KeyNET

KeyNET – Masterkey and Key Control and Management Software

 

KeyNETTM is a Server Based, Browser-Accessed Key Management Software.  This highly advanced Key Management Software is our ultra-high end software.  Currently offered in five deployment models and three entry levels, KeyNETTM takes Key Management to NEW Heights.  Designed to integrate , import, export or share information with other software packages.  If you are unhappy with the way your existing software performs, and special features currently not in our program,, you can have us develop EXACTLY what you want.

Our programs are WEB BASED applications.  No more loading programs on computers and establishing network connections.  System maintenance costs are virtually eliminated.

 

If you are a ConnieTM customer, KeyNETTM has all of those dynamic features, and more.  No more travel to upgrade each users computer or specialized training requirements are needed to configure your computers.

Learn more about KeyNETTM by clicking on the links below:

Getting Started with KeyNET

Three Application Level Starting Points – LITE, PRO and ULTRA – You choose what you need.

Features

System Design

Deployment Options/Models

SSL (Secured Socket Layer)

Making your Computerized Key Machine work with KeyNET

Integrate with other Software packages

KeyNET system design specifications

KeyNET server requirements

 

KeyNETTM is Full Featured – Authorizations and eKeyRequest, eKeyOrder, KeyRings, Masterkey System Generation, Complete Key History, Core Location History, Individual Issue History, PhotoID and eSignature capture, Already Issued and Higher Level Key Issued Alerts, RECALLED Key Notification, Auto-Notifications for Departments, Buildings, Job Codes, Multiple Key Issue Locations and MUCH, MUCH MORE!

 Getting Started with KeyNETTM

To access KeyNETTM simply open your favorite browser, type in the URL where your data is stored, and you are ready to login. We have a location for alternative ways to get your questions answered.  Tips on how to maximize your operation. Support Packages are designed to insure your success.

To login and start using your program. It is CRITICAL that you sign in using your personal USER ID and PASSWORD, and verify that you have read and agree with the END-USER LICENSING AGREEMENT.

The setup and design of how your KeyNETTM software will work for you is controlled by your Systems Manager.  If you believe you should have access to something which you are unable to access, contact your Systems Manager to obtain access.

Spectrum Group has created a package JUST for YOU!

LITE – is a starter program, which can be added too, as you grow.  Strictly the basics is offered by subscription only.  Startup fee is small, subscription is small… A GREAT WAY TO GET GOING !  More on KeyNET Lite…
PROadds the dynamics of Key Issue to KeyNET LITE.  This module contains KeyNET LITE and all 5 of the options available under KeyNET LITE… IDEAL FOR SCHOOL DISTRICTS, HOSPITALS, COLLEGES & UNIVERSITIES, INDUSTRIAL AND GOVERNMENTAL FACILITIES. More on KeyNET Pro…
ULTRA adds the most desired features of Key Issue; eKeyRequest and authorization routing, Photo ID and eSignature capture.  More on KeyNET Ultra…

Features

  • Management Control – Now you can have complete control over the users access to your system; what they can see, create, modify and delete.
  • Complete Accountability – Know the status on every key created.  The program tracks the entire history of each key, from creation to destruction, with several security checks along the way.
  • Key Issue Security – The program checks for correct authorization before the key is issued, and stores the authorization information.
  • Tailored to YOUR needs – The program can be customized to fit your organization.  From the very basic to elaborate operations.
  • Create & Manage Masterkey Systems – KeyNET allows for the manual input and hierarchal linking of keys to display masterkey systems.  Or, our SG1 Technical Team can import the systems for you.

KeyNET also allows for the creation of masterkey systems.  Developments are made using the ABC’s of Masterkeying, and create complete systems with no phantom or ghost keys.  Never worry about expanding a system, KeyNET produces the entire system at the time of creation.  Masterkey generation systems are available for Standard 2 Step (Arrow, Corbin, Russwin, Schlage, etc.), Small Format Interchangeable Core (A2, A3 and A4), Sargent Systems (zero=10), ASSA, Medeco, Standard Single Step and a Custom Generator for Rotating Constant or other special needs systems.

  • Create & Issue Key Rings – The program can quickly create and monitor issuance of key rings.
  • Computerizing Key Cutting – The system allows for manual or computerized cutting of keys…yes, you can cut keys to a computerized key machine directly from your computer.

Keys can be tagged with a cost center at the time of creation for chargeback purposes.  Cost center information can be automatically charged to the appropriate account in AccountNET or other third party ODBC software.  When used with WorkNET, the charging can include time charges from individual’s time entries.

  • Multiple Key Issue Locations (MKI) – Allow other issue sites to manage and issue keys at their locations, while you have complete oversight.  School Districts can now allow each school to manage their own keys with centralized oversight.  Hospitals and Universities can allow department to become issue points; including KeyRing tracking.  Colleges and Universities can allow Building Managers to issue and control keys from their individual locations, or simply authorize keys when centralized issue is used, via eKeyRequests.
  • Authorizations – control authorizations by department, building, cost center or building and room.  Verification has never been easier.  Use in conjunction with eKeyRequests or eSignature to reduce issue time and increase accountability
  • eKeyOrders – You can electronically order keys from your MKI sites
  • eKeyRequests – electronically request keys, route the request through the appropriate authorizations and issue the correct key…with notifications to the requestor and authorizers along the way.  A complete history of status and stop changes and pathway traversal may be used as an option.
  • eKeySignature – uses standard industry capture methods to store signatures electronically and add it to the issue form.
  • Extensive Reports – Effectively manage your key program with an extensive choice of reports.  Create custom reports through multiple field selections and filtering.  Complete with individual key histories and core location histories.
  • Computerized Key Cutting of Medeco and Emhart
  • Computerized Key Cutting of Standard Keys

 

 

Deployment Options/Models

SG1 Hosted (Recommended) – we provide your users access to your database on our high-end servers.  Your data is hosted in our server farms.  We backup your data daily.  We maintain the server, including periodic upgrades and periodic replacement.  Your software, data and use is always current. We maintain your program, including backups, and remote data storage.  This is the MOST cost effective method of deploying KeyNET and has the lowest annual license and support costs.

Site Based (2 Deployment Models) – Not available after January 1, 2015, except for Federally Regulated facilities requiring SITE BASED Deployments

1.  Web Appliance (proprietary server required) – we sell the complete server and program, ready to go…you provide the network.  Or, you provide the server and we will configure and load the software, returning it to you ready to go.  You provide the network…plug it in and you are ready to go.  We maintain the programs, maintain your data backups; you just use the program. Unrestricted SSH, port 22 access is required for all maintenance and licensing.

2.  Customer Controlled Site Based (proprietary server required) – We sell the complete server and program, ready to go… you provide the network.  Or, you provide the server and we will configure and load the software, returning it to you ready to go.  The customer is responsible for the hardware and maintaining the system.  Spectrum Group will provide support via an annual licensing agreement.  Unrestricted and unlimited SSH, port 22 access is required for all maintenance and licensing.

3.  Virtual Machine Customer Controlled Site Based (proprietary setup is provided and installed remotely via SSH port 22 connection.  The Customer provides the server and Linux Suse setup, along with port 22 access.  Spectrum Group will load the deployment image, load the KeyNET software, deploy the SQL database and make the deployment ready for operation and training.  The customer is responsible for the hardware, initial setup, network and unrestricted SSH access, via port 22, for the duration of the deployment.  Spectrum Group will provide support via an annual licensing agreement.  Unrestricted and unlimited SSH, port 22 access is required for all maintenance and licensing.


Modular Design of KeyNET allows our databases to be divided into multiple tables.  These data tables are accessed via the KeyNET program depending on the privileges your systems manager has set.

System Manager – who controls your system and how it is Configured.

Personnel – where the information for individuals who have, or have had, keys/cards issued are stored.

Lockshop – where the functions of the Lockshop are performed.  Keys and cards (or other accountable asset) information are stored in these data tables.

Key Issue – where the individuals from the Personnel module are interfaced with the available keys/cards created in the Lockshop module, and the associated information is stored for recall.

ODBC Modules – this is the interface data tables that you utilize with the other functions being used with KeyNET, like Card Access, Photo ID and other integrated modules.

Optional SSL Connections – Spectrum Group offers Secured Socket Link connections at additional costs.  Contact your Spectrum Group Representative at 877-560-2457 or sales@sg1.us for current pricing.

