Optimal management of narcotics and psychotropic drugs. Reduction of personnel management costs.
Management of who opened the door and when - Permissions for which doors can be opened can be restricted - Management of "who opened it" and "who can open it" Equipped with a multi-card reader - Authentication can be done with employee ID cards, smartphones, etc. By setting available days, holidays, and times for each door, usage restrictions are possible. The control box can accommodate up to 80 additional doors. Reduction of personnel management costs - Retrieval history of pharmaceuticals can be tracked - No need for personnel for the handover of keys, etc.
Inquire About This Product
basic information
Product Name: Narcotics Storage Cabinet Controller: Touch Panel, IC Card Sensor, CPU Up to 80 doors can be managed by one controller Operational Image 1. In the morning, the narcotics manager replenishes the drugs in the IC narcotics storage cabinet. 2. Users unlock the door with their employee ID and take out the drugs they need. The used drugs are recorded in the narcotics ledger. 3. In the evening, the narcotics manager checks the usage status and inventory of the drugs. The door opening and closing history is also monitored. The management application can connect multiple devices via LAN. If there is no LAN environment, operation via USB memory is possible.
Price range
P3
Delivery Time
Applications/Examples of results
In-house drug storage PC management in schools and companies Management of valuables such as keys and mobile phones
Company information
Since ancient times, technological capabilities have been developed by a select group of outstanding researchers aiming for unknown heights. Biometric authentication technologies, including fingerprint recognition, have similarly achieved technological innovation as tools for personal identification, encompassing fingerprints, veins, faces, and eye colors. However, the adoption rate in general companies remains low, and the majority of people may find biometric authentication to be novel yet cumbersome, fearing that their data could be misused by others, leading to a lack of proactive use. This is because Japan's advanced biometric technology has progressed too far in terms of innovation without considering "convenience." Our company aims to develop products that combine the "technological capabilities" of traditional advanced biometric authentication with "convenience," striving for the widespread adoption of biometric authentication systems for our customers.