procontrol ProxerSafe KeySafe User Manual Download Page 7

 

 
 

 
 

 

7/ 23   

KeySafe Lock User Guide 

 

KeySafe terminal with biometric fingerprint reader 

 

KeySafe cabinet can be set to accept Client’s existing cards 

 

Key storage capacity according to unique demands 

 

Mounting options per request 

 

Direction of door opening can be changed upon request 

 

Outdoor version 

 

At returning car keys it is obligatory to record the odometer reading 

 

More cabinets can be put in a string 

 

 

Operation 

 

The  cabinet  can  be  opened  only  with  personalized  RFID  proximity  tags  or/and  PIN  code,  optionally  using 
fingerprint  identification  (KeySafe  Lock  Bio).  Each  key  has  a  unique  RFID  identifier  that  allows  key 
identification  and  monitoring  of  key  movements.  The  software  logs  when  a  key  is  taken,  returned,  and  by 
whom. The right to be able to remove a key can be given separately. Without this right, the cabinet does not 
let the person take out any key.  

Each key has a plug equipped with RFID transponder. If you return the plug into the right slot, the RFID reader 
reads the transponder, and it sends the ID to the PC software.

 

In case of a closing command a latch locks 

into the plug

’s notch, preventing to be able to pull out the plug. 

 

The module’s own RFID reader reads the available RFID IDs and sends them to the PC software.   

 

When someone identifies himself, the cabinet starts to investigate, whether the user has the rights to take 
one or more keys. 

 

If the person has sufficient rights, the cabinet door will open, and the device automatically unlocks the 
keys for what the person has pick-up rights. Should the door be closed again, all slots will be locked. 

 

The PC software records all the events, since it is possible to monitor and control the key movements. 

The intelligent modules containing key positions are connected to an RS485 network inside the cabinet. This 
network is connected via Ethernet to the cabinet

’s management software running on external PC. The RFID 

reader, the other storage units, the cabinet door locks and the door state sensors are also connected to the 
same RS485 network. 

Rights for removing keys 

More than one key-ID can be assigned to one person. The right to remove a key can be given for keys one 
by one individually.  

Key identification 

The cabinet recognizes what key is in which slot. Who, when and which keys he has removed or returned - It 
will be saved in the event log. If you take or put back more than one keys, the system will know the key holder 
ID numbers of all of them. 

 

 

Summary of Contents for ProxerSafe KeySafe

Page 1: ...1 23 KeySafe Lock User Guide PROCONTROL ProxerSafe family KeySafe Lock RFID technology based safety key cabinet User Guide Version 14 1 Date October 2018...

Page 2: ...11 Login 11 Login using card 11 Login using PIN code 11 Login with combination of card and PIN code 12 Login with fingerprint 12 Login with combination of fingerprint and PIN code 12 Key handling 13...

Page 3: ...3 23 KeySafe Lock User Guide Check user event log 22 Monitoring using other functions 23 KeySafe cabinet Questions and Answers 23 Installation 23 Installation guide is in the Administrator Manual 23...

Page 4: ...he equipment only for the purpose it has been designed for About the security Use the power supply provided by manufacturer for the device Use electric power connection as specified in this guide Atte...

Page 5: ...an built in computer It is possible to connect it to a computer network and to check remotely who and when took which key and for how long time The KeySafe Lock does not allow taking any key just the...

Page 6: ...ffline online communication operates in its own manageable via the touchscreen of the built in PC and can be managed from a remote PC via Internet Can be combined with the access and time management m...

Page 7: ...o be able to pull out the plug The module s own RFID reader reads the available RFID IDs and sends them to the PC software When someone identifies himself the cabinet starts to investigate whether the...

Page 8: ...rm tone alarm out The motor mechanics of the key latch get jammed alarm out email The door was left open for too long successful identification keys have been removed but the door remained open Alarm...

Page 9: ...ck Bio type the fingerprint reader works only after the device has waken when the fingerprint reader is blue During power outage mode the key LEDs light only at use The key modules check the keys in e...

Page 10: ...dmin The difference between the key user and the superuser is in their rights User rights Key user has right to login select pick up and return keys Superuser is authorized to login select pick up and...

Page 11: ...glish by default To select other available languages please consult the Admin Guide At request other translations can be available Login Login using card Place your card close to the card reader next...

Page 12: ...till waiting Login with fingerprint Put your finger on the fingerprint reader The device beeps at the fingerprint scan In case a fingerprint is not entitled a Not authorized message appears on the scr...

Page 13: ...les mark the keys available for you If keys are reserved the software shows them in full orange rectangles The full grey rectangle means that another user who also has right for this key has picked up...

Page 14: ...hile the green an open one If the person has no activity for 90 sec after the door has been opened the latches of the opened key slots will lock again timeout Key position slots also close if the user...

Page 15: ...ways find the keys with the key finder function Switching off marking the misplaced keys optional The function described in the previous paragraph can be switched off In this case the key map does not...

Page 16: ...se the KeySafe for managing bunch of keys in the FindKey menu you can see the subkeys which belong to a key The key position number of the subkey is the same as of the main key If you choose one of th...

Page 17: ...the keyboard in the lower right corner E g let s search for vehicles with letter C It is possible to search in more columns at once the search result will be displayed accordingly To close the keyboa...

Page 18: ...ew users into the system manage all the keys and user rights per keys set time and read event logs User cards can be also requested These can be used to open the cabinet and certain key slots if the r...

Page 19: ...the entered PIN is to be confirmed Then press Save Modify a user When you tap on a username their data is shown on the right You can edit those data a pencil icon appears next to the username and when...

Page 20: ...rights Edit keys You can change the name and modify the RFID number of a selected key in Admin menu Key edit menu Choose a key modify its data and finally tap Save Replacing RFID key holders To replac...

Page 21: ...menu point too If you click on a user name a key list will appear on the right side Mark the empty checkbox in the Authorized column or unmark it if you need to revoke key rights from the user Finally...

Page 22: ...thin a specified time interval just set the From start date and To end date fields and then press the Update button Press the Back button if you would like to return to the Admin menu KCS shows the fo...

Page 23: ...One person can take out more keys at the same time The event log records the key numbers username and the date of removal What happens if I put the key back not to its own position e g Key 22 into th...

Reviews: