Onity TESA HT24W HT28 Smart User Manual Version 2 X PDF
Onity TESA HT24W HT28 Smart User Manual Version 2 X PDF
Onity TESA HT24W HT28 Smart User Manual Version 2 X PDF
Release 3, March-2001
Contacting TESA Entry Systems
International Sales
Phone: + 34 943 448 300
Fax: + 34 943 261 011
The information contained within this manual is subject to change. In no way does TESA warrant that the operation of this system will be entirely
error free or perform precisely as described within this documentation, or that the functions and features of this system will meet your specific
requirements. Additionally, this system has not been designed for use in life-critical situations and must not be used for this purpose
Introduction 1
Who is TESA............................................................................................................................. 1
Problems with Metal Key Systems ............................................................................................ 1
Benefits of TESA Electronic Locking Systems ......................................................................... 1
About this Manual ..................................................................................................................... 2
What's New................................................................................................................................ 2
Hardware 63
HT24W System Components .................................................................................................. 63
HT24 Magnetic Stripe Lockset.................................................................................. 63
Magnetic Cards.......................................................................................................... 65
Card Readers ............................................................................................................. 66
Encoders .................................................................................................................... 67
HTCOMBO Safe ....................................................................................................... 71
Operation ................................................................................................................... 71
HT28 Smart System Components............................................................................................ 72
HT28 Dual Technology Lockset ............................................................................... 72
Smart Cards ............................................................................................................... 74
Encoder...................................................................................................................... 75
General Components................................................................................................................ 78
Portable Programmer................................................................................................. 78
Communications Windows Distributor ..................................................................... 82
Terminal Mode Encoders......................................................................................................... 84
Online Revalidator................................................................................................................... 86
Options ...................................................................................................................... 86
Using the Revalidator ................................................................................................ 88
Emergency Mode....................................................................................................... 89
Glossary of Terms 99
Who is TESA
TESA Entry Systems has a sales and service network that spans more than 110
countries. One of the world's largest suppliers of electronic locking systems, TESA
electronic locks can be found on over one million doors in over ten thousand hotels
around the globe.
TESA Entry Systems is known for its extensive industry experience and commitment
to its customers. This commitment to the highest standards of service has enabled
TESA Entry Systems to earn preferred vendor status with leading hotels around the
world.
TESA Entry Systems is part of one of the largest providers of security products and
solutions in the world. With this backing, TESA Entry Systems has the business
strength and resources to continue to lead the world in electronic locking technology.
What's New
• User-friendly Windows interface makes features intuitive and easy to use.
• HT28 Smart v2 takes full advantage of the power of smart card technology with
card activity and lock status reports.
• The management of master cards has been completely revised to make large
numbers of staff cards easy to maintain.
• The revalidation system provides a simple way to increase the level of security
at your property by greatly reducing the effects of lost master cards.
• Locks automatically adjust for Daylight Savings Time if they have been updated
by the programmer any time within the six months previous to the time change.
• Property management systems can interface with TESA through the Ethernet
network which simplifies the setup and maintenance of the interface. This
feature may not be available from all PMS vendors.
• Distributed communications network allows multiple TESA devices to be
controlled by workstation PCs as well as the TESA server PC. Any encoder on
any PC can be controlled by the PMS.
General
The HT24W / HT28 Smart system is a revolutionary step in locking systems. The
following sections will take you step by step through all of the features and functions
of the software. Some features are only available in the HT28 Smart system that
uses smart cards.
• In this manual, the Smart only features will be indicated with this symbol in the
Available only with left-hand margin.
HT28 Smart!
Designed for keyboard use! • The front desk functions that are used most frequently have been designed so
that the operator can quickly complete the process without requiring the mouse.
The keyboard image shown to the left indicates the functions designed for
keyboard use.
HT24W
The HT24W system uses Windows based software to manage and control the HT24
series magnetic stripe locks.
HT28 Smart
The HT28 Smart system uses Windows based software to manage and control HT28
dual technology, smart card and magnetic stripe, locks. There are several features in
the software that can only be used with HT28 locks and smart cards. The primary
feature difference is that card transactions can be stored on the smart card.
The Reception Menu includes the most frequently used functions, including New
Guest Check-In, Copy Guest and Check-Out. Many functions on the Reception Menu
have been designed to be used without the use of a mouse. Although a mouse can be
used in these functions, the operations will be completed more quickly by using only
the keyboard.
The primary functions of the Reception Menu can be accessed from the main screen
through the Hot Buttons. These buttons are shown in the figure below. For quick
access to the full Reception Menu, press the F10 key.
This function is used when a new guest is to be checked into a room. When the
new card is used in the lock, the card of the previous guest will automatically be
New Guest Check-In canceled.
The New Guest Check-In function of the system allows you to make guest cards
Designed for keyboard use! that will work in up to four guestroom doors, depending on the type of encoder
used to make the card. The HT24 motorized encoder and the smart encoder can
encode up to four rooms. Manual insertion encoders can encode a maximum of
three rooms on one card. As an example, if a family checked into the hotel, and
the parents requested one room for themselves and another room for the
children, the cards can be made to work in both locks.
Use the UP/DOWN ARROW keys to navigate through the list of available
authorizations. By pressing the SPACE BAR you can grant or deny each
authorization and press the ENTER key to continue to the length of stay.
6. Once the authorizations section is completed, the cursor will move to the area of
the screen to enter the number of nights the guest will be staying.
Type a number or use the UP/DOWN ARROW keys to set the number of nights
for the stay and press the ENTER key.
7. If your property uses a starting date on guest cards, the cursor will highlight the
start date. The default start date is today. You can use the number pad to set the
starting date of the card. To change the starting time, press the TAB key to
move the cursor to the time and use the number keys to change the time. Press
ENTER to continue to the Expiration date and time.
8. The software will convert the number of nights into the expiration date. You
may make any changes you wish to the check-out date and time by using the
number keys to enter the new hour, day, month or year. Press ENTER to
continue to Track 1 and 2 data.
With a motorized encoder, 9. If you are using magnetic cards and a motorized encoder, you are able to encode
POS information can be information on tracks 1 and 2 of your card. This information is not needed to
placed on tracks 1 and 2. operate the TESA locks, but is commonly used for Point Of Sale (POS) systems.
Track 1 data can contain letters or numbers and track 2 data can contain only
numbers.
