top of page


Electronic system for security and key management


• 15 years of experience

• Thousands of projects

• Own production

• Quality design

• High quality construction

• Competitive solutions

Chaveiro Eletrónico KeyGuard

Security and key management



KeyGuard logo



  • 15 years of experience

  • Thousands of projects and systems in operation 

  • Own production

  • Quality design

  • High quality construction

  • Competitive solutions

  • Proven quality

  • 5 years warranty

KeyGuard Model 2017

  • Access by RFID card / PIN / Biometrics (optional)

  • Automatic delivery and reception of keys

  • User-friendly interface

  • Automatic activation and deactivation of the security system

  • Software development kit available

  • Module backlighting

  • Locking and non-locking SmartKeys functions

  • Database of 100,000 users

  • 100,000 events in non-volatile memory

  • Glass, steel or no door

  • Installation of the control display on the bottom/base or on the right side

  • Ethernet, RS485, RS232

  • Total management and reports to print or export 

  • Cabinets for 3, 5 and 10 modules

  • From 20 to 2000 keys with a single control panel

  • ...

Chaveiro Eletrónico KeyGuard


Recommended use






Factories and industry


Data Center

Security forces

and many others...

More information:


Compliance Solutions

Apresentações Videos

Utilização fácil, rápida e segura


Levantamento de chaves em 4 movimentos / 5 segundos

1. Apresentar cartão de Utilizador válido;

2. Abrir porta;

3. Levantar chave ou chaves autorizadas - destacadas por led de alta densidade para facilitar a escolha;

4. Fechar a porta.

Devolução de chaves em 4 movimentos / 5 segundos

1. Apresentar cartão de Utilizador válido;

2. Abrir porta;

3. Inserir chave ou chaves - em qualquer posição livre, o sistema reconhece o ID Dallas do porta chave;

4. Fechar a porta.


1. O sistema regista automaticamente todas as operações com informação de Utilizadores, chaves e data/hora.

2. As chaves podem ter períodos de utilização autorizada, no caso de não serem devolvidas no horário previsto, o sistema pode enviar alarme/report (SMS/email) para o Gestor/Administrador do sistema com informação do ultimo Utilizador da chave

3. No caso de se manter/esquecer a porta do chaveiro aberta, este evento é igualmente assinalado e enviado alarme com informação do ultimo Utilizador do sistema.

Utilização segura
Questões e Respstas

Frequently Asked Questions and Answers

Config periodos de tempo
1.1 Config niveis de acesso
Config listas chaves não devolvidas
Config grupos de chaves
Config alarmes não devolução
Planta de local com ID de posições
Seleção de chaves para levantar
Procurar e localizar chave pelo nome

1. KeyGuard - System Features

1.1. Can access to keys be customized?

A unique group or individual key access level is created for each user. The access level represents a combination of keys or hierarchical lists of keys and a reference for a specific period.

To support system configuration, keys, users and access, you can use SW SecuriProx Studio supplied with the system.

1.2. Can a time period be assigned for access to a key?

Key access levels have a "Time Range" field. Time ranges can include 10 time periods which are the hour, day of the week, holiday, weekend, even day, and an individual list of days. If more than 10 time slots are needed, you can add an entry at the access level, and there are no limits to the number of entries. This way we can achieve unlimited customizations.

1.3. Can an individual schedule be assigned to a User?

It is possible to assign, in addition to the individual schedule, an individual list of working days. For example, you can create the "First Day of Work" list so that an employee can have access to the equipment room to perform maintenance work on the first working day of the month. All lists are aggregated into a key management system message log. Entries are made in the message log whether or not the servers are connected to software. The software is only needed to create a database and generate reports.

1.4. Can a key group be assigned?

The KeyGuard electronic key fob comprises hierarchical lists of keys (groups). This means you can create a key list, which in turn includes snap lists (up to 7 snap levels). Each list has its own name. You must include this list in a user's key access level to assign keys according to the list. If the keys are returned, you need to select a section for working with lists in the key holder menu, select a required list from the table and get the keys back.

