Smart Lockers
Swipe
SmartKey electronic locker systems are the solution for securing, controlling and tracking larger objects. Now access to laptop computers, cash trays and more can be managed as efficiently as keys. Items can be returned to any security locker system for convenience.
Set up SmartKey Locker systems as a personal metal locker storage space for one or multiple users. Like all Morse Watchmans solutions, they are customizable and scalable.
SmartKey metal locker cabinets are engineered for complete interactivity with your other business systems. By opening our protocols to a wide range of integration partners, Morse Watchmans makes it possible for you to implement connectivity across systems on any level you choose. For example, by integrating your SmartKey Locker system with your access control system, your access control system will know which users are in the facility and which are not. A user who has taken an object from a SmartKey Locker cabinet can be denied egress from the facility until the object is returned – and selected management can be alerted automatically via email if an item has not been returned.
By designing SmartKey Locker systems with the ability to communicate across systems, Morse Watchmans helps our customers maintain best-in-breed security solutions without the need to overhaul or replace costly installations. SmartKey Locker systems have a built-in Ethernet port for networked connectivity.
It’s easy to expand scalable SmartKey Locker systems as your needs grow. Start with a single cabinet, or configure your system with multiple locker cabinets. Designed with scalability in mind, each additional metal locker storage unit can be controlled by a single console and monitored by the advanced TrueTouch software.
- Notebook PCs
- Weapons
- Cell Phones
- Cash Trays
- PDAs
- Data Terminals
- Hand-Held Radios
- Personal Items
- Key and Group Interlock: Each key set or group of key sets can be configured to limit other key removals by the user who removed one set or globally by anyone that removed one of the interlocked key sets or groups. For instance, Key set 2 can’t be taken if key set 1 is out. Or, group 5 can’t be removed if any key sets within it are out. There are many possibilities here, so please call us for more details.
A variety of access control devices to interface with
Like a door to a building or room, the KeyWatcher stands by waiting for a valid signal from your preferred method of access validation. The KeyWatcher comes with a standard touch screen. Users enter a 4-6 digit UserID and a 4-digit PIN. There are also other available access methods as detailed below.
The initial standby Start screen mode
4-6 Digit UserID + 4-Digit PIN Combination Login
From this screen a user can either enter a 4-6 digit UserID and a 4-digit PIN or use one of the other two optional methods below. Note that you can also optionally disable UserID login when Fingerprint or card readers have been implemented.
Fingerprint (most common method)
An image of the fingerprint is NOT stored. Instead the unique reference points of a fingerprint called minutiae points or PK’s. These are bifurcations (splits), end of ridges, etc. Using algorithms, a mathematical score is created from these PK’s for referencing against future biometric comparisons. The information from a stored template CANNOT be recreated to duplicate the user’s fingerprint. The stored template is proprietary to a MorphoTrak system and CANNOT be used for any other function such as background checks, law enforcement, or civil identity systems.
Card Reader Login Option
Your choice of magnetic card strike or proximity RFID card readers and be integrated to eliminate entry of UserID. The system can be configured to optionally require a PIN number with the card read.
Card Reader Relay Input Option
This feature allows the KWTouch login to be locked at all times, unless the relay input has been triggered by a valid reply from your access control system.
How it works:
The KWTouch has an input connection on the optional Card Reader/Relay board. This normally open input is monitored by the board. When there is a momentary closure between the RLY and GND connections, the system will unlock the touch screen and allow login input.
Login Input methods allowed after unlocking:
- Fingerprint scan
- Secondary card reader directly interfaced with the KeyWatcher
- Single card reader: The weigand wiring can be split to connect to your access control system and directly to the KWTouch. The 1st card swipe would unlock the KWTouch and allow for a 2nd swipe on the same card and reader to login to the KWTouch for key access.
Once the user logs out, the system is automatically relocked.
Note: Once the relay input is activated, the system will be unlocked waiting for a login for 10 seconds. If no activity is detected, then the system will relock waiting for the relay input.