10. The last thing to do before encoding your cards is to tell the software how many
cards your guest will need. You can type the number or use the UP/DOWN
ARROW keys. When you are ready to encode the cards, press the ENTER key.
A message will appear on the screen instructing you to insert the card. When
encoding is complete, a message will instruct you to take the card.
This function is used to encode extra cards for an occupied guestroom after the
initial check-in procedure. These cards will not affect the use of the existing guest
Copy Guest card.
Designed for keyboard use!
WARNING: Never make a copy of a guest card if the guest has LOST their card.
Make a NEW GUEST CARD to void out a lost card.
3. The cursor will move to the next Room field in the display and allow you to
enter another room number, or select from the list. If you do not want to add
another room to the card, press ENTER again. Repeat this step until you have
entered all of the rooms you want to encode on this card. When you are finished
entering all of the rooms, press the ENTER key again to continue to
authorizations.
4. If your property is using Emphasized Authorizations to promote the sale of
amenities such as the use of an in-room safe, a message box will appear asking
you to confirm this authorization. To select the authorization, press the SPACE
BAR and press the ENTER key to continue.
Use the UP/DOWN ARROW keys to navigate through the list of available
authorizations. By pressing the SPACE BAR you can grant or deny each
authorization and press the ENTER key to continue to the length of stay.
6. Once the authorizations section is completed, the cursor will move to the area of
the screen to enter the number of nights the guest will be staying.
Type a number or use the UP/DOWN ARROW keys to set the number of nights
for the stay and press the ENTER key.
7. If your property uses a starting date on guest cards, the cursor will highlight the
start date. The default start date is today. You can use the number pad to set the
starting date of the card. To change the starting time, press the TAB key to
move the cursor to the time and use the number keys to change the time. Press
ENTER to continue to the Expiration date and time.
8. The software will convert the number of nights into the expiration date. You
may make any changes you wish to the check-out date and time by using the
number keys to enter the new hour, day, month or year. Press ENTER to
continue to Track 1 and 2 data.
With a motorized encoder, 9. If you are using magnetic cards and a motorized encoder, you are able to encode
POS information can be information on tracks 1 and 2 of your card. This information is not needed to
placed on tracks 1 and 2. operate the TESA locks, but is commonly used for Point Of Sale (POS) systems.
Track 1 data can contain letters or numbers and track 2 data can contain only
numbers.
10. The last thing to do before encoding your cards is to tell the software how many
cards your guest will need. You can type the number or use the UP/DOWN
ARROW keys. When you are ready to encode the cards, press the ENTER key.
A message will appear on the screen instructing you to insert the card. When
encoding is complete, a message will instruct you to take the card.
If more than one card was requested, the screen will repeat the prompts until all
of the requested cards are made. When you are finished making cards, select
another function, or press the F9 key to log out of the system.
Note: The original and 4 copies can be uniquely identified in the audit record of
the lock. If you encode more than 5 cards, the audit report will indicate that a
'Redundant Card' was used.
Check-Out (F7)
This function is used to make a card that will work in a guestroom lock only once.
The single opening card is commonly used by the hotelier to allow a guest to
Single Opening Card preview a room, or to allow a vendor to place an item inside of a room. Once the
Designed for keyboard use! card is used in the lock, it is no longer valid. A maximum of four Single Opening
Cards may be made for a single guestroom between new guest Check-Ins.
Use the UP/DOWN ARROW keys to navigate through the list of available
authorizations. By pressing the SPACE BAR you can grant or deny each
authorization and press the ENTER key to continue to the length of stay.
5. Once the authorizations section is completed, the cursor will move to the area of
the screen to enter the number of nights the guest will be staying.
Type a number or use the UP/DOWN ARROW keys to set the number of nights
for the stay and press the ENTER key.
6. If your property uses a starting date on guest cards, the cursor will highlight the
start date. The default start date is today. You can use the number pad to set the
starting date of the card. To change the starting time, press the TAB key to
move the cursor to the time and use the number keys to change the time. Press
ENTER to continue to the Expiration date and time.
7. The software will convert the number of nights into the expiration date. You
may make any changes you wish to the check-out date and time by using the
number keys to enter the new hour, day, month or year. Press ENTER to
continue to Track 1 and 2 data.
With a motorized encoder, 8. If you are using magnetic cards and a motorized encoder, you are able to encode
POS information can be information on tracks 1 and 2 of your card. This information is not needed to
placed on tracks 1 and 2. operate the TESA locks, but is commonly used for Point Of Sale (POS) systems.
Track 1 data can contain letters or numbers and track 2 data can contain only
numbers.
The last thing to do before encoding your cards is to tell the software how many
cards your guest will need. You can type the number or use the UP/DOWN
ARROW keys. When you are ready to encode the cards, press the ENTER key.
A message will appear on the screen instructing you to insert the card. When
encoding is complete, a message will instruct you to take the card.
If more than one card was requested, the screen will repeat the prompts until all
of the requested cards are made. When you are finished making cards, select
another function, or press the F9 key to log out of the system.
This function is used to identify an unknown card and to examine the information
encoded on the card.
Read a Card
Designed for Keyboard Use!
You may read another card by pressing the READ button located in the bottom
left of the window. When you are finished reading cards, press the ESCAPE key
and select another function, or press the F9 key to log out of the system.
This function will read a card, erase it, and check out the room if the card is still
valid. Use this function if a group of cards is left at the front desk by the guests or
Erase a Card the housekeeping staff for Check-Out. This feature can be used to enhance the
Designed for Keyboard Use! hotel’s Express Check-Out function.
To use the Read and Erase a Card function, perform the following steps:
1. From the Reception menu click Erase Card, press F4, or click on the Erase Card
Tool.
2. The screen will prompt you to insert the card.
3. Once the card has been read, the screen will display all of the guest information
encoded on the card, such as the authorizations and the expiration date and time.
In the example in the figure above, the card is for room 256 and 258, and it is
the original card (not a copy). The card was authorized to operate the guestroom
safe, garage, pool, and the concierge lounge. This card will not override guest
privacy or the blocking card, and it cannot place a door into office mode. The
card will expire at 3:00 p.m. on June 17, 1999 and was encoded by Sally on June
12 at 3:30 PM.
4. If you wish to erase the card, click on the Erase button at the bottom of the
window. The screen will prompt you to insert and remove the card. Insert and
remove the card in the encoder. Once this is done, the card is now erased and
may be re-used in the system at any time.
If you do not want to erase the card, press ESCAPE or click the eject button at
the bottom of the window.
