Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Product List
Cipher-Slide13

Another advantage is that in a CipherLinx® -based system, the encoder’s unique ID is available from the decoder. This identification can be used in various ways, including systems that record access attempts or applications where the originating user needs to be known. Also advantageous is how the modules hand user permissions. In conventional designs, all transmissions are recognized or denied based on the address. In a CipherLinx -based system, each encoder's permissions can be set separately to establish differing use or authorization levels. Permission settings control how the decoder will respond to the reception of a valid command, either allowing the activation of an individual data line or not. The next advantage is that the decoders offer the ability to select momentary or latched operation for the output lines. They can be set to momentarily activate an output while a valid transmission is being received, or they can be set to latch the output in a specific state which remains set until unlatched.

PTM Published on: 2011-12-06