Advances in Key Control Technology

Imagine this scenario. It’s late in the evening on a holiday weekend. A security officer is making his rounds of the multi-building campus and sees a light in a window where there shouldn’t be one. He calls in the report and is requested to investigate the situation. His access card allows him entry to the building, where he again uses his card and his personal identification number (PIN) to access the building’s key control cabinet. The particular key he needs is not in the cabinet and the message screen tells him that the key is currently located in the key cabinet in the adjacent building. The security officer retrieves the key and is able to confirm that a light was left on and everything appears normal. He returns the key to the key cabinet in the building and resumes his rounds. Continue reading