KI BROWSER enables easy and safe use of kiosk systems and terminals by the end user.

KI BROWSER protects your system from unauthorized intervention by preventing access to operating system settings, system files, windows desktop and applications; and enables remote management.

Your system will be under your control from startup to shutdown.

KI BROWSER Specifications
  1. Installation and Configuration
    KI BROWSER is simple and fast to install and configure. As you move step by step while installing, you complete both the installation and the configuration of KI BROWSER.
    Configuration changes after the installation can be made via the configuration application with a graphic interface or via remote management.
  2. Security
    After you complete the installation and configuration, your system will be protected by KI BROWSER from the moment of startup.
    1. KI BROWSER operates your system with limited user's rights and allows only permitted operations and access to resources
    2. The functioning of the system, unwanted shutdowns, errors are controlled by both software and hardware via the security service or the optionally provided KI Card; and high access is provided
    3. Operating system message windows and warnings are detected by KI BROWSER security service and hidden from the view of users
    4. The pop-up windows that automatically open on the displayed websites without the user's consent are closed without showing to the user, enabling convenient and efficient use of the network line
    5. Shortcut key combinations (CTRL+Esc, Alt+Tab, CTRL+Alt+Del vb.) are disabled in order to prevent modification of the system configurations
    6. All information created in the system is stored in the embedded database. In case the system shuts down or cannot transfer the information for any reason, no information is lost.
  3. Customization
    KI BROWSER's features can be chosen based on need and only required features can be activated
    1. KI BROWSER interface can be customized by using model templates or a completely new visual can be prepared to match the corporate visual of the company which will use KI BROWSER
    2. One of the ready-made pages can be used as the homepage; or, a completely new homepage can be prepared and used
    3. The virtual keyboard option is disabled in the models with physical keyboard, allowing only the use of physical keyboard
    4. KI BROWSER supports the use of more than one language. One of the predefined languages can be preferred; or, to use a language which was not predefined, the necessary definitions can be easily made
    5. The second monitor in the system can be activated upon request to display advertisements, announcements and other similar content
    6. The components necessary to use the hardware installed on the system and to enable remote monitoring of the status information can be easily prepared and integrated. Thus, a completely new hardware (printer, camera, card reader, cash unit etc.) can be used with KI BROWSER
  4. General Specifications
    The following specifications come ready to use with KI BROWSER. Optional specifications can be enabled or disabled based on needs
    1. Internet Explorer based web browser
      Using the Internet explorer technology, KI BROWSER provides all security and display opportunities of Internet Explorer to the end user.
    2. Tab Support
      The user can use more than one browser window at the same time



    3. Browser Toolbar
      The browser toolbar enables scrolling the pages up and down, returning to previously visited pages, displaying the virtual keyboard and customizing the display and the status



    4. Virtual Keyboard
      When the Virtual Keyboard is activated, the keyboard appears on the touch-screen and enables data entry and use on the systems with no physical keyboard.



    5. Customizable Alerts
      In cases of internet disconnection, inaccessible pages, paper jam in the printer or breakdown in the card reader, the user is noticed with predefined alerts. The end user sees the preferred predefined alerts instead of the alerts of the operating system
    6. User Recognition
      The optional KI Card provides the possibility to do the desired operations and to move on to the requested pages when a user shows up in front of the system or a current user leaves
    7. Phone Module
      The optional phone hardware dials a predefined number when the receiver is lifted. The keypad displayed on the screen at that moment enables calls or other IVR applications.
    8. Access Restriction
      Users can only display the content of the permitted addresses based on the prohibited and permitted addresses defined during configuration



    9. File Display
      The files on the Internet/Intranet websites (Word, Excell, Powerpoint, avi, mpeg) can be displayed on the system if permitted
    10. Picture/Video E-Mail
      The optional Picture/Video module allows users to record and e-mail their pictures/videos
    11. Charging and Payment
      Payment options (credit card, cash) are defined and the user is provided the requested services upon collection of the fee. Tariffs for services subject to a fee can be defined through configuration application after the installation; or, they can be modified remotely through the remote management application
    12. Remote Management
      KI BROWSER can be configured remotely, system status and the functioning of the devices in the system can be periodically monitored from the head office through the optional remote management application
    13. Remote Monitoring
      KIB logs, status information on the terminal, pages visited by users are periodically communicated to the head office and can be monitored from the central monitoring application.
    14. Alarm Management
      High priority errors on the terminal (hardware breakdown, opening of the kiosk cover, a reduction in the system resources etc.) are communicated to the center so that the necessary measures can be taken
    15. Printer Support
      All thermal and laser printers in the system can be used for print-outs. Printer status can be displayed to the end user before use upon request; and alerts are sent to the center if necessary (running out of paper or toner, paper jam etc.) to provide logistic support
    16. Determining Work Hours
      System monitors can switch to standby mode on defined days and hours to save on monitor use life.
      The days and hours on which the system will be closed and re-opened can be determined via the optional KI Card. The KI Card completely shuts down the system at the predetermined time. It prevents the system and its hardware from working unnecessarily while not in use and saves energy.


