Supra KeyAdvantage User Manual

KeyAdvantage System
User Manual
This page was intentionally left blank.
Copyright © 2012 United Technologies Corporation. All rights reserved.
Document number/revision: 10092796P1-07 REV D (October 2015).
Disclaimer The information in this document is subject to change without notice. United Technologies
disclaims any liabilities, losses, or risks, personal or otherwise, incurred as a consequence, directly or indirectly, of the use or application of any of the contents of this document. For the latest documentation, contact Supra or visit us online at www.keyadvantage.com.
This publication may contain examples of screen captures and reports used in daily operations.
Examples may include ctitious names of individuals and companies. Any similarity to names and
address of actual businesses or persons is entirely coincidental.
Trademarks and
patents
Supra is a registered trademark of United Technologies Corporation.
Other trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products.
i
Software License
Agreement
Important: This end-user license agreement (“Agreement”) is a legal agreement between
UTC Fire & Security and You. Read the following terms and conditions carefully before installing or using this Software. This agreement provides a license from UTC Fire & Security to use the Software. It also contains warranty information, disclaimers, and liability limitations. Installing and/
or using the Software conrms Your agreement to be bound by these terms and conditions. If
You do not agree with these terms and conditions, do not install or use the Software or, if already installed, immediately cease all use of the Software and promptly uninstall all components of the Software.
1. Denitions. The following denitions apply to this document:
a. “UTC Fire & Security”, with respect to title to or warranty of the Software, means
UTC Fire & Security Americas Corporation, Inc., a Connecticut corporation.
b. “Software” means the executable software or rmware programs and accompanying
documentation installed on the UTC Fire & Security products, plus any upgrades, modied
versions, updates, additions, and copies of the software furnished to Customer during the term of the license granted herein.
c. “Documentation” means all associated media, printed materials, and electronic
documentation accompanying the Software.
d. “Licensed Product” means the Software and Documentation.
e. “Customer” means the person or organization, or parent or subsidiary thereof, who uses
the Software for its intended purposes, and excludes distributors, authorized resellers, value-added resellers and original equipment manufacturers. Customer may be referred to as You or Your, whether an individual or a business entity of any kinds.
f. “Machine” means the computer, workstation, terminal, or other hardware product on which
the Software is installed.
2. License. All rights to and in the Licensed Product, including, but not limited to, copyrights, patents, trademarks, and trade secrets, belong to UTC Fire & Security, and UTC Fire & Security retains title to each copy of the Software. You agree that UTC Fire & Security at any time, upon reasonable notice, may audit Your use of the Software for compliance with the terms and conditions of this Agreement. Subject to the terms and conditions of this Agreement, UTC Fire & Security grants You a nonexclusive license to use the Software, but only in the country where acquired, provided that You agree to the following:
You may:
a. install and use the Software on a single Machine at one time, unless You have purchased
additional copies of the Software, in which case You may install the software on the number of Machines for which You have purchased copies of the Software;
b. use the original copy of the Software provided to You for backup purposes.
ii
You may not:
a. transfer or distribute the Licensed Product to others, in electronic format or otherwise, and
this Agreement shall automatically terminate in the event of such a transfer or distribution;
b. use the Software over a computer network;
c. sell, rent, lease, or sublicense the Software;
d. copy or modify the Licensed Product for any purpose, including for backup purposes.
3. Term. This Agreement is effective until terminated. You may terminate this Agreement by uninstalling all components of the Software from all Machines and returning the Software to UTC Fire & Security. UTC Fire & Security may terminate this Agreement if You breach any of these terms and conditions. Upon termination of this Agreement for any reason, You agree to uninstall all components of the Software and return the Licensed Product to UTC Fire & Security. All provisions of this Agreement relating to (i) disclaimer of warranties; (ii) limitations on liability, remedies, and damages; and (iii) UTC Fire & Security’s proprietary rights, shall survive termination of this Agreement.
4. Object code. The Software is delivered in object code only. You may not alter, merge, modify, adapt, or translate the Software, nor decompile, disassemble, reverse-engineer, or otherwise reduce the Software to a human-perceivable form, nor create derivative works or programs based on the Software.
5. Limited warranty. UTC Fire & Security warrants that for one (1) year from the date of delivery of
the Licensed Product (Software Warranty Period), the functions contained in the Software will be t
for their intended purpose as described in the applicable Documentation from UTC Fire & Security,
and will conform in all material respects to the specications stated in such Documentation.
UTC Fire & Security does not warrant that the operation of the Software will be uninterrupted or error-free. UTC Fire & Security does warrant that the media on which the Software is furnished will be free from defects in materials and workmanship under normal use for a period of thirty
(30) days from the date of delivery (Media Warranty Period). Except as specically provided
therein, any other software and any hardware furnished with or accompanying the Software is not warranted by UTC Fire & Security.
Your exclusive remedy under this limited warranty for nonconforming Software shall be repair or replacement of the Software, at the sole discretion of UTC Fire & Security. To obtain a repair or replacement of nonconforming Software, contact UTC Fire & Security Customer Service toll-free at 1-866-259-8077 or online at www.keyadvantage.com during the Software warranty period.
Except as expressly provided above, the licensed product is provided “as is” without warranty of any kind, either expressed or implied, including, but not limited to, implied warranties of
merchantability or tness for a particular purpose and, except as expressly provided above, You
assume the entire risk as to the quality and performance of the licensed product.
