Distinct Key Tag Design

The thoughtful design of the deister KeyTag is the reason CLC decided to represent the deister key and asset control product line.  Deister did not simply copy other company’s key control systems.  The deister engineers knew that putting their defining emphasis on their RFID technology was the key to a better system, not just a cheap copy.

Contactless vs Contact Based Systems

If you ask a user what they do not like about a particular system they are using or have used, you will get the same responses from all users of product lines that rely on dallas touch memory chips.  They include:

The exposed dallas touch memory chips are vulnerable to being scratched, accumulating dirt and grease and are even affected by humidity.  KeyTags that have these flaws will not be able to be read by the receptors, so you can often end up with returned keys that have not been read, just returned and then the next user can’t find the keys because the system doesn’t realize they were returned.  I must admit that if you are using a small cabinet, then it is just an inconvenience of time wasted searching through a few keys, but in a large system of hundreds of keys, that is an all day audit.  Do you have time for that?

 

What is RFID?

In brief there are two parts to the acronym RFID which stands for Radio Frequency and Identification. Quite simply it means you can identify an item by means of radio waves. You are probably already using one of the most common applications for RFID within your access control system, often generically referred to as a proximity or smart card. Indeed many credit cards now include RFID on the card as a method for fast and reliable payment.

What does this mean for key management and the identification of the keyTag? Well, because a radio wave is not affected by harsh physical environmental conditions, it eliminates the need for physical electrical contacts.

Being “Contact-Free” the radio wave can penetrate most non-metallic materials and by its very nature unlike contact based systems means there is no wear and tear of electrical parts. Again a typical common use that is fast disappearing is the old swipe card used for access control and credit cards where the daily constant swiping action through the reader caused endless problems with wear and tear. Dirt and damage on the card all took its toll, with RFID all this is eliminated.

Why History of Methods of Key Control is Relevant

So, history matters because technology products are supposed to evolve….

When we originally started key control, our engineer designed our system to control the keytags using bar codes.  When the drawer was opened, rows of optical scanners in the bottom of the drawer would compare which tags were withdrawn or replaced and compare it to the last information from the previous user of the drawer.

As time progressed we realized bar codes wore out, could become unreadable if scratched or dirty.  Nothing prevented a user from returning those tags, but the next user wouldn’t be able to find the key, since it had been returned but not read, thus requiring a physical audit.

It is completely incomprehensible that companies are still out there selling systems that use bar code technology.

Now, many key management systems use what is known as a dallas touch memory, to control keytags. The primary reason is because it is cheap and technically easy to read the unique ID by 1 data wire and ground, which means that the cost of the reading mechanism is low. These devices are essentially touch memories.

Contact based, they require metal to metal electrical contact. This is best described like an audio jack plug. The keyTag contains memory which is electrically connected to the metal housing. The housing generally has a plastic ring separating the two electrical connections. When it is inserted in to the cabinet or drawer, metal spring contacts mate with the surface to provide power and read the identification number of the chip.

RFID is more reliable than contact identification or bar code scanning and is why deister key management systems use RFID keyTags to provide maximum operational life with minimum cost.

 

Reusable Key Rings Save Money

deister, once again has concentrated on giving clients the best but economical solution for securing keys.  Their practical reusable keyring and low cost “tamper evident” security seal is easy on your budget, and allows “peace of mind” key attachment.


 

Lifetime Warranty

To clearly demonstrate that deister electronic’s proxSafe products offer world-class quality and reliability, we offer a full lifetime warranty on the keyTag. CLC will replace any proxSafe™ keyTag when it is no longer possible to be identified by the system.

Which products are covered? The proxSafe™ keyTag is covered by the lifetime warranty.

How long are products covered for? For as long as the original buyer owns the proxSafe™ product. Original proof of purchase is required to receive warranty service.

What is not covered? This warranty does not cover products that have been misused, abused, or modified in any way.