i-Access Management

Supervisory software functions

Supervisory actions

  1. Define Group: Kiosks in the field can be grouped according to specified criteria such as province, region, district, etc.



  2. Define Kiosk: These pages are used to define new kiosks that are to be added to an existing system.



  3. Display User List: This page lists users that the system recognizes and who have been assigned different authorization levels to check kiosks' statuses and to monitor and intervene in their use.



  4. Add User: These pages are used to define new users who will be allowed to monitor and intervene in kiosks' use.
  5. Change User: This page allows changes to be made in existing users' authorization levels and access codes.
  6. Display Page List: Generates a list of pages that kiosks are allowed to access.
  7. Add Page Group: Accessed pages may be grouped. For example if there are three different addresses used for online banking, all three of them can be grouped together as "Online Banking" pages.



  8. Add Page Name: Names made be assigned to accessible pages to make them more intelligible than just their addresses would be.
  9. Add Page: Add a new address that may be accessed.
  10. Change Page Group: Make changes in previously defined page groups.
  11. Change Page Name: Make changes in previously defined page names.
Kiosk Status List

Display detailed information about kiosks, sorted according to the groups they are in.

  1. Group name
  2. Unit ID
  3. Location (Branch where the kiosk is located)
  4. IP address
  5. Most Recent FTP (When the most recent file transfer took place)
  6. Most Recent Click (When the page was most recently used)
  7. Ping (Check the page's Ping accessibility)
  8. Application
  9. Case (Cabin doors open/closed)
  10. Power (UPS on/off)
  11. Proximity (User present/not present)
  12. Temperature (Cabin temperature)
  13. Printer (Printer status)
  14. Printer Paper (Printer paper status)
  15. KCC (Kiosk Control Card function status)
  16. Memory (RAM capacity and status)
  17. Hard Disk (Disk capacity and remaining space)
  18. Application Version (Current revision number)
  19. Controller Version



The "Most Recent FTP", "Ping", "Application", "Case", "Power", "Printer", "Printer Paper", and "KCC" cells will appear red, orange, or gray. Gray means the function is operating normally. Orange signals the possibility of a critical situation while Red indicates that an emergency exists. By clicking on the link over a particular feature it is possible to display only the kiosks where an emergency exists for that feature.

Operational actions

After selecting one or more kiosks, the operator can take the same action with all of them: Restart, Shutdown, Send Files.

Reports

Detailed Kiosk Current Status Report

This is a more detailed version of the report displayed on the Kiosk Status List page.



Visit Numbers Report

This report shows the pages that were visited from kiosks, the groups the pages belong to, and the numbers of hits.

Unnamed Pages Report

This report displays a list of pages to which names have not been assigned. The operator may assign names to such pages if he wishes.

Daily Usability Report

This report shows the amounts of time (as percentages of the total) for a given date that kiosks have been out of use due to connectivity problems.



Customized Reports

  • Operational Command Report

    Shows any problems ("Fail", "Connection cannot be established" etc) that may have been encountered when kiosks were restarted or shut down as well as when these problems occurred.
  • File Upload Report

    Shows the upload statuses ("Failed" / "Succeeded") of files uploaded to kiosks as operational actions.
  • Activation Statistics Report

    Shows the number of people who used kiosks during a specified period of time.



Specific Visit Reports

  • Visit Numbers Report

    Shows the pages that were visited from kiosks, the groups the pages belong to, and the numbers of hits during a specified period of time.


  • Most Active Kiosks Report

    Shows the most and least frequently used kiosks during a specified period of time.


  • Unused Kiosks Report

    Shows kiosks that were not used at all during a specified period of time.


  • Website Hit Count Report

    Shows what websites were visited how often during a specified period of time.



  • Visited Page Report

    Shows what pages were visited on what days during a specified period of time.
  • Page Group Visits Report

    Shows how often page groups were visited during a specified period of time.
  • Detailed Page Group Visits Report

    Shows how often page groups and the pages in each group were visited during a specified period of time.