6. Limitation of liability. UTC Fire & Security’s sole obligation or liability under this agreement is the repair or replacement of nonconforming software and/or defective media according to the limited warranty above. In no event will UTC Fire & Security be liable for damages, whether
consequential, incidental, or indirect, nor for loss of data, loss of prots, or lost savings, arising
from use or inability to use the software or documentation (or any hardware furnished with the software), even if UTC Fire & Security has been advised of the possibility of such damages, nor for any claim by any third party.
7. General. Any materials provided to You by UTC Fire & Security shall not be exported or reexported in violation of any export provisions of the USA or any other applicable jurisdiction. Any attempt to sublicense, assign, or transfer any of the rights, duties, or obligations hereunder shall be void. This Agreement shall be governed by and interpreted under the laws of the State of New
York, United States of America, without regard to conicts of law provisions. You hereby consent
to the exclusive jurisdiction of the state and federal courts located in Multnomah County, Oregon, to resolve any disputes arising under or in connection with this Agreement, with venue in Portland, Oregon.
8. Restricted rights legend. The Licensed Product is provided with RESTRICTED RIGHTS. In the event the United States Government or an agency thereof is granted a license, the
following additional terms apply: Restricted Computer Software, as dened in the Commercial
Computer Software–Restricted Rights clause at Federal Acquisition Regulations 52.227-19, and the restrictions as provided in subparagraphs (c)(1) and (c)(2) thereof; and as applicable, the Government’s rights to use, modify, reproduce, release, perform, display, or disclose the Software also are restricted as provided by paragraphs (b)(2) and (b)(3) of the Rights in Noncommercial Technical Data and Computer Software–Small Business Innovative Research (SBIR) Program clause at DFARS 252.227-7018.
9. Acknowledgment. You acknowledge that You have read and understand this agreement and agree to be bound by its terms. You further agree that this agreement is the complete and exclusive statement of the agreement between You and UTC Fire & Security, and supersedes any proposal or prior agreement, oral or written, and any other communication relating to the subject matter of this agreement.
Intended use Use this product only for the purpose it was designed for. For the latest product information,
contact Supra or visit us online at www.keyadvantage.com.
FCC Compliance This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
Changes or modications not expressly approved by the party responsible for compliance could
void the user’s authority to operate the equipment.
EMC Directive The European Union directive on electromagnetic compatibility (2004/108/EC) requires non-
European manufacturers to designate an authorized representative in the Community.
Our European representative is UTC Fire & Security B.V., Kelvinstraat 7, 6003 DH Weert, Nederland.
The European directive Waste Electrical and Electronic Equipment (WEEE) aims to minimize the impact of electrical and electronic equipment waste on the environment and human health. For proper treatment, recovery, and recycling, return the equipment marked with this symbol to your local supplier upon the purchase of equivalent new equipment, or dispose of it in designated collection points.
Regulatory
iii
Table of Contents
Chapter 1. Introduction ....................................................................................2
iv
Preface ................................................................................................................................ 1
Safety terms and symbols ............................................................................................ 1
KeyAdvantage Overview .................................................................................................. 2
KeyAdvantage System Controls ...................................................................................... 3
Software Controls ......................................................................................................... 3
KeyPad Controls ........................................................................................................... 3
KeyBox Controls ........................................................................................................... 5
The KeyPad ........................................................................................................................ 6
Physical Characteristics ................................................................................................ 6
KeyPad User Interface .................................................................................................. 7
KeyPad Navigation ....................................................................................................... 7
Audio Feedback ............................................................................................................ 8
Visual Feedback ........................................................................................................... 8
User Operations ............................................................................................................ 8
Programming the KeyPad........................................................................................... 11
The KeyBox ...................................................................................................................... 13
Physical Characteristics .............................................................................................. 13
Programming the KeyBox ........................................................................................... 14
User Operations .......................................................................................................... 15
The KeyTag ....................................................................................................................... 18
Physical Characteristics .............................................................................................. 18
KeyTag Programming ................................................................................................. 18
The KeyCaddy .................................................................................................................. 19
The Programming Base ................................................................................................... 20
Physical Characteristics .............................................................................................. 20
Visual Feedback—LEDs ............................................................................................. 20
User Operations .......................................................................................................... 21
Software Overview ........................................................................................................... 22
System Users ............................................................................................................. 22
User and Product Status............................................................................................. 24
Importing KeyAdvantage Inventory Files .................................................................... 25
Entering Vehicle Information ....................................................................................... 25
Assigning KeyTags ..................................................................................................... 26
Maintaining the KeyAdvantage Database................................................................... 26
System Conguration ................................................................................................. 26
KeyAdvantage Reports ............................................................................................... 27
Assignment Reports ................................................................................................... 28
Reconciliation Reports ................................................................................................ 28
Inventory Reports ....................................................................................................... 28
Conguration Reports ................................................................................................. 29
History Reports ........................................................................................................... 29
Scheduling Reports .................................................................................................... 30
v
Chapter 2. Getting Started .............................................................................32
Logging on to KeyAdvantage ......................................................................................... 32
KeyAdvantage Software Toolbars ..................................................................................33
Importing KeyAdvantage Inventory ...............................................................................34
Creating Key Holder Groups ...........................................................................................34
Creating Users and Key Holders .................................................................................... 35
Assigning Key Holders to Groups .................................................................................38
Assigning KeyPads to Key Holders ............................................................................... 39
Viewing Change History ..................................................................................................40
Entering Vehicle Information ..........................................................................................41
Importing Vehicle Information ........................................................................................42
Assigning KeyTags to Vehicles ...................................................................................... 43
Unassigning KeyTags from Vehicles .............................................................................44
Chapter 3. Using KeyPads and KeyBoxes ...................................................46
Checking Out KeyPads ...................................................................................................46
Checking In KeyPads ......................................................................................................47
Modifying KeyPads .......................................................................................................... 47
Diagnosing KeyPads .......................................................................................................48
Flashing KeyPads ............................................................................................................ 51
Importing rmware ...................................................................................................... 51
Flashing KeyPads ....................................................................................................... 51
Modifying KeyBoxes ........................................................................................................52
Programming KeyBoxes .................................................................................................53
Reading KeyBoxes ..........................................................................................................53
Diagnosing KeyBoxes ..................................................................................................... 54
Chapter 4. Reports ..........................................................................................58
Scheduling Reports for Automatic Distribution ...........................................................58
Chapter 5. Database Maintenance .................................................................60
Backing Up KeyAdvantage Data ....................................................................................60
Archiving KeyAdvantage Data ........................................................................................61
Unarchiving KeyAdvantage Data ...................................................................................62
Purging Vehicle Inventory Data ......................................................................................63
Restoring the Entire Database ........................................................................................64
Appendix A. Troubleshooting ...........................................................................66
Device Programming Errors ...........................................................................................66
Device Diagnostics .......................................................................................................... 66
KeyBox-KeyPad Connection Errors ...............................................................................66
KeyAdvantage Software Error Messages ...................................................................... 67
KeyPad Troubleshooting .................................................................................................67
KeyPad Error Messages .................................................................................................. 68
Appendix B. Contacting Us ...............................................................................70
Preface
Preface
This manual includes an overview of KeyAdvantage products, and detailed instructions explaining:
how to log on to KeyAdvantage;
how to create and assign users, key holders, and key holder groups; and
how to use KeyPads, KeyBoxes, and KeyAdvantage data.
