Rediware Software © 2004, v 1.1.6 2018

      Securentry software was originally designed to be used with custom made hardware designed and manufactured by WCB Inc. Sadly, the hardware designer has passed away, so this becomes a do-it-yourself project as of June, 2018. This software package is dedicated to Bill, my dear friend.
       The total package (software and hardware) enables the user to maintain a secure keypad entry system complete with customizable access codes, logs of all activity, and the ability to change any aspect of the system by persons authorized to make such changes. The entire software system is protected by secure, encrypted information to prevent even a computer-savy person to access any part of the software without the proper access codes. Practical uses for the Securentry system include storage rooms, latchkey children, club houses, or any other area you wish to control access to. The Securentry system also monitors all usage of the system so you can know who did what, and when.
     Unlike most security systems, Securentry does not require a monthly service charge or fee. Securentry runs from your computer and is maintained by you, the owner. Software help is free via e-mail. Hardware service maintenance is no longer available.
     This documentation discusses the software aspects of Securentry. Hardware documentation, if it becomes available, is contained in a separate document.

     Some of the screenshots contained in this document may not appear exactly as they do in the application. Minor changes to the program will cause the text in this documentation to change, and only major changes will cause the screenshots to be updated. You will notice some minor differences.

     When Securentry has been installed, you may wish to create a shortcut of the securentry.exe program and place this shortcut in your startup folder. The will insure that Securentry will run automatically when your computer is rebooted. It is recommended (but not required) that you have a dedicated computer to guard your system. A low cost older style computer is sufficient.


     I have added to this document (June 2018) to provide help with the hardware end as I understand it.
     Before your keypad is built or wired, you may use a gamepad (or joystick) to configure and test this software. I used the ProPad Blue gamepad, but any multi-button gamepad or joystick, properly installed should work well. After your keypad is built or wired, you will use the gamepad port as your keypad port. As detailed below, this software has the ability to access two gamepads simultaneously (players 1 and 2) and therefore you can have two keypads if desired.
     This software reads the input of the gamepad port and controls the output of the serial (RS232) port. This means your locking / unlocking mechanism must be tied into your serial port. My knowledge stops here. I do not know what pins are used on the serial port on the hardware end, or how to connect a locking mechanism to it. I do know the software uses a true / false switch. This is where you, the hobbiest comes in.
     The initial default of this software configures the serial port on com 1, 9600, 8,n,1.

Getting Started

     Upon the initial loading of Securentry, you are presented with the main window. This window allows you to see everything that goes on in Securentry, allowing you to keep an eye on events. It also presents you with one of two keypad interfaces. The first interface is the software interface shown in the picture. The second one, of course, is your hardware keypad.

     The picture above shows the main window, with some activity going on. The keypad shown can be used in place of the hardware keypad entry. Like the hardware, it expects an access code to be entered. Use your mouse to enter the access code. Each number clicked will be represented by an asterisk in the box below the pad. When a complete and correct access code has been entered, the automatic door lock (installed by your technician) will open and entry can be gained. The door will then automatically lock, after a preset time (designated by you).

     The clear button will clear the entry at any time, allowing you to start over should you decide not to complete the entire access code for any reason. After a specific time out, predetermined by you, the partially entered code will remove itself.
     The unlock and lock buttons are not being used in this version.

     The 'delay' box displays a countdown when a delay between processes is in action. The 'keypad' box displays the last keypad used. The 'reboot' box displays the time when Securentry will automatically reboot your computer to refresh itself. This is configutrable on the 'auto reboot' tab discussed later.

     Because this is a secure system, the starting interface is limited with a small help key. This help key is only for first run users and displays this message:

    Immediately after installation the door can be unlocked with the access code 1111. All secure areas of the software need to be accessed with a manager's password. Initially this password is 1111. After becoming a bit familiar with the software, you should change these two numbers. They are done on the configuration window which will be discussed below. For security reasons, do not leave Securentry on guard unattended with these codes in place. Change them before using Securentry.

