Secure and safe management of valuable items such as keys, mobile phones, USB drives, and medications. Reduction of personnel management costs. Always keeping track of items taken out and possessed.
Personal authentication via IC cards and biometric authentication are also available as options. Managing the history log of who took out what and when it was returned enables more reliable security management. The basic model features a compact chassis with 10 trays (capable of controlling up to 100 trays). The dimensions of the chassis are 290 (W) × 390 (H) × 185 (D).
Inquire About This Product
basic information
You can register organizational information and user information. You can specify which trays can be taken out at the organizational level. Additionally, it is also possible to specify at the individual level, and you can add or cancel trays specified at the organizational level. It is also possible to specify that trays cannot be taken out on certain days or times. Furthermore, if a tray is not returned by a certain time, there is a function that notifies the administrator of that tray via email that it has not been returned. Current lending information and historical information for each tray can be checked in real-time from a PC.
Price range
P3
Delivery Time
Applications/Examples of results
Key management by reservation system (approval number input required), USB memory management (data must be deleted upon return, otherwise return is not possible), classroom key management (new keys cannot be borrowed unless returned), IC card management (24/7 unattended service).
Company information
Since ancient times, technological capabilities have been developed by a select group of outstanding researchers aiming for unknown heights. Biometric authentication technologies, including fingerprint recognition, have similarly achieved technological innovation as tools for personal identification, encompassing fingerprints, veins, faces, and eye colors. However, the adoption rate in general companies remains low, and the majority of people may find biometric authentication to be novel yet cumbersome, fearing that their data could be misused by others, leading to a lack of proactive use. This is because Japan's advanced biometric technology has progressed too far in terms of innovation without considering "convenience." Our company aims to develop products that combine the "technological capabilities" of traditional advanced biometric authentication with "convenience," striving for the widespread adoption of biometric authentication systems for our customers.