5. You may read another card by pressing the READ button located in the bottom
left of the window. When you are finished reading cards, press the ESCAPE key
and select another function, or press the F9 key to log out of the system.
To view the State of Rooms, click State of Rooms from the Reception menu, or press
the F2 key.
The Hotel Information window is divided into three (3) tabs. The leftmost tab
shows the list of rooms in a table with columns for important information about
each room. Use the UP/DOWN ARROW keys to navigate through the rooms. To
rapidly move through the table, you can use the PAGE UP/DOWN, or click on the
slider to the right of the table. You can also use the Search button to jump directly
to a room if you know the room number.
Tip: You can use the filters to You can use the filtering boxes on the right of the Room List tab if you want to
limit the rooms in the list. limit the rooms you see by certain criteria. For example, you may wish to view
Note that the Search button only the rooms that are occupied. Or, perhaps you wish to see a list of rooms that
cannot find a room that is need to be updated with the portable programmer. The state column of the table
hidden by a filter. will show the reason a room needs updating.
The Room Details tab shows all of the information from the room list table as well as
the starting date, if any single opening cards have been encoded, what type of lock
hardware is installed, and which mastering scheme is being used. Multiple
mastering schemes are optional, so your property may not display this information.
Navigation Buttons If you wish to see details of other rooms, you can return to the room list or use the
navigation buttons at the bottom of the window. From left to right, the buttons
perform the following task: view the first room in the list, view the previous room in
the list, view the next room in the list, view the last room in the list.
The right tab of this window shows general information about your property. At
times, it may be useful to know the number of guests that have access to a
particular amenity. The Additional Information tab shows each of the
authorizations declared for your property and how many valid guest cards are
encoded with access to these authorizations. This tab also shows a chart with the
percentage occupancy and the percentage of rooms that are out of service.
When you have finished viewing the room information, click the close button at
the bottom of the window, or press the ESCAPE key.
Groups
This function provides a convenient method of encoding cards for a large group of
guests in advance so that the group is not delayed by this operation when they arrive.
Groups Group cards are encoded with a special code so that the new group cards do not
cancel current cards, and group cards will not affect the ability to replace lost cards
of current guests.
To manage groups, select Groups from the Reception menu or click on the Groups
Tool.
Once the starting date is set, the expiration date will automatically be calculated
based on the number of nights you selected. You can always manually set the
expiration date, if you prefer.
4. Press ENTER when you have finished entering the dates.
5. To select the rooms for the group, click on the Select Rooms button or press
ALT+E. When the room list appears, you can select individual rooms by
Double Clicking or pressing the SPACE bar.
6. To select several rooms, hold the left mouse button and drag the mouse to create
a rectangular block of rooms. Press the SPACE bar to select the highlighted
rooms. Selected rooms will be colored red.
Group Check-Out
Group Check-Out Button The Group Check-Out process is a simple operation to help organize your list of
groups. When a group leaves or cancels before arrival, there is no need to keep the
group in your list. The Check-Out process removes the group from the list and
clears the occupied status of the rooms in the Rooms List.
You can Check-Out any group at any time. The cards do not need to be encoded, and
the group does not need to be Checked-In. This can be useful if a group cancels a stay
before arrival.
To Check-Out a group, perform the following steps:
1. Select a group from the list.
2. Click the Check-Out button. A confirmation box will appear on the screen;
therefore, you can’t accidentally Check-Out a group. Click Yes to finish the
Check-Out operation.
After the Check-Out another message box will appear confirming the success of the
operation.
Peripheral Openings
The purpose of the Peripheral Openings window is to allow a quick and easy way
to see the number of times a particular guest used a particular door or amenity.
Peripheral Openings For example, you may wish to have front desk operators examine this list at
Check-Out and charge the guest based on the number of trips to the sauna.
The Peripheral Openings function will display or print the openings from any on-
line card reader or an insertion identifier. This data can only be retrieved from the
server PC.
To view this list, select Peripheral Openings from the Reception Menu, or click
the Peripheral Openings Tool.
The Peripheral Openings List will not include invalid access attempts. If you wish
to view the full audit recorded in an on-line reader, including invalid attempts,
select Peripheral Transactions from the Security menu.
Follow these steps to set up the definition of the openings you wish to see:
1. Select Peripheral Openings from the Reception Menu, or click on the Peripheral
Openings Tool.
2. Choose the peripheral you are interested in from the list and press the ENTER
key. The list of peripherals includes online wall readers and online identifiers.
3. Using the date filter, you can limit the openings you see to only those in the time
frame that interests you. The default dates are the beginning of this year and
today, but you can set these limits to any dates you choose. Type a date or use
the UP/DOWN ARROW keys to change the dates to limit your search. Only
those openings that fall between the dates will be shown.
4. The Function Filter can further limit your search to only those openings that
interest you. You can view all openings, only the openings for a particular guest
room card, special operations, or openings of a particular master card. Special
operations include the use of the Exit Button, Spare Cards, Programming Cards,
Canceling Cards, and other operations that might interest you.
Select the option button beside the filter you wish to use. If you are not viewing
all the openings, you must specify a particular guest room, master card, or
special operation from the selection list.
5. When you are satisfied with your filter criteria, click the OK button to view the
openings. If the list of openings does not contain the event you were searching
for, you can modify your filter at any time. To reset all the filters back to the
default, click the Reset button.
The openings list is a table showing all of the openings from the selected peripheral
that match your filter criteria. The table shows the date, time, and which card was
used. The ‘Denied Because’ column is empty because this view does not show
invalid attempts in the peripheral. To view invalid as well as valid attempts, use the
Peripheral Transaction function on the Security menu.
The table shows the openings in Real Time. This means that if someone uses their
card in this peripheral, you will see a record of the opening within moments of the
actual event. The system will scan the peripheral every few seconds and any new
openings will be added to the bottom of the list. If your list is long, you may wish to
turn this feature off while you look at your list so that the list is not changing. To
turn off the Real Time feature, click the check box at the top of the window so that
there is no check in the box.
Navigation Buttons With the Real Time feature turned off, you can use the special navigation buttons to
move to the first record at the top of the list, to the previous record, to the next
record, or to the last record at the bottom of the list.
To print your list, click on the Print button at the top of the window.
Task List
If there is a task running in an encoder, such as a PMS command waiting for the desk
clerk to perform the operation, the system will display them before you exit the
software. You can complete these tasks or discard them. This warning is to prevent
you from accidentally losing information or commands from the PMS
Managing master cards is one of the most important tools to keeping tight security at
any facility. A lost master card is dangerous because it can open many, if not all, of
the doors at a facility. There are three features of the TESA system that reduce the
risk of a lost master card – sequential encoding, master canceling cards, and
expiration dates.
• Sequential encoding means that an old card is locked out by using any new card
in a lock. This is the same principle that works with the guest cards.
• Master canceling cards will also lock out a lost master card. To be sure that a
lost master cannot be used, make a canceling card and dip it in all the locks and
readers. The canceling card will not unlock the doors, it will only cancel the
appropriate master type.
• The expiration date is an easy way to limit the risk of a lost master. If a master
expires in a few hours you may feel that a notification to all employees and a
watchful eye will get you through those hours.
The software makes managing masters simple and allows various levels of risk
management. This section explains all of the details about managing master cards,
master users and the security of your facility.
Revalidation
Revalidation is a new feature in the system that allows you to manage your master
users simply and effectively while maintaining the security of your facility. This
section will explain the basic philosophy of revalidation and the flexibility it offers.
First we will briefly discuss the traditional method of managing master cards.
Traditionally, master cards are encoded with an expiration date that will allow the
card to operate for several months. If a card is lost it poses a significant threat
because the card can enter all or nearly all of the doors in a hotel. To prevent an
incident the management must cancel the card using a master canceling card in all of
the TESA locks and by encoding new master cards for all users who hold that type of
card. For example, if a housekeeping master (HK) is lost, a canceling card should be
used in all of the locks, and all staff members who carry an HK master card must be
located to have their cards re-encoded. This process is time consuming and
inconvenient because all of the users must be found and their cards updated or they
will be locked out of the guest rooms.
To reduce some of the logistical problems you could issue daily cards to your staff.
These cards would work for only one day and then they expire. This reduces some
of the problems because everyone gets a new card at the same time each day, but
someone must encode all of those cards.
Suppose that each employee encoded their own card each day – automatically. That
is what the revalidation system does. Every day when an employee arrives for work
he inserts his card into the revalidation unit which reads the card and identifies the
user. If the user is still employed, the card is re-encoded, or revalidated, to operate
for one more day. If a card is lost it can be canceled as usual and the new
information automatically gets encoded on the proper cards the next morning.
The Master Users List is a table that shows many of the attributes of your master
users and the cards they hold. From this screen, you can perform all of the
Master Users functions necessary to manage all of your master card holders. These functions,
create, modify, encode, update and cancel, are accessed with the buttons at the
bottom of the screen.
To view this list, Select Master Users List from the Masters menu or click the
Master Users List Tool to open the Masters window.
If the list of doors is lengthy, you can check a particular door by typing it in the text
box and clicking the Search button. If this master can enter that door, the list will
jump to that door and highlight it. A message will be shown if this master cannot
open that door.
1. Enter the name of this user. Entering the full and correct name will help you to
find this user in the list in the future when you need to encode a new card or
cancel this user.
2. The Master Template determines where this master card can be used. For
example, a master template called 2nd FLOOR HM, would be used to access guest
rooms and housekeeping closets on the second floor.
3. Now you must select a shift for this Master User. The shift limits the time that a
card will work in the locks to a specific time window. Enter shift number 0 to
allow 24 hour access or refer to your property paperwork to select the appropriate
shift number for this user.
4. Next, you can choose if this Master User has certain special privileges. To select
a privilege, click the appropriate option button or press the space bar when the
option is hi-lighted. All special privileges are explained below.
• Override Privacy – This privilege allows the card to enter guest rooms even
if a guest has activated the privacy indicator.
• With Office Function – This privilege allows the Master User to place certain
doors into Office Mode so that they remain unlocked.
• Override Blocking – This privilege allows the master card to enter a room
that has been blocked by the Blocking Card.
5. Now, select any authorizations that this user will have. Authorizations allow
access to amenity areas, such as pools or exercise facilities.
1. The PIN information section applies when the master user uses a revalidation
terminal. If your facility is not using the revalidation function, leave the PIN
Information section completely blank.
• PIN – This is the Personal Identification Number that may be required for
the user to use a re-validation terminal.
• Ask PIN to revalidate card – If this box is checked, the user will be required
to enter the PIN to use the re-validation terminal.
• User MUST modify PIN – This box indicates that a user must change his or
her PIN during the next use of the revalidator.
• User CAN modify PIN – If this box is checked, the user has the option to
change his or her PIN during the next revalidation session.
2. The Revalidation Information section contains parameters used to determine
when the card will expire and what will happen when the card is encoded again.
This function is used to encode a guest canceling card. The guest canceling card is
a card with a special code that will lock the current guest card out of a guestroom
Encode Guest lock. Once the guest canceling card has been used in a lock, the guest must receive
Canceling Card a new guest card in order to get into the room.
To encode a guest canceling card, perform the following steps:
1. Select Encode Guest Canceling Card from the Special Cards menu or click on
the Canceling Card Tool.
Using a card with a new code 2. The screen will prompt you to decide if the code of the card should be changed,
in a lock will void any or if a copy of the existing code should be used. Make a selection by clicking
previous guest canceling one of the option buttons and press the ENTER key or click the OK button.
cards.
3. You will be prompted to insert a card into the encoder. When you have finished
encoding the card, your canceling card is ready to use.
4. Insert this card into any guest room lock where you wish to invalidate the cards
of the current guest.
This function is used to encode a blocking card. The blocking card is used to take
a room out of service for an off season or to seal a room after a criminal incident.
Encode Blocking When a blocking card is used in a lock, no other card will operate that lock, unless
Card it has the blocking override privilege. Typically, only high level master cards have
the blocking override privilege. The lock is restored to normal operation by using
the blocking card a second time in the lock.
1. Select Encode Blocking Card from the Special Cards menu or click on the
Blocking Card Tool.
Using a card with a new code 2. The screen will prompt you to decide if the code of the card should be changed
in a lock will void any or if a copy of the existing code should be used. Make a selection by clicking
previous blocking cards. one of the option buttons and press the ENTER key or click the OK button.
3. You will be prompted to insert a card into the encoder. When you have finished
encoding the card, your blocking card is ready to use.
The Maintenance Menu provides the most useful functions for monitoring and
maintaining the software and locks.
This function is used to transfer current data to the Portable Programmer. The
Portable Programmer (PP) is then used to update the data in the stand-alone locks.
Load Portable After 48 hours, the PP will erase this data as a security precaution.
Programmer
To load the PP with current data from the front desk console, perform the
following steps:
1. Connect the Portable Programmer and turn it on. See the System
Components section of this manual for details about connecting the Portable
Programmer.
2. Select Load Portable Programmer from the Maintenance menu or click on
the Load Portable Programmer tool.
3. Before you load data into the programmer, you must decide what data you
need to load. You can choose one of three choices. To select one, click on
the option button beside your choice.
• All Doors – Loads data for all of the stand alone TESA locks for your hotel,
or as much data as the Portable Programmer can hold.
• Select Doors – Loads only the data for the doors you select. This option
can save you time if you only need to visit a few doors. Click on the Select
Doors button to pick from the list.
Peripheral Diagnosis
This function is used to establish and monitor communications with all on-line
devices. There are three functions within the peripherals screen – Address, Update,
Peripheral Diagnosis and Change mode. These three functions are used to keep the data current and
determine the operating parameters in the on-line devices. The peripherals that
may be connected to the System include insertion and motorized encoders, guest
identifiers, and on-line card readers.
The main peripherals window maintains a list of these units and their current status.
The list shows the peripheral name, type, address, and communication status. To
open the peripherals window, select Peripheral Diagnostics from the Maintenance
menu, or click on the Peripheral Diagnostics Tool.
Updating a Peripheral
This function is used to transfer the current console data into an on-line reader
or identifier.
To update an on-line card reader or identifier, select a peripheral from the list and
click the Update Peripheral button. Updating can take a few moments for larger
hotels, so be patient.
The Station Diagnosis screen shows a list of all TESA computers. The list shows
which operator is logged in, the network address, if the station is communication
with its encoders, and the name of the computer. This information can be helpful
when troubleshooting problems.
When TESA technicians are making changes to the system, to add new doors for
example, the server must be the only computer accessing the files. This tool is useful
for determining which stations, if any, are logged in to the system.
Mastering Changes
Your hotel may have different mastering schemes set up. Having different schemes
allows you to change the way your guest and master cards operate the locks. It is
easiest to understand the way mastering schemes work with a good example.
Example:
If you occasionally have important visitors at your hotel, you may wish to have a
mastering scheme that only allows guest keys and emergency keys to operate the
guestroom lock.
You may also wish to lock rooms down if they are out of service such that only the
maintenance staff can enter the room.
With these scenarios in mind, we could create the following mastering scheme.
A) Standard – Guest cards and master cards function normally.
B) VIP – Guest cards and the EK card are the only functioning cards.
C) Maintenance – Maintenance master cards are the only cards that operate the
lock.
You can have a maximum of 3 different mastering schemes and you can switch
between these modes of operation at any time without requiring any action from
TESA. The schemes must be set up by TESA before they are available. If you do not
have mastering schemes set up and you would like to have this feature, call TESA.
You can use the ARROWS or the mouse to select a room. To change the
mastering scheme, Double Click, press the SPACE bar, or press the letter of the
scheme. To select rooms in a rectangular block, hold down the left mouse
button or hold down the SHIFT key and press the SPACE bar to toggle.
3. Press the ENTER key or click OK for the changes to take affect.
4. You will be asked to confirm that you really want to make the changes. Click
OK to confirm.
5. To inform the locks of the changes, you must load the PP with the new
information and update each lock. A message box will appear asking if you
want to load the PP at this time. If you say no, the changes will not occur until
you update the locks.
Note: You must update the locks with the PP before any changes will take affect.
The TESA system requires many data files to function properly. If these files are
ever corrupted by a hardware failure of the computer system or some other anomaly,
Backup Data
it is important to have a recent backup copy of the data files. The software has a
built-in function to make it easy to maintain these files.
TESA recommends that you back up your data files every day to maintain the
performance of the system.
What it Means
The Security Menu contains the functions most helpful in monitoring and
maintaining the security of the system and locks.
System Auditor
This function is used to view the transactions that have occurred on the computers.
The system records all the transactions that have occurred in the system, who made
System Auditor them, and when they were made. These transactions may be viewed on the screen, or
printed out.
To view the System Auditor, click the System Auditor Tool.
The System Auditor Report shows all of the transactions that matched the criteria set
up in the Filters window. If the list does not contain the information you are looking
for, you can adjust the filter at any time by clicking the Filter button.
The report shows the date, time, operator, operation, and location of each transaction.
If the transaction is a New Guest Check-In or a Guest Copy, the Details button will
show all the attributes of the card, including expiration date, authorizations, and
special privileges encoded on the card.
Note: If you need to scroll You can view a Real Time report of transactions if you check the Real Time check
through a long list, turn the box. As soon as a transaction takes place that fits your Filter criteria, an entry will
Real Time feature off. appear at the bottom of the list. The list will refresh every few seconds even if there
are no new events. After each refresh, the last transaction will be selected.
Peripheral Transactions
This function is used to display or print the audit trail from an on-line card reader.
This data is retrieved from the locks using the front desk console. The audit trail of
the on-line reader will include both valid access entries and invalid access attempts.
Follow these steps to set up the definition of the openings you wish to see:
1. Select Peripheral Openings from the Reception Menu, or click on the Peripheral
Openings Tool.
2. Choose the peripheral you are interested in from the list and press the ENTER
key. The list of peripherals includes online wall readers and online identifiers.
3. Using the date filter, you can limit the openings you see to only those in the time
frame that interests you. The dates default to the beginning of this year and
today, but you can set these limits to any dates you choose. Use the number pad
to change the dates that limit your search. Only those openings that fall between
the dates will be shown.
4. The Function Filter can further limit your search to only those openings that
interest you. You can view all openings, only the openings for a particular guest
room card, special operations, or openings of a particular master card. Special
operations include the use of the Exit Button, Spare Cards, Programming Cards,
Canceling Cards, and other operations that might interest you. All available
options are included in the selection list.
Select the option button beside the filter you wish to use. If you are not viewing
all the openings, you must specify a particular guest room, master card, or special
operation from the selection list.
5. Select whether you want to show all transactions, only openings, or only
incidences. Incidences include cards denied for many reasons. You can select
which types of incidences you want to see by checking the boxes to the right of
the screen.
6. When you are satisfied with your filter criteria, click the OK button to view the
openings. If the list of openings does not contain the event you were searching
for, you can modify your filter at any time. To reset all the filters back to the
default, click the Reset button.
The table shows the openings in Real Time. This means that if someone uses their
card in this peripheral, you will see a record of the opening within moments of the
actual event. The system will scan the peripheral every few seconds, and any new
openings will be added to the bottom of the list. If your list is long, you may wish to
turn this feature off while you look at your list so that the list is not changing. To
turn off the Real Time feature, click the check box at the top of the window so that
there is no check in the box.
Navigation Buttons With the Real Time feature turned off, you can use the special navigation buttons to
move to the first record at the top of the list, to the previous record, to the next
record, or to the last record at the bottom of the list.
To print your list, click on the Print button at the top of the window.
When smart cards are used by guests or staff in an HT28 smart lock, the lock can
write information onto the smart card after each use. This is one of the most
Card Activity Report
powerful features of the HT28 smart locks. This information can be very useful in
recognizing problems in the locks or with the cardholders. The information includes
which doors the card has been used to open, when those doors were opened, and if
Available only with those doors had low batteries or other maintenance issues.
HT28 Smart! To see a report of all the collected card information select Card Activity Report from
the Security Menu or click the tool.
The card activity report can be filtered to show only the data that is interesting to
you. You can view the activity of a particular master user, or the traffic through a
particular door, or any combination. The report can also be filtered by date so that
you get exactly what you want to see.
The Card Activity report shows a lot of useful data. Perhaps the most interesting is
the time and date that a user unlocked a door. This data is shown with the user's
name and the type of master card they used, the door name, and a lock status
indicator. If the lock status indicator shows 'Changed' you can view details of the
parameters stored inside the lock memory.
The lock status indicator will show if anything has changed in the parameters stored
inside the lock. If all parameters are normal there are no details to show. Each
parameter is explained below.
• Office Mode status – reports whether the lock is in office mode or not.
• Blocked status – reports whether the door has been blocked with the blocking
card
• Battery status – reports if the battery level is good.
• Code status - reports whether the card that was used has a new code or the same
code. When a lost master card is replaced, the new card gets a new code.
• Guest status – reports whether a guest canceling card has been used in the lock,
if a spare card is currently being used, if a suite card is being used, or if a normal
guest card is being used.
You can use this filter to view only the records with certain features, such as low
battery or only reports from this morning.
To narrow the view, check one or more of the filter boxes. Then select the records
you want to see from the list boxes on the right side of the screen. If a check box is
unchecked, the report will show all records for that category.
Unknown Rooms
Unknown button In some cases there may be rooms that do not appear in the list so their status is
unknown. Maybe the rooms did not fit the filter criteria, or maybe the room is not
accessed very often and there is no reading in the system. If you want to see the
rooms that do not appear in the list, simply press the Unknown button.
Operators
This function is used to enter system operators, their passwords, and their access
levels into the system.
Modifying Operators
Click the Modify button to change the attributes of an existing operator. The steps to
change attributes are the same as those to add a new operator.
Deleting Operators
To delete a system operator, select Operators List from the Security menu. Select an
operator from the list and click the Delete button. You cannot delete operators that
have the same level as you or a higher level. You may only delete operators with a
level lower than your own.
Language
The language option allows the system operator to view messages and screen text in
any of the loaded languages. To change the language of the system, simply select
the Language option from the configuration screen and pick a language from the list.
If a required language is not loaded with your system, contact a TESA representative
to check the list of available languages.
Station Configuration
There are a few parameters that must be set for your system to function properly.
These parameters can be adjusted by using the Station Configuration selection on the
Configuration Menu.
• Auto Log-Off – This option lets you choose whether the system will log users out
after a certain period of not being used. If the Enable Auto Log-Off check box is
Change Encoder
There is a feature in the software that allows online devices like encoders and wall
readers to be connected to any TESA computer. Encoders connected to a
workstation computer can be terminal encoders or PMS controlled encoders. In
previous systems, a workstation computer could only control one encoder.
If using this system, you must declare which encoder each workstation will use
locally. Choose Change Encoder from the Configuration Menu, and select the
encoder to be used by the local workstation.
This encoder will be used when making keys from the workstation.
Check-Out Warning
The system can warn you if you are about to perform a New Guest Check-In for a
room that has not Checked-Out. If you would like to use this feature, select Check-
Out Warning on the configuration Menu. If the feature is active, there will be a
check mark next to the menu item. To deactivate the feature, click again and the
check mark will disappear.
PMS Enabled
If your hotel has a Property Management System that is interfacing to TESA, the
PMS Enabled item on the Configuration menu must be checked. To change the
setting, simply click on the menu item.
Battery Operation
TESA locks are powered by 4 AA size alkaline batteries. These batteries are
expected to last between 2 and 4 years, depending on a number of factors.
Factors that can shorten battery life are:
A) The freshness of the batteries when they are purchased.
B) The number of transactions per day.
C) Extreme cold weather.
D) Battery quality.
TESA recommends the use of major brand batteries in the locks, such as
Energizer, Duracell, and Panasonic batteries. In installations where the lock will
be subjected to extremely cold temperatures, use 4 AA size Lithium batteries.
Both Alkaline and Lithium batteries may be purchased through TESA.
A low battery indication is given to staff cards for approximately one month
prior to the batteries being completely dead. The hand-held Portable
Programmer can also be used to check the level of the batteries.
Audit Trail
TESA locks use non-volatile memory to store a record of the most recent
openings. The TESA HT24 lock records the last 100 openings. This means that
the locks will not lose the audit trail, even if the batteries are removed. Reading
Panic Operation
TESA locks feature panic retraction of the deadbolt from inside the guestroom.
Operation of the lever from inside the guestroom retracts both the deadbolt and
the latch, fulfilling the requirements of various building codes, life safety codes,
and the ADA.
Magnetic Cards
Operating Instructions
Remove
Remove
card
from slot.
When
Open green light
appears,
depress
lever and
open door.
Red light
staffi
i Electronic Locking
Solutions
Card Care
Magnetic cards can be re-used many times without affecting the card. There are a
few precautions that can extend the life of the cards even further.
• Make sure the cards are clean. This is very important because dirt and grime
can scratch the surface of the magnetic stripe affecting the ability of the lock to
read the information. Dirty cards can also cause damage to the reader of the
lock and the encoding equipment.
• Make sure the cards are flat. The lock cannot read a card that has been folded or
creased.
• Keep the cards away from magnets. Because the information is encoded on a
magnetic stripe, magnets can destroy the data. Direct contact with a small
refrigerator magnet will erase all or part of a card.