Example of Use:
- If the KeyWatcher is in an active area or has public access where the system could be subject to tampering.
- A card reader connected to an access control system would be placed next to the KWTouch.
- The access control system would need to verify the card swipe, then make a momentary closure across our relay input contacts. This would activate our system.
Radio Locker
4”W x 12”H x 6”D4”W x 12”H x 9”D
Single Locker Module
7”W x 6”H x 2.5”D8”W x 7”H x 6”D
PC Locker
18”W x 4”H x 12”DDual Locker Modules
TrueTouch Client PC Software
KeyWatcher TrueTouch key inventory software comprises the KeyWatcher TrueTouch client interface and the KeyWatcher Server for enhanced administration and control of the KeyWatcher Touch system.
Key Inventory Software Features:
- Client Server Enterprise solution using a dedicated application server and SQL DB.
- Server performs all synchronizations of DB changes and transactions
- Auto-sync for automatic updates of KeyWatcher systems as changes are made.
- Auto collection of transactions as they occur
- Profiles to quickly assign users key and group permissions, access level, and many other settings to Users
- Text/email notifications enable users to create alerts for specific users, keys or events and select who will be alerted
- New, easier to read reports utilize color and include more information including portrait and landscape modes
- Reports feature lets users create and save reports with custom criteria for easy future access
- Reports can be scheduled to be automatically emailed
- All reports can be saved in PDF and CSV file formats
KeyWatcher TrueTouch client interface is designed to run all programming, remote functions and reports for many KeyWatcher Touch locations. Add users from a global list and all specific settings (added or modified) will be automatically synchronized across the system. Share Fingerprints or Card Access across multiple KeyWatchers with a single enrollment. Profiles make quick work assigning KeyWatcher access for improved user control. Administrative access levels are designed to allow reports only or alarms only in addition to the five system administration levels.
Generate TrueTouch reports in landscape or portrait format with color interspaced lines for easy reading. Reports can be scheduled to automatically email, print or save.
The KeyWatcher TrueTouch Server is designed for installation on a dedicated computer and can be connected to a KeyWatcher via a network connection. The server is the main interface for the client software and performs all synchronizations of transactions as well as maintaining the SQL database. Both access control systems and customized client control software interface with the server application.
It’s all done with the express intent of addressing your specific security needs with the most cost-effective, end-to-end solutions.
The new "Home KeyWatcher" configuration options! Have it your way!
This unique unparalleled configuration provides flexibility in where your key sets can be returned.
- Random: Return key to any KeyWatcher and any slot on the same site. Otherwise known as "KeyAnywhere".
- By KWTouch: Return to specific cabinet, but any slot within a specific KeyWatcher system
- By KWTouch and Box: Return to specific slot and cabinet within a specific KeyWatcher system
- By KWTouch, Box and Slot: Return to specific a KeyWatcher, cabinet and slot
If the need arises, there's unique configuration called "KeyAnywhere" that allows a key set to be returned to AnyWhere in ANY KeyWatcher, and easily locate which KeyWatcher it's in.
Remote Touch Screen
This is an example of the optional Remote Display for use in an industry such as casino's were the KeyWatcher cabinet would be mounted just outside the cage securing sensitive key sets, and the remote display on the inside. Or in a correctional facility the cabinet would be inside the control room and the remote outside it. This configuration is beneficial when there are key sets that require more then one user login before they are released.
Multi User Key Removal & Returns
Key Removals: The ability to control how many total logins will be required for a user to remove the key. Changing this will default the number of logins required for returning the key to the same setting. The number of logins required for returning the key can be independently changed, however. This feature is useful in cases where two people are required to be present during the key removal.Key Returns: The ability to control the total number of logins that will be required for a user to return a key. The number of logins required will be initially set by the number of logins required for removal. However, it can be changed to another setting if desired. This feature is useful in cases where three people are required to be present during the key removal.