• Slide01-key-management-system

    IQ CleverKey System

    ● Key management system

    ● Keyholder with RFID-chip

    ● Key tracking solutions

    ● Modular key cabinet

  • Slide02

    IQ Notebook Storage Box

    ● Asset management system

    ● Modular storage system

    ● Ergonomic cabinet software

    ● Variable with key locker

  • Slide03

    IQ Handgun Storage

    ● Built in measure tray

    ● Variable key control modules

    ● Intelligent tracking system

    ● Ergonomic GUI software

  • Slide04

    IQ Tablet Storage System

    ● Smallest scale asset storage

    ● Smart storage cabinet system

    ● Built in USB charger port

    ● Variable key tracking

  • Slide05

    IQ Phone Storage System

    ● Smart box storage system

    ● Clever storage system solution

    ● Built in USB charger port

    ● Variable key control modules



General information of Key and Storage Box Management Software

The IQ key management and storage system software is attractive, user-friendly. The user will have access through the interface of the graphic touchscreen to pick up and return keys in the Key management system. The efficient ergonomic key management software development allows easy and fast usage and at the same time remains understandable for the operations of the key management system, even for ordinary users.

key management software
key cabinet software

A number of a unique customized configuration options ensure that the key management cabinets meets the special and unique application requirements and high expectations. On the visible graphic display the key management system is easy and transparent to use.

key storage
key control software

All services of the key management system are accessible and can be configured on the graphic interface of the IQ key management software, but for system administrators remote monitoring can be also possible through the web based interface.

User functions of Key Management System and Storage System

Identification of the User has to be done to have access to the keys. “Access code”, and with RFID card, and/or with fingerprint reader can be used for identification. After the successful log in the user’s name will appear on the graphic touch screen of the key management system and available keys will appear on the display. The desired keys can be selected by touching them on the screen. Those keys for which we have access but they are not in the cabinet, will appear on the screen in black. When we want to choose an already picked up key, it will appear at the bottom of the screen with the information who picked up it and when, further information can be also displayed when it is necessary, for instance the contact details of the person who removed the key or keys last time from the key tracking system.

Administrator informations of Key Management System and Storage System

After successful login Administrators can see the „Menu” button next to the clock, it will become active, and by touching it the button bar can be called up, which contains functions. The desired function can be chosen by touching them, and navigating can be done in the menu of the key management system.

key cabinet software
key cabinet software

All events are recorded in the key management system such as: key movements, even if it is ordinary usage, error, sabotage, picking up keys, returning of keys or other event. These events can be found in the log.

key storage system
key tracking software

Filtering the log can be done by completing the „Filter” box. Touch the screen and enter the information that is needed or a part of it and then press the Enter button. In the Filter box event’s name, user’s name, key’s name and event description can be also set up. When we are looking for a date the desired date should be typed, and the events of that day will appear in the log. Touching the small arrows the pages can be selected. 200 events can be found on one page. 10 000 events can be found on the screen, and further 20 000 events in the backup memory. When we are on the first page, the log will be automatically refreshed.

The columns of the log list contain the following information in the key management system

  • Serial number
  • The designation and the date of the events
  • The number of the key place, which is connected to the event
  • The designation of the key, which is in connection to the event
  • The name of the person, who created the event
  • Further description of the event

The statement „Report” list shows the current status of the keys can be seen in the list of the “Report”. More details of the list can be seen by using the „scroll”. Each key movement will be recorded.

The list contains the following information

  • The name of the key
  • The present status of the key
  • The time of the last status change
  • The name of the person, who used the key last time

The user’s and key holder’s personal details as well as their access codes and keys assigned to the IDs can be set and maintained in the “Owners” menu. The names of recorded persons appear on the surface in a boxed form. To select a person, tap the box containing his name. The outer frame of the selected person’s field turns yellow. To filter persons press the “Filter” text field and type in the information on the appearing input screen, according to that you want to search by users, and then press the “OK” button. After filtering, only those users will remain in the list, whose personal data contains any requested information. To switch off filtering press the text box again, and delete the entered characters. If you want to find the owner of a card, show the card to the reader. If the system can identify the owner after reading the card, he will automatically selected within the list. If card reading is performed by a filtered list, and the person cannot be found in the list, then the system notifies you to switch off filtering and try your search again.

When we place the cable of the key cabinet into the power supply, the Key Management System starts. The CPU and the key place electronics will be ready for implement use. After the boot on the graphic touch screen appears the login surface, and the key management and intelligent storage system is ready for usage.

Key Management System | Key Storage System | Key Control System | Intelligent Key Storage System | Intelligent Key Control Cabinet | Intelligent Key Cabinet | Key Locker System | Key Tracking System | Digital Key Cabinet | Electronic Key Cabinet | Electronic Key Management | Asset Management System | Key Box System | Key Box Cabinet | Key Storage Box | Key Locker Cabinet | Key Tracker System | Digital Key Management | Phone Storage System | Gun Storage System | Intelligent Handgun Storage Cabinet | Smart Key Cabinet

+1 (239) 220 5466

Summary of the main functions of the Key Management System Software


  • Picking up and returning the key
  • Keys and log can be checked
  • Reports regarding the keys
  • Reports regarding to user
  • Adding and modifying user
  • Identifying user (Access code, PIN code, ID card, Fingerprint)
  • Modifying user’s data
  • Groups
  • Rights of the owners
  • Deleting of owners
  • Modifying and fixing keys
  • System information of the key cabinet
  • View of key information
  • View of key place information
  • Operations regarding the key places
  • Status of the key management system
  • Testing and diagnostic of the key management system
  • System setup of the key management system
  • Timing setup of the key management system
  • Interface settings of the key management system
  • Booking of keys
  • Synchron setup between key management systems
  • Network settings of IP
  • Database information and status
  • Database settings of the key management system
  • Database backup of the key management system
  • Database restore of the key management system
  • Issuing command of the key management system
  • Language and keyboard settings
  • Remotely monitoring and service of the key management system
  • System software upgrading of the key system
  • Sabotage functions of the key management system
  • Time and date setup of the key management system
  • Card reader settings
  • Security settings of the key management system