ELECTRONIC KEY MANAGEMENT
Electronic system for security and key management
• 15 years of experience
• Thousands of projects
• Development and production
• High quality design and construction
• Competitive and User Friendly Solutions
• Software included, no additional fees or licenses!

Security and key management
KeyGuard

KeyGuard Key Management Systems
The KeyGuard system is an absolutely innovative system, with the best cost-benefit for access control and automatic registration of the use of your keys.
-
Sophisticated and modern design
-
The depth of the slim case is only 132mm, one of the most compact on the market!
-
High quality, made with the best European components.
-
Management, online and real-time information of all events, positions and key withdrawal.
-
Practical and truly user friendly!
-
Industrial line display for 24-hour operation and long longevity!
-
High-resistance cabinet for greater security!
-
5 years warranty!
-
Free software, no fees or licenses!
KeyGuard System Europe KS
-
Access by RFID card / PIN / Biometrics (optional)
-
Automatic delivery and receipt of keys, with or without blocking, with User, date and time records.
-
Easy and quick to use interface
-
Automatic activation and deactivation of the security system
-
Backlighting of modules
-
SmartKeys lock and non-lock functions
-
Database of 50,000 users or more
-
50,000 events in non-volatile memory or higher
-
Glass/polycarbonate door, steel or no door
-
Installing the control display on the bottom/base or on the right side
-
Ethernet, RS485, RS232 interfaces and 5 outputs (4 reversible)
-
Complete management via software/PC and reports to print or export. Sending events by SMS or Email.
-
Complete online management of Users, cards and keys.
-
Software development and customization kit available upon additional request.
-
SecuriProx Studio configuration and management SW included with no fees or licenses.
-
Cabinets for 3, 5 and 10 modules x 10 keys
-
From 10 to 2000 keys with a single control panel
-
...

KG 50 KEY GLASS
Recommended use
Hospitals
Schools
Banks
Airports
Museums
Factories and industry
Logistics
Data Center
Security forces
and many others...
Compliance Solutions
More information:
For further clarification or practical demonstrations, you can contact us via our email: contact@kedacomsolutions.pt
Functional presentation
Key delivery in 4 movements / 5 seconds
1. Present a valid User card;
2. Open door;
3. Raise authorized key or keys - highlighted by high-density LED to facilitate selection;
4. Close the door.
Key return in 4 movements / 5 seconds
1. Present a valid User card;
2. Open door;
3. Insert key or keys - in any free position, the system recognizes the Dallas ID of the key fob;
4. Close the door.
Security
1. The system automatically records all operations with User, key and date/time information.
2. Keys may have authorized use periods. If they are not returned at the scheduled time, the system can send an alarm/report (email and optionally SMS) to the system Manager/Administrator with information about the last user of the key.
3. If the keychain door is left open/forgotten, this event is also noted and an email can be sent with information about this event.
4. We can also select other events such as collection and delivery of keys, alarms, power outages, to send an email indicating the respective event.
1. KeyGuard - System Features
1.1. Can access to keys be customized?
Yes. You can create groups or individual access levels to the keys for each user. The access level represents a combination of keys or hierarchical lists of keys and a reference to a period. To support system configuration, keys, users and access, you can use the SW SecuriProx Studio supplied with the system.

1.2. Can a time period be assigned for access to a key?
Yes. Key access levels have a customizable "Time Range" field. Time ranges can include 10 time periods which are the hour, day of the week, holiday, weekend, even day, and an individual list of days. If more than 10 time slots are needed, you can add an entry at the access level, and there are no limits to the number of entries. This way we can achieve unlimited customizations.

1.3. Can an individual schedule be assigned to a User?
It is possible to assign, in addition to the individual schedule, an individual list of working days. For example, you can create the "First Day of Work" list so that an employee can have access to the equipment room to perform maintenance work on the first working day of the month. All lists are aggregated into a key management system message log. Entries are made in the message log whether or not the servers are connected to software. The software is only needed to create a database and generate reports.
1.4. Can a group of keys be assigned?
Yes. The KeyGuard electronic key fob comprises hierarchical lists of keys (groups). This means you can create a key list, which in turn includes snap lists (up to 7 snap levels). Each list has its own name. You must include this list in a user's key access level to assign keys according to the list. If the keys are returned, you need to select a section for working with lists in the key holder menu, select a required list from the table and get the keys back.

