Xmark PT2 User Manual

User Manual
December 2000
March 2000, Revision 5.0, Added FCC Regulations
December 2000, Revision 6.0, Added new features from HALO™ software version 3.1
© Copyright 2000, EXI Wireless Systems Inc., All rights reserved.
Revision 6.0
EXI HALO User Manual 980-000002-000
Table of Contents
ABOUT THIS DOCUMENT..........................................................................................................................3
1. SYSTEM INTRODUCTION..................................................................................................................5
1.1. S
1.2. T
1.3. C
2. USER LEVEL FUNCTIONS..................................................................................................................8
2.1. A
2.2. D
2.3. D
2.4. S
2.5. “N
2.6. I
3. SUPERVISOR LEVEL FUNCTIONS.................................................................................................19
3.1. A
3.2. E
4. ACTIVITY LOG MANAGEMENT.....................................................................................................21
4.1. A
4.2. N
4.3. A
4.4. B
YSTEM COMPONENTS ERMS USED IN THIS DOCUMENT
OMPUTER DISPLAY CONVENTIONS
DMITTING A PATIENT ISCHARGING OR EDITING A PATIENT ISABLING A TAG TEMPORARILY
ILENCING AND ACCEPTING ALARMS
URSE SAVER” AND “LOITERING
MPROPERLY STORED TAGS
CCESSING SUPERVISOR LEVEL
XITING SUPERVISOR LEVEL
CTIVITY LOGS AVIGATING THE ACTIVITY LOG DDING A SUPERVISOR ANNOTATION TO AN ALARM ACKING UP ACTIVITY LOGS
................................................................................................................................21
......................................................................................................................5
........................................................................................................5
..................................................................................................6
.......................................................................................................................8
..............................................................................................11
.....................................................................................................13
..............................................................................................15
EATURES
” F
.................................................................................17
..............................................................................................................17
.......................................................................................................19
............................................................................................................20
.......................................................................................................22
...........................................................................................................23
........................................................................22
5. MANAGING TAGS..............................................................................................................................24
5.1. T
5.2. A
5.3. D
5.4. D
5.5. U
5.6. E
5.7. C
5.8. L
AGS
...............................................................................................................................................24
DDING A NEW ELETING A ISABLING A NASSIGNING A
DITING A
HANGING A TAG’S EXPIRY DATE
OCATE A TAG
P-T
AG TO THE SYSTEM
P-T
AG FROM THE SYSTEM
P-T
............................................................................................25
.............................................................................................26
P-TAG.........................................................................................................................27
P-TAG....................................................................................................................27
AG RECORD
...............................................................................................................28
...................................................................................................28
.................................................................................................................................29
6. MANAGING SYSTEM USERS...........................................................................................................30
6.1. A
6.2. D
6.3. D
6.4. E
DDING A NEW USER TO THE SYSTEM ELETING A USER FROM THE SYSTEM ISABLING A SYSTEM USER
DITING A SYSTEM USER’S ACCESS LEVEL
..............................................................................................................32
...............................................................................................31
...............................................................................................32
........................................................................................32
7. PRINTING LOGS................................................................................................................................33
8. MANAGING ALARM ANNOTATIONS............................................................................................34
8.1. A
8.2. D
8.3. E
DDING AN ANNOTATION ELETING AN ANNOTATION
DITING AN ANNOTATION
...............................................................................................................35
.............................................................................................................35
...............................................................................................................35
9. SHUTTING DOWN AND RESTARTING THE SYSTEM................................................................36
9.1. S
9.2. R
HUTTING DOWN
ESTARTING THE SYSTEM
.............................................................................................................................36
.................................................................................................................36
APPENDIX A - LIMITED WARRANTY....................................................................................................37
APPENDIX B - FCC REGULATIONS .......................................................................................................38
APPENDIX C - SYSTEM MAINTENANCE...............................................................................................39
EXI Wireless Systems Inc. 2 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
ABOUT THIS DOCUME NT
Intended Audience
This manual is intended for system users (typically duty nurses), team leaders, and supervisory level us­ers who manage the system and the system users.
Scope
This manual will provide step-by-step instructions for users and supervisors who administer the usage of the system. The HALO™ system features a very simple user interface that guides the user through each step.
About the Halo Infant Protection System
HALO™ is a premium infant protection system.
HALO™ works in conjunction with the EXI P-tag patient transponder that is capable of sensing
if it has been removed from the infant.
HALO™ is an electronic system, which, in conjunction with staff diligence, creates a secure
perimeter to deter infant abductions.
HALO™ will detect if an infant is near a controlled exit and invoke countermeasures.
The system will identify the infant, the location and the time.
