
9. Close Door
10. Extend Bolt → IPI
Extend the bolt and secure the lock by turning the dial left (CCW). When the lock is fully locked, the display will prompt IPI
(Insert Personal Identifier).
11. IPI → Insert Personal Identifier Key → EOP
Insert the Personal Identifier B Key again to record the lock closure. The lock will verify a completed closure by storing the date
and time for the close in the B key and displaying EOP (End of Operation).
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the first bank user's combination. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert First Personal Identifier Key → EC2
Insert the first User's Personal Identifier B Key into the key reader. EC2 (Enter Combination 2) is displayed.
4. EC2 → Enter Second Combination → IP2
Key in the combination for the second User. IP2 (Insert Personal Identifier 2) is displayed..
5. IPI → Insert Second Personal Identifier Key → OPr
Insert the second User’s Personal Identifier B key into the key reader. OPr (OPen right) is displayed.
6. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
7. Open Door
8. Perform Operations
Perform the service or bank operation.
9. Close Door
10. Extend Bolt → IP?
Extend the bolt by turning the dial to the left (CCW) until IP? (Insert Personal Identifier ?, either 1 or 2) is displayed.
11. IP? → Insert Personal Identifier Key → EOP
Insert either User’s Personal Identifier B Key into the key reader. The lock will confirm the closure by writing the date and time of
the close into the B key and displaying EOP (End of Operation).
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the first bank user's combination. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert First Personal Identifier Key → EC2
Insert the first User's Personal Identifier B Key into the key reader. EC2 (Enter Combination 2) is displayed.
4. EC2 → Enter Second Combination → IP2
Key in the combination for the second User. IP2 (Insert Personal Identifier 2) is displayed..
5. IPI → Insert Second Personal Identifier Key → dxx
Insert the second User’s Personal Identifier B key into the key reader. dxx (delay xx), with xx being the time delay remaining
before the lock can be opened, is displayed.
6. dxx → Wait for Time Delay → IPI
When the programmed delay time has elapsed, the lock will prompt with IPI (Insert Personal Identifier).
Note
It may be necessary to power the lock again before you will get the IPI prompt.
Note
If the Window to Open expires before the lock is opened, it will reset itself and the entire open procedure must be repeated,
including the delay time.
Note
If you experience a lockout situation with dual user access, you should be aware that user order on a retry is important. After the
lockout period expires, the lock will open if the first combination and the first key used in the current entry attempt are the same as
those used during the entry attempt that caused the lockout. If the first combination and the first key used are not the same as
those used when the lockout occurred, the lock will prompt with IP2 and will then prompt with EC2.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the bank user's combination. When the final number of the combination is keyed, the display will prompt IPI (Insert Personal
Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid B key in the lock's key reader. OPr (OPen right) is displayed.
4. OPr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
5. Open Door
6. Insert Change Key
Insert the change key into the change key socket.
7. Extend Bolt
With the door open, extend the bolt.
8. Power Lock →
Turn the dial to the left (CCW) until (Change Key Symbol along with Enter Combination) appears on the display.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed,
Enter the default factory combination of 50-25-50. ISA (Insert Supervisor Audit Key) will be displayed.
10. ISA → Insert and Hold SA Key → Add
Insert and hold the SA key in the key reader on the side of the lock. The lock will display Add (Adding Users) while the
information is being processed.
11. Add → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
12. POC → Remove SA Key and Pull Out Change Key → OPr
Remove the SA key and the change Key. OPr (OPen right) will be displayed.
13. OPr → Retract Bolt
Turn the dial to the right (CW) to retract the bolt. Adding Users is now complete for the Users that were programmed into the SA
key.
14. Close Door
15. Extend Bolt → IPI
Extend the bolt by turning the dial to the left (CCW). IPI (Insert Personal Identifier) will be displayed.
16. IPI → Insert Personal Identifier Key → EOP
Insert the User’s Personal Identifier B Key into the key reader again. The lock will confirm the closure by writing the date and
time of the close into the B key and displaying EOP (End of Operation).
Note
After adding a User you will need to change the combinations for the User that was added. All Bank User combinations are initially
set to the default combination of 50-25-50 but will not open the lock until changed to a valid new combinations.
Note
If the lock is in dual mode and a bank user is forced to change their combo, the dual combo entry process is aborted.
When the user's combo is successfully changed, the lock indicates the end of the operation (EOP).
© 1996-2013 Kaba Mas LLC
Cencon 4.1.5.3097 Reference Manual 19 Apr 2013
Cencon System Reference Manual
4.2.14 Bank Mode - Remove Users
Follow this procedure to delete Users from the lock at the lock after deleting them from the PC System:
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the bank user's combination. When the final number of the combination is keyed, the display will prompt IPI (Insert Personal
Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid B key in the lock's key reader. OPr (OPen right) is displayed.
4. Opr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
5. Open Door
6. Insert Change Key
Insert the change key into the change key socket.
7. Extend Bolt
With the door open, extend the bolt.
8. Power Lock →
Turn the dial to the left (CCW) until (Change Key Symbol along with Enter Combination) appears on the display.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed,
Enter the default factory combination of 50-25-50. ISA (Insert Supervisor Audit Key) will be displayed.
10. ISA → Insert and Hold SA Key → dEL
Insert and hold the SA key in the key reader on the side of the lock. The lock will display dEL (dELeting Users) while the
information is being processed.
11. dEL → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
12. POC → Remove SA Key and Pull Out Change Key → OPr
Remove the SA key and the change Key. OPr (OPen right) will be displayed.
13. OPr → Retract Bolt
Turn the dial to the right (CW) to retract the bolt. Deleting Users is now complete for the Users that were programmed into the
SA key.
14. Close Door
15. Extend Bolt → IPI
Extend the bolt by turning the dial to the left (CCW). IPI (Insert Personal Identifier) will be displayed.
16. IPI → Insert Personal Identifier Key → EOP
Insert the User’s Personal Identifier B Key into the key reader again. The lock will confirm the closure by writing the date and
time of the close into the B key and displaying EOP (End of Operation).
Warning
If the lock is only activated in Bank Mode, do not delete all users!
1. Power Lock → EC
Power the lock by turning the dial to the left (CCW) until EC (Enter Combination) is displayed.
2. EC → Press #8 → IPI
Press the # button followed by 8. IPI (Insert Personal Identifier) is displayed.
3. Note
To determine the code level of your lock, see Appendix E.
Note
If a flashing lightning bolt appears on the display, the combination was not confirmed properly. Reset by pressing the “*” key
and rekey the operation.
Warning
For security purposes, you should define your own values for User Combinations in your Cenbank system.
Note
Note: If a flashing lightning bolt appears on the display, the combination was not confirmed properly. Reset by pressing the
“*” key and rekey the operation.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Press #0 →-dL
Press the pound (#) button followed by the 0 button. -dL will be displayed.
Note
If the lock has sufficient power, the #0 will go directly to ISA without the -dL indicated in steps 2 and 3.
3. -dL → ISA
Turn the dial to the left (CCW) until ISA is displayed.
4. ISA → Insert and Hold DS1922 Key → CLS
Insert and hold the initialized DS1922 key in the lock's key reader. The lock will display CLS (CLock Set in Progress) while
the clock is being set and the daylight savings time information is being saved.
Note
You may need to turn the dial to maintain power during this time.
5. CLS → EOP
Continue to hold the key in the reader until EOP (End OPeration) is displayed.
6. EOP → Remove Key
When the display prompts EOP, remove the DS1922 key.
Note
The clock set key is not lock specific and may be reused to set the time on additional locks.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Press #0 →-dL
Press the pound (#) button followed by the 0 button. -dL will be displayed.
Note
If the lock has sufficient power, the #0 will go directly to ISA without the -dL indicated in steps 2 and 3.
3. -dL → ISA
Turn the dial to the left (CCW) until ISA is displayed.
4. ISA → Insert and Hold SA Key → UdP
Insert and hold the initialized SA key in the lock's key reader. The lock will display UdP (User dumP in progress) while the
user retrieval is being processed.
Note
You may need to turn the dial to maintain power during this time.
5. UdP → EOP
Continue to hold the SA Key in the reader until EOP (End OPeration) is displayed.
6. EOP → Remove SA Key
When the display prompts EOP, remove the SA key.
