Funkwerk UDSS Manual

UDSS
Universal DECT Secury System
•Professional Emergency Signal System for Personal Security in hazardous areas and for lone
workers
•Message and telemetry handling system for direct communication with all portable handsets
Technical Information Brochure

Technical Information Brochure Universal DECT Secury System 10.05.2012
2
Document type Technical Information Brochure
Product UDSS: Universal DECT Secury System
Publisher Funkwerk Security Communications GmbH
John-F.-Kennedy-Str. 43-53
D-38228 Salzgitter
Phone:+49 5341 2235-0
Fax: +49 5341 2235-709
This document is protected by copyright.. All rights reserved. The copying, distribu-
tion, translation or conversion of this document in its entirety or any part thereof,
whether in electronic or otherwise machine-readable form, is not permitted without
the permission of Funkwerk Security Communications GmbH.
Subject to alteration without notice.
Suggestions and
enquiries ... regarding this technical information brochure or products should kindly be directed
to the above address
Last amendment 10.05.2012

Technical Information Brochure Universal DECT Secury System 10.05.2012
Table of Contents 3
Table of Contents
1 Functional Description of UDSS .......................................................................................................... 4
1.1 What is UDSS? ..................................................................................................................... 4
1.2 Personal Emergency Signal Functionality ............................................................................ 6
1.3 Messaging ............................................................................................................................ 7
1.4 Operational requirements .....................................................................................................8
1.5 Operation of the UDSS ......................................................................................................... 9
1.6 UDSS supported by Inductive Localisation Beacons .......................................................... 10
1.7 Alarms ................................................................................................................................. 11
1.7.1 Alarm types............................................................................................................. 11
1.7.2 Alarm parameters ................................................................................................... 13
1.7.3 Login and log-off in the secure Secury mode ......................................................... 14
1.8 Localisation of personnel ....................................................................................................15
1.9 Alarm Activation .................................................................................................................. 16
1.9.1 Schematic representation ....................................................................................... 17
1.9.2 Processing an alarm ............................................................................................... 18
1.9.3 Expanded alarm procedures .................................................................................. 19
1.10 Application limits ................................................................................................................ 19
1.11 Scope of supply ................................................................................................................. 19
1.12 Commissioning .................................................................................................................. 20
2 UDSS Server ........................................................................................................................................ 21
2.1 Overview ............................................................................................................................. 21
2.2 Function .............................................................................................................................. 21
2.3 Connection type .................................................................................................................. 21
2.4 Secury Software ................................................................................................................. 22
2.4.1 Overview ................................................................................................................. 22
2.4.2 Configuration and Operation .................................................................................. 22
2.4.3 Warden’s Rounds Command and Control System (optional) ................................. 23
2.5 Guard module versions ....................................................................................................... 24
3 Handsets .............................................................................................................................................. 25
3.1 Technical data .................................................................................................................... 25
3.2 Handsets | Messaging-only Function .................................................................................. 26
3.3 Handsets | Alarm Function.................................................................................................. 27
3.4 MemCard ............................................................................................................................ 27
3.5 Accessories and enhancements ......................................................................................... 27
4 Inductive Localisation Beacon........................................................................................................... 28
4.1 Overview ............................................................................................................................. 28
4.2 Function .............................................................................................................................. 28
4.3 Properties ........................................................................................................................... 29
4.4 Technical data .................................................................................................................... 29
4.5 Accessories and Spares ..................................................................................................... 30
5 Application examples.......................................................................................................................... 31
5.1 Mid-sized retail business ....................................................................................................31
5.1.1 Technical Service ................................................................................................... 31
5.1.2 Security Personnel and House Detectives ............................................................. 31
5.2 Mid-sized business in the recycling industry ....................................................................... 33
5.2.1 Machine operators and assistants .......................................................................... 33
5.2.2 Electrician and mechanic ........................................................................................ 33
6 Abbreviations....................................................................................................................................... 35