1.5. How do I get information about keys that have not been returned?
Open the "System objects table" and press the "Keys raised" quick filter button in the software. The system will filter the list and leave only the keys that were not returned at that time. Additional information about the latest events, who picked up and returned a key and when, quick filter, etc. are also shown here.

Furthermore, the system can work with graphic plans of the facilities and the position of each door, which helps to identify and visually control the status of the keys, with immediate reference to each key/room.

1.6. Can an alarm event be triggered if a key is not returned in time?
Yes. You can specify in a key's settings that it must be returned to the KeyGuard key control system by a certain time or within a certain period of time. If a key is not returned within a set period of time, the system activates the alarm. The alarm can be viewed on the monitoring system screen and can be sent automatically in the form of SMS and/or email.

1.7. How to quickly get the key we need?
1. If you are only allowed to carry one key, simply place the card in the correct reader. If the key is in the storage cell, the system immediately opens the door and illuminates the cell with your key. 2. If you have access to several keys, the system displays the menu with the table where your keys are listed. You can scroll through the table page by page or use the filter or search keys. The system highlights the chosen keys, the raised keys, the blocked keys, the prohibited keys for this period of time, etc. 3. You can perform a key search by key name or room number/name. Just enter the first digits (symbols) and the system filters the list. 4. With a fingerprint reader, you have the option to assign different keys to different fingers. Simply present your right finger and you will immediately get the appropriate key.

1.8. Can I find a key by its name or ID?
Each key can have a name and a number. The key number is made up of digits, but may have a letter of the alphabet at the end, for example, 101A, 101B. The search can be carried out by name and number. Just enter any symbols. All matching variants will be filtered and displayed on the screen. You can activate the command to give the key, directly from the search menu, or return to the main menu to continue working.

1.9. How do you quickly find out who raised a bracket?
This information is available directly on the key holder's dashboard. Place your card in the reader, select the desired key from the table (of course you must be authorized for this key), press the "History" button. The last 16 events relating to the key will be shown, the events include the action, time, surname and first name and telephone number of the respective User. Reports for a longer period of time are also available in the software.
1.10. How do I view a report on who used a key?
The last 16 events are available directly on the key holder's dashboard. It is possible to view a more detailed report in the software. Select a key or a list of keys, select a specific department or user, and select a time range. You can export a report to files in different formats or print a report. You can also save a report as a template and start it automatically.