7. Return SA Key
Return the SA Key to the dispatch center to be read using the Cencon Key Report function.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Press #0 →-dL
Press the pound (#) button followed by the 0 button. -dL will be displayed.
Note
If the lock has sufficient power, the #0 will go directly to ISA without the -dL indicated in steps 2 and 3.
3. -dL → ISA
Turn the dial to the left (CCW) until ISA is displayed.
4. ISA → Insert and Hold DS1963 Key → rSY
Insert and hold the initialized key in the lock's key reader. The lock will display rSY ( reSYnchronization in Progress) while
the lock data retrieval is being processed.
Note
You may need to turn the dial to maintain power during this time.
5. rSY → EOP
Continue to hold the Key in the reader until EOP (End OPeration) is displayed.
6. EOP → Remove Key
When the display prompts EOP, remove the key.
7. Return Key
Return the Key to the dispatch center to be read using the Resynchronize the Database with Lock Data operation.
1. Power Lock → EC
Power the Lock by turning the dial to the left (CCW) until EC appears in the display window.
2. EC → Press #1
Press # followed by 1.
All Gen 2 locks will display “LL-” , “G2”, followed by 4 sets of 3 numbers, followed by “HL-” with 2 number pairs.
If the LCD instead shows the letters “LL-” followed by a string of number pairs then “HL-” followed by 2 number pairs, then this lock is
a Gen1 lock.
Note
To determine the exact Lock Level of a Gen 1 lock, please refer to Appendix F of the Cencon Reference Manual. 4.
The lock will continue repeating the Lock Level until either the * key is held down or until the dial has not been turned in 40
seconds.
All the prompts that request a user key (blue FLM, yellow Route, or green Bank) be presented will do so by displaying the “IPI” after the
command is entered. The difference to note is that #73 will be reading and displaying information unique to a particular key, whereas
#72, #76, #78, and #79 are reading which particular mode this key is associated with (FLM, Route, or Bank) and then displaying
information for that entire mode.
As is the case with interacting with the other prompts, the information will continue to display to the user until the lock powers down or
until the * is held down.
Which modes on the lock are currently active: FL (First Line Maintenance), ro (Route), or bA (Bank mode).
Whether this mode is active in Single or Dual access, noted by either a 1 or 2 before the mode abbreviation.
If the activating company activated their mode using a USB Key Box and the 4.0 or higher software, additional security benefits
are incorporated in the lock. One example is that the #70 also would display the following (rather than displaying only 0’s if the
customer activated the lock with a version below 4.0 or with a PCI card system.):
A unique 4-digit code (Cn-) assigned by Kaba Mas for the company that has activated that mode, in order that vendors
sharing access might know who to contact for service needs at the ATM,
Which USB Key Box 4-digit number (bn-) assigned to that particular customer, created the activation key, in order for
tracking and to deter possible security violations.
(For example, “01-“, “1FL”, “ Cn”, “ 00”, “ 00”, “ bn”, “ 00”, “ 00”, “02-“, “1ro”, “ Cn”, “ 00”, “ 00”, “ bn”, “ 00”, “ 00”, “03-“,
“2bA”, “ Cn”, “ 00”, “ 00”, “ bn”, “ 00”, “ 00”, where “FL” indicates FLM mode, “ro” indicates route mode, “bA” indicates
bank mode, the “1” prefix indicates single mode, the “2” prefix indicates dual mode, the “ Cn” prompt precedes the
company code, and “ bn” precedes the USB key box device ID)
#73: Display key type and key serial number for the key presented
Each SmartKey has a unique serial number engraved on the key, which is also recorded in the Cencon software when that key
is added to the customer’s database. At times in the field, to troubleshoot and to ensure that the user has the appropriate key
that the combination was dispatched to, it may be necessary to relay the key serial number over the phone back to the
dispatcher. The #73 function of the Gen2 lock allows any user key to be presented to the lock’s key reader to display the key
serial number which assists the user in this serial number’s legibility. The serial number typically starts with 6 zeros, and then
has 6 alpha-numeric characters, including letters A-F. (For example, “CL-”, “14”, “27”, “CS-”, “00”, “00”, “00”, “11”, “d7”, “EF”, to
display the iButton device number and 12 digit serial number.)
#76: Display software level the mode was activated with by user key
Because the Gen2 lock will incorporate many more security and functional enhancements as well as future compatibility
allowances when the lock used in conjunction with the Cencon 4.0 or higher software + the USB Key Box, it is important for a
customer in the field to know whether or not the mode being used has been programmed with this updated settings (For
example, “SL-“, “ 01”, where software level "01" is compatibility mode, and software level "02" indicates Cencon 4.0 or higher
with a USB Key Box).
#77: Display UTC/GMT date/time on DS1994 FLM and Route keys and DS1427 Bank Keys
Even though the Gen2 lock no longer uses the internal iButton timekeeping registers on DS1994 FLM and Route keys or from
DS1427 Bank keys, that time can be now be read at the Gen2 lock for diagnosing problems encountered when operating Gen1
locks. The time is displayed in UTC/GMT format since time zone information may not be available to Gen2 locks operating in
compatibility mode. (For example, “PIC”, “Yr-”, “ 20”, “ 09”, “ 10”, “ 31”, “Hr-”, “ 16”, “ 45”, “ 00”).
We will need a change key for these procedures, which is a tool that will normally be in the possession of the FLM or Route Service
Person. The change key has two prongs that, when extended, fit securely into the change key holes on the rear of the lock body. Any
change key may be used in any Cencon lock. The change key is not encoded or unique in any way.
Required Items: Blue F or Yellow R Key, Combination, Change Key, Red SA Key
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the one time shelving combination. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert Key → OPr
At IPI insert the user key into the Lock's key reader. OPr is displayed.
Note
If the lock is activated for Dual Combination Access, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
8. Power Lock →
Turn the dial to the left (CCW) until (the Change Key symbol along with EC) appears in the display window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the default Factory
Combination of 50-25-50. ISA is displayed.
10. ISA → Insert and Hold SA Key → UPA
Insert and hold the SA key in the lock's key reader. The lock will display UPA (UPdate Activate in Progress) while the lock
is being reactivated as a Gen 2 lock.
11. POC → Remove SA Key AND Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. Opr is displayed.
12. Opr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
13. Close Door
14. Extend Bolt
Turn the dial to the left (CCW) to extend the bolt.
15. Power Lock → IPI
Turn the dial to the left (CCW) until IPI (Insert Personal Identifier) appears in the display window.
16. IPI → Insert Key → cxx or cxx xx (Close Seal)
At IPI insert the personal identifier key of the FLM or Route person who opened the lock. The LCD will display cxx where xx is
a two-digit number (the Close Seal number for this opening).
Note
An audit record is recorded each time a key is inserted for opening and closing operations.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Shelved Mode Combination → OPr
Enter the current Shelved Mode combination, whether it be the Factory Combination of 50-25-50 or a new Shelved Mode
combination, by sequentially pressing those digits on the lock keypad. The LCD will display the numbers as the combination is
entered. When the combination has been correctly entered, the LCD will read OPr, meaning "OPen right."
3. OPr → Retract Bolt
Rotate the container handle to unlock the lock.
4. Open Door
5. Close Door
6. Extend Bolt Rotate the container handle to extend the bolt.
Note
You can only change the Shelved Mode combination while operating in Shelved Mode. Once a lock is "activated" in any mode, the
Shelved Mode combination returns to the Factory Default of 50-25-50.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Shelved Mode Combination → OPr
Enter the current Shelved Mode combination (either 50-25-50 or a changed Shelved Mode combination) by sequentially pressing
those digits on the lock keypad. The numbers will be displayed on the LCD as they are entered. When the combination has been
correctly entered, the LCD will read OPr, meaning "OPen right."
3. OPr → Retract Bolt
Rotate the container handle to unlock the lock.
4. Open Door
5. Power Lock →
Turn the dial briskly in any direction until CLb is displayed
6. CLb→ Press #8 → EcF
Press the "#" button followed by the "8" button. EcF (Enter current Factory combination) will be displayed.
7. EcF → Enter Current Shelved Mode Combination → EnF
Enter the current shelved mode combination, "EnF" (Enter new Factory combination) will be displayed.
8. EnF → Enter New Combination → CnF
Select and enter the new combination. "CnF" (Confirm new Factory combination) will be displayed.
Note
The new Shelved Mode combination should be recorded and stored in a secure area.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Press #2 → Sn- xx xx xx or Sn- xxx xxx xxx
Press # followed by 2.