     The system status block tells you the last events that have occurred. As you become familiar with all of the actions Securentry can do, you'll begin to see familiar patterns in this block. At a glance you can see the last event that took place.

     The delay box is simply an indicator. Some routines have a delay in them, such as the time between your door unlocking and then locking again. All delays are configurable by you, the user. When a delay is in process, this box displays the countdown. You know that Securentry is working correctly at this time even if nothing else seems to be happening at that time. The keypad box is also just an indicator. When a hardware keypad is used, this will display which pad is being used.

     The announcement button allows you to play a prerecorded announcement created by you (via a wav file) to all who click it. This can be used for special instructions for employees, children, or members of a club.

     The log block has a few variations. Securentry gives you the option of viewing the first screen of the current log, viewing the entire log, or hiding it completely. You may or may not wish those who enter to view any portion of this log. Normally this log is visible, but only the first screen full The log cannot be scrolled to view the rest of the log without unlocking it. Click the unlock button, and enter the manager's password (initially 1111) to gain access to the rest of the controls. Once the log is unlocked, you can scroll it to view the entire log. You can also clear the current log and start from scratch. If you wish to save parts or all of the log, use the log configuration (discussed below) before clearing. While the log is unlocked, you may elect to make the log invisible by clicking the 'visible' check box to remove the check. It will appear like this:

visible log                                                                            invisible log

     After doing what you need to do, click the lock button so that further access to the log is restricted unless the manager's password is entered again.

     In mist applications the quit key needs no explanation. In Securentry, you should know that the application can only be ended with the manager's password entered.

     Every time I mention 'manager's password' you are probably wondering where that would be entered. It's time to tell. When ever you are about to enter a secure area, you will be asked for this password. A box will pop up allowing you to enter it. Enter the password (initially 1111) and click OK. You will then have access to the restricted area. The box looks like this:

     There's one button left that I haven't discussed. It is the configuration button and takes you into another dimension of Securentry. This is the area where all the configuration, maintenance, and decisions are made. Click the configuration button, enter the manager's password to gain entrance, and let's see what lies beyond.

     The configuration button, accessed with the manager's password, will open up another window that contains tabs. To enter data and maintain the information contained here, simply click on the tab you wish to work with. I will discuss each of the tabs individually, and describe that they do.

     When the configuration window loads, the first tab will be shown by default. The entire window is called the configuration window, and in this window is the first tab, the configuration tab.

The configuration tab

     As you can see, some of the entries are labeled 'reserved.' This is for future expansion, and do not require any input from you. As Securentry expands to meet future needs, these may become used. At that time documentation will include text for these areas.
     I will briefly describe the input required for each box. It is up to you to decide what you wish to enter. Note that all tabs are self-loading. This means that as you select each tab, the appropriate file will load and fill in the entries that have already been saved. Most tabs also have a 'load' and 'save' button. If you make changes and then decide you wish to start over, click the load button, This will load the file again. When you are finished making entries and wish to make them permanent, click the save button Nothing is finalized until you save it. If you forget to save changes, you will be prompted to do so before closing the window. You can also elect to not save the changes you made. Once you save your changes, they become active within the program.