Technical Information Brochure Universal DECT Secury System 10.05.2012
What is UDSS?
Functional Description of UDSS
4
1 Functional Description of UDSS
1.1 What is UDSS?
Funkwerk Security Communications now offers you the full performance package of
a professional personal emergency signal (PES) system with competitive operating
costs: the UDSS versions of the latest Funkwerk FC 4 DECT handset generation
employ standardised transmission mechanisms and can be fully integrated with
GAP-DECT systems.
A multiplicity of performance features is available to ensure the personal security of
your employees, allowing optimal adaptation to your individual requirements – inclu-
ding the precise localisation of casualties.
Alarm events are shown clearly at the control centre, enabling an immediate appre-
ciation of situations, even though they may be complex. Appropriate measures can
then be taken. Devices equipped with high-performances sensors recognise certain
hazardous situations automatically and send the corresponding alarm, with an exact
position of the incident, directly to the control centre or the handsets of the emer-
gency response team.
In addition to the personal emergency signal functionality, the UDSS also has
messaging features, allowing the operators to send manual messages. In the event
of machine or personal alarms, messages are automatically sent to the DECT hand-
sets.
Intrinsically safe (explosion-proof) versions of the FC4 are available for use in envi-
ronments with a high explosion risk, be it due to a gas or dust atmosphere.
The speech channel of an active telephone call is used to exchange information
between the UDSS server and the handsets for the messaging, personal security
and localisation features. Data is transferred in-band by means of a special modula-
tion technique. To enable the UDSS server and the handsets to react very rapidly,
Calling Line Identification Presentation (CLIP) is required.

Technical Information Brochure Universal DECT Secury System 10.05.2012
What is UDSS?
Functional Description of UDSS 5
Functional Structure
In the case of a personal alarm, a technical device alarm or a beacon-based (ILB)
localisation report, the mobile device opens a speech channel to the ISDN card of
the UDSS. The relevant UDSS server MSN is initially defined in the system and pre-
configured as a data sink in all the UDSS devices. The addressed UDSS server
accepts the call immediately and then awaits the modulated telegram data. This data
is then analysed by the UDSS server and is indicated in text and on a floor-plan at
the alarm control centre, as well as being relayed to the handsets.
ILB
DECT-login and handover
compliant with GAP/CAP
Server connection via
the S0
subscriber connection
FC4 U | FC4
Telephone
exchange UDSS server
Alarm relay via speech channel on DECT network
Acknowledgement via speech channel on DECT network

Technical Information Brochure Universal DECT Secury System 10.05.2012
Personal Emergency Signal Functionality
Functional Description of UDSS
6
1.2 Personal Emergency Signal Functionality
By using a personal emergency signal system, the risk of injury to personnel can be
minimised and damage to property can be avoided.
In accordance with the directives of the German Employers’ Insurance Association
regarding personal emergency signal systems (BGR 139), as well as DIN VDE 0825-
1, the Funkwerk UDSS can be used to safeguard the personal security of lone
workers.
The automatic, sensor-based recognition of emergency situations by the DECT
handsets, and the automatic relay of alarms to other active personal emergency
signal devices in the system, enables assistance. to be rendered rapidly.
•Compatible with existing and new systems
•Compatible with standard DECT systems (GAP/CAP)
•User-friendly display of alarms and alarm management
•The precise localisation of a casualty (using the optional ILB) enables an accu-
rate position to be displayed on the floor-plan of the alarm management system
•Rescue services can be guided directly to the accident site by means of the
alarm, together with the location, being relayed to mobile units
•Cyclic monitoring of the radio signal coverage and the functionality of the device
ensures serviceability
•Remote-controlled eavesdropping function in the event of an alarm
•Server-based alarm indication and alarm management
•Connection to commercial telephone exchanges via ISDN subscriber terminal

Technical Information Brochure Universal DECT Secury System 10.05.2012
Messaging
Functional Description of UDSS 7
1.3 Messaging
The messaging feature of the Funkwerk UDSS makes it possible to send text
messages and numerical sequences wirelessly between users. The UDSS server
enables messaging between:
•system handsets of an existing DECT system
•system handsets and external messaging sources and destinations that have
system-compliant interfaces with the UDSS server.
•The alarm is displayed at the alarm management point of the UDSS server.
The UDSS server is an addition to the telephone exchange infrastructure and its
capabilities include messaging as well as several Secury functions. It directs the
process of messaging to the DECT handsets and enables the connect of system-
compliant personal paging systems.
Users can manually create individual text messages via the alarm management point
or retrieve defined texts from clients or handsets. These texts can then be sent to
individual subscribers, groups or all subscribers.
If an alarm message is generated by a particular machine, a text message can be
sent automatically to the responsible employee. The content of the message must be
predefined and assigned. In this way, all relevant information can be conveyed: for
example, the designation of the machine, its location and the error code of the alarm.
To indicate the various levels of urgency of the messages, it is possible to set up
further programming in addition to the standard signalling. The standard signalling of
all call types is a vibration alarm as well display and keypad illumination. The melody,
display duration, signal duration and the signal volume can be set individually for
each call type.
PLEASE NOTE
Further information regarding the topic of messaging can be found in the “Funkwerk
Professional Messaging” document.

Technical Information Brochure Universal DECT Secury System 10.05.2012
Operational requirements
Functional Description of UDSS
8
1.4 Operational requirements
In order to operate a Funkwerk UDSS, a telephone system with a DECT wireless
capability that supports DECT GAP/CAP and CLIP features is required. The Funk-
werk UDSS is integrated with the DECT network supplied by the client by means of
the internal S0-bus of the telephone exchange.
The CLIP feature is a basic requirement for the operation of the UDSS and must, if
required, be subjected to a system test prior to delivery. A list of tested exchanges is
available under the Partner tab of the Funkwerk website.
Example of a customer-supplied telephone exchange system
Legend
Symbol Meaning and features
Customer-supplied telephone exchange with GAP/CAP and CLIP features
Connection cable for the DECT stations and DECT Repeater
Telephone network (optional)
DECT station or DECT repeater

Technical Information Brochure Universal DECT Secury System 10.05.2012
Operation of the UDSS
Functional Description of UDSS 9
1.5 Operation of the UDSS
The UDSS server is linked to the internal S0bus of the telephone exchange. The
UDSS server uses the existing DECT system as a communication path to the termi-
nals. In order to be able to use the functions of the UDSS, Funkwerk DECT handsets
are required, see the section on „Handsets“ (Page 25).
Connection between the UDSS and the existing telephone exchange
Legend
Symbol Meaning and features
UDSS server – see chapter „UDSS Server“ (Page 21) on UDSS server,.
S0-connection cable between the UDSS server and the internal S0-bus on the
existing telephone exchange
Customer-supplied user-interfaces (monitor, keyboard, mouse)

Technical Information Brochure Universal DECT Secury System 10.05.2012
UDSS supported by Inductive Localisation Beacons
Functional Description of UDSS
10
1.6 UDSS supported by Inductive Localisation Beacons
Inductive localisation beacons (ILB) can be used for the precise localisation of
personnel. The more ILBs that are installed, the more precisely a person can be
localised.
In order to operate, the ILBs need only be supplied with electrical current (24 V or
230 V). Further information regarding ILBs can be found in the chapter on „Inductive
Localisation Beacon“ (Page 28).
In the standard configuration, information regarding the immediate position of a
handset is only transmitted to the UDSS server in the event of an emergency. If
required by the client, continuous monitoring is possible – see the section „Warden’s
Rounds Command and Control System (optional)“ (Page 23). The type of monitoring
depends on the programming of the terminals.
UDSS supported by Inductive Localisation Beacons
Legend
Symbol Meaning and features
Inductive localisation beacon (ILB) continually transmits unique localisation codes
in a defined area

Technical Information Brochure Universal DECT Secury System 10.05.2012
Alarms
Functional Description of UDSS 11
1.7 Alarms
The mobile personal emergency signal devices are equipped with manual and auto-
matic alarm triggers.
The manual alarms are at first only indicated locally by means of an aural signal on
the mobile device that triggered the alarm (pre-alarm). In order to prevent false
alarms, the pre-alarm can be cancelled within a pre-set reaction time by the user.
1.7.1 Alarm types
Manual modes
Alarm Alarm designation Application
Pushbutton alarm 1:
Single touch of the
button
Active Alarm:
Observed danger
Pushbutton alarm 2:
Button pressed 3
times
Active Alarm:
Observed danger
Warning alarm 1:
Single touch of the
button
Request for support, call for assistance
Warning alarm 2:
Button pressed 3
times
Request for support, call for assistance
Automatic alarm modes
Alarm Alarm designation Application
Loss alarm
Tag is torn away Detection of an attack situation:
(Seizure of device)
Position alarm
Device is tilted at least
55º
Fall or feinting

Technical Information Brochure Universal DECT Secury System 10.05.2012
Alarms
Functional Description of UDSS
12
The reporting parameters of each alarm mode are individually programmable in
terms of:
•reaction time
•pre-alarm time
•aural alarm signal sequence and volume
•signal and display duration
Time-out alarm
A pre-programmed
key is not pressedafter
a predefined time has
elapsed
Periodic testing for activity
Man-down alarm:
Device is static and is
not moved within a
predefined period of
time
Lack of movement
(Person is trapped or unconscious in a
seated position)
Automatic alarm modes (cont'd)
Alarm Alarm designation Application

Technical Information Brochure Universal DECT Secury System 10.05.2012
Alarms
Functional Description of UDSS 13
1.7.2 Alarm parameters
All alarm parameters are configured in a programming tool and are saved to the
memory card of the device via the USB MemCard dongle or a special programming
cable. The user can have all the alarm parameters displayed in a PIN-secured
Secury menu. This has the advantage that in the event of a devices being swapped,
the new device can be taken into use immediately simply by exchanging the
MemCard.
Config software

Technical Information Brochure Universal DECT Secury System 10.05.2012
Alarms
Functional Description of UDSS
14
1.7.3 Login and log-off in the secure Secury mode
Directly after removing the FC4 U device from the desk-top charger, the user is
required to test all active (as enabled by the programming of the device) security
sensors. If required by the customer, the commencement of the start-up test can also
be carried out manually by means of an appropriate menu. Only after the successful
completion of the start-up test will the device automatically login to the UDSS server.
This test process is performed each time the device is taken into service or at least
once every 24 hours. The cyclic monitoring of the connection between the handset
and the UDSS server now begins. During this monitoring, the handsets are conti-
nuously tested for device faults. If a device develops a fault or reports a communica-
tion failure, then this information is reported immediately.
Log-off occurs automatically when the device is placed in the desk-top charger.
Cyclic monitoring of this FC4 device then ceases. As with login, log-off can also be
performed manually by means of a menu selection. Cyclic monitoring of this FC4 U
device then ceases. As with login, log-off can also be performed manually by means
of a menu selection.
PLEASE NOTE
Automatic testing of individual sensors and automatic login can also be switched off,
if the customer so requires.

Technical Information Brochure Universal DECT Secury System 10.05.2012
Localisation of personnel
Functional Description of UDSS 15
1.8 Localisation of personnel
In order to localise personnel in the field, the UDSS must be aware of the actual posi-
tion of the mobile devices being carried, thus determining the locality of each indivi-
dual. A permanently installed network of inductive localisation beacons (ILBs) is
required to enable localisation.
Already when the DECT handset is logged-on to the secure mode, the user is
required to enter the signal field of an ILB (this requirement can be switched off as an
option). Each permanently installed ILB continually transmits a unique localisation
code. The transmission ranges of the ILBs do not overlap and cover an area of only
a few square metres (transmission range can be preset). On leaving one transmis-
sion range and entering another, the newly-acquired localisation code is detected
and saved by the handset. The last three ILB-codes are memorised by the handset.
In the event of an alarm, the last-saved ILB codes are transmitted to the UDSS
server. The direction of movement can be extrapolated from this data. The actual
position is indicated at the alarm management point of the UDSS server by means of
a symbol on the floor-plan and as text.
Secury software display (screen-grab) indicating precise localisation by means of localisation beacons.
The use of inductive localisation beacons makes room-specific localisation possible.
Further information regarding the ILBs and examples of the configurations can be
found in the section „Inductive Localisation Beacon“ (Page 28).

Technical Information Brochure Universal DECT Secury System 10.05.2012
Alarm Activation
Functional Description of UDSS
16
1.9 Alarm Activation
If an FC4 U sensor detects an alarm situation or if the user triggers an alarm manu-
ally, the handset transmits an appropriate alarm telegram. The telegram includes the
most recently received ILB code (site of the alarm) and the type of alarm. The base
station or the repeater in whose reception area the alarm has been activated relays
the alarm to the UDSS server. Alarm activation takes place by means of a dial-up
connection between the handset and the UDSS server.
The UDSS server evaluates the alarm telegram. The ILB code is converted into
appropriately configured text information. The received alarm is displayed in graphic
and/or text form at the alarm management point of the UDSS server. A server
acknowledgement is sent to the handset initiating the alarm. All in-coming alarms
reports are saved as a data set in a database transaction table. At any stage, a
history of alarm reports can be requested from the alarm management point of the
UDSS server for subsequent evaluation.
If the control point is not manned continuously, then all alarms can also be relayed
via messaging to other devices in the field. In this case, the location report is
displayed as text.
Depending on the configuration, an alarm can also be relayed to external devices
(not connected to the DECT system): for example, to mobile radios or landline tele-
phones or in the form of e-mail.

Technical Information Brochure Universal DECT Secury System 10.05.2012
Alarm Activation
Functional Description of UDSS 17
1.9.1 Schematic representation
Schematic representation
Legend
Symbol Meaning and features
Call for help / alarm activation
Message is relayed
Assistance is dispatched

