Singapore Seamark “Key Management System Solution”
[ad_1]
The Smartkey key tracking management system is the latest Baoan product developed by Smartkey. The system finally utilizes the latest international technology, including: smart card technology, biometric authentication technology, video processing technology, wireless communication technology, network communication technology, embedded High-speed information processing technology, distributed control and centralized management concept, and high-security locks, etc. It has completely solved many problems in key management, truly achieved 24-hour/365-day unattended management of keys, and overturned the traditional key management concepts and methods, leading the new concept of key management, and improving Baoan for you Provides a set of handy tools for management work level. This product is mainly designed and produced for the management of mechanical lock keys.
The keys that need to be managed are suspended and locked in the key box through a special key ring, and protected by an electronic auspicious door lock. Without a legal user login, no one can access and return the key.
Each key ring can hang up to eight keys according to needs. For example, two doors in the same room, different control box doors in the same machine room, etc. The keys negotiated by the county and the commander can be hung on one key ring.
The user must access and return the key after the legal user logs in. The login can be configured in various ways according to the user’s requirements, such as: smart card, password, fingerprint recognition, etc.
Built-in camera, you can take the key and return it, or take pictures of other functions. The avatar of the operator can be photographed and stored locally or uploaded to the system management server for verification when needed in the future.
The operation authority management can be done for each user separately, mainly including:
A) Arbitrary setting allows the user to access the key, the unavailable key is not released, and the user cannot access it even if the user logs in and opens the door legally.
b) Set the maximum number of keys that the user can take at any time. When the number of keys taken by the user reaches the set number, other keys that have been released will be automatically locked back.
c) Set the time when the user is allowed to access the key at will, and only within the set time period, the user is allowed to log in and access the key.
d) Set the time for the user to keep the key in hand at will. If the key is not returned after the set time, an alarm will be sent to the relevant management department immediately.
Keep all log-in operation records and the operator’s profile picture at the time for the manager to check and print.
Perfect alarm mechanism, real-time monitoring of key box failures, illegal operations, man-made sabotage, etc., supervise the user’s key use status, and can timely notify the relevant personnel of alarm or status information in various ways.
Authorized users can know the history of key use at any time in a variety of ways, as well as the current use of keys and user information.
This system can be networked to form a system, or it can be run independently.In the networking system, each key box can be scattered and installed in each corner of the group or building, and it becomes a complete key optical cable and tracking system application through the common structure of TCP/IP Ethernet network.
1.Where the product is directly applied
(1) Confidential, key management of important archives and filing cabinets.
(2) Key management of lockers in the pawnbroking industry.
(3) It is not used frequently, but is very sensitive or important for the management of access door keys.
(4) Key management of important unattended computer rooms, such as: telephone exchange room, power distribution room, radar room, generator room, and various power distribution shaft doors.
(5) Door key management for various laboratories and operating rooms equipped with sensitive, high-tech, and valuable equipment.
(6) Sensitive, valuable, and highly toxic drug warehouse door key management.
(7) Key management of storage room/safe/showroom/showcase for precious items such as jewellery, antiques, precious artworks, precious samples, gold and silver, and cash.
(8) The key management of important military equipment and equipment, armed warehouse door.
(9) The key management of the door keys obtained by prisons and guards, and prisoners’ locks.
(10) The important criminal evidence storage room of the Public Security Bureau, and the key management of the cabinet door.
(11) Key management of police machinery and police equipment room/cabinet of the police station and the public security agency.
(12) Key management of vehicles, boats, professional machinery, etc.
(13) Amusement and gaming equipment, automatic teller machines, automatic vending machines, etc. withdraw/add banknotes and door key management for vending goods
2 The industry faced by the product
(1) High-end commercial buildings: high-end office buildings, luxury star-rated hotels, high-end service apartments, high-end precious commodity stores, banks.
(2) Government agencies: offices and archives in the office building, the army, military agencies and facilities, police stations, police stations and prisons
(3) Research departments: hospitals, universities and colleges, research institutes and research institutes.
(4) Venues: airports, stadiums, museums, art galleries, libraries.
(5) Foreign-related institutions: embassies, customs, ports.
(6) Industrial enterprises: chemical plants, oil fields, power plants, nuclear power plants, transformation/distribution stations, mints, satellite communication ground stations.
(7) Others: gambling and entertainment industry, pawnbroking, vending. Stand-alone operation independently. In the networked system, each key box can be scattered and installed in each corner of the group or building, and becomes a complete key tracking management system through the ICP/IP Ethernet network.
The disadvantages of the current key management system
1 As there are more and more large-scale modern commercial buildings, these buildings usually have thousands of doors of various types. There are so many keys to manage, and effective management cannot be carried out by human resources.
2 Even if someone reluctantly hires a special person to manage it, it is difficult for key managers to familiarize themselves with all users, let alone their familiarity with their shifts, authorized keys, key uses, and so on.
3 At present, the key access records are basically paper and pen, which is difficult to keep and record clearly, and it is time-consuming to check the records in the event of an accident.
4 Senior supervisors or security managers cannot understand the whereabouts and use of keys in real time.
5 Other security loopholes caused by the negligence of others.
[ad_2]