Key tracking management system solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. Introduction to the system

The Smartkey key tracking management system is a newly developed security product. The system comprehensively utilizes the latest international technology, including: smart card technology, biometric authentication technology, video processing technology, wireless communication technology, network communication technology, embedded high-speed information processing Technology, distributed control and centralized management concepts, and high-security locks, etc., have indeed solved many problems in key management, truly achieved 24-hour/365-day unattended management of keys, and completely subverted traditional key management concepts and Method, leading the new concept of key management, providing you with a set of handy tools for improving the level of security management.

This product is mainly designed and produced for the management of mechanical lock keys.

1.Disadvantages of the current key management system and method

(1) As there are more and more large-scale modern commercial buildings, these buildings usually have thousands of doors of various types. There are so many keys to manage, and effective management cannot be basically carried out by manpower.

(2) Even if someone is reluctantly hired to manage it, it is difficult for the key manager to be familiar with all users, let alone familiar with their shifts, the keys that are authorized to use, the purpose of the keys, and so on.

(3) At present, the key access records are basically paper and pen, which is difficult to save and record clearly, and once an accident occurs, it is time-consuming to check the records one by one.

(4) Senior supervisors or security managers cannot know the whereabouts and use of keys in real time.

(5) Other security loopholes caused by human and human negligence.

2. The benefits of using this system to users

(1) Compared with the commonly used key boxes, this product has a stronger box structure, which increases the ability to resist man-made damage.

(2) Both the key and the door of the box can be tightly locked before legal login, and there will be no loopholes caused by forgetting to lock the door.

(3) Provide 24-hour/365-day, unattended strict management, and save all key access records (including: access and return time/date, access key number, access/return photo, etc.). ?

(4) This product is also designed with a complete safety alarm mechanism, whether it is failure, misoperation, unauthorized operation, forced operation, or violent coercion operation, it can send alarm information to relevant management departments or personnel in time.

(5) Completely eliminate internal human relations loopholes.

(6) The human negligence inside is completely eliminated.

(7) Completely eliminate internal management loopholes.

(8) The manager can track the whereabouts of important keys in real time.

(9) The management plan such as the use authority and time of the management key can be adjusted at any time according to the needs;

(10) The key box can be installed nearby, saving the user’s time.

(11) It can centrally manage and distribute the key boxes installed in each area, and call and query related records;

(12) Even if you are away from home, you can monitor the key usage.

(13) Once a security incident occurs, it is very easy to provide detailed and reliable information on the use of the key, which greatly reduces the scope of case detection.

2. Basic functions

1. The key to be managed is suspended and locked in the key box through a special key ring, and is protected by an electronic chassis door lock. Without a legal user login, no one can access and return the key;

2. Each key ring can hang up to eight keys as needed. For example: two doors in the same room, different control box doors in the same machine room, etc. keys that need to be used at the same time can be hung on one key ring.

3. The user must pass the legal login to access and return the key. The login can be configured in a variety of ways according to the user’s requirements, such as smart card, password, fingerprint recognition, etc.

4. Built-in camera, you can take a picture of the avatar of the key taker and returner, or other function operator, and store it locally or upload it to the system management server for verification when needed in the future.

5. The operation authority management can be done for each user separately, mainly including:

a) Freely set the keys that the user is allowed to access, the unavailable keys will not be released, and the user will not be able to access it even if the user logs in and opens the door legally.

b) Set the maximum number of keys that the user can take at any time. When the number of keys taken by the user reaches the set number, the other released keys are automatically locked back.

c) Freely set the time when the user is allowed to access the key. Only within the set time period, the user is allowed to log in and access the key.

d) Freely set the time for the user to keep the key in hand. If the key is not returned after the set time, an alarm will be sent to the relevant management department immediately.

6. Keep all log-in operation records and the operator’s profile picture at the time for the manager to check and print.

7. Complete alarm mechanism, real-time monitoring of key box failures, illegal operations, man-made sabotage, etc., supervise the user’s key use status, and can timely notify the relevant personnel of the alarm or status information in various ways.

8. Authorized users can know the history of key use at any time in a variety of ways, as well as understand the current use of keys and user information.

9. This system can be networked to form a system, or it can be run independently. In the networked system, each key box can be scattered and installed in all corners of the community or building, and it becomes a complete key management and tracking system through the common structure of the TCP/IP Ethernet network.

Applications

Macau Tower Casino
Singapore Changi Prison
Mobil Refinery in Singapore
Singapore Ministry of Transport
Singapore ST James Power Station Entertainment Plaza
Macau Galaxy Entertainment Group Co., Ltd.
Philippine Telephone Office Unattended Switching Station
Singapore Paya Leba Girls’ High School
Singapore Yishun Barracks
Singapore Ministry of Home Affairs
Singapore Air Force Base

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare