| Modular system |
Patented modular system; flexible combination of key hooks, key boards and electronically secured compartments for different key types (e.g. 48 key positions + 1 terminal). |
| Dimensions (example) |
Unit with 48 key positions: H ≈ 1800 mm, W ≈ 1200 mm, D ≈ 250 mm (wall-mounted) or D ≈ 400 mm (floor-standing model). |
| Key management capacity |
Various configurations: Small (24-48 keys), medium (50-100 keys), large (100-200 keys), XL (200+ keys); expandable by adding modules; support for single keys, key rings, transponder keys, chip cards, key fobs with RFID tags. |
| Key identification |
Intelligent key recognition with RFID tags on each key or bunch of keys; automatic identification when keys are removed and returned; barcode labels as an alternative; optical recognition; weight sensors to check the return; unique key ID in the system. |
| Construction method |
Robust steel construction with reinforced walls; high-quality powder coating; wall-mounted or free-standing version; security class in accordance with VdS or EN 14450 optional; fire-retardant version available; soundproofed doors for quiet office environments. |
| Key hanger |
Various hanging systems: single hooks with sensor monitoring, key boards with LED display, pull-out key drawers, multiple hooks for key bundles; colour-coded areas for different key groups; labelling position fields; LED lighting for quick location. |
| Power supply |
Mains operation (230 V) with integrated power supply unit; optional battery backup solution (48-hour bridging); energy-efficient LED interior lighting with motion sensor; standby mode for low power consumption; emergency opening in the event of a power failure using a mechanical key. |
| Connectivity |
LAN/Ethernet (preferred for stable connection) or WLAN; cloud connection for remote management; integration into building networks; VPN support for secure remote maintenance; offline-capable with local data storage and later synchronisation. |
| Operation at the terminal |
Touchscreen display (7-10 inch) with intuitive user guidance; graphic display of key availability in real time; search function by key ID, room number or vehicle; multilingual interface; optional hardware keypad for fast PIN entry; barcode scanner for key identification. |
| Access control |
Multi-level authentication: RFID employee ID card, PIN code, smartphone app (NFC/Bluetooth), biometric identification (fingerprint); role-based authorisation management (full access, partial access, read-only); time-based access restrictions; dual control principle for critical keys; guest and visitor access with time limits. |
| Locking system |
Electronic high-security lock; tamper-proof locking; multi-point locking for maximum security; alarm function in the event of violence; mechanical emergency opening by authorised personnel; automatic locking after door closure. |
| Key removal detection |
Sensor-based detection of each key position; LED display for free/occupied positions (green/red); acoustic and visual confirmation when key is removed; automatic assignment of key to user; warning in the event of incorrect position on return; completeness check before door is closed. |
| Software & API |
Cloud backend + web admin portal with real-time dashboard; RESTful API for integration into facility management systems, CAFM software (Computer Aided Facility Management), building management systems, time recording systems; encrypted data communication (TLS/SSL); on-premise installation optional; automatic software updates. |
| Key management |
Digital key management with detailed key profiles (room, building, vehicle, purpose); storage of plans and documents; photo documentation of keys; categorisation and grouping; maintenance and inspection intervals; cost centre allocation; insurance information; duplicate tracking. |
| Reservation system |
Online reservation of keys via web portal or app; calendar integration (Outlook, Google Calendar); automatic notification of availability; pre-approval by superiors; conflict management for multiple reservations; recurring reservations for regular requirements. |
| Audit trail & logging |
Complete, tamper-proof logging of all key movements; time stamp, user ID, key ID; removal and return times; optional photo documentation for each access; export for audits and compliance reports; audit-proof long-term archiving (10+ years); search function with various filter criteria. |
| Notifications & alarms |
Automatic notifications by e-mail, SMS or push notification; reminders when keys are overdue for return; escalation mechanisms after defined periods of time; alarms when keys are not returned; notification of superiors; maintenance reminders; battery status alarms; security alerts in the event of tampering or unauthorised access. |
| Reporting & Analytics |
Comprehensive usage statistics; utilisation analysis by key, user, time period; identification of frequently used and unused keys; return compliance reports; average loan times; peak time analysis; cost centre reporting; export to common formats (CSV, Excel, PDF); customisable dashboards for management. |
| Emergency functions |
Emergency override by authorised personnel (facility manager, security service); quick access to critical keys without time delay; master key system for emergency opening; automatic notification of security service in the event of emergency access; deactivation of individual keys in the event of loss; remote locking via web portal. |
| Security features |
Tamper-proof design; burglar resistance to RC2/RC3; encrypted data communication (AES-256); complete audit trails; access logging in accordance with GDPR; optional video surveillance with face recognition; alarm forwarding to security centre; glass breakage sensor; vibration sensor; integration with building security systems. |
| Branding opportunities |
Corporate design adaptation: company logo, individual colour scheme according to RAL palette; customer-specific lettering; department or location labelling; multilingual lettering; information boards with usage instructions. |
| Compliance & Standards |
CE conformity; GDPR-compliant; data protection in accordance with BDSG; VdS certification optional; security class in accordance with EN 14450 or EN 1143-1; burglar resistance in accordance with DIN EN 1627 (RC2/RC3); fire protection conformity; ISO 9001-certified production; compliance with insurance requirements for key management. |