In some instances powerful motors, such as the kind that drive some elevators,
can damage cards that are stored nearby.
• Throw away worn out cards. Eventually any card will become worn out. The
magnetic material will become thin and the information cannot be properly
encoded on the card.
Card Readers
Off-line
Off-line readers are stand-alone units that do not require connections to a central
computer. The off-line readers do require a 12-volt DC power supply to operate.
The off-line reader acts as a switch to control an electrical locking device, such
as an electric strike, magnetic lock, automatic door, or gate operator. In all other
regards, the off-line reader behaves like the stand-alone lock. The off-line reader
can operate in three modes – Standard mode, Selective mode, and Foyer mode.
On-line
On-line readers are devices that are connected to the front desk main console for
instantaneous update and audit capability. Each reader is connected to a controller,
which in turn is connected through the TESA HTCOM network to the front desk main
console. All Check-In and Check-Out information is immediately relayed to the
reader, so that access privileges can be granted or denied on a minute-by-minute basis.
The on-line reader acts as a switch to control an electrical locking device, such as an
electric strike, magnetic lock, automatic door, or gate operator. If the locking device
requires 12VDC power, and draws less than one Amp of current, the internal power
supply of the reader control unit may be used to power the locking device.
The on-line reader has a much larger capacity for data than the stand-alone locks. The
on-line reader can recognize the codes for up to 8000 rooms and masters, and will
store the last 8000 openings. If communication with the front desk console is
interrupted, the on-line controller continues operating normally with the last access
data received from the front desk console. Once communications are restored, the
front desk console will update the on-line reader with any changes made during the
interruption.
The on-line reader has a feature called anti-passback. This feature allows connection
of a second reader to the controller. The second reader is used to record exits. Anti-
passback only allows cards to re-enter an area if the card was used to exit the area. As
an example, if an on-line reader was used to control the gates in a parking deck, users
may freely enter the deck the first time. Once they use their card to exit the deck, they
may re-enter at a later time. However, if they were to enter the deck, then give the
card to a friend to allow them to park in the deck, the card will not allow the second
entry, because no exit has been recorded. This feature is optional; it is not active
unless requested at the time of setup.
Encoders
Encoders are used to create working guestroom and master cards for your TESA
locks. They can operate with a Property Management system or directly from the
software. There are several varieties of encoder available from TESA, each with
different features, but they all serve the same basic purpose.
Operation
Upon arrival at the hotel the guest receives a new room key. This key may contain an
optional authorization that may be required to operate the safe. Upon arrival to the room
the guest opens the door as usual. To operate the safe the guest inserts the room key into
the safe reader. (The safe MUST be unlocked). Upon insertion of the card both the green
and red LED’s illuminate. The guest should enter any random 4 digit code number. Both
LED’s will flash rapidly for 1 second, then go out. The guest should close the door and
enter the code again to confirm the code and lock the safe. To unlock the safe again,
enter the code number. The guest card is not used to operate the safe; it is only used to
program the code number for a new guest. Instructions for using the safe are provided in
the form of a large cardboard card suitable for wall mounting and a decal affixed to the
outside of the door of the safe. The card is provided in English, French, Spanish, and
German.
Should the guest arrive in the room and discover that the safe is locked, the guest card
will not operate the safe. Under these conditions, the safe must be opened by
management using either the safe master card or the Portable Programmer.
TESA recommends that every lock be tested twice per year for proper operation and
battery strength. This scheduled maintenance can coincide with the daylight savings time
change adjustment. Update the time in every lock, and run the Test function with the
portable programmer to make sure the keypad and all of the switches are functioning
properly. This function is also used to test the battery pack. Also test each lock by
inserting a diagnostic card. This will test the read head’s ability to read the data encoded
on a card. If the lock will not read the diagnostic card, clean the head with a TESA
supplied cleaning card. If you experience delayed red lights or erratic reading, cleaning
the head usually restores normal operation.
Battery Operation
TESA locks are powered by 4 AA size alkaline batteries. These batteries are
expected to last between 2 and 4 years, depending on a number of factors.
Factors that can shorten battery life are:
A) The freshness of the batteries when they are purchased.
B) The number of transactions per day.
C) Extreme cold weather.
D) Battery quality.
TESA recommends the use of major brand batteries in the locks, such as
Energizer, Duracell, and Panasonic batteries. In installations where the lock will
be subjected to extremely cold temperatures, use 4 AA size Lithium batteries.
Both Alkaline and Lithium batteries may be purchased through TESA.
A low battery indication is given to staff cards for approximately one month
prior to the batteries being completely dead. The hand-held Portable
Programmer can also be used to check the level of the batteries.
Audit Trail
TESA locks use non-volatile memory to store a record of the most recent openings.
The TESA HT28 lock records the last 500 openings. This means that the locks will
not lose the audit trail, even if the batteries are removed. Reading the lock will
produce a list of all cards used in the lock and the date and time they were used.
Smart Cards
In addition to traditional magnetic stripe cards, the HT28 lockset will read and write
to microprocessor cards and memory cards. Smart cards can not only store a great
deal more data than magnetic stripe cards, they are also more robust. Smart cards
cannot be damaged by magnets or small scratches that will destroy the information
on a magnetic card.
A variety of smart cards are available on the market today and all of them have
different features and capabilities. The TESA HT28 Smart system can work with
several different types of smart cards and memory cards – each with its own features
and costs. The section below offers a brief description of the cards offered and
approved by TESA.
Memory Cards
Memory cards, like magnetic card, can be freely written or read. Data on the card is
not password protected. Because of the lack of special security features, memory
cards are usually less expensive than microprocessor cards.
Microprocessor Cards
Microprocessor cards are really 'smart' cards. They are equipped with a tiny
microprocessor chip that can perform fairly complicated tasks such as password
protection and data encryption. Microprocessor cards can typically handle a much
larger amount of data than memory cards.
Card Care
Smart cards have the benefit of having powerful electronics in a convenient package,
and they should last for many uses. However, cards may become damaged quickly
without proper care.
Encoder
The HT22i Smart insertion encoder is based on the HT22i single-track manual
insertion encoder and uses an external encoder to encode smart cards. This is the
only TESA encoder that can encode smart cards.
The HT22i insertion encoder can be controlled directly from a PC or through
HTCOM in a PMS network. In addition, the HT22i can use the onboard display and
keypad to function as a terminal on the HTCOM network. From an HT22i in
terminal mode, users can create new keys and perform other transactions directly
with the PC acting as the server. Refer to the section of this manual about Terminals
for details.
• Display and keypad
The display on the HT22i encoder provides instructions and messages to the
front desk operator. The eight-line display is back-lit when messages are
displayed for easy viewing. The characters on the display can be made lighter
or darker by adjusting the contrast knob under the left rear ledge of the unit.
• Connections
The external encoder connects to the RS-232 port on the rear of the HT22i
encoder.
Portable Programmer
The Portable Programmer, commonly called the PP, is used to carry information
between the lock and the front desk equipment. It can also be used to open a
guestroom and to test the operation of a lock.
When the locks are first installed, the PP is used to initialize each lock to a
particular room number, load its table of room codes, and set the internal clock.
Note: Since the PP can be used to unlock a door, it should be secured when not in
use.
If you are unable to secure the PP, remove and reinstall one battery after use.
This will clear the memory and require that the PP be connected to the console
before it can be used again. Connection to the console requires a management
level password; therefore, proper security is maintained.
Batteries
The PP uses 4 AA batteries which are expected to provide about 50 hours of use.
If the display is not visible, the batteries must be replaced.
NOTE: While it is good procedure to select the proper room number with the
arrow keys, you will find that you cannot update a lock to the wrong room number.
The PP is intelligent in that it "knows" what lock it is plugged into and will update
the information for THAT lock. You will also notice that if you need to update
several locks, the room numbers disappear from the list in the PP as they are
updated.
READ Openings Option
The lock contains an audit trail of the last 100 openings. To view this audit trail you
must use the READ OPENINGS function of the PP.
To read a lock, follow these steps:
1. Go to the desired door and connect the PP.
2. Turn the PP on and select READ OPENINGS by pressing the
MENU key.
3. Press the green TX key.
4. Unplug the PP and take it to the front desk console.
5. Refer to the section on Lock Openings to print this report.
NOTE: You may read the openings of more than one lock. You will be allowed
to select which lock openings to print at the front desk console.
TEST Option
The TEST function will test most functions of the lock, including the batteries, the
electronics, and the handle switches. It will also indicate the reason a card was
rejected in a lock. A good time to test each lock is during the time change that occurs
twice each year, since you are at the door with the PP.
To test each lock, follow these steps:
1. Connect the PP to the lock, turn it on and select TEST with the
MENU key.
2. Press the green TX key. This will show you the room number of this lock,
the lock type and version, the door number and will test the red and green
lights.
3. Press the TX key again, this will show the date and time in the lock
and test the batteries. You should see "Batteries OK". If not, replace
the batteries.
HTCOM Network
The HTCOM network has a total distance limit of 4500 feet. That is the entire
distance from the communications distributor to the very last device on the
network. This distance limitation can be extended by using repeaters in the
network. If you require online devices with cable distances over 4500 feet,
contact TESA technical support for assistance in configuring your HTCOM
network.
Copy Guest
The steps to make an additional card for a guest are exactly the same as for a new
guest. Refer to the New Guest Check-In procedure above.
WARNING: Never make a copy for a guest who has lost a room card. Always
perform a New Guest Check-In to void the lost card.
Check-Out
To check a guest out of the hotel and mark the room as vacant, follow this one step
procedure. Using the number pad, enter the room number you wish to Check-Out,
then press ENTER. The screen will inform you when the operation is complete.
Options
There are many options available when using the revalidation system. Most options
can be different for each master user and the options are enabled on the Revalidation
tab of the Master Users screen.
Revalidation Increment
The revalidation increment is the length of time the expiration date of the card can be
extended when it is revalidated. The highest level of security is achieved with the
shortest revalidation increment. However, this could be very inconvenient for your
staff, so the option is left for management to decide for each specific card holder.
Note: We recommend that you set the revalidation increment less than or equal
to the shift that a card holder works. For example, if a card holder works an 8
hour shift, the revalidation increment should be set to 8 hours or less.
Enable Revalidation
You can prevent a master user from revalidating his card by simply disabling the
revalidation option. For example, you may need to speak with the staff member or
there may be a disciplinary reason to prevent revalidation. Whatever the case, the
card cannot be revalidated until you change this setting.
Revalidation Shift
The revalidation shift can be used to limit the time of day a master user can
revalidate his/her master card. This can be a useful tool to prevent large groups of
staff members from trying to use the revalidation station at the same time. It can also
allow you to maintain a tighter level of security over the master cards carried by your
staff.
• Once the card has been inserted, do not remove the card until the
display prompts you to do so. If using a smart card, this process may
take a few seconds for the system to recover the card activity
information.
• If a message has been entered for this user, the screen will beep and
prompt the user to press enter to see the message. The message will be
displayed on the screen.
Emergency Mode
If the revalidator loses communication with the main TESA server, the revalidation
process can continue in Emergency Mode. When this happens, the system has fewer
features and is intended to maintain active master cards until the connection can be
re-established.
To maintain the security of the revalidation system, a revalidation station will not
enter Emergency mode without a password.
- Guest Copy
- Check-Out
- Read Card
- Erase Card
- Groups
- Peripheral Openings
- Master Users
- Portable Programmer
- Peripheral Diagnostics
- Back Up Data
- System Audit
Troubleshooting
Amenity
An item or service that a hotel offers to some guests but not to all guests. There may
be a charge for the use of this service. Concierge lounges, guestroom safes and
fitness centers are some common amenities.
HTCOM
The proprietary communications network between TESA computers and peripheral
devices like encoders, revalidators and on-line readers.
ISO
International Standards Organization - This group defines standards such as
magnetic card encoding. TESA Motorized encoders can encode magnetic tracks 1
and 2 with ISO information.
Memory Card
A smart card with memory that can be written or read without requiring a password.
Microprocessor Card
A type of smart card with built in data security features such as encryption and
password protection.
Office Function
The ability of a lock to be unlocked for unrestricted access. This may be
accomplished by using an authorized card or automatically at predefined times. The
lock will remain in office mode until manually or automatically changed back into
standard mode.
PMS
Property Management System - A computer system used by hotels to control and
monitor the operation of the property such as reservations, billing and guest
reception.
Revalidation
A system used to effectively manage master card holders that reduces the
inconvenience associated with lost cards and the staff members who carry the cards.
Smart Card
A general term used in this manual to refer to any contact type memory card or
microprocessor card.