- Australia & New Zealand
- Belgium & Luxemburg
- Czech Republic
- Saudi Arabia
- Singapore & Malaysia
- South Africa
- South Korea
Traka's iFob can be used as an intelligent electronic key, replacing the need for multiple conventional keys. It has many advantages in that it can be programmed to open different doors for different users (based upon a user's profile held in the system database), it can be reprogrammed easily, if lost it can't be identified and can't be copied, it has a time-out life span and it can be quickly cancelled by an administrator. What's more, the system provides a full audit of all user activity, showing which doors a user accessed (or attempted to) and when.
We refer to the Traka iFob, used as an intelligent electronic key, as the iKey. It is used by organisations who want a simple but very effective access control system. It restricts and audits which users can access selected property, buildings, facilities, secure areas and store rooms.
It can be fitted to control access to external front doors or to internal doors, including computer data rack doors. It provides functionality, control and audit capabilities similar to a full access control system, yet at a fraction of the cost.
The core components of the system include:
Not only does Traka's access control system offer you immediate control over which staff can access specified property, rooms and secured areas but, should an important key get lost or stolen, you don't need to re-key a suite of locks and replace master keys.
Furthermore, if a member of staff leaves your employment, you don't need to worry about retrieving important keys as each individual iKey can be cancelled at the click of a mouse.
Traka iKeys (iFobs) are held in the key management download cabinet.
In the first instance, a user must identify him or herself to the Traka cabinet (PIN code, company magnetic ID card or by using a biometrics fingerprint reader). The system communicates with the Traka software on the administrator's PC. The door will only open to an authorised user and, at this stage, the user can take any iKey. The user profile has already been read - details about the user, including any shift working times or competency expiry dates, and the doors to which he/she has authority to access. This information is then written to the iKey at the time of the user taking it.
Thus, the ikey has no value to the user until the access permissions are written to it. Even now, the pemissions only have a (programmable) life-span and the iKey must be returned to the cabinet before this expires, otherwise the access rights will automatically be revoked.
The single iKey stores all the permissions for the user and will allow that user to access all doors for which they have authorisation. The advantages of this system are: