Benchmark : ECKINDUS
The PC-independent solution for the management of your important keys
ecos systems offers an easy-to-install and especially cost-effective key management system of the highest safety standard through the optimization of functionalities as well as through the standardization of all production processes.
With this advanced development of its safety systems, ecos systems has answered up to the need for a user-friendly and compact key management system.
With ecos keysafe, a practical and robust key management system that is suited especially for a small number of up to 20 protection-worthy keys has been developed. Usage as well as a complete tracing and documentation of the individual user profile is realized through the touch screen display of the integrated industrial processor directly on-the-spot.
“Plug and Play”
The installation and operation of the system is done the easiest way – absolutely independent of a PC. User’s guide through the integrated touch screen display allows for a fast initial operation also by untrained personnel. Of course, all utility data can be imported through USB stick directly into spreadsheet programs like MS Excel, or established and optionally obtainable ecos systems software modules and evaluated in accordance with tried and tested methods.
Fast and clear access
User access is done either through PIN code or optionally through non-contacting identification system via card or key ring pendants (Proximity Tag). After successful verification, the door opens automatically. Authorized keys are then unlocked and rendered identifiable with blue LED illumination for a better overview.
Functions and configurations
• The issuance of access authorization for up to 100 users with the read-in of the non-contacting means of identification, issuance of a date of expiration and assignment of an additional individual PIN (four to eight digit number) for maximum safety standards, time window per week day and user
• Integrated data memory with memory capacity in excess of one year (up to 25,000 entries) upon daily usage of every key
• Alarms in case of impending data overflow, unauthorized removal, unauthorized opening, power failure, if door is not properly closed and door is not properly locked
• Visual and acoustic alarm signals on the spot
• Switchover of alarm to a superior alarm system through potential free contact
• Emergency power supply through battery charging switch for a minimum of 24 hours
• Evaluation and saving through customary spreadsheet programs after data transfer using USB stick