Alarms must be accepted by staff using password access to the system.
The system maintains a log of all activity.
Access Levels
The HALO™ system has three separate access levels:
User
Team Leader
Supervisor
Level Password
required
User Yes Admit Patients
Discharge Patients Accept/Silence alarms Toggle between floor plans
Team Leader Yes All user functions
Temporarily Disable Patient
Functions Access Management
Access controlled by Supervisor level users
Access controlled by Supervisor level users
EXI Wireless Systems Inc. 3 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
Supervisor Yes All team leader functions
Manage user list Assign usernames and passwords View and annotate activity logs Add/Delete tags from fleet Add alarm annotations Initiate System Data Backups Print logs Exit the
HALO
System Conventions
Each user in the system has a unique identity (username) and password. The Supervisor assigns both the username and password. It is suggested that both be kept between 4-8 characters to provide sufficient security and allow users to easily enter and remember their system access codes. For example: a user named Barbara Smith would have a username such as bsmith or barbs. Note that that each user must have a unique name.
The system prompts the user for any text entry such as usernames or infant names, etc. To move from one field to the next, the user may press Tab key on the keyboard or place the mouse cursor over the field and Click the left button.
System Support
The first Supervisor is setup by the installing dealer. This Supervisor may add more assigned supervisory access.
system
For system service or support contact your installing dealer
Or contact:
EXI Wireless Systems Inc.
Suite 100-13551 Commerce Parkway Richmond, BC V6V 2L1 Canada Ph: 1-800-667-9689 Fax: 604-207-7760 Website: www.exi.com
EXI Wireless Systems Inc. 4 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
1. SYSTEM INTRODUCTION
1.1. System Components
HALO™ Software:
Controllers:
Receivers:
Transponders:
Primary user interface that assists in the assignment and tracking of Transponders, and displays alarms and other activities in graphical format. It also stores and al­lows printing of all system events that have been logged.
Controls an egress point and reports any Tag presence at the egress point to the computer. Depending on sys tem configuration, c ontrollers may control door locks and local alarms, and allow keypad input for door bypass. They may also provide a “Nurse Saver” and “Loiter” feature. The “Nurse Saver” feature eliminates nuisance alarms by not setting off an alarm when the presence of a Tag is detected and the door is se nsed as closed. In the event that the door is open, or is opened when the Tag is at the egress point, the system will alarm. The “Loiter” feature sounds an alarm if a Tag detected at a door rema ins at that door for a peri od of time, regard­less of the fact that the door may be sensed as closed.
Controllers will also detect a “Tag off body” condition in its area, as does a Re­ceiver.
Detects “Tag off body” condition when a Tag is removed from a patient, and reports this activity to the computer.
Also referred to as “Tags”, these devices are attached to the patient. Tags initiate two different kinds of alarm conditions as follows:
TIC - Tag-initiated-Communications:
This alarm is initiated in the event that a Tag is removed from a patient. This occurs when the Tag can no longer sense the body of the patient.
TIF - Tag-in-field Communications:
This alarm is initiated when a Tag enters an area protected by a Controller. The Controller’s antenna(s) emit a constant field of radio waves that is picked up by the Tag when in the proximity of the Controller. The Tag re­ports its presence to the Controller, and therefore the system, when it senses this field of radio waves.
1.2. Terms used i n t hi s document
The following terms are used to help explain user functions in this document:
-
­for example, to complete a function place the mouse pointer over the button then click the left mouse button.
­This term is usually used to highlight data, for example when that data is to be changed, or de­leted..
- Θ Names of keys are shown as the physical keys on a keyboard.
means to press a key on the keyboard
Press
means click the left mouse button once. This term is usually used for an action button,
Click
means you position the mouse pointer in a data area and click the left mouse button.
Select
EXI Wireless Systems Inc. 5 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
- Names of dialog boxes, screens, and field titles in forms are bolded or shown graphically.
- Names of buttons are shown as on screen.
1.3. Computer Display Conventions
The computer displays various types of information, which is color -coded, to differentiate between the Supervisor and Use r mode s. In addi tion, the “Icons” that displ ay the l ocations of the various system components such as the Controllers and the Receivers, and the on-screen “buttons” may also change color to indicate their status.
The table below shows the various icons, and alarm conditions.
Icon Name Description
The controllers are located near egress points, such
Controllers
as doors. This icon will flash red if there is a communication problem.
Receivers
Elevators
Console
Pre-alarm
Alarm Condition
Receivers can be placed anywhere, and will only detect off-body TIC alarms.
Elevators are controllers which detect TIC or TIF alarms near an elevator.
The console is the computer that runs the HALO softw ar e.
Controllers or Receivers will flash these two icons when they receive a TIC, a TIF, or a loiter alarm.
EXI Wireless Systems Inc. 6 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
The figure below shows a typical user screen and identifies its components.
1
3
2
4
Walk around:
1.
This is the fl oor plan area. It shows the positions of all control lers, recei vers, elevators, and con­soles that are installed in your system.
2.
Floor navigation buttons. Clicking on the desired floor will cause that floor to be displayed on the screen. The buttons will change color depending on the alarms have occurred on each floor:-
3.
These are the action buttons. From here you can Team leaders may also
4.
This is the list of played in this window. In order to line with alarm, and click the left mouse button to select. When the alarm is selected it will turn blue.
5.
Once an alarm has been selected from the fields will become active. In order to accept an alarm, these three fields must be filled in.
6.
These are the are filled in, the accept the alarm. The
5
Green:
Blue:
Yellow:
Red:
Normal
Indicates that the cursor is positioned over button
Indicates Pre-alarm condition on floor
Alarm condition on this floor
Disable a Tag
Act ive Ala rms
Accept Alarm
Accept Alarm
Silence
and
button is always available after selecting an alarm from the list.
.
. When an alarm occurs, the description of the alarm will be dis-
Silence
Active Alarms
buttons. Once the
Silence
button will become active. Click on the
6
Admit a Patient
or
Accept the Alarm
list, the
and
Discharge or Edit a Patie nt
, you must po i nt the mouse to the
Usernam e, Password
Usernam e, Password
, and
Accept Alarm
, and
Notes
.
Notes
fie l d s
button to
EXI Wireless Systems Inc. 7 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
2. USER LEVEL FUNCTIONS
The Halo system provides a simple, intuitive user interface. After each step, the system will automatically take you to the next step until the task is complete.
2.1. Admitt i ng a Pat ient
Select the button on the top right of the screen.
Enter Username and Password:
1. Type in your
2. Press the Θ key on the keyboard
3. Type in your
4. Press the ≅key on the keyboard, or click on the button.
5. The
Select a tag
Usernam e
Password
screen will appear.
Main Screen - User Level
as assigned by your supervisor.
EXI Wireless Systems Inc. 8 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
Select a Tag:
1. Select the tag number that corresponds to the serial
number on the side of the tag you wish to use. The list contains only available tags which have been registered in the system but not assigned to an infant.
2. Click on to go to the
.
Confirm Tag:
Click on to begin a test of the tag.
1.
We recommend that you test each tag before use.
The system will guide you through the process
Test tag
1. Expose the tag, or trigger an off-body TIC alarm
During this test, the system is
verifying the tag serial number
Confirm Tag
step
testing the tag removal alarm
gene r ati ng an a ct iv it y lo g ent ry t o d oc ument the
test.
If the test is successful, the system will take you to the next step in the admit process. If the controller cannot detect the tag, select to go back and try another tag. Ensure the bottom of the tag is held stable on your skin during the test for about 10 seconds prior to
removing. If the test fails, try it once more on your wrist.
EXI Wireless Systems Inc. 9 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
Enter Patient Information:
1. Verify that the
number on the Tag you have just selected
2. Type the
3. Click when done.
Choose Activation Delay:
1. Select the required
2. Click on to complete the admission
3. NOTE that Delays apply to sensing “off- body” or
TIC alarms only. Tag will still initiate alarms at egress points.
Patient info
shown matches the serial
Tag #
Activation
delay
1. Click on to admit another patient
2. Click on to return to the main screen
EXI Wireless Systems Inc. 10 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
2.2. Di scharging or Editing a Patient
Select the button on the top right of the screen.
Enter Username and Password:
1. Type in your
2. Press the Θ key on the keyboard
3. Type in your
4. Press the key on the keyboard, or click on the button.
Usernam e
Password
Main Screen - User Level
as assigned by your supervisor.
Select Option
EXI Wireless Systems Inc. 11 December 2000
Revision 6.0
EXI HALO User Manual 980-000002-000
1. Select the option require.
2. Click on
Select Patient:
1. Select the
either discharge or edit
2. Click on .
Editing a Patient’s Info:
1. Type the changes to the existing information
2. Click on
Patient Name/Tag
that you wish to
Discharging a Patient:
1. Verify the
2. Click on to discharge the infant
3. Click on or if the infant
is not to be discharged.
4. Note: The system will continue to respond to a
tag detected at an egress point, such as a doorway or elevator, and control that egress point even after the tag has been discharged.
EXI Wireless Systems Inc. 12 December 2000
Infant Name
Revision 6.0
Loading...
+ 27 hidden pages