RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Step Logic KeyMaster

Product
Developers: Step Logic
Last Release Date: 2018/05/07
Technology: Cybersecurity - Biometric identification,  Internet of Things of Internet of Things (IoT),  ACS are Control and management systems for access

KeyMaster is the network solution with centralized operation intended for the organization of storage of keys and completely automated process of their receiving and delivery.

The customized solution KeyMaster is created based on development of domestic manufacturer of KeyGuard

2018: Upgrade of a system

KeyMaster provides completely automated process of storage of keys

The Step Logic company announced on May 7, 2018 expansion integration and functionality of the product KeyMaster. The network solution with centralized operation organically fits into infrastructure of geographically distributed objects where it is necessary to raise the security level of control and access control.

After the carried-out upgrade the key keeper became the IoT element: the solution is seamlessly integrated with different identifiers ACS, security systems of an object and software for registration of personnel and also flexibly scaled under the customer's tasks. Thus, the organizations with the developed branch network, government institutions, management companies have an opportunity to work in unified information environment of security.

File:Aquote1.png
Automated systems of storage of keys were widely used in the Russian market. However development of technologies and general digitalization dictate new requirements to the organization of complex security. The increased customers needs became the driver for expansion of opportunities KeyMaster. Obvious pluses of the solution are the scalability, efficiency of decision making, simplicity of operation and also a broad spectrum of integration opportunities. A system can be used on any object — from the airports to hotel or residential complexes — and allows to meet the most strict requirements to reliability and security of control systems of access — Yury Batyzhev, the director of the department of the engineering systems of Step Logic said.
File:Aquote2.png

KeyMaster allows to organize multilevel access for users to storage of keys. Identification of employees happens to the help of biometric data (fingerprints, an iris of the eye of eyes, etc.). Thanks to universality of this KeyMaster technology it can be applied including on objects, crucial in terms of security: transport, industrial, power, military, cultural and mass, in data centers, etc. Authorization is possible via magnetic cards or using the PIN code.

KeyMaster control panel

After passing of identification procedure of the user on the body of the key keeper the indicating panel with the cell assigned to a specific key lights up. Keys fasten on the intellectual charms having the built-in chips from which data are used every time when it is necessary to take a key from storage or to return it into place. Thus, the probability of confusion and loss of keys is completely excluded.

The intellectual base KeyMaster is provided by the specialized software developed by specialists of Step Logic for solution integration with object security systems (for example, from the ACS, the fire warning) and also synchronization of data with management programs for personnel. For rapid response to emergency situations and prevention of incidents a system allows to receive notifications at delivery and receiving charms, about the expiration of the time spent of a key out of a system and also at operation of a disturbing signal. It is possible to transfer a key to other authorized users through a special application for smartphones.

For the purpose of providing high degree of security the body of the key keeper can be executed in anti-vandal execution. The KeyMaster control panel has the web interface via which it is possible to receive quickly archive of events, to perform search of a key and to define its location. For each user of storage system of keys the unique group or personal access level is created. It is possible to connect from 20 to 2 thousand keys to one storage system, to 50 thousand users, up to 50 thousand events.