LOCK UP THE KEYS! LOCK UP THE KEYS! LOCK UP THE KEYS!

Step 1

Step 1
For a view of the cabinet, please click image.

The Electronic System Works With Four Easy Steps!

Providing maximum security, the KeyWarden E-System can be set to require biometric user access. This assures that the correct user is identified and accountable. Step 1: Once an established user touches their finger to the thumbprint reader and is recognized the system allows them to request a key. If the key is currently checked out the system displays the name of the person who currently has the key.

At any time, a system operator or other allowed person can check and see which keys are currently checked out, which users have them and when they got them.

Step 2

Step 2
To See Sample Copies of Reports, Click Image.

Step 2: Granted access the user inputs the item number for the key(s) that they wish to access. If the key they are requesting is checked-out, they will be informed as to who has that key.

Software Notes: The simple and intuitive Windows® interface is adapted for different markets such as auto dealerships, multi-family housing, law enforcement, or student housing. Interfacing to existing PC networks is easy to implement and trouble-free. This means that system operators can access the data at any time from a permitted workstation. Within these different markets, there are connectivity options to other vendors. For example, an interface to the Reynolds and Reynolds DMS system is available for auto dealerships.

Step 3

Step 3

Step 3: The cabinet lights up to indicate that the electronic latch has released and the user can open the door.

Other Security Considerations:
• Time Zones can be applied which allow users access only during specific times such as shifts.
• Users can be limited to access only certain keys.
• Users can be allowed to access only particular cabinets.

Step 4

Step 4
For another close-up view, please click image.
Step 4: The requested key is lit for easy access by the user.

If a key other than the one(s) requested is taken it will be logged-out to the user as an illegal transaction. The system can be set to provide system operators with immediate, on-time alerts when an illegal transaction occurs.
This site will look much better in a browser that supports web standards, but it is accessible to any browser or Internet device. Please upgrade your web browser.