A.P. Unix Software is uniquely experienced to solve your security and web services needs with a touch of a finger. Explore our site to learn about A.P. Unix Software's history, and discover how we can provide for your software needs.
Setting the standard for reliability, robustness and user experience.
Our value is delivered in multiple ways.
A.P. Unix makes maximum use of open-source software, avoiding the costly licensing and security problems associated with the Windows platform. This doesn’t mean we don’t interface with Windows/OS based devices, because we do. We just don’t use it as the basis for our software platform.
Our platform is Java® based, which means that we have the most flexible software that can be ported to different computers, workstations - even handheld devices. A.P. Unix was awarded ‘Best in Show’ at Kiosk.org for porting a complete kiosk to an Ipaq hand-held.
Our appliance hardware establishes new standards for relaibility, security and remote operation. No disk means no reboot and it means automatic recovery from local power interruptions. We also pioneered the concept of Plug and Go - ship the kiosk to the field location, pick where it goes in the store, plug into AC power and connect to a network. That’s all it takes.
Value means we leverage your asset investments - you are not going to change your database structures or software to accommodate A.P. Unix.
- Embedded Computing
- Cloud Computing
- Propietary Toolkit Approach
• One Code Base
• No Custom Programming
- Custom CPU Boards
- Control Unit
- Vault Unit
- Smart Lock Boards
- Smart Motor Control Boards
- Integrated UPS
- Remote Vault Interface Module (VIM)
- Four Universal Peripheral Connectors
• Relay Controlled
• 12/24v Power
- Four RJ45 USB Lock Connectors
- Daughter Card (Wifi, Bluetooth, More I/O, etc.)
- External Connections
• Two USB
• Two Ethernet
• Alarm Interface
- Quad/Dual Core CPU
- Lock Boards
- Motor Control Boards
- UPS Board
• USB Based Design for easy connection, power and reuse in new designs SecureIP protected access
• Low Cost PIC
• Microprocessor with USB
- Superior Support
- Over 35 Calendar Years of Expertise
- Read-only OS
- Robust behavior to abrupt Power On/Off
- Plug and Run Technology
- Lower Total Cost of Ownership
- Front End Applications
- Web Services
- Android Applications
- Back-End Systems
- Databases (DB2, SQL, Server, Oracle, Sybase, etc.)
- XML (web service portals)
- TCP / IP (VISA-1, Proprietary Systems, etc.)
- Device Management
- Real Time Monitoring
Security between the safe and the cloud servers provided through state-of-the-art Blowfish™ cipher encrypted VPN channel using certificates based authentication.
All products are part of a cloud computing solution.
Each product in the field is totally plug and play.
No software is loaded in the field, no system configuration is done, and no networking configuration is required. Just plug the power in the wall and the network cable in the back and the system will start up and run.
Summit web services run redundant, replicated servers to handle all the back end data storage, management, configuration and reporting functions. This is done using industry standard XML messaging which can be easily interfaced to most other systems whether they be Java® or .NET based.
An important part of cloud computing is security. Our security between the device and the cloud servers is the best available. The only access to the device is through a state of the art Blowfish cipher encrypted VPN channel. Encrypted certificate based authentication is used to establish the connections between the device and the cloud. Full Blowfish encryption has never been broken.
Solid State Computing Platform
Key to any electronic product’s reliability profile is the platform upon which it is built. All products are built using a proven solid state architecture. A true computing applicance (e.g. Kiosk, Router, DVR or Smart TV) all share the same hardware profile: a diskless and fanless computer with read-only operating system. This removes the most common sources of failures in the field: disk drive failure and corruption of the operating system caused by sudden power on/off events.
Linux-Based Open Source Operating System
The device's embedded operating system built on a robust and reliable version of Lunix is known as the leading platform for security and immunity to attacks from the outside world. On top of Linux, we create and load our own proprietary enhancements. The operating system is configured and runs in ultra-secure mode with its own embedded firewall that blocks all external inbound access to the product. The product communicates through a single outbound encrypted VPN tunnel to the server cloud. The system is virtually immune to viruses, worms and other common attacks that occur to computers on the internet.
A key component in the solution is our in-house developed, proprietary device driver support for all the peripheral devices in the device product line. This includes drivers for touch screen devices, printers, i-button, locks, relay boards, cash validators, cash recyclers, coin counters and coin dispensers.
An open source database, MySQL is used both on the device and the cloud servers for data management, storage and reporting. MySQL is widely recognized in the industry as rivaling the most expensive commercial databases for speed and reliability and in many cases out performs them.
In addition, we have the avantage of having access to the complete source code for any piece of software starting from when the computer leaves the boot prom until the last pixel is painted on the screen. We rely on no third parties to find, fix or release patches for their software.
Common Application Development Platform Based on Java® System
Our products operates from a single code base. Each application is crested using our point and click based rapid application development tool. No custom programming is created for any individual application. This is important as it allows us to focus on enhancing and maintaining a single deployment engine and not specific code written for specific applications or specific customers. With this approach we are able to develop, test and deploy applications in terms of weeks instead of years.
It also means we are able to make modifications and changes to meet evolving customer needs quickly and efficiently. Lastly, since no custom code is being developed, we are able to easily and cost effectively support and maintain all deployed solutions.
The programming of our common code base is in Java®. Java® is known for providing a robust and reliable deployment platform that frees the application from problems, such as pointer errors and memory leaks. That always occur with other programming languages. Applications developed in these other environments often take years to debug and are in reality never truly bug free. With Java®, we can deploy our application knowing that it is capable of running for years at a time without reboot or reset and will never cause a system freeze.
It is inevitable that some electronic safes will eventually fail in the field. This can be due to either a power supply failure, hardware electronic failure of for our competitors, disk or operating system corruption. Traditionally, the only way to deal with this issue is to send someone to the safe to drill the safe open and then repair, secure and get the safe back online.
With our patient pending Drilless Lock™ Technology any service device with a USB interface and loaded with our Secure IP™ application can be used to unlock a failed safe. All locks in the safe can be both controlled and powered by the USB interface. In order to actually unlock the lock, the service device runs our Secure IP™ application which reads a challenge code from the device. This challenge code is then sent to our Global Security Operation Center and only after extensive verification of the requestor, location and circumstances is a response code issued to enable the requestor to properly unlock the safe.
• Allows the user to determine their data structure (dashboard, raw data, etc...)
• Allows the user to see only data which is relevant to his/her function (Risk Reporting, Treasury Reporting, HR Reporting.)
• Allows data to be sent on a fixed schedule or on-demand.
Devices have full remote management access via an intuitive web-based portal. Through a highly secure connection and encrypted login credentials, companies are able to maintain constant contact with their deployed devices and perform a comprehensive set of activities including:
System Administration - Site configuration, software revisions, accepted configuration, safe registry, and current firmware log can all be viewed and managed remotely. Precent full thresold (safe cassette), door open and content removal email alerts provide pro-active notification of situations which may require action.
Device Monitoring - National, regional and city monitoring of all devices in the network (at a glance through Google Maps), real-time device status visibility, and device failure or maintenance alerts. This allows remote visibilty and management of all units deployed in the field. Should onsite maintenance be required, the service technician can arrive knowing the specific issue to be resolved.
Manager Functions - User access can be granted, updated or removed. Departments associated with a safe transaction, authority to perform activities by function (e.g. Manager, Cashier), type of manual drops (e.g. checks, gift cards) and shifts can all be defined and managed from a central location.
Reporting - Robust business intelligence capabilities with site specific or system-wide reports available upon demand. Standard reports include Deposit Activity Report, Enrolled User Report, Error Report, Site Configuration Report and Site Cash Totals Report. Custom reporting on specific data within a specified timeframe is available to support analysis of specific transactions and maintenance activities.