Simplify

Attractive design and user-friendly intelligent key management cabinet

Store, audit and manage your keys!

Newly designed cabinet

26 Key Slots | 7' Touchscreen

Fashionable Appearance and Design

Curved edges | simple outline

LED lighting

UV antivirus | LED lighting

Multiple access methods

Face | Fingerprint | RFID card | Password

Emergency opening

Full detection of door lock status

Cloud management

Remote control

Well-designed and practical

German Red Dot Award

personally designed, a new appearance and structure design

Intelligent nodes are fully upgraded

real-time detection status, remote alarm for abnormal conditions effectively preventing unauthorized opening make it safer and more reliable

Locking Key Slots

The K26 smart key cabinet can individually lock and control each key or key set, providing high security for sensitive assets. This provides your organization with strict control over who can access each asset and when.
Each key slot is equipped with red and blue dual color LED lights, which conveniently guide users to quickly find the correct position without the need for manual marking one by one.
RFID based key tags are durable, passive, contactless, maintenance-free, and can be quickly identified by the system for accurate and comprehensive auditing of all key logs.

User Authentication

K26 provides different types of ways to verify user identity, such as passwords, employee cards, biometric facial recognition (or fingerprints, veins, etc.), and even allows you to combine them to activate two factor authentication for compliance in certain application environments. For example, after scanning the employee card, prompt the user to verify their password to avoid greater losses caused by card theft.

Convenient methods to access your items.

Password | Fingerprint | Face Recognition | RFID card

2 Cabinet Options for Any Application

K26 White

Key Capacity: 26
Dimensions: 566 x 177 x 380mm
Weight: 17kg
Material: 1.5mm thick steel + ABS
Terminal: Android Terminal
Operating System: Android 4.4
Display: 7″ Touchscreen
Power Supply: 110v / 220v > 12V 5Ah
Power Consumption: 60W Max

K8

Key Capacity: 8
Dimensions: 440 x 177 x 380mm
Weight: 14kg
Material: 1.5mm thick steel + ABS
Terminal: Android Terminal
Operating System: Android 4.4
Display: 7″ Touchscreen
Power Supply: 110v / 220v > 12V 5Ah
Power Consumption: 60W Max

Smart remote key retrieval

Operation on your mobile phone is possible. Remote key retrieval and assign others to retrieve the keys for you.

Transparent data management

Open the interface and all key records are readily available.

Send a reminder at any time using email alerts

Network Version

Network version available

The network version of the intelligent key management system includes all functions of the stand-alone version with cloud settings, control, query, and storage control functions. Regardless of the location and quantity of the cabinets, the network version key management system can be controlled uniformly.
Reservation function: A key can be reserved in advance on the mobile phone/Web. Application function: temporary visitors could register a temporary account to use a certain key at a certain time.
Approval function: Approve the temporary user’s application.
Remote key returned: the system can be controlled remotely so that the key could be returned by others.
Real-time data: Abnormal messages, alarms, and records could be checked at any time on your mobile phone/web.
Message: Messages can be sent to any user.

Standalone Version

Industrial computer stand-alone version UI operation process

All settings, data, and control of the stand-alone version of the intelligent key management system are implemented on the local industrial computer.
Login functions: account password login, ID card login, fingerprint login, and face recognition login.
Setting functions: key cabinet setting, key setting, user setting, multi-authentication setting, authority setting, reason setting for taking the key, and basic parameter setting.
Query functions: all retrieval records, illegal operation records, and operation logs.