1.11. Can I use data relating to keys that have been withdrawn/returned to calculate usage time?
You can calculate usage time using the software. The calculated time can be viewed online on the Key Users screen.
1.12. What database is used?
The software uses a free FireBird database. The database is protected by a password. We recommend that you use encryption for responsible applications, with the help of standard tools or other Windows tools.
1.13. Can I access the key management system via the Internet?
Yes. However, as with any other security system, direct access to unprotected networks is not recommended. The system has a certain level of protection, but if you use insecure channels, it is strictly recommended to protect yourself with security tools (VPN channel and others).
1.14. What is the user storage capacity and event history storage capacity?
The total number of memory cells can be 200,000. The number of memory cells can be increased when ordering the equipment. The distribution of this memory between users and events can be changed by the user. For example, you can assign 100,000 cells for storing user data and other settings and 100,000 cells for storing events. The system also has an event memory for each key, that is, the system stores the latest events, regardless of the date on which the event occurred.
1.15. Is it possible to change the system language?
The system allows you to switch between interface languages inline. Simply specify the desired language in the access card settings and the screen language will automatically change depending on the access card used.
2. KeyGuard - Special Features
2.1. Is an anti-vandal version available?
For more critical security locations we can supply systems with a solid steel door with a thickness of 2 mm for systems with 50 keys and with a thickness of 1.5 mm for systems with 100 keys. The standard 5mm thick transparent polycarbonate door is 250 times more resistant than glass of the same thickness. Although not “anti-vandal” rated, the resistance is suitable for most applications and installation locations, generally protected and security areas.
2.2. How resistant is the glass on the keychain/cabinet door?
The transparent door is made of polycarbonate (5mm), it is the most durable material of all transparent plastic materials with resistance up to 250 times greater than glass of the same thickness. It stands out for its excellent mechanical, thermal and electrical properties and has high impact resistance (practically unbreakable): - Unbreakable, mechanical resistance to impact, up to 250x more resistant than glass of the same thickness; - Transparent, with great light transmission, 88% in crystal; - UV protection on both sides; - Weather resistant; - Recyclable; On request we also supply steel doors.
2.3. Can I order a cabinet without a door?
Yes, the system can be supplied without a door. Use under these conditions must be considered and reserved for systems with key locks and security rooms with more restricted access.
2.4. Can I choose a color for the cabinet?
We have two standard colors to choose from: dark silver 5359AO445 and light RAL7038. Upon request, we can also manufacture in color according to your specifications.
2.5. Can I fix the control panel to the side?
Yes, two brackets are included in the scope of delivery, one for fixing at a 45 degree angle on the bottom of the cabinet and the second is prepared for fixing on the right side of the box.
2.6. What is the power of the system power supply, is there a reserve?
The system's power supply is ensured via the normal public network and can be of any international range (between 100V and 250V), the maximum consumption is 60 W. Backup batteries are included in the scope of supply, and can offer autonomy to the system up to 20 hours, depending on use. The system automatically charges and tests the batteries. The KeyGuard electronic key fob constantly monitors the status of the batteries and, if their capacity drops to a critical level, the system will display a personalized fault and an alert message that the batteries need to be replaced.
2.7. How do I obtain the keys in the event of a power outage?
If the mains power supply is interrupted and the batteries are discharged, the system will remain blocked. In this case, to release the keys, it is necessary to open the door lock with an emergency release key, unscrew two interior door fixing screws, open the interior door lock with the same key and unlock the groups of keys by pulling the pins. coming out of the solenoids.
2.8. Can I build the cabinet into the wall?
The door's rotating column does not allow it to be completely embedded in the wall. You can install the cabinet so that its box protrudes 55 mm from the wall. Don't hesitate to get in touch if you need decorative frames for this type of installation.
2.9. Is a specialist required to assemble and commission the system?
It is recommended but not mandatory, assembling the system is quite simple. The system can be put into operation by itself. 1. Make sure that the wall where the cabinet is to be mounted supports a load greater than the weight of the cabinet. 2. To support the main unit, 4 holes are required. 3. Screw one of the two brackets included in the scope of delivery onto the controller (for installation from below or for mounting from the right side of the box) and connect the control panel (one connector). 4. Connect the system to the 100 - 230V electrical network, ensuring an earth connection, and connect the battery terminals. 5. Start system configuration mode (button on the control panel board inside the main unit), enter the system and server IP addresses (see manual). Programming is carried out with the help of the SecuriProx Studio software included in the scope of delivery (see video tutorials on our website).
2.10. How difficult is it to open the keychain/cabinet?
The key management system is not a safe. However, we have taken some measures to prevent unauthorized openings. The door is equipped with an opening sensor, the lock cylinder is from HSS and has drill protection. The lock is additionally protected with an attached panel. We recommend integrating the key control system with an intrusion alarm system to ensure additional system security. In this case, only authorized access to the system will give a command to turn off the security alarm, and unauthorized access will activate the alarm.