For Gen2 locks: The lock will display Sn- (Serial number) followed by the serial number, displaying three digits at a time. If
the Lock Serial Number is 1000022, "Sn-", then "001", then "000", then "022" will be displayed.
Note
This display can be canceled by pressing the asterisk (*) key, or it will automatically be canceled when the lock powers down.
A Dispatcher activates the lock at the PC using the software program and the red SA key. An FLM or Route Person physically goes to
the lock to complete the activation, using the initialized SA key, a blue F or yellow R key, change key and an activation combination
obtained from the Dispatcher.
Note
If the lock is already active in another mode, a service call must be issued for that mode so that the lock can be opened for the
new activation.
The Change Key is no longer required for this procedure as it was with the deadbolt version of the Cencon lock. In it's place is the new
Change Key Function. To initiate this function, the FL or Route technician must first open the lock, then with lock open power up the
lock again until they receive a CLb prompt on the lock display. Then the FL or Route technician must enter a #50 command on the
keypad in order to get an ISA prompt on the lock.
This process should be followed when the lock is not currently activated in any mode; that is, it is in Shelved Mode.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Shelved Mode Combination → OPr
When EC is displayed, key in the current Shelved Mode combination. This could either be the default Factory Combination of
50-25-50 or a unique combination that was set while the lock was in Shelved Mode. OPr (OPen right) is displayed.
3. OPr → Retract Bolt
Rotate the container handle to unlock the lock.
4. Open Door
5. Power Lock →
Turn the dial briskly in any direction until CLb is displayed.
6. CLb→ Enter #50 → ISA
Enter #50 on the lock keypad. ISA (Insert Supervisor Audit key) is displayed.
7. ISA → Insert and Hold SA Key → Ini
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Ini (Initializing) with a flashing bar
over the "n" while the information is being processed.
8. Ini → EOP
Continue to hold the SA Key in the reader until EOP (End of Process) is displayed.
9. Extend Bolt
Do not close the door. Rotate the container handle to extend the bolt.
10. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
11. EC → Enter Activation Combination → IPI
When EC is displayed, key in the activation combination. This is the combination that was issued at the PC software. IPI (Insert
Personal Identifier) is displayed.
12. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid FLM or Route key. OPr is displayed.
Note
If you have activated the lock in Dual Access Mode, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To stop the display of a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate
the display of the close seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted in the opening and closing operations.
To Activate an FLM or Route Lock Mode from an Active FLM or Route Mode:
This procedure should be used when the lock has already been activated in at least one mode, either FLM or Route, and you wish to
activate the other Cencon operating mode.
Note
Since the Lock has already been activated in one Mode and you are activating another, you will be required to meet someone at
the Lock who has the authority to open it.
Required Items: Default Factory Combination, SA Key, Activation Combination, F or R Key, Service Call
Combination and F or R Key for Active Mode.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Service Call Combination for Active Mode → IPI
When EC is displayed, key in the one time combination that is already active. When the final number of the combination is
keyed, the display will prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert the Personal Identifier Key for the mode that is already active into the Lock's key reader. OPr (OPen right) is
displayed.
4. OPr → Retract Bolt
Rotate the container handle to unlock the lock.
5. Open Door
6. Power Lock →
Turn the dial briskly in any direction until CLb is displayed.
7. CLb→ Enter #50 → ISA
Enter #50 on the lock keypad. ISA (Insert Supervisor Audit key) is displayed.
8. ISA → Insert and Hold SA Key → Ini
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Ini (Initializing) with a flashing bar
over the "n" while the information is being processed.
9. Ini → EOP
Continue to hold the SA Key in the reader until EOP (End of Process) is displayed.
10. Extend Bolt
Do not close the door. Rotate the container handle to extend the bolt.
11. Power Lock → IPI
Turn the dial briskly in any direction until IPI (Insert Personal Identifier) appears in the display window.
12. IPI → Insert Personal Identifier Key → Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key that originally opened the lock.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To stop the display of a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate
the display of the close seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To stop the display of a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate
the display of the close seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
This procedure should be used when the lock has already been activated in Bank mode and you wish to activate another Cencon
operating mode.
Note
Since the Lock has already been activated in one Mode and you are activating another, you will be required to meet someone at
the Lock who has the authority to open it.
Required Items: Default Factory Combination, SA Key, Activation Combination, F or R Key, Bank User
Combination and B Key for Active Mode.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Bank User Combination for Active Mode → IPI
When EC is displayed, key in the one time combination that is already active. When the final number of the combination is
keyed, the display will prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert the Personal Identifier Key for Bank mode into the Lock's key reader. OPr (OPen right) is displayed.
4. OPr → Retract Bolt
Rotate the container handle to unlock the lock.
5. Open Door
6. Power Lock →
Turn the dial briskly in any direction until CLb is displayed.
7. CLb→ Enter #50 → ISA
Enter #50 on the lock keypad. ISA (Insert Supervisor Audit key) is displayed.
8. ISA → Insert and Hold SA Key → Ini
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Ini (Initializing) with a flashing bar
over the "n" while the information is being processed.
9. Ini → EOP
Continue to hold the SA Key in the reader until EOP (End of Process) is displayed.
10. Extend Bolt
Do not close the door. Rotate the container handle to extend the bolt.
11. Power Lock → IPI
Turn the dial briskly in any direction until IPI (Insert Personal Identifier) appears in the display window.
12. IPI → Insert Personal Identifier Key → EOP (End of OPeration)
At IPI insert a valid Bank key to confirm the lock is closed and to display EOP (End of OPeration)
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To stop the display of a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate
the display of the close seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Combination → IPI
When EC is displayed, key in the one time combination. When the final number of the combination is keyed, the display will
prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid FLM or Route key in the lock's key reader. OPr (OPen right) is displayed.
4. Opr → Retract Bolt
At OPr, Rotate the container handle to unlock the lock.
5. Open Door
6. Perform Operations
Perform the service or route operations for the lock.
7. Close Door
8. Extend Bolt → IPI
Rotate the container handle to extend the bolt. When the lock is fully locked, the display will prompt IPI (Insert Personal
Identifier).
9. IPI → Insert Personal Identifier Key → Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To stop the display of a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate
the display of the close seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter 1st Combination → IPI
When EC is displayed, key in the one time combination. When the final number of the combination is keyed, the display will
prompt IPI (Insert Personal Identifier).
3. IPI → Insert 1st Personal Identifier Key → EC2
At IPI insert the first valid FLM or Route key in the Lock's key reader. For Dual Mode EC2 (Enter Combination 2) will be
displayed.
4. EC2 → Enter 2nd Combination → IP2
At EC2 key in the second valid combination. IP2 (Insert Personal Identifier 2) will be displayed.
5. IP2 → Insert 2nd Personal Identifier Key → OPr
At IP2 insert the second valid FLM or Route key. OPr (OPen right) will be displayed.
6. OPr → Retract Bolt
At OPr, Rotate the container handle to unlock the lock.
7. Open Door
8. Perform Operations
Perform the service or route operations for the lock.
9. Close Door
10. Extend Bolt → IPI
Rotate the container handle to extend the bolt. When the lock is fully locked, the display will prompt IPI (Insert Personal
Identifier).
11. IPI → Insert Personal Identifier Key → Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
To stop the display of a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate
the display of the close seal, it will automatically disappear when the lock powers down.
Note
An audit record will be recorded each time a key is inserted for opening or closing operations. In the case where a lock is
operating in Dual Mode, two records will be written for the closing even though only one key is required to retrieve the
close seal and end the call.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. Press #4 → IPI
Press # followed by 4. IPI (Insert Personal Identifier) will be displayed.
3. IPI → Insert Personal Identifier Key →Cxx xx (Close Seal)
At IPI insert a valid FLM or Route key.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the last Close Seal
number issued for the previous FLM or Route Mode opening.
Note
To stop the display of a four-digit close seal, press and briefly hold the * key. If you do not choose to manually eliminate the
display of the close seal, it will automatically disappear when the lock powers down.
The lock always keeps track of how many times it has been opened (Total Audit Count) no matter in which mode the opening occurred,
including Shelved Mode, FLM, Route, and Bank. To learn the Total Audit Count, press the pound symbol, “#,” followed by the “3”
whenever “EC” is displayed on the LCD. The display will flash two sets of numbers alternately on the screen. When taken as one four-
digit number, this represents the Total Audit Count. For instance, if the LCD flashes “AC-” then “00” followed by “07,” the lock has a
Total Audit Count of “0007,” meaning the lock has been opened seven times in all modes combined. This display can be cancelled by
pressing the asterisk (*) button. The Total Audit Count does not reset when the lock is shelved. Once the counter exceeds 9999
openings, the Gen2 lock begins displaying more digits.
To retrieve the audit count for a Mode activation period, a valid PI key is required. The type of Personal Identifier key inserted in the
key reader will tell the lock which Audit Count to show.
Note
In current versions of the lock the audit counts are initialized when a lock is activated. This allows you to retrieve the audit count
for the last activated time period for a specific mode.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. Press ## → IPI
Press the pound (#) button twice. The display will prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → SC- xx xx or SS- xx xx
At IPI insert a valid FLM or Route key in the Lock's key reader. SC will display if the lock is active . SS will display if the lock is
shelved. The display will then indicate the Audit Count for the Mode of the key that was inserted, displayed two digits at a time.
Note
This display can be canceled by pressing the asterisk (*) button, or it will automatically be canceled when the lock powers down.
To Obtain the Total Audit Count for All Modes (Including Shelved Mode):
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. Press #3 → AC- xx xx
AC- will display followed by the total audit count for all modes, displayed two digits at a time.
Note
This display can be canceled by pressing the asterisk (*) button, or it will automatically be canceled when the lock powers down.
A 5 minute delay will be imposed if more than five (5) #0 operations are done in 5 minutes (a 'dLY' prompt is
displayed). Either wait for the delay to elapse or open the lock to clear the count and reset the delay.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Press #0 → -dL or ISA
Press the pound (#) button followed by the 0 button.
3. -dL → ISA (Gen2 locks)
For Gen2 locks, the -dL (dial Left) prompt will be displayed indicating that the user is required to dial counter-clockwise (CCW)
to supply additional power to the lock before the ISA (Insert SA key) prompt is displayed.
4. ISA → Insert and Hold SA Key → Aud
ISA will be displayed. Insert and hold the initialized Supervisor Audit key in the lock's key reader. The lock will display Aud
(Audit in Progress) with a flashing bar over the "u" while the Audit Download is being processed.
5. Aud → EOP
Continue to hold the SA Key in the reader until EOP (End of OPeration) is displayed.
Note
You must periodically turn the dial to maintain power during this time.
The Change Key is no longer required for this procedure as it was with the deadbolt version of the Cencon lock. In it's place is the new
Change Key Function. To initiate this function, the FL or Route technician must first open the lock, then with lock open power up the
lock again until they receive a CLb prompt on the lock display. Then the FL or Route technician must enter a #50 command on the
keypad in order to get an ISA prompt on the lock.
This procedure should be used when you want to shelve any combination of FLM, Route Mode, or Bank Mode.
Note
The designation of how many modes are to be shelved, and which ones, occurs at the PC using the Cencon software. That
information is written to an SA key which is then used in this process.
If you will be shelving ALL active modes, this process will return the lock to Shelved Mode where it will open with the Factory
Combination of 50-25-50.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Shelving Combination → IPI
When EC is displayed, key in the one time shelving combination. When the final number of the combination is keyed, the display
will prompt IPI (Insert Personal Identifier).
3. IPI → Insert Key → OPr
At IPI insert the key for the mode being shelved into the Lock's key reader. OPr is displayed.
Note
If the lock is activated for Dual Combination Access, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
For Gen2 locks: The lock will display Cxx xx (Close seal) where xx xx is a four-digit number that is the Close Seal
number for this opening.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
Note
If the lock has been shelved in ALL active modes, you should at this time test the opening of the lock with the Default
Factory Combination of 50-25-50.
This procedure should be used when you want to shelve any combination of FLM, Route Mode, or Bank Mode (Cencon 4.0 or later
only).
Note
The designation of how many modes are to be shelved, and which ones, occurs at the PC using the Cencon software. That
information is written to an SA key which is then used in this process.
If you will be shelving ALL active modes, this process will return the lock to Shelved Mode where it will open with the Factory
Combination of 50-25-50.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Shelving Combination → IPI
When EC is displayed, key in the one time shelving combination. When the final number of the combination is keyed, the display
will prompt IPI (Insert Personal Identifier).
3. IPI → Insert Key → OPr
At IPI insert the key for the mode being shelved into the Lock's key reader. OPr is displayed.
Note
If the lock is activated for Dual Combination Access, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
Note
An audit record will be recorded each time a key is inserted for opening and closing operations.
Note
If the lock has been shelved in ALL active modes, you should at this time test the opening of the lock with the Default
Factory Combination of 50-25-50.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Shelved Mode Combination → OPr
When EC is displayed, key in the current Shelved Mode combination. This could either be the default Factory Combination of 50-
25-50 or a unique combination that was set while the lock was in Shelved Mode. OPr (OPen right) is displayed.
3. OPr → Retract Bolt
At OPr ,Rotate the container handle to unlock the lock.
4. Open Door
5. Power Lock →
Turn the dial briskly in any direction until CLb is displayed.
6. CLb→ Enter #50 → ISA
Enter #50 on the lock keypad. ISA (Insert Supervisor Audit key) is displayed.
7. ISA → Insert and Hold SA Key → Ini
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Ini (Initializing) with a flashing bar
over the "n" while the information is being processed.
8. Ini → EOP
Continue to hold the SA Key in the reader until EOP (End of Process) is displayed.
9. Extend Bolt
Do not close the door. Rotate the container handle to extend the bolt.
10. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
11. EC → Enter Default User Combination → IPI
Enter the default user combination of 50-25-50 for User 00. The lock will prompt IPI (Insert Personal Identifier key) on the
display.
Note
To determine the code level of your lock, see Appendix F.
Warning
For security purposes, you should define your own values for User Combinations in your Cencon CenBank
system.
Note
If a flashing lightning bolt appears on the display, the combination was not confirmed properly. Reset by pressing the * key
and rekey the operation.
Note
It is a good practice to dial the new combinations and open the lock at least once after initially setting them, before closing
the door and extending the bolt.
Note
An Audit record is created each time a key is inserted during the opening and closing operations. These are reported as “Open
Time” and “Close Time” on the Audit Log Reports.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Combination → IPI
When EC is displayed, key in the bank user's combination. When the final number of the combination is keyed, the display will
prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid B key in the lock's key reader. OPr (OPen right) is displayed.
4. Opr → Retract Bolt
At OPr, Rotate the container handle to unlock the lock.
5. Open Door
6. Perform Operations
Perform the service or bank operation.
7. Close Door
8. Extend Bolt → IPI
Rotate the container handle to extend the bolt. When the lock is fully locked, the display will prompt IPI (Insert Personal
Identifier).
9. IPI → Insert Personal Identifier Key → EOP
Insert the Personal Identifier B Key again to record the lock closure. The lock will verify a completed closure by storing the date
and time for the close in the B key and displaying EOP (End of Operation).
Note
An Audit record will be created each time a key is inserted during the opening and closing operations. These will be
reported as “Open Time” and “Close Time” on the Audit Log Reports.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Combination → IPI
When EC is displayed, key in the bank user's combination. When the final number of the combination is keyed, the display will
prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → dxx
Insert the User’s Personal Identifier B Key into the key reader. dxx (delay xx) will be displayed showing the amount of time
delay remaining before the lock can be opened.
4. dxx → Wait for Time Delay → IPI
When the programmed delay time has elapsed, the lock will prompt with IPI (Insert Personal Identifier).
Note
It may be necessary to power the lock again before you will get the IPI prompt.
Note
If the Window to Open expires before the lock is opened, it will reset itself and the entire open procedure must be repeated,
including the delay time.
7. Open Door
8. Perform Operations
Perform the service or bank operation.
9. Close Door
10. Extend Bolt → IPI
Rotate the container handle to extend the bolt. When the lock is fully locked, the display will prompt IPI (Insert Personal
Identifier).
11. IPI → Insert Personal Identifier Key → EOP
Insert the Personal Identifier B Key again to record the lock closure. The lock will verify a completed closure by storing the date
and time for the close in the B key and displaying EOP (End of Operation).
