A.P. Unix Software is uniquely experienced to solve your security and web services needs with a touch of a finger. Explore our site to learn about A.P. Unix Software's history, and discover how we can provide for your software needs.

Innovators of the Customer Self-Service Appliance

Setting the standard for reliability, robustness and user experience.

Our value is delivered in multiple ways.

A.P. Unix makes maximum use of open-source software, avoiding the costly licensing and security problems associated with the Windows platform. This doesn’t mean we don’t interface with Windows/OS based devices, because we do. We just don’t use it as the basis for our software platform.

Our platform is Java® based, which means that we have the most flexible software that can be ported to different computers, workstations - even handheld devices. A.P. Unix was awarded ‘Best in Show’ at Kiosk.org for porting a complete kiosk to an Ipaq hand-held.

Our appliance hardware establishes new standards for relaibility, security and remote operation. No disk means no reboot and it means automatic recovery from local power interruptions. We also pioneered the concept of Plug and Go - ship the kiosk to the field location, pick where it goes in the store, plug into AC power and connect to a network. That’s all it takes.

Value means we leverage your asset investments - you are not going to change your database structures or software to accommodate A.P. Unix.

Our Core Technologies
Proprietary Hardware Design

- Embedded Computing

- Linux

- Java

- Cloud Computing

- Propietary Toolkit Approach

• One Code Base

• No Custom Programming

Proprietary Hardware Design

- Custom CPU Boards

- Control Unit

- Vault Unit

- Smart Lock Boards

- Smart Motor Control Boards

- Integrated UPS

- Remote Vault Interface Module (VIM)

FireKing Proprietary CPU Board

- Four Universal Peripheral Connectors


• Serial

• Relay Controlled

• 12/24v Power

- Four RJ45 USB Lock Connectors


- Daughter Card (Wifi, Bluetooth, More I/O, etc.)

- External Connections

• Two USB

• Two Ethernet

• Alarm Interface

- Serial

- Quad/Dual Core CPU

Other fireKing Prorietary Hardware
Three Types of Boards

- Lock Boards

- Motor Control Boards

- UPS Board

• USB Based Design for easy connection, power and reuse in new designs SecureIP protected access

• Low Cost PIC

• Microprocessor with USB

Linux Technology

- Secure

- Small

- Customizable

- Embedable

- Superior Support

- Over 35 Calendar Years of Expertise

Enbedded Computing
A reliable, embedded operating system that requires no system administration

- Read-only OS

- Robust behavior to abrupt Power On/Off

- Plug and Run Technology

- Lower Total Cost of Ownership

Java Technology
Robust and Scalable
The Cobol of the 21st Century Equally adapt at:

- Front End Applications

- Web Services

- Android Applications

Proprietary Content Creation Tool
RAD self-service experience development tool

- Peripherals

- Back-End Systems

- Databases (DB2, SQL, Server, Oracle, Sybase, etc.)

- XML (web service portals)

- TCP / IP (VISA-1, Proprietary Systems, etc.)

Cloud Based Computing
Complete Content Management

- Device Management

- Reporting

- Configuration

- Real Time Monitoring

Cloud Architecture

Security between the safe and the cloud servers provided through state-of-the-art Blowfish cipher encrypted VPN channel using certificates based authentication.

Software and Security Technologies

All products are part of a cloud computing solution.
Each product in the field is totally plug and play.

No software is loaded in the field, no system configuration is done, and no networking configuration is required. Just plug the power in the wall and the network cable in the back and the system will start up and run.

Summit web services run redundant, replicated servers to handle all the back end data storage, management, configuration and reporting functions. This is done using industry standard XML messaging which can be easily interfaced to most other systems whether they be Java® or .NET based.

An important part of cloud computing is security. Our security between the device and the cloud servers is the best available. The only access to the device is through a state of the art Blowfish cipher encrypted VPN channel. Encrypted certificate based authentication is used to establish the connections between the device and the cloud. Full Blowfish encryption has never been broken.