manager password: Change your manager password here. Make sure you remember it! There is no way to retrieve this information if you forget except to e-mail your configfile.sec file to me via It is also important to change this password before putting Securentry into action.
com port number: This will normally be set by your installation technician. If you decide to change the port that your computer uses, you can change it here. Valid port numbers are from 1 to 4.
start log as visible?: Type a Y here to always have Securentry begin with the log on the main window visible. If you wish to always start Securentry with the log invisible, type a N here. You can always change it here, or view an invisible log by clicking the unlock button (previously discussed) on the main window.
access code size (digits): Enter here the length of the access codes. Note that all codes must have the same length. If your access codes will have 8 digits, enter an 8, as shown here. You can have access codes from one digit (definitely not recommended!) to ten digits long.
last digit to enter (or N): If you wish to have a final digit that all access codes contain, which tells the system "OK I'm done entering my access code - check it and let me in", you enter that digit here. This is simply a different method of code entry. If you wish to have Securentry process in the normal manner, which is to begin processing when the maximum code size is reached, enter an N in this box. If you enter a digit from 0 to 9, all access codes can be extended in length by one. (maximum code length plus the 'enter' digit). If you have a need to change all codes periodically and do not wish to assign everyone a new code, you can use this method and change only this last digit. You can use the digit selected within the access codes themselves too.
door unlocked for (secs): this is the time delay, in seconds between the time the door unlocks after entry of a successful access code and the time the door automatically locks again. This number can be between 1 and 99. The minimum seconds recommended is 8, which is about one-two seconds longer than the door open buzzer sound.
delay before open (kybd): When an access code is entered from the computer by clicking the keypad with the mouse, this number is the delay time before the door unlocks. This gives time to actually walk over to the door to exit. This number can be between 1 and 99.
valid buttons (fmt=0-9): This is the range of valid single digits you wish Securentry to be able to output in the access code range (excluding letters or extra symbols). There is no limit on the range you can enter here, but it should consist of the range of numbers on your keypad. If you wish to use a zero or a nine for a single button exit, then you would limit this range t oexclude that number. For example, if 9 will be your single button exit number, then the format 0-8 would be entered here. This prevents someone from using that single digit exit code to gain entry. The standard keypad capability is 0-9 and you can use all digits and still have a single digit exit button by assigning it to a combined button and a two digit output code as seen below on the keypad tab. Although you will enter 0-9 for valid keypad buttons, Securentry can emulate any character for any button. A bad entry here can cause problems. Your technician can tell you what this should be, or set it for you. For all standard installations, this should read 0-9. Be sure to enter the numerical range with a minus (-) sign between the numbers as shown in the example.(fmt= 0-9)
word processor location: Use the folder icon to locate your word processor. This will become useful on the 'logs' tab. I recommend using WordPad as your associated word processor with Securentry. I have used WordPad for testing Securentry's special logs capabilities and know that other word processors may not give the desired results. You are still free to select your word processor of choice.
enter code timeout (secs): Enter here the number of seconds you wish to give someone to enter their access code. This is important because in someone enters some keys and walks away, Securentry needs to know to clear itself after a specific period of time so a genuine access code will not be refused.
manual exit key number: This number should be outside or your range of normal accepted keypad numbers so that it cannot be activated within someone's access code. It should not lie within the standard rance of 1-8. It is preferable to use a two-digit number to keep this obvious. This number is selected by you as a number that, when generated, will simply generate a "single key exit" entry into the log. This key should be hard-wired to open the door on it's own rather than have Securentry open it. You can use this for emergency exiting. Be sure to code this in the keypad tab (described below) for it to work correctly.
     The status bar at the bottom of the tab control will notify you when a file from one of the tabs is read or written. This is your indication that your read or write was successful.

     The remainder of the inputs are reserved for future use.

     Don' forget to save the configuration when finished. These values do not become effective until the save button has been pressed. If you do not want to make your entries permanent, do not save and click 'yes' when notified that "you have not saved your configuration file - do you still wish to close this window?" If you wish to start over at any time (before saving) just click the load config button.

The users tab

     The users tab keeps track of the individuals who can use or have used the Securentry system. The first thing you should do is change the default 'new member' to yourself, giving yourself an access code you will remember, and within the guidelines set up by the configuration and keypad tabs.
     The users list is displayed upon selecting the users tab. Each user can have a series of items that is attached to that user. You cannot edit a user's properties directly in the user list, except for the access code. To edit just the access code, click on the code twice and enter the new code. Be sure to follow the guidelines you have set up on the configuration and keypad tabs. The length of the access codes MUST be the same as was designated in the configuration tab.
     To edit the other properties of any user, check the check box associated with that user and click the edit button. This will remove the user from the list and bring it down to the edit boxes below the list. Notice how the information has moved from the list box to the editing boxes below.

Edit the access code, name, and phone number of the user directly in the edit boxes. You may use any characters for the access code, but they need to be buttons that are visually on your keypad, and have been defined in the keypad setup tab (discussed below). Select a status from the dropdown box. You cannot enter a status directly in the status text box.