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Combination → IPI
When EC is displayed, key in the first bank user's combination. When the final number of the combination is keyed, the display
will prompt IPI (Insert Personal Identifier).
3. IPI → Insert First Personal Identifier Key → EC2
Insert the first User's Personal Identifier B Key into the key reader. EC2 (Enter Combination 2) is displayed.
4. EC2 → Enter Second Combination → IP2
Key in the combination for the second User. IP2 (Insert Personal Identifier 2) is displayed..
5. IPI → Insert Second Personal Identifier Key → OPr
Insert the second User’s Personal Identifier B key into the key reader. OPr (OPen right) is displayed.
6. OPr → Retract Bolt
At OPr, Rotate the container handle to unlock the lock.
7. Open Door
8. Perform Operations
Perform the service or bank operation.
9. Close Door
10. Extend Bolt → IP?
Rotate the container handle to extend the bolt. When the lock is fully locked, the display will prompt IP? (Insert Personal
Identifier ?, either 1 or 2) is displayed.
11. IP? → Insert Personal Identifier Key → EOP
Insert either User’s Personal Identifier B Key into the key reader. The lock will confirm the closure by writing the date and time of
the close into the B key and displaying EOP (End of Operation).
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Combination → IPI
When EC is displayed, key in the first bank user's combination. When the final number of the combination is keyed, the display
will prompt IPI (Insert Personal Identifier).
3. IPI → Insert First Personal Identifier Key → EC2
Insert the first User's Personal Identifier B Key into the key reader. EC2 (Enter Combination 2) is displayed.
4. EC2 → Enter Second Combination → IP2
Key in the combination for the second User. IP2 (Insert Personal Identifier 2) is displayed..
5. IPI → Insert Second Personal Identifier Key → dxx
Insert the second User’s Personal Identifier B key into the key reader. dxx (delay xx), with xx being the time delay remaining
before the lock can be opened, is displayed.
6. dxx → Wait for Time Delay → IPI
When the programmed delay time has elapsed, the lock will prompt with IPI (Insert Personal Identifier).
Note
It may be necessary to power the lock again before you will get the IPI prompt.
Note
If the Window to Open expires before the lock is opened, it will reset itself and the entire open procedure must be repeated,
including the delay time.
Note
If you experience a lockout situation with dual user access, you should be aware that user order on a retry is important. After the
lockout period expires, the lock will open if the first combination and the first key used in the current entry attempt are the same as
those used during the entry attempt that caused the lockout. If the first combination and the first key used are not the same as
those used when the lockout occurred, the lock will prompt with IP2 and will then prompt with EC2.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Combination → IPI
When EC is displayed, key in the bank user's combination. When the final number of the combination is keyed, the display will
prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid B key in the lock's key reader. OPr (OPen right) is displayed.
4. OPr → Retract Bolt
At OPr ,Rotate the container handle to unlock the lock.
5. Open Door
6. Power Lock → CLb
Turn the dial briskly in any direction until the letters CLb appear in the display window.
7. CLb→ Enter #50 → ISA
Enter #50 on the lock keypad. ISA (Insert Supervisor Audit key) is displayed.
8. ISA → Insert and Hold SA Key → Add
Insert and hold the SA Key in the key reader on the side of the lock. The lock will display Add (Adding) with a flashing bar
over the "n" while the information is being processed.
9. Add → EOP
Continue to hold the SA Key in the reader until EOP (End of Operation) is displayed.
10. Extend Bolt →
Close the door. Rotate the container handle to extend the bolt.
11. Power Lock → IPI
Turn the dial briskly in any direction until the letters IPI (Insert Personal Identifier) appear in the display window.
12. IPI → Insert Personal Identifier Key → EOP
Insert the User’s Personal Identifier B Key into the key reader again. The lock will confirm the closure by writing the date and
time of the close into the B key and displaying EOP (End of Operation).
Note
After adding a User you will need to change the combinations for the User that was added. All Bank User combinations are initially
set to the default combination of 50-25-50 but will not open the lock until changed to a valid new combinations.
Note
If the lock is in dual mode and a bank user is forced to change their combo, the dual combo entry process is aborted.
When the user's combo is successfully changed, the lock indicates the end of the operation (EOP).
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Enter Combination → IPI
When EC is displayed, key in the bank user's combination. When the final number of the combination is keyed, the display will
prompt IPI (Insert Personal Identifier).
3. IPI → Insert Personal Identifier Key → OPr
At IPI insert a valid B key in the lock's key reader. OPr (OPen right) is displayed.
4. Opr → Retract Bolt
At OPr ,Rotate the container handle to unlock the lock.
5. Open Door
6. Power Lock → CLb
Turn the dial briskly in any direction until the letters CLb appear in the display window.
7. CLb→ Enter #50 → ISA
Enter #50 on the lock keypad. ISA (Insert Supervisor Audit key) is displayed.
8. ISA → Insert and Hold SA Key → dEL
Insert and hold the SA key in the key reader on the side of the lock. The lock will display dEL (dELeting Users) while the
information is being processed.
9. dEL → EOP
Continue to hold the SA Key in the reader until EOP (End of Process) is displayed.
10. Extend Bolt →
Close the door. Rotate the container handle to extend the bolt.
11. Power Lock → IPI
Turn the dial briskly in any direction until the letters IPI (Insert Personal Identifier) appear in the display window.
12. IPI → Insert Personal Identifier Key → EOP
Insert the User’s Personal Identifier B Key into the key reader again. The lock will confirm the closure by writing the date and
time of the close into the B key and displaying EOP (End of Operation).
Warning
If the lock is only activated in Bank Mode, do not delete all users!
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Press #8 → IPI
Press the # button followed by 8. IPI (Insert Personal Identifier) is displayed.
3. IPI → Insert Personal Identifier Key → EcC
Insert the User's Personal Identifier B Key into the key reader. The lock will display EcC (Enter current Combination).
4. EcC → Enter current Combination → EnC
Enter the user's current combination. The display will display EnC (Enter new Combination).
Warning
For security purposes, you should define your own values for User Combinations in your Cencon CenBank
system.
Note
Note: If a flashing lightning bolt appears on the display, the combination was not confirmed properly. Reset by pressing the
“*” key and rekey the operation.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Press #0 →-dL
Press the pound (#) button followed by the 0 button. -dL will be displayed.
Note
If the lock has sufficient power, the #0 will go directly to ISA without the -dL indicated in steps 2 and 3.
3. -dL → ISA
Turn the dial to the left (CCW) until ISA is displayed.
4. ISA → Insert and Hold DS1922 Key → CLS
Insert and hold the initialized DS1922 key in the lock's key reader. The lock will display CLS (CLock Set in Progress) while
the clock is being set and the daylight savings time information is being saved.
Note
You may need to turn the dial to maintain power during this time.
5. CLS → EOP
Continue to hold the key in the reader until EOP (End OPeration) is displayed.
6. EOP → Remove Key
When the display prompts EOP, remove the DS1922 key.
Note
The clock set key is not lock specific and may be reused to set the time on additional locks.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Press #0 →-dL
Press the pound (#) button followed by the 0 button. -dL will be displayed.
Note
If the lock has sufficient power, the #0 will go directly to ISA without the -dL indicated in steps 2 and 3.
3. -dL → ISA
Turn the dial to the left (CCW) until ISA is displayed.
4. ISA → Insert and Hold SA Key → UdP
Insert and hold the initialized SA key in the lock's key reader. The lock will display UdP (User dumP in progress) while the
user retrieval is being processed.
Note
You may need to turn the dial to maintain power during this time.
5. UdP → EOP
Continue to hold the SA Key in the reader until EOP (End OPeration) is displayed.
6. EOP → Remove SA Key
When the display prompts EOP, remove the SA key.
7. Return SA Key
Return the SA Key to the dispatch center to be read using the Cencon Key Report function.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Press #0 →-dL
Press the pound (#) button followed by the 0 button. -dL will be displayed.
Note
If the lock has sufficient power, the #0 will go directly to ISA without the -dL indicated in steps 2 and 3.
3. -dL → ISA
Turn the dial to the left (CCW) until ISA is displayed.
4. ISA → Insert and Hold DS1963 Key → rSY
Insert and hold the initialized key in the lock's key reader. The lock will display rSY ( reSYnchronization in Progress) while
the lock data retrieval is being processed.
Note
You may need to turn the dial to maintain power during this time.
5. rSY → EOP
Continue to hold the Key in the reader until EOP (End OPeration) is displayed.
6. EOP → Remove Key
When the display prompts EOP, remove the key.
7. Return Key
Return the Key to the dispatch center to be read using the Resynchronize the Database with Lock Data operation.
1. Power Lock → EC
Turn the dial briskly in any direction until the letters EC (Enter Combination) appear in the display window.
2. EC → Press #1
Press # followed by 1.
All Gen 2 locks will display “LL-” , “G2”, followed by 4 sets of 3 numbers, followed by “HL-” with 2 number pairs.
Note
The lock will continue repeating the Lock Level until either the * key is held down or until the dial has not been turned in 40
seconds.
All the prompts that request a user key (blue FLM, yellow Route, or green Bank) be presented will do so by displaying the “IPI” after the
command is entered. The difference to note is that #73 will be reading and displaying information unique to a particular key, whereas
#72, #76, #78, and #79 are reading which particular mode this key is associated with (FLM, Route, or Bank) and then displaying
information for that entire mode.
As is the case with interacting with the other prompts, the information will continue to display to the user until the lock powers down or
until the * is held down.
Which modes on the lock are currently active: FL (First Line Maintenance), ro (Route), or bA (Bank mode).
Whether this mode is active in Single or Dual access, noted by either a 1 or 2 before the mode abbreviation.
If the activating company activated their mode using a USB Key Box and the 4.0 or higher software, additional security benefits
are incorporated in the lock. One example is that the #70 also would display the following (rather than displaying only 0’s if the
customer activated the lock with a version below 4.0 or with a PCI card system.):
A unique 4-digit code (Cn-) assigned by Kaba Mas for the company that has activated that mode, in order that vendors
sharing access might know who to contact for service needs at the ATM,
Which USB Key Box 4-digit number (bn-) assigned to that particular customer, created the activation key, in order for
tracking and to deter possible security violations.
(For example, “01-“, “1FL”, “ Cn”, “ 00”, “ 00”, “ bn”, “ 00”, “ 00”, “02-“, “1ro”, “ Cn”, “ 00”, “ 00”, “ bn”, “ 00”, “ 00”, “03-“,
“2bA”, “ Cn”, “ 00”, “ 00”, “ bn”, “ 00”, “ 00”, where “FL” indicates FLM mode, “ro” indicates route mode, “bA” indicates
bank mode, the “1” prefix indicates single mode, the “2” prefix indicates dual mode, the “ Cn” prompt precedes the
company code, and “ bn” precedes the USB key box device ID)
#73: Display key type and key serial number for the key presented
Each SmartKey has a unique serial number engraved on the key, which is also recorded in the Cencon software when that key
is added to the customer’s database. At times in the field, to troubleshoot and to ensure that the user has the appropriate key
that the combination was dispatched to, it may be necessary to relay the key serial number over the phone back to the
dispatcher. The #73 function of the Gen2 lock allows any user key to be presented to the lock’s key reader to display the key
serial number which assists the user in this serial number’s legibility. The serial number typically starts with 6 zeros, and then
has 6 alpha-numeric characters, including letters A-F. (For example, “CL-”, “14”, “27”, “CS-”, “00”, “00”, “00”, “11”, “d7”, “EF”, to
display the iButton device number and 12 digit serial number.)
#76: Display software level the mode was activated with by user key
Because the Gen2 lock will incorporate many more security and functional enhancements as well as future compatibility
allowances when the lock used in conjunction with the Cencon 4.0 or higher software + the USB Key Box, it is important for a
customer in the field to know whether or not the mode being used has been programmed with this updated settings (For
example, “SL-“, “ 01”, where software level "01" is compatibility mode, and software level "02" indicates Cencon 4.0 or higher
with a USB Key Box).
#77: Display UTC/GMT date/time on DS1994 FLM and Route keys and DS1427 Bank Keys
Even though the Gen2 lock no longer uses the internal iButton timekeeping registers on DS1994 FLM and Route keys or from
DS1427 Bank keys, that time can be now be read at the Gen2 lock for diagnosing problems encountered when operating Gen1
locks. The time is displayed in UTC/GMT format since time zone information may not be available to Gen2 locks operating in
compatibility mode. (For example, “PIC”, “Yr-”, “ 20”, “ 09”, “ 10”, “ 31”, “Hr-”, “ 16”, “ 45”, “ 00”).
We will need a change key for these procedures, which is a tool that will normally be in the possession of the FLM or Route Service
Person. The change key has two prongs that, when extended, fit securely into the change key holes on the rear of the lock body. Any
change key may be used in any Cencon lock. The change key is not encoded or unique in any way.
Required Items: Blue F or Yellow R Key, Combination, Change Key, Red SA Key
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) appears in the display window.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key
in the one time shelving combination. When the final number of the combination is keyed, the display will prompt IPI (Insert
Personal Identifier).
3. IPI → Insert Key → OPr
At IPI insert the user key into the Lock's key reader. OPr is displayed.
Note
If the lock is activated for Dual Combination Access, the lock will prompt EC2 for the second combination and then IP2 for
the second user's key before OPr will appear.
8. Power Lock →
Turn the dial to the left (CCW) until (the Change Key symbol along with EC) appears in the display window.
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. Enter the default Factory
Combination of 50-25-50. ISA is displayed.
10. ISA → Insert and Hold SA Key → UPA
Insert and hold the SA key in the lock's key reader. The lock will display UPA (UPdate Activate in Progress) while the lock
is being reactivated as a Gen 2 lock.
11. POC → Remove SA Key AND Pull Out Change Key → OPr
At the POC prompt remove the SA Key and Pull Out the Change key. Opr is displayed.
12. Opr → Retract Bolt
At OPr turn the dial to the right (CW) to retract the bolt.
13. Close Door
14. Extend Bolt
Turn the dial to the left (CCW) to extend the bolt.
15. Power Lock → IPI
Turn the dial to the left (CCW) until IPI (Insert Personal Identifier) appears in the display window.
16. IPI → Insert Key → cxx or cxx xx (Close Seal)
At IPI insert the personal identifier key of the FLM or Route person who opened the lock. The LCD will display cxx where xx is
a two-digit number (the Close Seal number for this opening).
Note
An audit record is recorded each time a key is inserted for opening and closing operations.
Caution
Many times the error code for 0b is mistaken as a 06 error code. Examine the display closely to determine if the error
code is the number 06, where the number 6 has a flag at the top that differentiates it from the letter b.
Note
In Gen2, error codes are expanded from 2 digits to to 4 digits. The legacy error codes have leading zeros in the error history, and
are indicated with the same lightning bolt error indication as in Gen1.
06 <beep>
06 <beep>
06<beep>
06 <beep> etc.
New error codes, will show the modified lightning bolt indication. Example of error
9003:
90 <beep>
03 <beep>
90 <beep>
03 <beep>
90 <beep>
03 <beep>
90 <beep>
03 <beep> etc.
Error
Error Notes
Code
03 Key/Mode The wrong key type has been presented for the mode(s) in which the lock is active.
Mismatch
05 Dual Combination When asked for a dual combination entry, the same combination and key were used for
Access Error the 2nd entry as for the 1st.
06 Wrong Key Type The wrong key type has been presented. Make sure to use the appropriate key type for
the appropriate function. Have the Supervisor display the user key information at the PC
system to check the key serial number, user ID, customer # and company #. Possible
bad key contact.
0d User Out of Time The user is attempting to access the lock at a time that does not fall within the defined
Window lock access time on the key. Have the Supervisor display the the user key information at
the PC system to check the Window Opening Information, thus verifying when the user is
able to access the lock.
Incorrect User ID
A call was dispatched for the wrong User ID or the wrong user key is being inserted into
the key reader at the lock. Try a different user key if another user is on this call. If that
is not successful, check at the PC to see if the call was dispatched for the correct User.
LCO 5 Failed Lock The combination was entered incorrectly 5 times. The lock has now gone into a "lockout"
Entry Attempts mode. Review the items in the previous section (Lightning Bolt Only) to try and
determine the cause for the failed attempts.
Wait at least 4.5 minutes without powering the lock and then enter a valid combination
and present the appropriate key.
Gen2 Locks
If there is a problem with the battery in the Gen2 lock when a lockout occurs, the lock
must have power for the full timeout period. The display will alternately flash -dL and
LCO to indicate this.
Error
Error Notes
Code
Lock The lock is already active in the mode that you are attempting to activate.
03 Mode
Mismatch
0b Bad An internal error has occurred while trying to reset the processor in the lock. Clear the lightning
Processor bolt error display by pressing * and try the operation again (note that these failures are counted
Reset toward the five entry attempt limit).
If you continue to get the error indicator, contact Kaba Mas Customer Service for assistance at
1(800) 950-4744 .
Lock Read/Write
Error
Error
Code
61 Drill.
63 One mode of the lock is corrupted. Try another and and remove from service. If all modes give 63 Drill. If
powers up 63 then Drill.
67 One mode of the lock is corrupted. Try another mode and remove from service. If all modes give 67 drill.
If powers up 67 then Drill.
69 Eprom Bank User Read (Lock could not read the key to memory).
6A Eprom Bank User Write (Lock could not write the opening into memory).
6b Occurs with older model of lock. User key-different key closing lock than which opened the lock. Some are
key specific some are mode specific.
6C One mode of the lock is corrupted. If all modes give 6C drill. Try another mode once opened remove from
service. If powers up 6C then Drill.
6d One mode of the lock is corrupted. If all modes give 6C drill. Try another mode once opened remove from
service. If powers up 6C then Drill.
Key Read/Write
Error
Error
Code
73 Bad time in the key. Verify audit, lock will be one ahead. Close and issue new combo to that key for that
lock and have the tech open and get close. It will correct the time in the key.
74 Bad key Contact, Try again and if the error still appears clean key and key reader.
76 Only while supershelving, shelving or activating. Is like a 7F for a supershelve/SA key. Use supershelve key
again within 6 seconds and finish.
Gen2 Codes
9003 Time windows user denied access due to clock failed/reset condition.
Command Function
# 0 Perform administrative operations. (audit download, resync, clock set, bank user table download, etc.)
# 6 Reserved.
# 9 Reserved.
# 72 Gen 2: Display the local date and time according to user key’s mode
# 73 Gen 2: Display key type and key serial number for the key presented.
# 76 Gen 2: Display software level the mode was activated with by user key.
# 77 Gen 2: Display internal UTC/GMT key time on DS1994 FLM and Route and DS1427 Bank keys
Enter Combination
Enter Combination 2
End OPeration
Initializing
Open right
SheLving
Multi-Lock Route
1. INITIALIZE SA KEY AT PC
2. TAKE SA KEY TO LOCK
3. RETRIEVE AUDIT DATA WITH SA KEY
4. RETURN SA KEY TO PC TO READ AUDIT INFORMATION
Part I:
Activate the lock at the PC
PART II:
ACTIVATE LOCK AT LOCK
PART III:
Close the call at the PC
Alternate method:
Part I:
Activate the lock at the PC
PART II:
ACTIVATE LOCK AT LOCK
PART III:
CLOSE SERVICE CALL AT PC
Alternate method:
Part I:
Activate the Lock at the PC
Part II:
Activate Lock at Lock
Part I:
Activate the lock at the PC
Personnel: Logon User authorized to activate Route locks and dispatch FLM calls
Required items: SA Key
Note: This section would be done by another company if another company has activated the lock in FLM mode.
Part II:
Activate the Lock at the Lock
Part III:
Close the Calls at the PC
Note: This section would be done by another company if another company has activated the lock in FLM mode.
Part I:
Activate the lock at the PC
Personnel: Logon User authorized to activate FLM locks and dispatch Route Calls
Required items: SA Key
Note: This section would be done by another company if another company has activated the lock in Route mode.
Part II:
Activate the Lock at the Lock
Part III:
Close the Calls at the PC
Note: This section would be done by another company if another company has activated the lock in Route mode.
Part I:
Issue Service Call Combination
- OR -
PART II:
Complete Service Call at the Lock
OR
Part III:
Close the Service Call at the PC
- Or -
Part I:
Issue Route Combinations
Part II:
Use combinations on Route
Note
Repeat the above process for each lock visit identified in the route.
Part III:
Close Route at the PC
Note
Each route lock visit can be closed as completed or the entire route can be closed with the key once the route is completed.
- OR -
Part I:
Retrieve Audit From Lock
Part II:
Report on Audit Download
Part I:
Shelve Lock at the PC
Part II:
Shelve Lock at Lock
7. DO NOT CLOSE DOOR. Turn the dial CCW to extend the bolt until is displayed.
8. Enter the factory mode combination. ISA is displayed.
9. Insert and hold the SA key in the key reader until POC is displayed.
10. Pull out the change key. OPR is displayed.
11. Turn the dial CW to retract the bolt.
12. Close the door.
13. Turn the dial CCW to extend the bolt until IPI is displayed.
14. Insert and hold F or R key in the key reader until a close seal is displayed.
15. Record the close seal.
16. Report the close seal to the dispatcher.
17. Return the SA key to the dispatcher to verify shelving..
Part III:
Close the Service Call
- OR -
Part IV:
Shelve Verification
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) is displayed.
2. EC → Enter combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key in the Bank
User's combination. IPI (Insert Personal Identifier) will be displayed.
3. IPI → Insert Personal Identifier Key → OPr
Insert the User's Personal Identifier B Key into the key reader. OPr (Open right) will be displayed.
4. OPr → Retract bolt and Open the Door
Turn the Dial to the right (CW) to open the lock.
5. Insert change key and Extend the Bolt
Insert the change key into the change key socket. Extend bolt but do not close door.
6. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) is displayed.
7. EC → Enter Default Combination → ISA
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, Enter the default
factory combination of 50-25-50. ISA, (Insert Supervisor Audit Key) will be displayed.
8. ISA → Insert and Hold SA Key → Add
Insert and hold the SA key in the key reader on the side of the lock. The lock will display Add (Adding Users) while the
information is being processed.
9. Add → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
10. POC → Remove SA Key and Pull Out Change Key → OPr
Remove the SA key and the change Key. OPr (OPen right) will be displayed.
11. OPr → Retract Bolt and Close the Door
Turn the dial to the right (CW) to retract the bolt. Adding Users is now complete for the Users that were programmed into the SA
key. Close the door.
12. Extend Bolt → IPI
Extend the bolt by turning the dial to the left (CCW). IPI (Insert Personal Identifier) will be displayed.
13. IPI → Insert Personal Identifier Key → EOP
Insert the User's Personal Identifier B Key into the key reader again. The lock will confirm the closure by writing the date and
time of the close into the B key and displaying EOP (End of Operation).
Note
After adding a User you may need to change the combinations for the User that was added. For Gen1 locks, Bank User
combinations are initially set to the default combination of 50-25-50 and will not open the lock until changed to a valid new
combination. However, with Gen2 locks, it is possible to have a unique combination set to a bank user from the software, and
optionally force the user to change the combination or allow the user to open the lock with this combination.
1. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) is displayed.
2. EC → Enter Combination → IPI
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, key in the first Bank
User's combination. IPI (Insert Personal Identifier) will be displayed.
3. IPI → Insert Personal Identifier Key → OPr
Insert the User’s Personal Identifier B Key into the key reader. IPI (Insert Personal Identifier) will be displayed.
4. OPr → Retract Bolt
Turn the dial to the right (CW) to retract the bolt.
5. Open Door
6. Insert change key and Extend the Bolt
Insert the change key into the change key socket. Extend bolt but do not close door.
7. Power Lock → EC
Turn the dial to the left (CCW) until EC (Enter Combination) is displayed.
8. EC → Enter Default Combination → ISA
If operating a Cencon Vertical lock, position the lip of the dial to cover the red bar. When EC is displayed, Enter the default
factory combination of 50-25-50. ISA, (Insert Supervisor Audit Key) will be displayed.
9. ISA → Insert and Hold SA Key → dEL
Insert and hold the SA key in the key reader on the side of the lock. The lock will display dEL (Deleting Users) while the
information is being processed.
10. dEL → POC
Continue to hold the SA Key in the reader until POC (Pull Out Change Key) is displayed.
11. POC → Remove SA Key and Pull Out Change Key → OPr
Remove the SA key and the change Key. OPr (OPen right) will be displayed.
12. OPr → Retract Bolt and Close the Door
Turn the dial to the right (CW) to retract the bolt. Adding Users is now complete for the Users that were programmed into the SA
key. Close the door.
13. Extend Bolt → IPI
Extend the bolt by turning the dial to the left (CCW). IPI (Insert Personal Identifier) will be displayed.
14. IPI → Insert Personal Identifier Key → EOP
Insert the User's Personal Identifier B Key into the key reader again. The lock will confirm the closure by writing the date and
time of the close into the B key and displaying EOP (End of Operation).
1. Power the lock by turning the dial to the left (counter clock wise) until EC is displayed.
2. Enter the # 1 keypad command.
The lock displays a string of characters on the LCD, displaying three characters at a time.
The lock code and hardware levels are displayed in a easily readable manner (for example, “LL-“, “G 2”, “002”, “000”, “000”, “789”, “HL-
“, “ 01”, “ 01” where Gen 2 firmware version 2.000.000789 is indicated.)
The lock displays a string of characters on the LCD, displaying two characters at a time.
Example
LL 4C 38 54 35 39 42
HL 00 02
The LL displayed in the character string stands for Lock Level while the HL stands for Hardware Level. The numbers following the
LL indicator are the hexadecimal representations of the ASCII codes for numbers and letters as we know them. These numbers
and letters can be decoded using the following table. Each pair of characters represents 1 letter or number. For instance "4C"
represents the letter "L" in our alphabet.
30 0 41 A 4E N
31 1 42 B 4F O
32 2 43 C 50 P
33 3 44 D 51 Q
34 4 45 E 52 R
35 5 46 F 53 S
36 6 47 G 54 T
37 7 48 H 55 U
38 8 49 I 56 V
39 9 4A J 57 W
4B K 58 X
4C L 59 Y
4D M 5A Z
The numbers following the HL indicator do not have to be decoded. It is simply a numerical representation as we know it.
The length of the display string will vary depending on which lock model you have. The best thing to do in analyzing the lock level is to
write down the entire string and then pick out the portions of it that are significant to you, or if you are experiencing a problem with the
lock, report the entire string to the Tech Support group.
The Lock Level string will consist of either 6 or 7 pair of characters and the Hardware Level will consist of 2 pair of characters. When
decoded, the Lock Level will be either a 6 or 7 character representation and the Hardware Level will be 2 characters.
The most relevant characters when analyzing the string displayed are the last three sets of characters displayed before the letters HL.
In the previous example, the three sets of characters are "35 39 42". These are decoded to indicate the Lock Code Level and Version
is 59B.
Example
LL 4C 38 54 36 36 42
HL 00 02
This indicates a Lock Code Level of 66, Version B.
The customer will be notified of the number of days left until Cencon expiration via the Cencon window title. For example
When Cencon is within 60 days of the expiration date, popup messages will be issued when the user logs into Cencon. For example
When Cencon has reached the expiration date the Cencon window title will state that the beta has expired. For example
When Cencon has reached the expiration date Cencon logon will be prohibited. When the user attempts to logon to Cencon a popup
message will be issued. For example
In future Beta releases the customer will be provided with the ability to reset the Cencon expiration date as well as the date on which
the warnings begin with help from Kaba Mas Technical Support.
Route
This is a series of route locks that have been dispatched as a group. This is generally used to allow Route Service Personnel to
get the combinations for all the locks on a route prior to leaving. See section 3.1.3 Route Report.
Route Table
This is the database table used by the Cencon system to store a record of the different defined routes. This table defines what
routes have been created. See section 3.1.3 Route Report.
Route Lock Table
This is the database table used by the Cencon system to store what locks are on each route. See section 3.1.3.1 Route Lock
Listing Report.
Route Service Personnel (RSP)
Those personnel who will be accessing specified ATM's on a given route, usually to replenish currency. They can have
combinations issued for multiple locks at one time. Route personnel can also be dispatched by the Dispatcher on a one time
basis to perform service at an Lock.
Shelved Mode
This is the default mode of a Cencon lock when it is shipped from the factory. It is also the mode that a Cencon lock is put in
when it is not actively being used; i.e., "shelved from service".
S Key
The black Supervisor Personal Identifier Key that is used by the Supervisor to access the certain menus of the Cencon program.
SA Key
The red Supervisor Audit key which is initialized at the PC with information needed to activate or shelve locks. It is also used to
retrieve audit records, Add and Delete Bank mode users, download a Bank Mode User Table, etc.
Single User Access Mode
A setting in the lock activation process that causes the lock to require only one user to open the lock.
Smart Key
This is a Dallas Semiconductor electronic chip imbedded in a fob.
Smart Key Reader
This is the key reader that is attached to the PC as a peripheral item. It is used to write and read data to and from, respectively,
the Smart Keys.
Special Supervisor
A type of Cencon logon key, that allows access to special supervisor level functions. This is the highest level of authorization for
a Cencon logon key. This is controlled by the authorizations defined for access to different functions. See section 3.6 Define
Function Authorization Levels.
SS Key
The black Special Supervisor Personal Identifier Key that is used by the Special Supervisor to access all menus in the Cencon
program.
Supervisor
A type of Cencon logon key, that allows access to supervisor level functions. This is controlled by the authorizations defined for
access to different functions. See section 3.6 User Authorization.
Two Person Integrity ( TPI )
When a lock is activated in FLM, Route, or Bank mode with the Dual Access requirement, two individuals, each with their own
combination and their own Smart Key, would be required to open the lock.
User ID Table
This is the database table used to store the users defined for the Cencon system. This contains information for FLM and RSP
keys for access to locks, as well as information on Dispatcher, Supervisor, and Special Supervisor keys for logging onto Cencon.
User ID History Log Table
This is the database table used to store information on previous users assigned to keys for the Cencon system. This table is
used to look up information on users from lock audit reports where that user may have been deleted from the system, or the key
user ID may have been renamed for assignment to another user.
UTC
An abbreviation for Coordinated Universal Time. This is the zero line for all time zones. Each time zone is offset from the zero
line by a specific number of hours. The number of hours to be used for offset correlates to the number of time zones that you
are away from the zero line. With the induction of daylight savings time, this offset decreases by one hour. Also known as
"GMT" (Greenwich Mean Time.)
6. Return SA key
A lock's default mode is Shelved Mode. A lock must be activated before it can become a functional security device. The lock must first
be activated at the PC. The activation process at the PC includes identification of users who will have access to the lock and
preparation of the SA key used to transfer the activation information to the lock. This activity is usually performed by the Bank
Supervisor. The Bank Supervisor (or equivalent personnel) must then take the SA Key and Change Key to the lock being activated. The
lock can be opened at this time using the factory or "shelved" combination of 50-25-50. During the activation process, the ATM/Lock
door is left open while the lock bolt is moved to the closed position. The Bank Supervisor then activates the lock using the Change Key
and the Supervisor Audit Key initialized to activate this lock. Once the lock activation is complete, you must change the combination for
a minimum of one user who was authorized for access to the lock. When the user combination has been changed and tested, the ATM
door and the lock bolt can be closed and the new user's Bank Key is used to confirm the closing and complete the lock operation.
If a Lock Collection Listing report is open, Cencon asks if you want to add the selected lock or locks to the open collection lock
list. If you click on Yes, the selection is automatically added to the open collection.
If a Lock Collection Listing report is not open (or if you select to not add the selection to the open collection lock list), the following
form is displayed:
To add the selected locks to a collection, click on a collection name to select it and press Add Locks. The dialog also allows for the
creation of a new collection and the display of the locks in an existing collection.
5. Select an appropriate user(s) and user dispatch mode (the user who will open the lock to perform the update)
6. Modify the Time and Region values if necessary.
7. Insert a red SA key into the Key Reader.
8. Click on a lock to view its details before processing.
9. Click on Update Gen 2 Lock Status and Write Update Activate Lock Key.
10. A success message is displayed and the user combinations are presented in the dialog.
11. The SA Key is now ready to be taken to the lock(s) for reactivation.
(See 4.2.21 Update Activate of Gen 2 Lock Activated as Gen 1 Lock for actions to perform at a Gen 2 lock.)
(See 4.3.21 Update Activate of Gen 2 Lock Activated as Gen 1 Lock for actions to perform at a Gen 2 Swing Bolt lock.)
Once the Update Activation has been completed, the lock close seal(s) must be reported to the PC System to verify the process.
Note
If the SA key is lost or needs to be regenerated:
Delete the lock's entry from the lock table (Force Delete of Unshelved Lock from the lock report).
Open the Lock History Report and Restore the lock's original record.
Start again with step #1 above.