S-0419
Intelligent Key Lock Application System
iKLAS (Intelligent Key Lock Application System) is an embedded web-based key management system that controls and tracks the movement of keys in buildings and facilities to ensure that security will not be compromised. Without requiring continual manual monitoring, iKLAS is easy to maintain and built with quality materials to withstand damage due to regular use or tampering. Our Key Management System (KMS) provides highly secured monitoring and control of information over the Wide Area Network (WAN). iKLAS is user-friendly and suitable for use in a wide field of sectors, including banking, education, entertainment, government, healthcare and retail industry etc.
Reduce Costs: Your keys are always accounted for, so re-keying costs drop and productivity stays high when staff don’t waste time searching for misplaced keys. Manage Risk: Good key management systems give you tracking and auditing of key use in real-time. You instantly know if keys haven’t been returned or if someone is trying to access a secure location at an unexpected time.
Prevent Losses: Not just lost keys, but with a complete ‘chain-of-custody’ transaction log built into a key management system, your personnel are fully accountable for how they use secured assets.
Improve Operations: You get tighter control on what happens in your facility. You can restrict key access to certain shifts, set timed key returns so work happens fast, and staff can reserve keys to ensure they’re available for time-sensitive tasks.
Now that you have a better understanding of what a key management system can offer, let’s talk about what one actually looks like. A key management system is usually built from four main components:
Key Cabinets: key-management-cabinet
Keys are secured in a locked key cabinet. There’s an outer locking door and in certain models, individual lock slots for key rings. With that feature, the system will only unlock the key ring someone selects and are authorized to access, so they can’t log a sign out for one key ring and take another.
The key cabinets and cabinet key modules can be customized to fit different numbers of keys and different sized key rings.
Smart Terminal:
That outer locking door only opens after personnel authenticate themselves on the system’s smart terminal. This is a terminal that accepts one or more authentication types. For example, Real Time Networks’ key cabinets can accept PIN codes, swipe cards, or different biometrics like fingerprints or iris scans.
Also, through the management portal for your key system (More on that below) you can configure required checklists on the terminal when staff sign out or return keys. For example, you can require drivers to log mileage and maintenance notes when they return vehicle keys at the end of a shift.
Key Tags :RFID key tags
In advanced key management systems, each key ring has a key tag attached to it, that allows the cabinet to track whether a key has been taken or returned. Different systems use different technologies to track key sets. Key rings in some management systems have RFID tags embedded in their key rings to verify keys upon return. RFID is a short range wireless technology, usually used for machine-to-machine communication. In advanced setups, you can even distribute RFID readers around a high security facility so keys can be tracked in real time as they’re carried around.
Key Management Software:
Our key management software is called KMS/CMS. It lets you manage everything in the system, including alarms, reports, and personnel access. This is where the real power of a key management system comes in. Not just in securing key rings, but enhancing work associated with those keys.
Broadcasting
City Management
Climate and Weather
Commerce and Industry
Development
Education
Employment and Labour
Environment
Finance
Food
Health
Housing
Infrastructure
Law and Security
Population
Recreation and Culture
Social Welfare
Transport
Cloud Computing
Internet of Things (IoT)
Mobile Technologies
Radio Frequency Identification (RFID)
-Hospital sector - Case reference: Public hospital in Hong Kong - The system streamlines the movement of the key to better ensure the rooms and the equipment in that rooms are used properly by the authorized personnel. So the supporting and service department in the hospital can spend more time on those support and service for the daily operation in the hospital so as to provide and maintain high quality of hospital service to the public.
Alfa Cloud (HK) Limited
97578722
16/F, Island Place Tower, 510 King's Road, North Point, Hong Kong.
If any government department would like to conduct PoC trial or technology testing on the I&T solution, please contact Smart LAB.