CHANG SHIN INFOTEL WKEY-2000 WIRELESS IDENTIFICATION KEY SYSTEM WITH ZIGBEE User Manual User s manual

CHANG SHIN INFOTEL CO.,LTD WIRELESS IDENTIFICATION KEY SYSTEM WITH ZIGBEE User s manual

User Manual

W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 1   WKEY-2000 Users’ Manual
W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 2 Contents 1. Product overview    …………………………………………………………………………………….3 2. Product mix    ……………………………………………………………………………………………4 3. How to use WKey-2000    …………………………………………………………………………..5 4. System configuration    ………………………………………………………………………………7 5. WKey-2000 Specifications    ………………………………………………………………………..8
W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 3  1. Product overview  WKey-2000 is a wireless authentication key that you wirelessly communicate with each other in 2.4GHz. It is used as a key of access control systems as the product which satisfies users’ convenience  and  security.  As it  doesn’t  require users’  authentication  behaviors  like  RF-ID  or finer  scan,  but  is  automatically  authenticated,  it  is  the  next  generation  access  device  that convenience was drastically improved.     The external appearance of WKey-2000 made by CSINFOTEL is as follow:   [Figure 1] WKey-2000
W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 4  2. Product mix  WKey-2000 consists of the following products: - A finished product of WKey-2000 - Three coin batteries are included.  Please see [Figure 2].   [Figure 2] WKey-2000
W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 5  3. How to use WKey-2000   [Figure 3] WKey-2000 WKey-2000’s composition is shown in [Figure 4].   Three coin batteries are used in Wkey-2000 of this company. You can use it for about a week when you operate Power On (Sleep Mode, Interval Time 5sec). How to use the user button and status LED is as follow: You can  select  use  by  using  the Button. And if you  press the  Button for more than three seconds, Red LED  can  change  the operational  status  of  WKey-2000.  If  Red  LED  flickers  twice,  the power is switched on and Green LED flickers by the set cycle (Default 5 sec.). At this moment, you can use the wireless access authentication function.
W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 6 If you again press the Button for more than three seconds while the power is switched on, Red  LED  flickers  once  and  the  power  is  switched  off.  When  the  power  is  switched  off,  the wireless  access  authentication  function  cannot  be  used  and  battery  consumption  can remarkably be reduced.   Therefore, it is recommended to use the product by turning off the  power  in  advance  in places that access authentication is not required.
W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 7  4. System configuration                                         [Figure 3] WKey-2000’s system configuration WKey-2000’s system configuration is shown in [Figure 3]. WKey-2000 wirelessly communicates with SG-7000. And SG-7000 communicates with it by using Manager/Server and Ethernet.   For the contents related to SG-7000 and Manager/Server, please see each manual.
W-KEY Users’ Manual                                          http://www.csinfotel.com/  PAGE 8  5. WKey-2000 specifications  Item  Specifications MCU  16 bit Microprocessor RF communication band  2.4GHz ~ 2.4835 GHz Data-rate  250Kbps IEEE Standard  802.15.4 2003 Battery  LITHIUM Battery(CR2032) x 3 / 3Vdc, 0.3A Workable temperature  -20℃  ~ 50℃  15.21 You are cautioned that changes or modifications not expressly approved  by the part responsible for compliance could void the user’s authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:  1) this device may not cause interference and  2) this device must accept any interference, including interference that may  cause undesired operation of the device.   15.105(b) This equipment has been tested and found to comply with the limits for  a Class B digital device, pursuant to part 15 of the FCC rules. These limits are designed  to provide reasonable protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and,  if not installed and used in accordance with the instructions, may cause harmful interference  to radio communications. However, there is no guarantee that interference will not occur in  a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try  to correct the interference by one or more of the following measures:    • Reorient or relocate the receiving antenna.  • Increase the separation between the equipment and receiver.  • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. IMPORTANT!!

Navigation menu