Making your Computerized Key Machine work with KeyNET

KeyNET supports automatic interfacing with all ITL Computerized Key Machines.  The communications is over a TCP/IP connection between the KeyNET server and a Cyclades or Lantronix converter box.


Device Requirement

Cyclades TS-100 – Support of a remote key machine requires that we deploy a Cyclades TS-100 micro-server or similar device which is connected to the computerized key machine.  this device has two ports – a serial port which drives the key machine, and an Ethernet port, which plugs into the LAN/WAN jack.  Spectrum Group should pre-configure your Cyclades TS-100 for your system.

1.  Device must have its own dedicated IP address.  Customer must provide a static IP address together with Submask and Default Gateway information for each device used.  This information is required to program the device.

2.  If in a NAT/private LAN block, device must also have a public internet IP address assigned to it, which routes traffic on ports 22, 7000 and 7001 from said public IP address to the internal IP address of the Cyclades box.

3.  If behind a firewall, device must also be permitted to receive traffic on ports 22, 7000 and 7001 from our central server network (we will provide a range of 10 static IP address which should be permitted to send information to the Cyclades box.)

4.  If neither NAT/PLAN/firewalled, Cyclades box will be configured to use its own internal firewall protection scheme.

 

Lantronix Devices (USED AFTER TO JULY 2011)- Support of a remote key machine requires that we deploy a Lantronix device server or similar device, which is physically attached to the key machine.  This device has two ports – a serial port which drive the key machine and an Ethernet port, which plugs into the network LAN jack.  Spectrum Group will pre-configure your Lantronix Device for you, or it is field configurable.

1.  Device must have its own dedicated IP address.  Customer must provide IP address, Submask and Default Gateway information for programming purposes.

2.  If in a NAT/private LAN block, device must also have a public internet IP address assigned to it,  which routes traffic on ports 10001 from said public IP address to the internal IP address of the Lantronix box.

3.  If behind a firewall, device must also be permitted to receive traffic on port 10,001 from our central server network (we will provide a range of 10 static IP addresses which should be permitted to send to the Lantronix box.)

 

Lantronix UDS-10 (USED PRIOR TO JULY 2011)- Support of a remote key machine requires that we deploy a Lantronix UDS-10 device server or similar device, which is physically attached to the key machine.  This device has two ports – a serial port which drive the key machine and an Ethernet port, which plugs into the network LAN jack.  Spectrum Group will pre-configure your Lantronix UDS-10 for your, or it is field configurable.

1.  Device must have its own dedicated IP address.  Customer must provide IP address, Submask and Default Gateway information for programming purposes.

2.  If in a NAT/private LAN block, device must also have a public internet IP address assigned to it,  which routes traffic on ports 10001 from said public IP address to the internal IP address of the Lantronix box.

3.  If behind a firewall, device must also be permitted to receive traffic on port 9999 and 10,001 from our central server network (we will provide a range of 10 static IP addresses which should be permitted to send to the Lantronix box.)


Technical Specification for KeyNET

KeyNET is a proprietary system solution which is

-Server-

Web server based

Browser Accessed

Apache Web Server

Uses SuSE Linux

Propriatary C5i programming (in C)

SQL databases

 

-Software-

User ID and Password Access

Unlimited User Access Groups

User Access restrictions by Access Groups

User defined privilege levels

Program defined second level access/permissions

 

-KeyNET-

Complete people databases (user and confidential)

Facility Restriction

Building Restrictions

Department Restrictions

Cost Center Restrictions

Job Code Restrictions

Status Codes

Auto Create, Manage and Control multiple masterkey system types.

Auto Create, Manage and Control multiple masterkey systems.

Manual Data entry with key linking for legacy masterkey systems.

Auto hook assignment

Multiple masterkey system capability

Core location database with histories and authorization linking

Department database with associations

Cost Center database with associations

Computerized Key Cutting

Key Issue with authorizations

Key Issue history

eKeyRequest (Electronic Key Request with building or department authorization routing)

Customer defined signature phrase

Multiple Key Issue Site capability.

eKeyOrder (Electronic Key Ordering with building or department authorization routing)

Any/All field look up

Audit reporting by building, department or cost center.

Complete system reporting, including extract and redefine.

Trace Access

Location

Hook

Exception Reporting

Lost and Delinquent Keys

Masterkey Systems Reports

Key Billing Reports

Online Manual