- Singapore & Malaysia
- South Africa
Buildings and facilities
Traka's iFob can be used as an intelligent electronic key, replacing the need for multiple conventional keys. It has many advantages in that it can be programmed to open different doors for different users (based upon a user's profile held in the system database), it can be reprogrammed easily, if lost it can't be identified and can't be copied, it has a time-out life span and it can be quickly cancelled by an administrator. What's more, the system provides a full audit of all user activity, showing which doors a user accessed (or attempted to) and when.
Who uses the iKey?
We refer to the Traka iFob, used as an intelligent electronic key, as the iKey. It is used by organisations who want a simple but very effective access control system. It restricts and audits which users can access selected property, buildings, facilities, secure areas and store rooms.
It can be fitted to control access to external front doors or to internal doors, including computer data rack doors. It provides functionality, control and audit capabilities similar to a full access control system, yet at a fraction of the cost.
The core components of the system include:
- iFobs to act as the electronic iKeys (usually one per person)
- A receptor socket per door, mounted on the door frame/wall nearby, into which the user inserts the iKey
- An Immobilisor, wired to the receptor socket to provide the intelligence, controlling the access permissions
- A maglock mounted on the door frame to provide the locking mechanism
- A quick release press to enable users to exit through the locked door
- One Traka key cabinet acting as a download station, in which the iKeys are held when not in use. It is used for programming the iKeys and downloading all the user activity, providing an audit of each door opened, when and by whom
- Traka32 software, running on an administrators PC, to define the user profiles and access permissions
Control and savings...
Not only does Traka's access control system offer you immediate control over which staff can access specified property, rooms and secured areas but, should an important key get lost or stolen, you don't need to re-key a suite of locks and replace master keys.
Furthermore, if a member of staff leaves your employment, you don't need to worry about retrieving important keys as each individual iKey can be cancelled at the click of a mouse.
How does it work?
Traka iKeys (iFobs) are held in the key management download cabinet.
In the first instance, a user must identify him or herself to the Traka cabinet (PIN code, company magnetic ID card or by using a biometrics fingerprint reader). The system communicates with the Traka software on the administrator's PC. The door will only open to an authorised user and, at this stage, the user can take any iKey. The user profile has already been read - details about the user, including any shift working times or competency expiry dates, and the doors to which he/she has authority to access. This information is then written to the iKey at the time of the user taking it.
Thus, the ikey has no value to the user until the access permissions are written to it. Even now, the pemissions only have a (programmable) life-span and the iKey must be returned to the cabinet before this expires, otherwise the access rights will automatically be revoked.
The single iKey stores all the permissions for the user and will allow that user to access all doors for which they have authorisation. The advantages of this system are:
- No more, or reduced need for, conventional keys
- Multiple key-sets, one for each person, are no longer needed
- A single iKey will open all doors for which the user has permission
- There is no need to return to the office should a user need to collect another key
- Unlike with conventional keys, there is no searching for another user should they have taken the key that you need
- If an iKey is lost, it does not mean any inconvenience for other users who might be needing to access rooms or facilities
- If lost, the iKey has no identity and will self expire with in (programmable) 24 hours and can be cancelled easily by an administrator
- A full audit of all door entries by time and person is maintained, and is easily made available via the software reporting function
Printer friendly page