     Status items that have a + sign will admit the user if the correct access code is entered. Status items with a - sign will be rejected regardless of the code entered. You can temporarily reject any user by changing the status of the user without having to delete the user or change their access code.
     The notes box can contain any notes you desire.
     You can select a personal sound file for each user. This is a sound file that will be played each time the user enters their code. It may be a musical ditty, a vocal announcement, or can be left blank. This sound file must be in either wav or mp3 format and reside in the application's 'sounds' sub folder. I will discuss the details of sound files later. To select a sound file, click the open folder icon, select wav or mp3 in 'file of type' dropdown, and select a sound file. Then click the 'open' button.

     You may hear the sound file after selecting by clicking the button with the notes on it. If a sound file is selected, the user who enters the correct access code will hear the announcement sound file first, followed by their personal sound file, and finally the door buzzer sound file. The door unlocks with the buzzer sound and not before. Keep this in mind as files played before should be as short as possible. When all data is entered as desired, click the add button to add it back into the list.
    To add a user, use the edit boxes as described without bringing an existing user down, and add it when finished. To delete a user, check it's check box and click the remove checked button. You can also use the check all and uncheck all buttons for deleting multiple users at one time.
     As with the other tabs, the save users will make your edits permanent. To start from scratch, if you haven't used the save button, click the load users button to load the original file back in.

The logs tab

     The logs tab makes easy work of maintaining the log that accumulates in the log window on the main screen. The log tab consists of two partitions. The left partition contains the currently active log and is taken directly from the main window's log. The right partition is a copy of the log on file stored on your drive. You can edit directly in either partition. Use the buttons in the center to replace, add, or clear a partition. Note the arrow indicators on the buttons. They point to the partition that will be affected. The add and replace buttons transfer data from one partition to the other. Because there are two independent partitions, there are two sets of load and save buttons The currently active log retrieves the data from the main window log, or sends the data in this partition to the main window log. The load and save log buttons load or save the data in the 'log from file' partition from or to the drive. Edits can be undone by reloading the appropriate partition as long as the save button was not pressed. When you have the info you want in the log on the main screen in the left partition, click the 'send to main' button. When you have the information you wish to save in a permanent log file on your drive in the right partition, click the 'save log' button. You can play around with these buttons to get comfortable with them, back and forth. As long as you do not save the results you will not affect anything. This log is simply a record of al activity in Securentry.

create doc files tab

     This is an easy tab! At this time there are only four buttons and each button is associated with the files that Securentry uses. Using these buttons is the only way you can view Securentry files with a word processor. This is because the files are stored in encrypted form, and loading them directly into a word processor will look something like this:

     This is a security measure. When you use any of these buttons to view the associated file, it will be loaded into your word processor as plain text. It is then up to you what you wish to do with the information. It can be saved as a normal readable file with your word processor, but the level of security is now in your hands.
     The word processor that will be used will be the one you selected on the configuration tab. I highly recommend using WordPad. The programming was designed for it, and it is a word processor that every one has. The results (formatting) may differ that what is intended using another word processor. Here is a sample of the configuration file in WordPad using the 'configuration doc' button.

     When you are done viewing the file, close your word processor to return to Securentry.

sound files tab

   The sound files tab gives you access to all the sounds that Securentry uses except for the personal user sound files. As in most of the other tabs, there is room for expansion. The labels describe the action, and the sound file (mp3 or wav format) that accompanies it is the sound that will be played when this action occurs. These files can be changed or omitted at any time on this screen. As with the user sound file, load the name of the file using the open folder button. Select to view mp3 files (default) or wav files. Select the file and click OK. Listen to the file with the notes button. As with the other tabs, you must save them after editing by using the 'save sound files' button. You can also start over again as long as you haven't saved them with the 'load sound files' button. It is important to note that ALL sound files, including the users' personal sound files, must reside in the application's sub folder called sounds. If it is not located there, the sound will not play. You can change files in that folder at will, rename them, or delete them. As long as this screen is current, your files will play at the time these events occur. If a sound file does not exist for a particular event, the only thing that will happen is that no sound will play.
     When this tab loads, a check is made to see if the designated sound file exists in the proper folder. If it does, the green indicator will be bright. If it does not, the indicator will be dull. If you make adjustments to the sound files to get them in order, clicking the 'refresh lights' button will perform the check again. In this way you can make sure your sounds are all active.
     Most of the sound files can be in either mp3 or wav format. The preferred format is the mp3 format as they are more compact. However, playing an mp3 file requires more overhead within Securentry than playing a wav file, and therefore wav files are manditory for sounds that coincide with Securentry's need for a quick response. The three files that can only be wavs are the first three listed. The default files that come with Securentry are mp3 files except for the first three. These sounds are timing sensitive, because Securentry needs to be ready for the next key press or automatic door unlock. The wav files for these sounds allows Securentry to react much quicker.