1.5. How do I get information about keys that have not been returned?

System object table " and press the "Given keys" quick filter button in the software. The system will filter the list and leave only those keys that have not been returned at the moment. Additional information about the latest events - who picked up and returned a key and when, quick filter, etc. - are also shown here. - are also shown here.

1.6. Can the alarm be activated if a key is not returned in time?

You can specify in a key's settings that it must be returned to the KeyGuard key tracking system by a certain time or within a certain period of time . If a key is not returned within a set period of time , the system activates the alarm. The alarm can be viewed on the monitoring system screen and can be sent automatically, in the form of an SMS, to the telephone number stored in the system or specified in the email settings.

1.7. How to quickly receive the key we need?

1. If you are only allowed to carry one key, simply place the card in the correct reader. If the key is in the storage cell, the system immediately opens the door and illuminates the cell with your key.

2. If you have access to several keys, the system displays the menu with the table where your keys are listed. You can scroll through the table page by page or use the filter or search keys. The system highlights chosen keys, raised keys, blocked keys, prohibited keys for this time period , etc.

3. You can perform a key search by key name or room number/name. Just enter the first digits (symbols) and the system filters the list.

4. With a fingerprint reader, you have the option to assign different keys to different fingers. Simply present your right finger and you will immediately get the appropriate key.

1.8. Can I find a key by its name or ID?

Each key can have a name and a number. The key number is made up of digits, but may have a letter of the alphabet at the end, for example, 101A, 101B. The search can be carried out by name and number. Just enter any symbols. All matching variants will be filtered and displayed on the screen. You can activate the command to give the key, directly from the search menu, or return to the main menu to continue working.

1.9. How to quickly know who lifted a key?

This information is available directly on the key holder's dashboard. Place your card in the reader, select the desired key from the table (of course you must be authorized for this key), press the "History" button. The last 16 events relating to the key will be shown, the events include the action, time, surname and first name and telephone number of the respective User. Reports for a longer period of time are also available in the software .

1.10. How do I view a report on who used a key?

The last 16 events are available directly on the key holder's dashboard. It is possible to view a more detailed report in the software. Select a key or a list of keys, select a specific department or user, and select a time range. You can export a report to files in different formats or print a report. You can also save a report as a template and start it automatically.

1.11. Can I use data relating to keys that have been removed/returned to calculate usage time?

You can calculate usage time using the software. The calculated time can be viewed online on the key holder's screen.

1.12. What database is used?

FireBird database . The database is protected by a password. We recommend that you use encryption for responsible applications, with the help of standard tools or other Windows tools.

1.13. Can I connect the key management system via the Internet?

As with any other security system, direct access to unprotected networks is not recommended. The system has a certain level of protection, but if you use insecure channels, it is strictly recommended to protect yourself with security tools (VPN channel and others).

1.14. What is the user storage capacity and event history storage capacity?

The total number of memory cells is 200,000. The number of memory cells can be increased when ordering the equipment. The distribution of this memory between users and events can be changed by the user. For example, you can assign 100,000 cells for storing user data and other settings and 100,000 cells for storing events.

The system also has an event memory for each key, that is, the system stores the latest events, regardless of the date on which the event occurred.

1.15. Is it possible to change the system language?

The system allows you to switch between interface languages ​​inline. Simply specify a language in the access card settings and the screen language will automatically change depending on the access card used.

2. KeyGuard – Special Features

2.1. Is a vandal-resistant version available?

For more critical security locations we can supply systems with a solid steel door with a thickness of 2 mm for a system of 50 keys and a thickness of 1.5 mm for a system of 100 keys.

2.2. How long does the glass on the keychain/cabinet door last?

The transparent door is made of polycarbonate, it is the most durable material of all transparent plastic materials. We also supply steel doors.

2.3. Can I order a cabinet without a door?

Yes, the system can be supplied without a door.

2.4. Can I choose a color for the closet?

We have two standard colors to choose from: dark silver 5359AO445 and light RAL7038. Upon request, we can also manufacture in color according to your specifications.

2.5. Can I attach the control panel to the side?

Yes, two brackets are included in the scope of delivery, one for fixing at a 45 degree angle to the bottom of the cabinet support, the second is prepared for fixing on the right side of the box.

