IDX HOME

CASINO HOME

WICKETS - RFID

    --   WR77 READER

    --   CARDS & TAGS

    --   TABLE TRACKER

X-Mark TOKENS

COIN ACCEPTORS

     --  X-10 Xeptor

     --  X-20 Xeptor

     --  X-50 Xeptor

     --  X-60 Xeptor

     --  X-70 Xeptor

CRAPS DISPLAY

ACCESSORIES

   --  Personality Plugs

   --  Coin Selectors

   --  X-Key, X-Tracker

   --  Xaminer

   --  XaminerPC

TECH SUPPORT

HOW TO ORDER

CONTACT US

ABOUT IDX

Google

 
  IDX   Web

 

 

X-Key
Electronic  Security  Key  For  Xeptors
 

INTRODUCTION
The X-Key is an electronic security key for use with IDX Xeptors. After an X-Key is first used with an Xeptor, the Xeptor becomes "Secured" from further manual coin programming unless the X-Key is plugged in. The X-Key keeps a record of the serial number of each Xeptor to which it was connected and the Xeptor records the X-Key serial number, the time and date stamp, and the personnel ID of the person who enabled the X-Key.

 The X-Key is enabled and disabled through X-Tracker, an MS Windows based software utility for managing and tracking X-Key activity. One does not need to use X-Tracker software to obtain the first level of security from tricksters who may wish to surreptitiously change the coin programming of your coin acceptors. Treating the X-Key as you would any other important key will allow you to lock down your coin acceptors.  However, by using the X-Tracker software described below, you can also have the knowledge of who changed what when.

 



X-Tracker
X-Key Management Software

 

INTRODUCTION
The X-Tracker is a Windows based software utility for managing and tracking X-Key (release-2) activity. An authorized personnel roster is set up and enables these personnel to "log-on" to an X-Key, which enables it to communicate with and enable an Xeptor. The personal ID and a time and date stamp are stored in an encrypted redundant file system on the PC and in the X-Key. When the X-Key is used to enable changes to the "learned coins" of an Xeptor, this same information is stored in the Xeptor and the serial number of the Xeptor is stored in the X-Key. Responsibility for the X-Key is terminated by X-Tracker "log off". This disables the X-Key and stores the log-off information, including the Xeptor serial numbers in the redundant encrypted PC log files.

Security Roster
The Security Roster Screen is used to determine access authority for each of the screens. Those at the Master Security Level can access all screens. Those at the Basic Security Level can only access the X-Key Log On / Log Off screen shown below. Be careful to remember that all entries are case sensitive. Names must be 2 to 15 letters long and the secret code must be 4 to 6 letters/numbers long. The ID number in the far right column is a 16 bit number computed from the First Name and Last Name entries and is the personnel ID number actually stored in the Xeptor by an enabled X-Key.

The information on this form is stored in an encrypted file to deter hacking by an employee with less than honorable intentions. If this form is printed to maintain a record of authorized personnel, IDX recommends that it, and any copy of it, be stored only in the locked files of management not normally accessible to others.


X-Key Log On / Log Off
When this screen is activated, the PC will try to communicate to the X-Key over the specified serial COM port. The X-Key should NEVER be connected to the PC and an Xeptor at the same time. Information about the last four "Logs" on the X-Key are displayed in the window on the left. The serial numbers of any Xeptors that have been enabled for programming by the X-Key will be listed in the right window. When the X-Key is enabled, its LEDs will be green and the Current Log will display only Log On information, but no Log Off information.


View Activity Log Files
The Activity Log File is a simple list of all activity, including Log On / Log Off of an X-Key, the list of Xeptor serial numbers enabled by an X-Key, who viewed, changed or printed the Security Roster, and who viewed the Activity Log File. This information is also kept in an encrypted file to deter hacking by an employee with less than honorable intentions.

This file may be viewed by log-date or by user name. When the file length grows larger than the window, a scroll bar will appear. Any Xeptor serial numbers are associated with "Log Off" activity. Click this record, and an additional window to the right will appear to show the serial numbers.


Xeptor Configuration
By connecting the computer's serial port directly to the Xeptor, you can read the contents of its configuration memory. All of the parameters used to determine coin acceptance, sensor calibration, and option configuration may be viewed. Information which describes the meaning of each of these parameters is available in a help window in the lower left. A record of the last three people who altered the program (along with a time and date stamp) is displayed in the upper right. Finally, a deciphered summary of the self diagnostic bytes indicating sensor status, operating problems, and the coin programming security status of the Xeptor is reported in the middle window on the right.

 

X-Tracker Download

 

 This product protected under the following patents US6564997, AU6653600, AU753887, CA2323844, GB2357620