     Default sound files will be distributed with Securentry. You can use sound files that you find on the web, create your own, or have professionally created sound files for your specific application for a small fee from WCB Inc / Rediware Software.

key setup tab

     The keypad setup tab is designed for the technician who installs your Securentry system. After installing Securentry, your technician will configure this screen. If you decide to install the system yourself, you will need to configure this screen for Securentry to work properly.
     The 8 boxes labeled 'keypad common grounds' provides spaces, 4 for each keypad, to enter the buttons that have common grounds. It is not necessary for you to enter anything in this area, but only serve as a reference should your system need service.
    The remaining text boxes must be configured for Securentry to work. The screen is divided into keypad 1 and keypad 2. Any numbers put into keypad 1 will be designated as an entry key because keypad 1 should be installed on the entrance. Numbers entered into the keypad 2 area will be regarded as an exit key since keypad 2 (if you decide to install a second keypad) should be installed at the exit or at the entrance of another door.
     The columns under the wired header represents the hardware end of the keypad. If a single button will be active if it is the only button pressed (such as 1-8 on keypad 1 above), just enter that button number in the first 8 rows. If more than one button will be wired together, enter those button numbers in the wired column in the remaining rows, such as 24 entered above (wires 2 & 4 wired together), 35 entered above (wires 3 and 5 wired together), 41 entered above (wires 4 and 1 wired together) etc on keypad 1. Button numbers must be in the range of 1 to 8. . Note that there are 8 rows in each frame (one for each keypad) that are separated from the others. It is not necessary, but it is recommended that single button keys (a button active by itself) be entered in these spaces. The remaining spaces can be used if you are wiring multiple buttons together to generate new key presses.
     The bin column is not filled in by you.
     In the output column, enter the number that this key press should be interpreted as. This would normally be a single digit number, and is the button number you wish Securentry to recognize. Notice that in keypad 2, buttons 2 & 3 are wired together and the user wishes then to output a 'button 1.' In all cases you will enter the desired output except for a special codes, such as the single-digit exit code (which was entered on the configuration tab). These numbers will be highlighted in yellow. The column labeled bin is not filled in by you, but by your computer. It is the binary equivalent of your wired selection.
     In the K(eys) column, you must enter the actual physical key character that will be pressed on the keypad. This is the character that makes up the user's access codes. You can put in any character at all. The K character that you enter in the yellow highlighted rows do not matter. You do not have to enter a K character if the output will be treated as a special code. Normally these K characters will be numbers, and usually the same as the output column, and will represent the range of numbers on the physical pads. However, if you have buttons on your keypad labeled A-Z, you can actually set access codes to these letters by entering the letters in the K column.
     In the example above, keypad 1 has 8 buttons wired (1-8). Each button is active if pressed. Pressing the 1 button will result in a 1 sent to Securentry. Pressing a 2 will result in a 2, 3 will send a 3, 4 will send a 4, etc. You could change this to suit your needs by entering any digit as the output digit. If you entered an 8 in the output column for button 1, this would result an 8 to Securentry being output.
     Example (as above highlighted green): a row has the entries 41 9 6 A. The user would press the A button on the keypad. Button A has actual buttons 4 & 1 wired together. Pressing the A button sends a 6 to Securentry for processing. Securentry then looks for an A in the users access code for validation.
     For wiring multiple buttons together, simple enter all the buttons that are used for each key press in the buttons column. They can be in any order. As you can see in my example (keypad 1) has buttons 2 and 4 wired together (enter as 24). A 9 has been entered in the output column meaning that when this button that has 2 and 4 wired together is pressed, have Securentry read it as a 9. This will bring up a match if a user has a 9 in his access code because a 9 is also entered in the K column. Buttons 3 and 5 will send a 0, buttons 4 and 1 will send an A etc. On keypad two, buttons 2 and 3 will send a 1, 3 and 4 will send a 2 etc. In this way it is possible to have 128 different buttons from a single port. Securentry allows for 94.
     After entering all of the buttons and desired results, click the calc button. This will put the binary equivalent (in decimal) in the bin column. This number cannot be edited by you. This will be the number Securentry will look for during a button press. Click the check button to have Securentry check your inputs for errors. The check button will flag duplicate buttons and missing output and key (K) data. There are additional corrections which will be flagged in succession. As the technician you will have the option to save the data without correcting the entries. Note that the calc button will calculate the binary data needed by securentry, the check button will do a calc first, then the check, and the save button will do a calc, a check, and then a save. Note that if you elect to save your data without correcting the defective data, Securentry will halt the check process and do the save.
     This tab also has a testing option. Check the 'test' option. Without this option checked, keypresses will be sent to the main application and not the configuration area! Test your buttons and watch the results on the boxes under the test option. In this way you can test your wiring and entries before you make the final installations. The button you press to test will be highlighted in green, as the above examble shows. To test buttons wired together with your game pad, press the two buttons on your gamepad together.
     It is important to note that while in the test option phase, Securentry will not activate locks, logs or sounds. The test mode will automatically shut off when you close this window.
    After entering and testing all of your buttons, be sure to save the entries using the 'save' button. The results do not become active until you save it, and if you close this window, your edits will be lost.
     To reload the original file (last saved) use the 'load' button.

auto reboot tab

     The auto reboot tab lets you configure your computer system for rebooting itself. This us usually necessary because computer memory tends to get clogged up over time, causing sluggish responses. If you do not wish to have your computer reboot daily, click the auto boot off option. To have your computer reboot daily, click the auto boot on option, and enter a time for the computer to perform the reboot in the reboot time text box. Don't forget to save your time when finished.
     This example shows a reboot time of 4:04 in the afternoon. It is suggested that you set this time to a time when your system can be down for a minute of so, perhaps in the early morning hours.
     Click the 'current time' button to have the current time displayed in the reboot time box. Load a saved time and reboot option with the 'load time' button. Save the selections with the 'save time' button.
     When your computer reboots, your current log (in the log box on the main screen) will be saved in a temporary file. Be sure to put a shortcut of Securentry in your startup folder. (see your installation technician or e-mail me if you are not sure how to do this) When Securentry restarts after the reboot, the temporary log file will be reloaded and then deleted. In this way you will not lose your activity information.
     Note that Securentry will not be active when your computer is rebooting.

Credits and rights

     Securentry was initially a combined package with the software by Rediware Software and Services and the hardware designed by WCB Inc. Rediware Software and the author retain all rights to the Securentry application and coding. Please do not redistribute this software, but request others to download a copy from A direct download registers users for software support.


     The authors, designers, and creators of the Securentry system are not liable for any failure of this system to prevent unwanted or illegal entry to any area protected by Securentry. This system is not designed to be used to prevent illegal theft, break-ins, or illegal activity by determined persons. Securentry is designed to act primarily as a detailed log for authorized persons and as a deterrent for those unauthorized.

      © Rediware Software and Services, version 1.1.3 released 2004, released for public download 2018.

Contacting Rediware Software

  If you have questions concerning the operation of this software, the instructions are not clear, or you have any comments at all, feel free to contact me any time.   

     You may contact Rediware Software via e-mail:  Steve Clarke
     Visit our website for other software available for free or low-fee:  Rediware Software and Services