2.6. What is the wattage of the system power supply, is a backup power supply provided?

The system power is supplied via a standard electrical socket and can be of any international range (100V - 250V), the maximum power consumption is 60 W. Backup batteries are included in the scope of delivery, and can offer autonomy to the system for up to 20 hours. The system automatically charges and tests the batteries. The KeyGuard electronic key fob constantly monitors the status of the batteries and, if their capacity drops to a critical level, the system will display a personalized fault and an alert message that the batteries need to be replaced.


2.7. How do I obtain the keys in case of a power outage?

If the mains power supply is interrupted and the batteries are discharged, the system will remain blocked. In this case, to release the keys, it is necessary to open the door lock with an emergency release key, unscrew two interior door fixing screws, open the interior door lock with the same key and unlock the groups of keys by pulling the pins. coming out of the solenoids.

2.8. Can I build the cabinet into the wall?

The door's rotating column does not allow it to be completely embedded in the wall. You can install the cabinet so that its box protrudes 55 mm from the wall. Don't hesitate to get in touch if you need decorative frames for this installation.


2.9. Is a specialist required to assemble and commission the system?

Assembling the system is quite simple. The system can be put into operation by itself.

1. Make sure the wall where the cabinet is to be mounted can withstand a load of 40 kg (100 LBS).

2. To support the main unit, 4 holes are required.

3. Screw one of the two brackets included in the scope of delivery onto the controller (for installation from below or for mounting from the right side of the box) and connect the control panel (one connector).

4. Connect the system to the 100 - 230V electrical network, ensuring an earth connection, and connect the battery terminals.

5. Start system configuration mode (button on the control panel board inside the main unit), enter the system and server IP addresses (see manual).

Programming is carried out with the help of the SecuriProx software Studio included in scope of delivery (see video tutorials on our website).

2.10. How difficult is it to open the keychain/locker?

The key management system is not a safe. However, we have taken some measures to prevent unauthorized opening. The door is equipped with a sensor, the lock cylinder is from HSS and has drill protection. The lock is additionally protected with an attached panel. We recommend that you integrate the key control system with a security alarm system to ensure additional system security. In this case, only authorized access to the system will give a command to turn off the security alarm, and unauthorized access will activate the alarm.

2.11. Is the alarm activated in case of unauthorized opening of the key fob door?

The system has double protection against unauthorized opening. A main magnetic contact indicates the position of the door and an additional magnetic contact analyzes the external magnetic field. If an intruder attempts to bypass an internal magnetic contact detector with an external magnet, the additional contact will be triggered. You can connect the alarm output to the security and alarm monitoring system.

2.12. Can I connect the key control system to a video surveillance system?

The KeyGuard key fob is equipped with 5 outputs (4 solid state relays with optical coupling and a 250V 5A relay). Each output can be regulated to be activated after a certain event: door opening, key collection/return, etc.

2.13. What types of readers are included in the scope of supply?

EmMarin and HID proxCard2 (125 khz ) formats . On request it is also possible to install MiFare readers . Players of other formats can also be easily connected. For this purpose, the system has two Wiegand interfaces with a format from 26 bits to 80 bits.

2.14. Why should I use two readers?

It's a way to simplify most uses. This way we avoid the need to navigate through buttons and menus on the display and consume additional time. A simple calculation shows that, if the system is used intensively and by dozens of employees, the loss of time with lengthy uses could amount to thousands of Euros over the years of using the system. We thus achieved a quick and easy solution: left reader to return the keys, right reader to collect the keys, this way all you have to do is open the door and deposit or remove the keys with authorized access.

At the same time, if the User has permission, there will always be the possibility of controlling and navigating through different functions using the display keyboard.

2.15. How to attach a key to a key ring?

Keys are attached to key rings by a 3mm stainless steel disposable clamp. The key is placed in the clamp and inserted into the key ring. You cannot remove the key from the key ring unless you cut the key or clip.

2.16. Can I use a key ring again if a key needs to be replaced or added?

Keychains are designed taking into account that keys can be replaced or added to multiple times. To do this, you will need to cut the clip close to the limit of the key ring, use a new clip to place the necessary keys and insert the clip into the key ring, pushing the piece of the old clip into the key ring. It is possible to replace up to 5 clamps depending on the length of the remaining pieces.