There is also information describing how to contact technical support if you have questions or concerns.
To use this document effectively, you should have the following minimum qualications:
a basic knowledge of the MS Windows operating system; and
a basic knowledge of vehicle information data tracking.
Read these instructions and all other documentation entirely before installing or operating this product. The most current versions of this and related documentation may be found on our website.
The following conventions are used in this document:
Bold Menu items and buttons.
Italic Emphasis of an instruction or point; special terms.
File names, path names, windows, panes, tabs, elds, variables, and other GUI elements.
Titles of books and various documents.
Blue italic (Electronic version.) Hyperlinks to cross-references, related topics, and URL addresses.
Monospace
Text that displays on the computer screen.
Programming or coding sequences
1
Safety terms and symbols
These terms may appear in this manual:
CAUTION: Cautions identify conditions or practices that may result in damage to the equipment or other property.
WARNING: Warnings identify conditions or practices that could result in equipment damage or serious personal injury.
Chapter 1. Introduction
The KeyAdvantage System is an electronic KeyBox system designed to give auto dealerships better control over access to vehicle keys.
The KeyAdvantage system consists of:
Electronic KeyPads, which are checked out by key holders.
Electronic KeyBoxes, which are assigned to dealerships and
departments.
Electronic KeyTags, which are assigned to specic vehicles.
KeyAdvantage software, used to track activity, assign inventory, and
create user permissions.
A programming base, which connects KeyAdvantage inventory to the KeyAdvantage software.
They KeyAdvantage system can be congured one of two ways:
Assign KeyPads to specic key holders: KeyPads are assigned to specic key holders in the KeyAdvantage software. Key holders can
only check out KeyPads that are assigned to them. Any number of KeyPads can be assigned to a key holder, but a KeyPad can only be assigned to one key holder at a time.
Allow key holders to check out any KeyPad: Key holders can check out any KeyPad that is not already checked out. The key holder’s information is stored in the KeyPad only for the duration of the key holder’s shift. You can limit the number of KeyPads a key holder is allowed to check out.
Chapter 1
Introduction
2
KeyAdvantage Overview
At the beginning of their shift, each salesperson checks out a KeyPad at the KeyAdvantage computer. Checking out a KeyPad activates it and programs the key holder’s PIN code and permissions into the KeyPad. In order to check out a KeyPad, the key holder must be set as Active in the KeyAdvantage software and within the set access hours.
If your system is congured to require purpose codes, key holders are required
to choose a description of why they are accessing the vehicles keys when they access a KeyBox. Reports can be generated showing who accessed vehicle keys and for what purpose.
Key holders access KeyBoxes by entering their PIN, selecting a purpose code, and touching the KeyPad to the KeyBox. They can then open the KeyBox and remove the vehicle keys. Both the KeyPad and KeyBox record who accessed the vehicle keys, and the date and time of the access.
Before leaving the vehicle, the key holder returns the vehicle keys to the KeyBox and closes it. The KeyPad can also be used to read the KeyBox and instantly display who last took the vehicle key.
The key holder carries the KeyPad throughout his shift. At the end of the shift, the key holder checks in the KeyPad, and the activity for that day is downloaded into the KeyAdvantage software.
3
KeyAdvantage User Manual
KeyAdvantage System Controls
The KeyAdvantage system has a number of integrated security features. Some system controls, such as tracking
parameters, are built into the system and are not optional. Others, such as purpose codes, can be congured
based on your company’s security needs.
Software Controls
The KeyAdvantage system utilizes user permissions to control access to the software.
There are two types of system users: those who only need access to the KeyAdvantage software in order to check in and out their KeyPad, and those who need access to the software in order to administer the system.
The KeyAdvantage system has built-in classications for a wide range of user permissions, based on the
requirements of each person:
Key holders can be set up with varying degrees of KeyBox access based on which dealerships and departments that they need to access.
There are ve preset administrative proles. See “Preface” on page 23 for more detailed information about user proles and permissions.
The status of any KeyAdvantage user can be changed to disallow them from using the system. Only users with a status of Active can check out KeyPads or log into the KeyAdvantage software. Users with an Inactive status cannot access the system.
KeyPad Controls
KeyAdvantage KeyPad controls include the use of PIN codes, KeyPad expiration, KeyBox access limits, bad PIN code lockout, KeyBox access tracking, audit trails, and purpose codes.
PIN Code
The most basic security feature of the KeyPad is the PIN code. Accessing the vehicle keys requires the valid PIN code for the user assigned to the KeyPad be entered.
If a KeyPad is lost or stolen, the KeyPad cannot access vehicle keys without the use of the PIN code.
If ve consecutive incorrect PIN codes are entered into the KeyPad, the KeyPad shuts down for 10
minutes.
The PIN code is a 4-digit number. There are 10,000 possible combinations of four digits.
KeyPad Expiration
KeyPads can only be used to access KeyBoxes when checked out by a key holder. The KeyPad then expires at the end of the key holder’s shift.
If a KeyPad is not updated or is not checked out, it displays KEY EXPIRED CHECK OUT KEY when it is powered on. The user must
check out the KeyPad using the programming base or manually update the KeyPad to use it to access KeyBoxes.
KeyBox Access Limit
The system administrator can limit the number of KeyBoxes a user’s KeyPad can access during the key holder’s shift by dening the
maximum number when creating the key holder record.
Chapter 1
Introduction
Bad Code Lockout
The KeyPad keeps track of all incorrect codes entered into the KeyPad. This includes incorrect PIN codes and incorrect update codes. If ve consecutive incorrect codes are entered, the KeyPad times out and
locks up for 10 minutes except to connect to the programming base or to view recent error codes.
If the KeyPad has timed out due to numerous incorrect codes, when the KeyPad is powered on it sounds the problem tone and displays SECURITY LOCKOUT KEY DISABLED.
See “Audio Feedback” on page 9 for more information on the tones used by the KeyPad, and each tone’s meaning.
KeyBox Access Tracking
The KeyPad holds tracking information for a maximum of 500 KeyBox accesses.
When a KeyPad reaches the maximum number of vehicle accesses, the KeyPad does not allow access
to another KeyBox until the access information in the KeyPad is transmitted to KeyAdvantage software.
Checking in the KeyPad clears the tracking information.
Audit Trail
The KeyPad keeps an audit trail of all KeyBoxes and KeyTags it has accessed and, if purpose codes are required, why it accessed them.
The vehicle access audit trail includes the ID and name of the key holder, the KeyBox and KeyTag accessed, the date and time of access, and the purpose code for the access.
Each time the KeyPad is checked in, its access information is automatically downloaded to the KeyAdvantage system software and can be viewed through reports and other software screens. If a KeyPad is not checked in at the end of the key holder’s shift, it is automatically checked in the next time it is checked out.
4
Purpose Codes
A dealership may require that a key holder specify the purpose of accessing the vehicle keys each time the KeyBox is opened. If purpose codes are required, a key holder cannot obtain the vehicle keys until they have selected a purpose code on the KeyPad.
The Night Removal purpose code also allows a KeyPad to open multiple KeyBoxes without having to enter a PIN code each time. This is useful for dealerships that remove the vehicle keys from the KeyBoxes each night.
After the user enters their PIN code to access a KeyBox, if the system requires a purpose code, the rst
purpose code is displayed. The up and down arrow buttons ( ) are used to scroll through the list. The user must press Enter when the desired purpose code is displayed. Scrolling through purpose codes is bidirectional and wraps around.
The KeyPad can contain up to 10 unique purpose codes. The rst seven purpose codes are preset by Supra. The remaining three purpose codes are customer congurable.
The rst 7 purpose codes are:
0—Sales Demo 4—Body Shop
1—Service 5—Aftermarket
2—PDI 6—Overnight
3—Night Removal
Reports can be generated to show why vehicles were accessed.
5
KeyAdvantage User Manual
KeyBox Controls
The KeyAdvantage KeyBox controls include the use of lockout lists, bad code lockout, audit trails, and nightly key removal.
Lockout List
If an active KeyPad is lost or stolen, a KeyBox can be programmed to lock out a KeyPad.
The KeyBox must connect to the KeyAdvantage software through the programming base to have a
KeyPad added to its lockout list.
The lockout list can contain up to 5 KeyPad serial numbers.
The lockout list can be viewed by diagnosing the KeyBox on the programming base.
The KeyPads on the lockout list cannot open the key container on the KeyBox but they can read the
KeyBox.
Bad Code Lockout
The KeyBox tracks invalid entry attempts. If the KeyBox encounters 10 consecutive incorrect access attempts, the KeyBox times out and locks up for 10 minutes.
Audit Trail
The KeyBox keeps an audit trail of KeyPads that have accessed it, and if purpose codes are required, why it was accessed.
The KeyBox access audit trail includes the name of the key holder, the KeyTag accessed, the date and time of access, and the purpose code for the access.
The KeyBox stores the most recent 35 access records. The information can be viewed either by reading the KeyBox with a KeyPad or connecting the KeyBox to the system software using the programming base.
Nightly Key Removal
Nightly key removal is an optional feature for dealerships who wish to take the vehicle keys out of KeyBoxes at the end of the day.
When the Night Removal purpose code is selected, the KeyPad allows the user to access multiple KeyBoxes without reentering the PIN code.
After a successful KeyBox access operation, the KeyPad prompts the user again to point the KeyPad towards a KeyBox to begin communication. The next KeyBox access must occur within 2 minutes or the KeyPad displays NO BOX FOUND and powers down.
After the KeyPads used for nightly key removal are checked in, a Vehicle Key Removal Reconciliation report can be run to see if there are any vehicle keys outstanding.
Chapter 1
Introduction
The KeyPad
The KeyAdvantage KeyPad is an electronic key that is used to access the KeyAdvantage KeyBox. A KeyPad is programmed daily when a user places it on the KeyAdvantage programming base to check it out. During checkout, the KeyPad is programmed with the permissions and access hours assigned to the user in the KeyAdvantage software. These permissions determine which KeyBoxes the KeyPad can open, when KeyBoxes can be opened, and how many can be opened during their shift.
When the KeyPad accesses a KeyBox, the KeyPad records:
Who took the vehicle keys.
Which KeyBox was opened.
Which vehicle keys were taken.
When the vehicle keys were taken.
Why the vehicle keys were taken.
How long a KeyTag was out of the KeyBox.
Physical Characteristics
The KeyPad has an infrared interface on the top of the KeyPad which is used to communicate with the KeyBox and programming base.
The KeyPad has a backlight to easily view the display in outside, evening lighting conditions.
The KeyPad has audible and visual feedback for errors, low batteries, button presses, and function
completion.
The KeyPad uses (2) AAA alkaline batteries as its main power source. When the batteries are low, the KeyPad emits two short buzzes and displays a low battery warning message. If the batteries in the KeyPad are removed and replaced, an internal lithium battery operates as a backup so that the KeyPad’s memory and functionality are not impacted.
6
7
KeyAdvantage User Manual
KeyPad User Interface
The KeyPad features 16 buttons:
10 buttons numbered 0–9 used to enter codes
Green start button
Three blue menu buttons
Blue enter button
Blue backspace/backlight button
Up & Down scroll buttons, numbered buttons 2 and 8, are used in some menus
Start
Keybox
Information
KeyPad
Information
Update
Up/Down
Scroll
Arrows
Backspace/
Backlight
Enter
KeyPad Navigation
Green Start button
Powers on the KeyPad
Resets the KeyPad
Press a blue menu button when the KeyPad is powered on to launch the menu options. Press a blue menu
button repeatedly to cycle through the KeyPad menu options:
KeyBox Information
Read KeyBox
View last KeyBox read
KeyPad Information
View user info
Review error codes
Display KeyPad battery status
Update
Used to enter a manual update code when the KeyPad cannot be checked out using the
KeyAdvantage programming base
Chapter 1
Introduction
Backspace/Backlight
Press to backspace (erase) an incorrect number entered.
Press and hold for 1 second to toggle the backlight on or off while the KeyPad is powered on. The
backlight turns off when the KeyPad times out and powers down.
Up/Down Scroll Buttons
The scroll Up/Down buttons may be used to view additional information in the Read KeyBox, View Last Read Box, Error Codes, User Information menus and purpose codes.
Audio Feedback
Audio tones are used by the KeyPad to indicate the status of an operation. They indicate when an operation has been performed successfully, and help determine the cause of an unsuccessful operation. There are nine audio tones generated by the KeyPad:
8
Tone
1 short beep A button on KeyPad has been pressed
2 short beeps A successful keystroke sequence has been entered
4 short beeps Operation complete
1 buzz Wrong number of digits or wrong code entered, or
2 short beeps repeated KeyPad is searching for KeyBox
1 short beep repeated KeyPad is communicating with KeyBox
Silence Communication between KeyPad and KeyBox
2 short buzzes KeyPad batteries are low
3 short buzzes KeyPad has been disabled
Explanation
operation is not allowed
interrupted
Visual Feedback
If an error occurs, a problem tone is sounded and an error message is displayed. See
Appendix A: Troubleshooting on page 67 for more information on error codes.
User Operations
KeyPad user operations include powering the KeyPad on and off, reading KeyBoxes, viewing KeyPad information, performing manual updates, viewing error codes, and checking the KeyPad battery status.
Powering On
The KeyPad is powered on by pressing the green Start button. When the KeyPad is rst powered on, it displays the name of the person the KeyPad is currently assigned to, then automatically goes to the Obtain Key menu.
Powering Down
The KeyPad does not have a button to turn it off, but it does power itself down automatically. There are several instances where the KeyPad powers down to maximize battery life: after a function is completed, the KeyPad powers down; if a button is not pressed for 20 seconds, the KeyPad powers down; when connecting to a KeyBox, the KeyPad searches for a KeyBox for 2 minutes and then powers down.
9
KeyAdvantage User Manual
Read KeyBox & View Last KeyBox Read
When the KeyPad reads a KeyBox, the 5 most recent accesses can be viewed on the KeyPad. The KeyPad displays the key holder name and KeyPad serial number. Press the Enter button to view the date and time of the access selected. To view the next access record, press the Down Arrow ( ) button to scroll through the additional entries.
A complete KeyBox read (which consists of the most recent 35 entries) can be downloaded to the KeyAdvantage software by checking in the KeyPad that performed the KeyBox read. The information can then be viewed as an Access report.
The KeyPad can store one KeyBox read at a time. Use the View Last KeyBox Read menu option to view KeyBox access details from the KeyBox read.
See “Reading KeyBoxes” on page 54 for details on reading KeyBoxes.
KeyPad Information
When a KeyPad is powered on, it displays the name of the user to whom it is currently assigned. If the KeyPad is unassigned it shows that it is unassigned and invalid.
The KeyPad assumes the identity of the user when the user checks out a KeyPad. This information is programmed into the KeyPad when it connects to the KeyAdvantage software through the programming base.
The KeyPad functions according to the key holder’s permissions when the user checks out a KeyPad.
The User Information menu option also shows the name of the assigned user. While the user name is displayed in this menu, pressing the Down Arrow ( ) button will show the date and time that the KeyPad is valid. The time displayed on the KeyPad will always be Standard Time. If Daylight Savings Time is in effect, only the time shown
on reports will reect Daylight Savings Time; a “D” will be displayed next to the time on the KeyPad.
To display the user information:
1. Press the Start ( ) button to turn on the KeyPad.
2. Press the KeyPad Information ( ) button repeatedly until the User Information menu is displayed.
3. Press the Enter button.
4. Press the Down Arrow ( ) button to view the date and time of the KeyPad’s validity. This time is always shown in Standard Time.
Manual Updates
Should you ever have problems getting your programming base to communicate with the KeyAdvantage software and are unable to check out KeyPads, the KeyPads can be manually updated by entering an update code.
Only the KeyAdvantage System Administrator can contact Supra customer support to receive update codes and the System Administrator will be required to answer a security question before receiving update codes.
KeyPads that are updated by means of an update code instead of through the programming base are not assigned to a specic user, and therefore do not assume their permissions. There are no department
restrictions. Manually updated KeyPads can open all of the dealership’s KeyBoxes, regardless of the
user’s prole in the KeyAdvantage system.
Manually updated KeyPads are activated until midnight of that night. If you have users whose shift lasts
past midnight, Supra Support can generate a special update code for the KeyPad that allows the KeyPad to be active until midnight of the next day.
Chapter 1
Introduction
The user name in a KeyPad that has been updated manually is blank. When the KeyPad is powered on, the KeyPad displays MANUAL UPDATE MODE. When the KeyPad is in this mode, during each KeyBox
access the KeyBox veries whether or not the update code that was entered is valid. If the update code
is valid, operation proceeds normally. If the KeyBox determines the update code is invalid, the KeyPad emits a buzz, displays KEY EXPIRED CHECK OUT KEY, and powers down.
When manually updated KeyPads access a KeyBox, the KeyPad serial number is recorded in the audit trail instead of a user name.
Reports with manually updated KeyPad activity will display the KeyPad serial number instead of the user name.
To manually update a KeyPad:
1. Press the Start ( ) button to turn on the KeyPad.
2. Press the Update ( ) button.
3. Enter the 9-digit update code. If a code shorter or longer than nine digits is entered, the KeyPad displays INCORRECT UPDATE CODE. The KeyPad checks to see if the entered update code is valid. If it is not, the same error message is displayed.
4. Enter a 4-digit PIN code. The KeyPad only accepts four digits for a PIN code. It ignores the Enter button if less than four digits have been entered, and it ignores any numbers entered after four digits.
5. Press Enter.
10
View Error Codes
The most recent errors that have occurred using the KeyPad can be displayed on the KeyPad. This menu option
also displays the current rmware version of the KeyPad and the KeyPad’s current date and time.
The KeyPad stores the last 16 error code entries.
Scroll through each error code entry, and the number of times it has occurred, using the Up and Down
Arrow ( ) buttons on the KeyPad.
Press Enter on an error code to view the error message describing the error.
The error code audit trail can also be viewed on the KeyAdvantage System software by placing the
KeyPad on the programming base.
See “Diagnosing KeyPads” on page 49 for details on diagnosing KeyPads.
To display the previous error codes and KeyPad rmware version:
1. Press the Start ( ) button to turn on the KeyPad.
2. Press the KeyPad Information ( ) button repeatedly to display the Error Codes menu.
3. Press the Enter button.
KeyPad Battery Status
The KeyAdvantage KeyPad operates on two AAA batteries. To display the battery level in the KeyPad:
1. Press the Start ( ) button to turn on the KeyPad.
2. Press the KeyPad Information ( ) button repeatedly to display the Key Battery Status menu.
3. Press the Enter button.
4. The KeyPad reports the percent battery remaining in the KeyPad.
11
KeyAdvantage User Manual
Programming the KeyPad
When the KeyPad is connected to the KeyAdvantage software by means of the programming base, the programming in the KeyPad can be read, diagnosed and changed. Each time that the KeyPad is placed on the programming base during check in the vehicle access audit trail in the KeyPad is uploaded to the system software.
Modify KeyPads
After connecting the KeyPad to the system software by placing it on the programming base, you can:
Change the KeyPad status. Only a KeyPad in Active status can be checked out and used to access KeyBoxes. KeyPads in Inactive or Lost status cannot be checked out.
Check the battery level in the KeyPad
Change the Notes information in the KeyPad
See “Modifying KeyBoxes” on page 48 for details on modifying KeyPads.
Check Out KeyPad
KeyPads are checked out at the beginning of the key holder’s shift and are updated only for that day. When a KeyPad is not checked out by a valid user, the KeyPad cannot access a KeyBox. KeyPads are checked out using the KeyAdvantage programming base.
During the checkout process:
The KeyPad assumes the permissions of the key holder as set up in the KeyAdvantage system software.
If the KeyPad was not checked in at the end of the previous user’s shift, the KeyAdvantage software
checks in the KeyPad and uploads the previous key holder’s access activity before checking out the KeyPad to the new user.
See “Checking Out KeyPads” on page 47 for details on checking out KeyPads.
Check In KeyPad
KeyPads are checked in at the end of the user’s shift.
During the check-in process:
The KeyPad uploads all access activity and KeyBox read information that occurred during the shift.
The KeyPad expires, regardless of the end-of-shift time prole of the key holder.
See “Checking In KeyPads” on page 48 for details on checking in KeyPads.
Diagnose KeyPad
The Diagnose KeyPad function is used to view KeyPad settings, programming and error information, as well as any KeyBox read information present on the KeyPad. There are six tabs in the Diagnose KeyPads screen.
General
Displays KeyPad programming information, including the serial number, manufacture date, check out status, and key holder name if it is currently assigned
If the KeyPad is currently checked out, the user name, ID, PIN, access hours and number of KeyBoxes allowed is displayed.
Introduction
KeyBox Permission
When the KeyPad is checked out, this screen displays which departments’ KeyBoxes the KeyPad has permission to access. One side of the screen shows the dealership/department permissions that should be programmed into the KeyPad according to the KeyAdvantage software. The other side shows the dealership/department permissions that are actually programmed into the KeyPad.
Error Log
Displays information about the most recent KeyPad access errors, including the date, error code, and a description of the error
Also displays the number of times a particular error code has occurred on the KeyPad
Access Log
Displays KeyPad date & time, KeyBox serial number, vehicle ID, purpose code used, key holder information and KeyBox date & time for the most recent KeyBox accesses
KeyBox Read
Displays the 35 most recent accesses to the most recently read KeyBox, including information about when the KeyBox was accessed and by whom as well as when the KeyTag was returned to the KeyBox. Information includes: accessing KeyPad number, user name and ID number, date and time accessed, the KeyTag and vehicle information, the purpose code used, and the date and time of KeyTag return.
KeyBox Back Read
Displays KeyBox access information stored in the KeyPad. Each time a key holder accesses a KeyBox, the KeyPad stores the access information. Information includes: type of access, date and time of the access, KeyTag serial number, vehicle ID number, purpose code used, and the date and time of KeyTag return.
Chapter 1
12
See “Diagnosing KeyPads” on page 49 for details on diagnosing KeyPads.
Flash KeyPad
The Flash KeyPad function is used when a new version of KeyPad rmware is available from Supra. After the new rmware le is imported into the KeyAdvantage database, KeyPads are placed in the programming base and “ashed” to update the KeyPad rmware.
See “Flashing KeyPads” on page 52 for details on ashing KeyPads.
13
KeyAdvantage User Manual
The KeyBox
The KeyAdvantage KeyBox is an electronic KeyBox that mounts on a vehicle window by means of a window hanger. The KeyBox stores ignition keys at each vehicle for easy access.
CAUTION: The KeyAdvantage KeyBox should be removed from the window before the window is completely rolled down and before the vehicle is driven. Damage to the vehicle may occur if it is not removed.
The KeyAdvantage KeyBox:
Can only be accessed by active KeyAdvantage KeyPads with the correct permissions
Can be programmed to specic dealerships and/or departments to control usage
Keeps track of each person that accesses the vehicle keys and the date and time of the last 35 accesses
Access activity can also be viewed by reading the KeyBox with a KeyPad
Physical Characteristics
The KeyBox has an infrared interface that allows it to communicate with the KeyAdvantage KeyPad and programming base.
The KeyBox has a large internal key container to accommodate the vehicle’s keys and the electronic KeyTag to which they are attached.
The key container in the KeyBox has a bright red label which displays the KeyBox serial number.
The key container closes only if a KeyAdvantage KeyTag is properly placed in the key container. If there
is no KeyTag present, the KeyBox can close part way but does not lock and latch. In this condition, the red label is clearly visible so that it can readily be seen which KeyBoxes do not have a KeyTag present.
The KeyBox has a jam pull tab located on the bottom of the key container. If the vehicle keys become wedged in the key container, the jam pull tab can be used to force open the key container. The KeyBox
must rst be accessed with authorized KeyPad.
Each time the KeyPad connects to a KeyBox, the KeyPad checks the KeyBox’s battery level. If the
battery level falls below 1%, the KeyPad buzzes and displays a BOX BATTERY LOW message.
Chapter 1
Introduction
Programming the KeyBox
When the KeyBox is connected to the KeyAdvantage software by means of the programming base, the programming in the KeyBox can be read, diagnosed, and changed.
KeyBox Assignments
All KeyAdvantage KeyBoxes are programmed with an owner system code that cannot be changed. Every customer has a unique owner system code to prevent unauthorized access.
During system conguration, the customer determines whether they will be assigning KeyBoxes to dealerships and/or departments. Establishing departments is a Supra conguration function and cannot
be performed by the dealership administrator.
If KeyBox assignments are available, each KeyBox can be programmed to allow access only by key holders within a dealership group, a single dealership, specic departments within a dealership or group
of dealerships. For example, you may allow some key holders access to the New and Used car sales KeyBoxes at one dealership and another group of key holders access to KeyBoxes assigned to the Service department for several dealerships.
If KeyBox assignments are being used, when inventory is ordered from Supra the KeyBoxes are programmed to dealership groups, dealerships, and departments so that the administrator can control which groups of key holders can access which KeyBoxes.
The dealership group code, dealership code, and department code can also be programmed by the dealership using the programming base.
14
See “Programming KeyBoxes” on page 54 for details on programming KeyBoxes.
KeyBox Access Records
The KeyBox stores the most recent 35 accesses.
KeyBox access activity is stored on a rst-in, rst-out rolling basis. When the 36th access occurs and is recorded in the KeyBox, the rst entry is removed.
When the KeyBox is accessed by a KeyPad, the KeyBox records:
Who took the vehicle keys—the key holder ID and user name assigned to the KeyPad
Which vehicle keys were taken—the KeyTag ID and vehicle information
When the vehicle keys were taken—date and time in the KeyBox
Why the vehicle keys were taken—which purpose code was used
Restrict KeyBox access
KeyAdvantage system operators, managers and administrators have the ability to restrict access to KeyBoxes.