2.11. Is the alarm activated in case of unauthorized opening of the key fob door?
The system has double protection against unauthorized opening. A main magnetic contact indicates the position of the door and an additional magnetic contact analyzes the external magnetic field. If an intruder tries to bypass the internal magnetic contact detector with an external magnet, the additional contact will be triggered. For greater security, you can connect the alarm output to the building's security and alarm monitoring system.
2.12. Can I connect the key control system to a video surveillance system?
The KeyGuard key fob is equipped with 5 outputs (4 solid state relays with third-party coupling and a 250V-5A relay). Each output can be regulated to be activated after a certain event: door opening, key collection/return, etc.
2.13. What types of readers are included in the scope of supply?
We provide readers that simultaneously support EmMarin and HID proxCard2 (125 kHz) formats. On request it is also possible to install MIFARE readers (13.56 MHz). Players of other formats can also be easily connected. For this purpose, the system has two Wiegand interfaces with a format from 26 bits to 80 bits.
2.14. Why do we use two readers?
It's a way to simplify most uses. This way we avoid the need to navigate through buttons and menus on the display and consume additional time. A simple calculation shows that, if the system is used intensively and by dozens of employees, the loss of time with lengthy uses could mean thousands of Euros over the years of using the system. We thus achieved a quick and easy solution: left reader to return the keys, right reader to collect the keys, this way all you have to do is open the door and deposit or remove the keys with authorized access. At the same time, if the User has permission, there will always be the possibility of controlling and navigating through different functions using the display keyboard.
2.15. How do I attach a key to a keychain?
The keys are attached to the key rings by a disposable 3 mm stainless steel clamp. The key is placed in the clamp and inserted into the key ring. You cannot remove the key from the key ring unless you cut the key or clip.
2.16. Can I use a key fob again if a key needs to be replaced or added?
Keychains are designed taking into account that keys can be replaced or added to multiple times. To do this, you will need to cut the clip close to the edge of the key ring, make a new locking groove, use the clip again to place the necessary keys and insert the clip into the key ring. Preferably, you should use a new clip to replace the cut one.
2.17. Why does the display turn off when the power supply is disconnected?
Simply to save the display and battery consumption. If you want to activate the display, simply touch the screen or bring the card closer to the reader.
2.18. I don't want to block keys in the system, I just want to control and record the withdrawal
For use without blocking the keys, you can use KGRD-0012 modules for 12 cells, WITHOUT blocking the key rings. In this case, only the system port will be blocked. The authorized employee can open the cabinet door and must only remove the key marked by an active LED. If you have taken an unauthorized key, an alarm signal will be generated. All reports on who picked up/returned a key are available in the software or on the locker display. The system without locking keys in the slots has a more competitive value. Application areas: car dealers, keys for cash terminals, keys for equipment rooms (distribution rooms), etc.
2.19. Can keys be stored in boxes?
Our system can store keys in both key rings and boxes. We can choose the scope of supply of the boxes depending on the size of the keys used.
2.20. I need a system for 70 keys
The units/cabinets have a fixed number of slots of 3, 5 and 10. We can order an incomplete set of modules, in this case the empty spaces will be closed by stainless steel covers. So, for 70 keys we need a cabinet for 10 slots (100 keys) but only with 7 slots of 10 keys each.
2.21. I need a system for 3000 keys
Each control panel/display can control up to 20 units/cabinets with a total number of up to 2,000 keys, that is, to store 3,000 keys, two systems of 1,500 keys each will be required. However, if they are in the same building, they can be fully integrated via Ethernet. In this case any of the controllers/display can access any cabinet or key regardless of where it is stored. When logging in or presenting the card at any of the withdrawal readers, the authorized keys are immediately marked in either system, presenting the card at the return reader, you can deposit the keys in any of the lockers. The solution for 3000 keys involves the provision of 30 cabinets with 10 slots x 10 keys each, equally distributed across two controllers/displays.
2.22. How can I access the system? What interfaces are available?
The default connection interface is Ethernet. There are also RS-485 and RS-232 interfaces. The initial configuration of the system and server IP addresses is carried out in the service menu on the electronic key fob display.
2.23. Is it possible to use a biometric fingerprint reader?
Yes, you can integrate the MorphoSmart fingerprint reader from Safran, a leader in biometric technology. For other manufacturers and models, please confirm.
2.24. Can I set access to a key with a code?
Yes. You can define any type of access: just with user number and password, just with card, combined access with card and password confirmation or you can also use a biometric reader.
2.25. Can I create a one-time password to access a key?
Yes, it is possible.
3. KeyGuard – Reliability and warranty
3.1. What is the warranty period of the system?
The warranty period is 5 years and includes replacement of damaged components due to proven manufacturing defects. This warranty is shared jointly between the Distributor and the Dealer/Installer.
3.2. Can warranty obligations be extended?
If the system is used very intensively and some mechanical parts such as locks, electrical or mechanical system locks fail, after the end of the 5-year warranty period, contact us and we will arrange for the replacement of the failed component at controlled cost values. . We do everything we can to keep systems operational and customers happy. The maintenance and full operability of KeyGuard systems beyond the warranty period is normal and guarantees that the systems are reliable, durable and fully justify the investment and preference of Customers and Users.
3.3. How reliable is the system's Flash memory?
The system uses power independent memory in different technologies, DataFlash memory is used to store data about Users and key access levels. This Flash memory essentially differs from the common USB flash drives known to everyone. This type of memory is microscopic in size with guaranteed recording quality. This ability helps to change the data of a given User, without relevant consequences and without the need to overwrite the remaining data on this medium, thus reducing limitations related to the number of rewriting cycles in Flash technology. Special ferromagnetic memory, with an unlimited number of rewrite cycles, is used for intermediate storage of events. This way, we guarantee problem-free operation of the system at any time throughout its entire service life.
3.4. What is the useful life and how is the reliability of the system guaranteed?
The system is designed for continuous operation over many years. All components are selected with high quality and safety standards and have been dimensioned to enable use at reduced loads. For example, an ultra-bright display only works at 50% brightness (thus twice the useful life is achieved), other components also work at voltage below their limit at around 10-20% less than the specified capacity. The useful life of the KeyGuard key storage system, under conditions of normal use, is expected to be more than 15 years without reaching the point of obsolescence.
3.5. Is system maintenance required?
The system only requires normal daily hygiene and cleaning with non-abrasive products, and annual lubrication of the door's mechanical components and cleaning and hygiene care for both the key rings and the keys themselves in order to avoid contamination and dust accumulation. or grease in the cabinet's receivers. To clean the contacts on the keychain, you can use a cotton pad moistened with alcohol.
Description and concept of the Electronic Key Management System
The Electronic Key Management and Security System is a technological solution that aims to control, monitor and manage access to physical keys in a safe and efficient manner, generally in environments such as hotels, companies, condominiums, hospitals and other places where control and registration automatic access is crucial. This type of system uses electronic devices, management software and hardware such as cabinets, safes or key distribution panels.
Main components of the Electronic Key Management system:
Control Hardware
Electronic cabinets or panels: for storing keys securely, where they are released and returned according to the authorization and profile of each User.
Proximity (RFID) card or biometric readers: Used to authenticate the User before releasing or returning the key.
Electronic locks: devices that activate the key release mechanism and cabinet doors.
They can be integrated with third-party systems such as CCTV, Alarms and Technical Building Management.
Management Software
Allows management of the system and keys, including assignment and return, control of use by each User, as well as auditing and generating reports on key use.
The software can also be accessed remotely, allowing for centralized management in real time.
Integration with other security systems, such as CCTV or alarm systems.
Identification and Authentication
RFID Cards: Users or employees can use proximity cards to access keys. These cards can be configured with different access levels.
Biometrics: Biometric readers, such as fingerprints or facial recognition, can be used to ensure that only authorized individuals can pick up or return keys.
Passwords or PINs: Use of codes is also possible.
Control and Monitoring
The system allows the Administrator to view in real time who has withdrawn or returned a certain key.
You can set up alerts and notifications for when a key is not returned on time, or if an unauthorized event occurs.
Security
Data encryption: Ensures that all information about key usage is protected from unauthorized access.
Controlled access: Depending on the authorization level, different Users will have access to different keys or areas.
Auditing and traceability: The system generates detailed logs with date/time/User on the withdrawal and return of keys, allowing for an effective and transparent audit.
Advantages of the system
Increased Security: Technology reduces the risk of loss, theft or duplication of physical keys.
Operational Efficiency: Centralizing key control allows for better organization and tracking of each key and respective User.
Time Savings: Automated key collection and return processes prevent employees from wasting time manually managing these processes.
Access Control: Key access management can be easily configured according to specific schedules, locations and needs.
Human Error Prevention: Minimizes human errors by automating processes and keeping detailed and up-to-date records of each action.
Common Applications
Hospitals and Clinics: For controlling access to restricted areas or sensitive equipment.
Hotels: Where keys for different rooms can be managed, collected and returned automatically, efficiently and securely.
Companies, Institutions, Industry: Access control to sensitive areas, such as safes, server rooms or restricted areas.
Condominiums: Management of keys for apartments, common areas and garages in a practical and safe way.
In short, an Electronic Key Management system facilitates the control and security of the use of physical keys, providing a more secure, efficient and auditable environment, while reducing operational costs and risks associated with irregular use of keys.