Safe and secure management of valuable items such as keys, mobile phones, USB drives, and medications. Reduction of personnel management costs. Always keeping track of items taken out or in possession.
Personal authentication using IC cards and biometric authentication is also available as an option. Managing the history log of who took out what and when it was returned enables more reliable security management. The basic model is a compact housing with 10 trays (capable of controlling up to 100 trays). The dimensions of the housing are 290 (W) × 390 (H) × 185 (D).
Inquire About This Product
basic information
You can register organizational information and user information. You can specify which trays can be taken out at the organizational unit level. Additionally, it is also possible to specify at the individual level, and you can add or cancel trays designated at the organizational level. It is also possible to specify that trays cannot be taken out on certain days or times. Furthermore, if a tray is not returned by a certain time, there is a function to notify the administrator of that tray via email that it has not been returned. Current lending information and history information for each tray can be checked in real-time from a PC.
Price range
P3
Delivery Time
Applications/Examples of results
Key management by reservation system (approval number input required), USB memory management (data must be deleted upon return to be accepted), classroom key management (new keys cannot be borrowed unless returned), IC card management (24/7 unattended service).
Company information
Since ancient times, technological capabilities have been developed by a select group of outstanding researchers aiming for unknown heights. Biometric authentication technologies, including fingerprint recognition, have similarly achieved technological innovation as tools for personal identification, such as fingerprints, veins, faces, and eye colors. However, the adoption rate in general companies is still quite low, and the majority of people may find biometric authentication to be novel yet cumbersome, fearing that their data could be misused by others, leading to a lack of proactive use. This is because Japan's advanced biometric authentication technology has progressed too far in terms of technological innovation without considering "convenience." Our company aims to develop products that combine the "technological capabilities" of traditional advanced biometric authentication with "convenience" from the customer's perspective, striving to promote the adoption of biometric authentication systems for our customers.