Home » Products » Electronic Locks | Electronic Keys

Electronic Locks | Passive Locking Solutions

An Efficient Industrial Locking System, using One Key to Unlock Multiple Locks, each Transaction creates a Full Audit Trail of Lock opening and closing with date and time and User Information.

Multiple Key Storage and Charging

Multiple Users can use Keys, when keys are stored in Either the Locker or Special Storage Cabinet, they are charged. User identification will release a key, and relevant access data will be sent to keys to do their Tasks.

About the Solution

The Solution consists of three parts, Electronic Key, Electronic Lock and Management Software. The Electronic key is the core of the system, which powers the lock when it is unlocked. Locks are passive devices. Access rights are stored in the electronic key. The Management Software is the foundation of the entire solution, by managing the software, distribution and revoking access rights and reviewing access records.

System Components

Electronic Keys

Keys are rechargeable and Multiple Key Types available, all keys have Voice Prompts and LED Indicator.

6

Basic Key

6

Bluetooth Key

6

Bluetooth and Fingerprint Key

6

4G Fingerprint and Pin Key

6

IP65 Rated

Electronic Locks

Locks are Powered by the key, locks have no wires or key way for object obstruction.

6

Various Locks

6

Authorized Access Only

6

IP68 Rated

6

Audit Data Locked and Unlocked

Management Software

The Software lets you Program and Control each key and lock. Creating full Audit trails, and authorizing remote job requests.

6

Remote Programming

6

Audit Trail

6

Hosted or Local Install

6

App

Overview

One Key to Unlock Multiple Locks

A single key can unlock multiple locks and create a full audit trail

Access Control

Through the Management Software, access rights can be set at any time and day, as well as specific locks or areas.

Lock Event

Through the Management Software, access rights and lock events can be reviewed.

Access Records

The Management System can provide access information to all operations performed by personnel, including a complete Audit Report.

AES256 Encryption

AES256 encryption technology prevents technical unlocking, securing lock and key encryption.

Lost Key Management

In the event of key loss or theft, such keys can be swiftly disabled and blacklisted.

Easy to Install

Without power or wiring installation is simpler and cost efficient.

API Integration

Seamlessly integrate with your systems for independent customization.

Key Storage

Automatic Storage with Charging and Key Retrieval.

  • Charge Keys
  • User Profiles assigned to most charged key on removal
  • Automatic Key Records Update for Work Day
  • Remote Key Changes

In Action

  • Security 100% 100%
  • Customer Satisfaction Guarenteed 100% 100%
  • Scalable Solutions 100% 100%

Get Started

If you would like more Information or to Book a Demo, Please Contact Us