KeyBoxes can be programmed with a lockout list that prevents specied KeyPads from accessing the
vehicle keys. To add a KeyPad serial number to the lockout list for a KeyBox, the KeyBox must be programmed on the programming base. See “Lockout List” on pages 6 and 54 for details on programming lockout lists in KeyBoxes.
15
KeyAdvantage User Manual
User Operations
KeyBox user operations include accessing vehicle keys, viewing KeyBox access information, and modifying, programming, and diagnosing the KeyBox. Visit www.keyadvantage.com to view more KeyAdvantage documentation.
Access Vehicle Keys
Note: The KeyBox can only be accessed by a KeyPad that has been
checked out by a key holder with permissions to open that KeyBox.
When the KeyPad has unlocked the KeyBox, press up on the key container to release it and access the vehicle keys.
Note: The key container must be released within one second of pressing up or the key container will re-lock.
To relock the key container, push the key container back up into its locked position. A KeyTag must be in place for the key container to lock. The KeyPad is not needed to close a KeyBox.
The key container has two contacts that recognize when a KeyTag is attached to the KeyBox. The KeyTag must be correctly inserted into the key container so the contacts in the KeyBox can read the serial number of the KeyTag.
To open the KeyBox to obtain vehicle keys:
1. Press the Start ( ) button to turn on the KeyPad.
2. After the KeyPad displays the user name, enter the 4-digit PIN code and press the Enter button.
3. Enter the purpose code and press the Enter button.
4. Connect the KeyPad to the KeyBox using the IR ports. The key holder has up to two minutes to connect with the KeyBox.
5. When you hear the operation complete tones (4 short beeps), press up on the key container to release it and access the vehicle keys.
After authorization has been granted, the user has 12 seconds to access the KeyBox.
View KeyBox Access Information
When an authorized KeyPad accesses a KeyBox, the access information for that event and the previous event are recorded in the KeyPad.
KeyBox access information can be viewed on a KeyPad or in the KeyAdvantage software through the use of a programming base.
Performing a Read KeyBox function with the KeyPad downloads the last 35 access records from the KeyBox to the KeyPad.
The rst ve access records can be immediately viewed on the KeyPad or accessed at a later time.
The most recent vehicle access data is displayed on the KeyPad rst. Additional access records can
be displayed by scrolling. Navigation through the records is bidirectional.
The user name and KeyTag serial number are displayed rst on the screen. Press Enter to display
the corresponding date and time of the record.
When the KeyPad is checked in at the end of the shift, the KeyBox read is downloaded to the
KeyAdvantage software where it can be viewed in the form of Access reports.
Chapter 1
Introduction
See “PIN Code” on page 28 for details on creating Access reports.
To read a KeyBox:
1. Press the Start ( ) button to turn on the KeyPad.
2. Press the KeyBox Information ( ) button until the Read Box menu is displayed.
3. Press the Enter button and connect the KeyPad to the KeyBox using the IR ports. User information for the most recent access is immediately displayed, press the Enter button to view the date and time of the KeyBox access.
4. Press the Down Arrow ( ) button to view the next KeyBox access record.
To view the last KeyBox read:
1. Press the Start ( ) button to turn on the KeyPad.
2. Press the KeyBox Information ( ) button until the View Last Read Box menu is displayed.
3. Press the Enter button to view the date and time of the KeyBox access.
4. Press the Down Arrow ( ) button to view the next KeyBox access record.
Modifying the KeyBox
The KeyBox status and notes can be modied without placing the KeyBox on a programming base. In addition, an
activity report can be generated for an individual KeyBox. The Modify KeyBox menu option allows users to view the following KeyBox information:
Serial number
Status
Programmed date
Battery status
Notes
Lockout list
Current department assignment
Activity report
16
Programming the KeyBox
When the KeyBox is connected to the KeyAdvantage software by means of the programming base, the programming in the KeyBox can be read, diagnosed and changed. Each time that the KeyBox is placed on the programming base, the vehicle access audit trail in the KeyBox is uploaded to the system software.
After connecting the KeyBox to the system software by placing it on the programming base you can:
Change the KeyBox status. Change the status of KeyBoxes that have been lost or damaged to Inactive
Check the battery level in the KeyBox
Add or delete KeyPads from the KeyBox lockout list
Change the dealership/department assignments that determine where the KeyBox
can be placed
Add notes about the KeyBox
See “Modifying KeyBoxes” on page 53 and “Programming KeyBoxes” on page 54 for details on modifying and programming KeyBoxes.
17
KeyAdvantage User Manual
Diagnosing the KeyBox
The diagnostic function is used to view settings, programming and error information on the KeyBox. There are four tabs in the Diagnose KeyBoxes screen.
General Tab
Displays KeyBox programming information, including the serial number, manufacture date and current lockout list
KeyBox Permission Tab
Displays the KeyBox dealership/department assignment dened in the KeyAdvantage software as
compared to the dealership/department assignment that is actually programmed in the KeyBox.
Access Log
Displays KeyPad serial number, user information, KeyTag number, vehicle assignment information and date & time for the most recent KeyBox accesses, as well as the date and time that the KeyTag and vehicle key were returned to the KeyBox
Error Log
Displays the most recent KeyBox errors, along with the date and time that the error occurred.
See “Diagnosing KeyBoxes” on page 55 for details on diagnosing KeyBoxes.
Loading...
+ 56 hidden pages