The start to true security is the comparison and commitment to begin replacing pin-tumbler key systems (1861 technology) and costly rekeys with an advanced but competitively priced intelligent locking system. Easy to use software replaces key cutters and pinning kits. Keys that operate locks 24/7 are replaced by high security credentials (cards, etc.) that only operate locks during authorized times and create a time stamped audit trail showing who accessed a door and when a door was accessed.
How it works
System software allows ultimate flexibility to match people with doors and time schedules to access those doors. Administrators can predetermine the period of time they will allow a card-holder to access a door and when the access rights will expire (an hour, day, semester, etc.).
Intelligence is the heart of a Proxess locking system. We utilize a powerful contactless smart card or credential to enhance the system. The access rights for each individual is actually programmed and stored on the credential rather than the lock so there is no need to travel to the lock when assigning access rights and issuing credentials. Access rights programmed to the credential also allow unlimited locks and users in the system. Proxess also employs DESFire EV2 credentials, the most advanced and secure contactless smart card in the industry to combat duplication and hacking.
Locks are typically programmed in advance of installation but can be reprogrammed by simply presenting a Mobile Programming Device (MPD) near the lock, creating an update using encrypted (128-bit AES) communication. Administrators don’t necessarily need to travel to the lock to make these changes. They may transfer authorization to update locks (Calendar, Time Schedules, Blacklist, Lockdown, Update Firmware, Audit, Lock/Unlock, etc.) to other authorized MPD devices located across campus or anywhere there is wireless connection around the world.
Imagine the added security that time schedules and audit trails could bring to your locking system. Imagine being able to “rekey” whenever you want because rekeying can now be handled within seconds without special equipment or expertise.