The Vendor is required to provide to supply and install a key management system.
- System requirements:
• Capable of controlling and storing 450-500 keys with the option to expand in the future.
• The proposed solution should include a secure cabinet with electric lock that only opens if user has access to the keys requested.
• There should be a mechanical key that can override for emergencies.
• Should incorporate operating system windows 10\11 pro or server 2016 (higher), 1.8 HHZ quad core CPU, 8 GB ddr3, and 64 GB MSATA solid state hard drive
• The key cabinet should allow authorized access only and result in an alarm for unauthorized use.
• Should incorporate a built-in bright 7" full color capacitive 5 point multi touch screen display.
• 1024 x 600 resolution.
• Glass resistant to scratching.
• The key locations should be identified by built-in touch screen and illuminating key locations.
• Each key should be electronically locked in its location, and should only be released if the user has access to that key or keys.
• Power should include 100-240v ac, 1,5a per supply (up to 3 supplies).
• Solution should include a monitored battery backup.
• Should include USB ports for connecting card reader interface and relay board and upgrades.
• Should include communications and electrical connections external or internal for connectivity.
• Solution should be user serviceable.
• Solution should be able to accommodate oversize keys.
• Should incorporate random return feature so that users can return keys to any box within a site, therefore protecting sensitive keys from pattern location placement.
• Capability to run reports to see which keys are out, if any are overdue, and when they will become overdue.
• Have the ability to locate a key in any box within a site.
• Solution should have auto enrollment to allow users to enroll via fingerprint, card, and change pin upon accessing the system.
• Solution should have one-time user codes, allow a temporary user code to be programmed.
• It should incorporate auto activation and deactivation, allow users to be setup with a start and end date for access to the system and deactivate users.
• System should include a status bar to guide users on what to do, and show what is happening.
• It should incorporate multiple key access.
• Allow the number of keys a user can have out at any given time to be set from 0-15.
• It should have instant key release to allow keys to be automatically released and returned.
• Should incorporate user and key disable to allow a user to be temporarily suspended from using the system and a key to be temporarily suspended from being removed.
• It should allow authorized users to enable an emergency release function for keys.
• It should have the capability to handle up to 10,000+ user codes per site and multiple access levels.
• User codes can be up to 6 digits plus a 4 digit pin.
• It should allow key removal and disabling by list, number, or name.
• It should have functionality to leave notes for key removal or return.
• It should be programmable to release keys within specified day(s) of week to users only within certain time zones.
• Performs all true touch software functions through LAN.
• Ability to store up to 200-250 profiles.
• Profiles provide an easy way to assign key and group permissions, access level, and much more to users.
• Ability to store 200-250 groups.
• Each group can be programmed with up to 500 keys and can be setup to release either the next available key or all the keys in the group.
• It should have key reservations that allow keys to be reserved for a specific user.
• It should provide transactions and alarms to the server software in real time.
• It should auto-sync automatically updates system changes.
• It should have a built in alarm for overdue keys, illegal removals, door left open, illegal entry, key not removed, key not returned, and invalid keys.
• Capable of producing reports that include "key name", "user name", and "time and date" of transaction.
• It should allow notifications to be setup for e-mails and SMS.
• It should have audit trail reports by key, user, events, alarms, and by date.
• It should have all key movements tracked by time, date and user code.
• System should incorporate a smart-switch solution that replaces welded and crimped rings.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.