• Intelligent Key Locker
  • Intelligent Key Locker
  • Intelligent Key Locker
  • Intelligent Key Locker
  • Intelligent Key Locker
  • Intelligent Key Locker

Intelligent Key Locker

Application: Public Passage, Enterprise, Supermarket, Campus, Hospital, Parking, Warehouse, Hotel, Company, Garage, Community
Working Principle: Electric Plug
Function: Fail-Secure
Type: Mechatronic Lock
Transport Package: Wooden Case
Specification: 30 keys 60 Keys 90keys
Customization:

Contact Supplier

Gold Member Since 2016

Suppliers with verified business licenses

Manufacturer/Factory, Trading Company

Basic Info.

Model NO.
TH-IKK408
Trademark
Tianhong
Origin
China
HS Code
83030000
Production Capacity
200-400 Pieces

Product Description

Product features

TH-IKK408 Intelligent key cabinet is for network computer control system. Intelligent key cabinet system takes the computer as a control center. Its logical structure adopts the master-slave distributed network control system, using real-time control, real-time monitoring of the whole system. Intelligent key cabinet system adopts the non-contact IC/ID card, biometric fingerprint, face recognition, digital code & QR as the effective certificate object access. So it is safe, reliable, convenient, fast etc.

Tianhong can design and produce different models as per the customers'demands between 8 keys up to 1000 keys above.


Comprehensive improve many problems of key management, do all unattended management of key, complete subvert the traditional key management concepts and methods,  lead the new concept of key management, and provide a reliable, efficient, scientific, handy electronic management tool for you.

 Real-time know the usage of the key and where it has gone

 Lock the keys into the key ring inside the key cabinet, lock the key ring by electronic locker, protected by the electronic cabinet door locker. Without a legitimate user login, no one can use the key; after locked by electronic locker, unless the violence, otherwise you cannot replace the key randomly; each key ring can hang several keys according to your need.

Comprehensive recording key user identity, borrowed and return time, overtime information and all events. The use of key state real-time online display function, through the background management machine can be used in real-time understanding of all keys, including the user, use time, approval and other information. Records stored in the machine or via the Ethernet transmission to the server

With reliable safety protective measures;
The whole system is smooth, of low noise and good stability.

 Unified management with other system.
Network management, central control. Real-time monitor the usage of key cabinet.
 Multi-level authorization management, scalable and grouping management.
Warning function when non normal reading card.
The door state warning function, to ensure the customer's financial security.
 Exquisite material: Cabinet body part adopts 0.8mm high quality cold-rolled steel plate while the door part adopts 1.0mm. The surface is processed by pickling phosphating electrostatic spray, to ensure  it is not easy to rust, but durable, beautiful and generous during the long-term use.

After power off, available to get the key. In case of accident or other reasons to make the power off, the system information data can be stored for a long time, more than 10 years without lose, the user can get the keys by the 
administrator opening the gates by force.

 Multiple response modes to choose: (1) centre control mode (2) effective card mode. High speed: you only need to out you effective card on the reader to scan, it is fast, convenient and of high recognition rate, fast and accurate recognition rate can reach 100%. Compared with manually inputting the password, it is much more efficiency, 1 second to take out the keys, thus greatly saving the password input box extract time.

The man-machine interactive: large screen liquid crystal display user interface by using a
dot matrix backlight, easy to use for user and administrator, the LCD screen can display the key state, time, operation steps tips and other information.

High safety program: program using IC / ID card as the extract vouchers, enhances the security certificate.
Communication protocol:TCP / IP
Intelligent Key Locker

Intelligent Key Locker

Intelligent Key Locker

Intelligent Key Locker Intelligent Key Locker

Send your message to this supplier

*From:
*To:
avatar Mr. Tony Wang
*Message:

Enter between 20 to 4,000 characters.

This is not what you are looking for? Post a Sourcing Request Now