Technical Information Brochure Universal DECT Secury System 10.05.2012
Alarm Activation
Functional Description of UDSS
18
1.9.2 Processing an alarm
Having received an alarm at the alarm management point of the UDSS server, the
personnel are required to take four processing steps.
The procedure requires that the following steps be executed:
1. The alarm in progress must be cancelled actively via the Secury software.
The message HELP IS ON ITS WAY is displayed on the handset that initiated the
alarm. This indicates to the user who initiated the alarm that the alarm is being
processed and that assistance intervention is being initiated.
On successful transmission of the display message, the handset that initiated the
alarm automatically sends confirmation to the UDSS server.
2. On completion of the rescue or assistance intervention, the person in charge
must issue a positive reset-authorisation for the relevant handset via the Secury
software. Resetting can also take place on the move from FC4U or FC4 hand-
sets.
The message ALARM ENDED is displayed on the handset that initiated the alarm.
On successful transmission of the display message, the handset that initiated the
alarm automatically sends confirmation to the UDSS server.
3. The alarm must be reset by means of a softkey on the handset that initiated the
alarm.
Once the alarm has been reset successfully, the handset that initiated the alarm
automatically sends confirmation to the UDSS server.
4. Finally, once processing of the alarm has been completed by means of an anno-
tation entry at the alarm control point of the UDSS server, it is deleted from the
report list.
Done.
PLEASE NOTE
Resetting can also take place on the move from FC4U or FC4 handsets.

Technical Information Brochure Universal DECT Secury System 10.05.2012
Application limits
Functional Description of UDSS 19
1.9.3 Expanded alarm procedures
The alarm procedure can be altered to suit the requirements of the customer. Thus it
is possible in an emergency, to activate the speaker mode of the handset without any
intervention by the user being required. (This function can also be remotely cont-
rolled.)
In the event of hostage-taking, it makes sense to mute the handset and not allow the
device to display any indication that help is on its way. Simultaneously, the handset
can be switched to an eavesdropping mode, which cannot be recognised on the
handset.
If the control point cannot be manned continuously, escalation scenarios can be
defined on the UDSS server.
The UDSS also provides for the automatic relaying of outgoing alarms as messages
to other handsets. In this way, the person responsible for responding to the alarm is
notified of an emergency situation within seconds by means of a display report. The
message contains information reporting the sender, the type of alarm as well as the
location of the alarm. The alerted personnel can then hurry directly to the location of
the alarm or man the UDSS server alarm control point, in order to deal with the
alarm.
If the alarm is not processed at the alarm control point within a predefined time, the
UDSS offers the possibility of escalating the alarms. These escalation scenarios are
defined according to the customer’s requirements. For example, warning lights and
sirens can be switched on after a preset acknowledgement time has elapsed, or the
alarm can be relayed to GSM devices or be e-mail. Even extensive relay scenarios
can be achieved by means of a script.
1.10 Application limits
If the Funkwerk UDSS is used as a personal emergency signal system, a maximum
of 30 Funkwerk FC4 U DECT handsets with a personal emergency signal function
can be operated simultaneously via the UDSS server. The management of larger
systems requires the Funkwerk DSS. Further information regarding the Funkwerk
DSS is available on request.
1.11 Scope of supply
The following elements are included in the scope of delivery of the UDSS:
•A UDSS server (industrial PC- with operating system installed and Secury soft-
ware (ready to configure)
•A licence dongle
•An installed and pre-configured S0card
•A power cable for the UDSS server
•A back-up CD with user manual.

Technical Information Brochure Universal DECT Secury System 10.05.2012
Commissioning
Functional Description of UDSS
20
1.12 Commissioning
Preparing the UDSS
server for operation The procedure requires that the following steps be executed:
1. The UDSS server must be connected to the existing telephone exchange via the
internal S0- bus.
2. Customer-supplied user interfaces (monitor, keyboard and mouse) are connected
to the UDSS server.
3. The UDSS server is powered up.
The server boots up
All the necessary software tools start automatically
4. Login to the UDSS server
User: Operations mode in this mode no settings are possible
Administrator mode: This mode is used to configure the system.
5. Enter the MSN of the UDSS server into the software tool on the server.
6. Test the connection between the UDSS server and the telephone exchange by
means of the software tools.
UDSS server is now operational.
Login of handsets to
DECT network The procedure requires that the following steps be executed:
Systems-dependent login of handsets to the DECT network
Handsets logged-in to system
Login of FC4 U
handsets to server The procedure requires that the following steps be executed:
FC4 U handsets are set to the Secury mode
Login takes place automatically on the UDSS server
FC4 U handsets now logged-in to server
Configuration
process of the UDSS
server
The procedure requires that the following steps be executed:
Customer-specific configuration of the Secury server software and the handsets
is executed (floor-plans, call groups, handset designations etc)
UDSS server is configured
Done.
PLEASE NOTE
A comprehensive start-up and initial configuration guide is included with the system.
Table of contents
Other Funkwerk Cordless Telephone manuals