Hello! Welcome to Guangzhou Boyue Intelligent Manufacturing Informat Official website!
|
|
|
详情介绍
Boyue Intelligent Manufacturing "RFID smart key management cabinet" is a professional management key cabinet that combines RFID radio frequency induction technology and computer information management system, and is specially provided for users with large-scale key management needs. As a result, an intelligent management system that can realize remote application, approval, record query, online monitoring and other functions has been developed, which integrates key issuance, collection, storage and recording.
(RFID) 20-digit mobile phone scan code smart key locker is equipped with dual key management function, fingerprint authentication, (face recognition, fingerprint, password, card swipe, code scan, etc.) can be used to open the key locker , take back the key.
1. Basic specifications and parameters of the smart key cabinet
1. Main control: industrial computer, touch screen all-in-one machine, 7-inch touch screen, 10-inch touch screen optional
2. Number of keys: 12, 15, 20... can be customized
3. Host configuration: 4418 A9 1.5GHz 2G+32G
4. System: Linux or WINDOWS
5. Power supply: 12V
6. Identification method: fingerprint, face, password, credit card, two-dimensional code optional
7. Digital tube: optional
8. Power consumption: input voltage 12V, power consumption 18W
9. Cabinet material: 1.0mm cold rolled steel plate
10. Key identification form: RFID tag electronic identity reading
11. Camera function: fisheye camera
12. Dimensions: height 616mm * width 894mm * depth 220mm support customization
13. Secondary development: support secondary development customization or OEM
2. Operation process of key collection:
1. Use the key
2. Staff fingerprint verification
3. After the fingerprint verification is passed, open the main cabinet door and start the video camera function at the same time
4. After the key is received, it will automatically display that the key has been received and generate a key usage record
5. When the authorized use authority is correct, the smart cabinet will automatically open the use authority of the key cabinet
6. Swipe the card to confirm the identity information of the recipient, and approve the use authority
7. Close the cabinet door and stop the video recording at the same time, that is, the receiving process is completed
3. Key return operation process
1. Return the key
2. Staff fingerprint verification
3. After the fingerprint verification is passed, open the main cabinet door and start the video camera function at the same time
4. The indicator light of the key storage location flashes at the same time, guiding the location of the storage location
5. The staff brushes the key card and manages the electronic identity information of the key
6. The staff brushes the work card and manages the identity information of the staff
7. Close the cabinet door and stop the video recording at the same time, that is, the return process is completed
4. Five management functions of smart key cabinet
1. RFID-based key management
Each key is equipped with an RFID key plate, and through the intelligent identification of RFID, the fixed-point positioning management of the key is realized; the system will automatically record the status of the key in position, out of position, and dislocation; if the key is placed in the wrong position, there will be a voice prompt on the spot, and the software will give an eye-catching prompt to prevent the key from being placed. Wrong location, standardized use of smart key cabinets.
2. Key management based on lock control device
The key storage location has a lock control function, and the key use authority can be assigned to each key. Only authorized personnel can receive or return the key from the lock control device; the key action (receiving or returning) is bound to the personnel information and automatically Recording personnel receive key records, realize key tracking; set key borrowing strategy, overdue keys, system text messages, software eye-catching prompts, to prevent keys from being lost.
3. Multi-factor authentication key management
Key access supports a variety of identification methods such as fingerprint, face recognition, card swiping, password and remote real-time authorization. For important keys, multiple security methods are used; both key access control and key collection and return actions can trigger the network camera to work and record automatically. Video screen of personnel operation, high security of management key use.
4. Key management of software system control
The system adopts the B/S frame mode design, the system is easy to operate, the system establishes an electronic file for each key, monitors the real-time status of the key, tracks the key usage record, sets the personnel authority, sets the key usage time, and prints the report.
5. Customizable key management system
The software and hardware of this system are independently developed by the company, which can be flexibly connected with other systems, and can provide customized services according to customer needs to ensure customer satisfaction.
Five, smart key cabinet product features:
1. Management standardization: no need for personnel to be on duty, accurately understand the user's taking and returning keys, and generate records
2. Product science: intelligently combined with password technology, RFID, biometric identification and other identification technologies, the system has the automatic function of intelligent management
3. Product practicability: The usage of each user and item is recorded, and the usage record of valuables is generated! Avoid management hidden dangers caused by a variety of people
4. Product cost performance: one-time investment, no need for repeated investment, low comprehensive cost, is the most effective set of modern management system to solve key management
5. Access control: reduce management and enhance transparency by sharing users, access levels, etc.
6. Cloud management: whether to realize cloud management according to the needs, remote viewing of various reminders, reports, and keys can be known at any time.