14.01.2010 • Topstories

Under Lock and Key

Keys are used to control access to so many things these days that there can be serious consequences when one is misplaced or has been taken without authority. Managing who is autho...

Under Lock and Key

Keys are used to control access to so many things these days that there can be serious consequences when one is misplaced or has been taken without authority. Managing who is authorized to take and use keys, and indeed knowing who currently has possession of a particular key, is traditionally left to one person who makes corresponding entries in a handwritten log. A product from deister now provides the opportunity to make the whole process more secure and less labor-intensive.

Where is the digital camera? Who's been using the company car? When was the technician last in the building? Where‘s the key to the server room? These important questions can now be answered by the proxsafe, an intelligent management system for keys and objects of value. It provides optimum management of keys, a vehicle fleet, small cameras, mobile phones and tools. It can also complement an access control system by providing a cost-effective way of expanding an electronic security management system to doors that are still secured by a conventional mechanical lock and key.
A durable electronic tag is attached to each key or valuable object by using a one-time, self-locking seal. The tubular tag has a unique number that is identified each time it is removed from and returned to the cabinet. All user activities from all terminals and cabinets are gathered and stored in a central database, providing a full audit trail for later evaluation when required.

Grows with the Task

A basic cabinet has positions for up to 32 keys, each assigned its own permanent position. Should there be a requirement for more keys to be securely stored, the system can be expanded by simply adding further cabinets. Many thousands of items can be electronically controlled in this way. Keeping track of so many keys would normally be a full-time task. The proxsafe management system keeps a record of which key is taken, when and by whom. Users gain access to the electronic safe by using their chip-based proximity card, a PIN or both and are immediately identified. Information about usage rights is stored in the terminal, enabling self-service to authorized items. When the required key has been selected, it is highlighted for quick location by the illuminated cylinder surrounding the tag. When returning the key, the user simply presents the tag to the reader in order to gain access to the system, which helps to prevent delays at busy times.

Secure from All Points

When not currently in use, an automatic self-locking shutter door closes in front of the keys to guard against unauthorized access. This is however sensitive to obstructions so there is no danger of fingers getting caught. The key tags use RFID transponder technology to provide a unique identification of the key or item. They are compact, sealed and water-resistant and will not corrode. The designers chose to use a key tag without any electrical contacts and this avoids any problems of grease, dirt or contamination affecting the ability to read the key tag. The contact-less concept also extends to the users who, by using a chip-based proximity card, gain access to the system quickly, conveniently and securely. The proxsafe commander management system supports all current credentials including mifare, Legic, HID, proxentry and other technologies. This enables it to be integrated over a network into other systems via the open deBUS communication protocol. Security personnel therefore always have an overview of which items are currently in use and by whom.

Invaluable Experience

Deister electronic was established in 1977 and is well-known in the security market. One of its strong points is radio frequency identification, and the company specializes in the design, ­manufacture and distribution of products using RFID-technology. Users of their systems include telecommunications providers, police fleet ­management officers, household technology manufacturers, engineering firms as well as city administrations.

Business Partner

Logo:

deister electronic GmbH

Hermann-Bahlsen-Str. 11-13
30890 Barsinghausen
Germany

Business Partner contact







most read

Photo
08.03.2024 • TopstoriesFire Protection

Choosing Door Closers is a Critical Element of Fire Safety

Every now and then, news reminds us of the devastation that a large building fire can cause. One consequence is that fire doors now receive the attention and regulation that they deserve, both nationally and internationally. Just as important, however, is that a fire door must be properly closed to be effective. Assa Abloy has a complete range of door closing solutions to meet the needs and regulations of almost every type of of door in every building.

Photo
05.03.2024 • TopstoriesFire Protection

Charging and Storing Lithium-Ion Batteries Correctly

Lithium-ion batteries offer many advantages. They are long lasting, have a high energy density and are only slightly self-discharging. The batteries are therefore particularly practical for many devices in the industrial sector as well as in security technology. However, one thing should always be borne in mind: Lithium and many of its compounds are highly flammable and highly reactive. Certified and GS-tested type 90 safety cabinet models enable the highest safety requirements to be met when storing and charging lithium-ion batteries.