Solid State Computing Platform

Key to any electronic product’s reliability profile is the platform upon which it is built. All products are built using a proven solid state architecture. A true computing applicance (e.g. Kiosk, Router, DVR or Smart TV) all share the same hardware profile: a diskless and fanless computer with read-only operating system. This removes the most common sources of failures in the field: disk drive failure and corruption of the operating system caused by sudden power on/off events.

Linux-Based Open Source Operating System

The device's embedded operating system built on a robust and reliable version of Lunix is known as the leading platform for security and immunity to attacks from the outside world. On top of Linux, we create and load our own proprietary enhancements. The operating system is configured and runs in ultra-secure mode with its own embedded firewall that blocks all external inbound access to the product. The product communicates through a single outbound encrypted VPN tunnel to the server cloud. The system is virtually immune to viruses, worms and other common attacks that occur to computers on the internet.

A key component in the solution is our in-house developed, proprietary device driver support for all the peripheral devices in the device product line. This includes drivers for touch screen devices, printers, i-button, locks, relay boards, cash validators, cash recyclers, coin counters and coin dispensers.

An open source database, MySQL is used both on the device and the cloud servers for data management, storage and reporting. MySQL is widely recognized in the industry as rivaling the most expensive commercial databases for speed and reliability and in many cases out performs them.

In addition, we have the avantage of having access to the complete source code for any piece of software starting from when the computer leaves the boot prom until the last pixel is painted on the screen. We rely on no third parties to find, fix or release patches for their software.

Common Application Development Platform Based on Java® System

Our products operates from a single code base. Each application is crested using our point and click based rapid application development tool. No custom programming is created for any individual application. This is important as it allows us to focus on enhancing and maintaining a single deployment engine and not specific code written for specific applications or specific customers. With this approach we are able to develop, test and deploy applications in terms of weeks instead of years.

It also means we are able to make modifications and changes to meet evolving customer needs quickly and efficiently. Lastly, since no custom code is being developed, we are able to easily and cost effectively support and maintain all deployed solutions.

The programming of our common code base is in Java®. Java® is known for providing a robust and reliable deployment platform that frees the application from problems, such as pointer errors and memory leaks. That always occur with other programming languages. Applications developed in these other environments often take years to debug and are in reality never truly bug free. With Java®, we can deploy our application knowing that it is capable of running for years at a time without reboot or reset and will never cause a system freeze.

Drilless™ Technology

It is inevitable that some electronic safes will eventually fail in the field. This can be due to either a power supply failure, hardware electronic failure of for our competitors, disk or operating system corruption. Traditionally, the only way to deal with this issue is to send someone to the safe to drill the safe open and then repair, secure and get the safe back online.

With our patient pending Drilless Lock Technology any service device with a USB interface and loaded with our Secure IP application can be used to unlock a failed safe. All locks in the safe can be both controlled and powered by the USB interface. In order to actually unlock the lock, the service device runs our Secure IP application which reads a challenge code from the device. This challenge code is then sent to our Global Security Operation Center and only after extensive verification of the requestor, location and circumstances is a response code issued to enable the requestor to properly unlock the safe.

Business Intelligence

Business Intelligence (BI) is the ability to produce information for an end user about their activities, allowing them to make business decisions on current and historical information.

With a cloud-based solution individual retail locations are able to continuously exchange information with central offices, providing organizations real-time information to significantly improve their cash management and control processes. By having data immediately available across Operations, Finance, Loss Prevention and Human Resources, companies are able to move from a reactive to a proactive posture when dealing with out-of-compliance cash handling behavior.

BI is ‘User Defined’ considering:


• Allows the user to determine their data structure (dashboard, raw data, etc...)


• Allows the user to see only data which is relevant to his/her function (Risk Reporting, Treasury Reporting, HR Reporting.)


• Allows data to be sent on a fixed schedule or on-demand.

Remote Web Services Portal

Devices have full remote management access via an intuitive web-based portal. Through a highly secure connection and encrypted login credentials, companies are able to maintain constant contact with their deployed devices and perform a comprehensive set of activities including:

System Administration - Site configuration, software revisions, accepted configuration, safe registry, and current firmware log can all be viewed and managed remotely. Precent full thresold (safe cassette), door open and content removal email alerts provide pro-active notification of situations which may require action.

Device Monitoring - National, regional and city monitoring of all devices in the network (at a glance through Google Maps), real-time device status visibility, and device failure or maintenance alerts. This allows remote visibilty and management of all units deployed in the field. Should onsite maintenance be required, the service technician can arrive knowing the specific issue to be resolved.

Manager Functions - User access can be granted, updated or removed. Departments associated with a safe transaction, authority to perform activities by function (e.g. Manager, Cashier), type of manual drops (e.g. checks, gift cards) and shifts can all be defined and managed from a central location.

Reporting - Robust business intelligence capabilities with site specific or system-wide reports available upon demand. Standard reports include Deposit Activity Report, Enrolled User Report, Error Report, Site Configuration Report and Site Cash Totals Report. Custom reporting on specific data within a specified timeframe is available to support analysis of specific transactions and maintenance activities.

Frequently Asked Questions?

Q: What abilities does the solution have to log/store data and for what devices?
A: All transactions performed at the devices are logged to the cloud. Devices firmware level metrics and usage data are extracted from the device and are made available to the reporting and maintenance modules. All information is transferred to the cloud and configurable alerts are generated in near real time.

Q: What user activities are logged?
A: All user activity is logged through the application level software and reported up to the cloud backend.

Q: What other events are captured and stored?
A: VPN, data synchronization, content and firmware updates, system level metrics.

Q: What is the process for Application software patching and configuration (e.g. User management, device configuration)?
A: Remote update process - the device checks into the server(s) periodically for updates. As currently deployed this happens every 5 minutes or less; the interval is configurable.

Q: What other remote capabilities are there?
A: Software restart, note device initialization, full device configuration and management and touchscreen recalibration.

Q: What level of encryption capabilities are used for data storage, data transmission and user access (internal and remote)?
A: All data from the devices to the servers is encrypted by Blowfish encryption during its entire route. Triple DES and during ciphers also available. Access to the web services is encrypted via SSL.

Q: What is the process for OS patching (e.g. Network setup, patches)?
A: The operating system is remotely updatable including the ability to apply patches and upgrade packages. Adjustments to network setup can also be configured remotely.

Q: What is the process for Firmware patching (e.g. Tracking and updating, acceptance of bill denomination changes)?
A: Remote update process is currently managed on an as-needed basis but may be automated based on business needs.

Q: Does the solution offer the ability to create device location specific (or grouped) messaging to display immediate notification/bulletin for end user messaging? If so, please explain the functionality?
A: Yes, the device level software includes a scrolling message center that is used for status, event notifications and messaging. This located at the bottom of the touchscreen and is available at all times.

Q: How do back office users access the software solution?
A: Full remote management via web browser using a secure connection and login credentials. Capabilities include configuration changes, software revision and a robust business intelligence reporting platform.

Q: What is the process for a sync after an offline condition?
A: Once connection is re-established all locally stored information is pushed to the cloud, and all configuration data is pulled down. The safe synchronizes at configurable intervals - typically less than 5 minutes. The sync process has 4 steps: check for updates and commands; gather and report health and status metrics; report transactional events that the server(s) have not received yet; check and update configuration.
Founded in 1981, A.P. Unix Software is an innovative, high-tech company whose focus has been the development of leading-edge software, hardware and cross-platform data solutions. For nearly three decades our award-winning kiosk technology formed the basis of our success in the areas of GUI and database interface, imaging and multimedia. As one of the earliest users of Java technology, A.P. Unix Software’s kiosk engine is the only truly platform-independent solution that can run on any system and take advantage of the inherent reliability of UNIX and Linux-based platforms.

In August of 2009, our focus shifted to security software development for cash management with our exclusive Cash In/Cash Out Systems.

Today, A.P. Unix Software is at the leading edge of security software development. In addition to our CICO Systems, we also create security software for vistor badging and management, as well as incident reporting.

How can we help you solve your security software needs?

Contact Us

A.P. Unix Software • 17150 Via Del Campo • Suite 308 • San Diego • California • 92127
ph (858) 673-8649 • fax (858) 673-8640 • email info@apunix.com