2.17. Why does the display turn off when the power supply is turned off?

Simply to save battery consumption. If you want to activate the display, simply touch the screen or bring the card closer to the reader.


2.18. I don't want to block keys in the system, I just want to control and record the withdrawal

For use without blocking the keys, you can use KGRD-0012 modules for 12 cells, WITHOUT blocking the key rings. In this case, only the system port will be blocked. The authorized employee can open the cabinet door and must only remove the key marked by an active LED. If you have taken an unauthorized key, an alarm signal will be generated. All reports on who picked up/returned a key are available in the software or on the locker display. The system without locking keys in slots is significantly cheaper.

Application areas: car dealers, keys for cash terminals, keys for equipment rooms (distribution rooms), etc.

2.19. Can keys be stored in boxes?

Our system can store keys in both key rings and boxes.

We can choose the scope of supply of the boxes depending on the size of the keys used.


2.20. I need a system for 70 keys

The units have a fixed number of slots of 3, 5 and 10. We can order an incomplete set of modules, in this case the empty spaces will be closed by stainless steel covers. So, for 70 keys we need a cabinet for 10 slots .


2.21. I need a system for 3000 keys

Each center can control up to 20 units with a total number of up to 2,000 keys, that is, to store 3,000 keys, two systems of 1,500 keys each will be needed. However, if they are in the same building, they can be fully integrated via Ethernet. In this case any of the controllers/display can access any key regardless of the cabinet where it is stored. When logging in or presenting the card at any of the withdrawal readers, the authorized keys are immediately marked in either system, presenting the card at the return reader, you can deposit the keys in any of the lockers. The solution for 3000 keys involves the provision of 30 cabinets with 10 slots each, equally distributed across two controllers/displays.

2.22. How can I access the system? What interfaces are available?

The default connection interface is Ethernet. There are also RS-485 and RS-232 interfaces. The initial configuration of the system and server IP addresses is carried out in the electronic key fob service menu.

2.23. Is there a possibility to use a biometric fingerprint reader?

Yes, MorphoSmart fingerprint reader from Safran, a leader in biometric technology. For other models and manufacturers, it is necessary to validate, please.

2.24. Can I set access to a key with a code?

Yes, You can define any type of access: just with user number and password, just with card, combined access with card and password confirmation or you can also use a biometric reader.

2.25. Can I create a one-time password to access a key?

Yes, it is possible.


3. KeyGuard – Reliability and guarantee


3.1. What is the system warranty period?

The warranty period is 5 years and includes replacement of components damaged due to manufacturing defects.


3.2. Can warranty obligations be extended?

If the system is used very intensively and some mechanical parts such as locks, electrical or mechanical system locks fail, after the end of the 5-year warranty period, contact us and we will arrange for the replacement of the failed component at controlled cost values. . We do everything we can to keep systems operational and customers happy.

The maintenance and full operability of KeyGuard systems beyond the warranty period is normal and guarantees that the systems are reliable, durable and fully justify the investment and preference of Customers and Users.

3.3. How reliable is flash memory independent of the power used?

DataFlash memory is used to store data about Users and key access levels, this Flash memory essentially differs from the USB flash drives known to everyone. This type of memory is microscopic in size with guaranteed recording quality. This ability helps to change the data of a given User, without serious consequences and without the need to overwrite the remaining data, thus helping not to worry about limitations related to the number of rewrite cycles in Flash technology.

Special ferromagnetic memory, with an unlimited number of rewrite cycles, is used for intermediate event storage. This way, we guarantee problem-free operation of the system at any time throughout its entire service life.

3.4. What is the useful life and how is the reliability of the system guaranteed?

The system is designed for continuous operation over many years. All components are selected with high quality and safety standards and have been designed for use at reduced loads. For example, an ultra-bright display only works at 50% brightness (thus twice the useful life is achieved), other components also work at voltage below their limit at around 10-20% less than the specified capacity. The useful life of the KeyGuard key storage system , under normal use, is expected to be more than 15 years without reaching the point of obsolescence.

3.5. Is system maintenance required?

The system only requires normal hygiene and cleaning on a daily basis, and annual lubrication of the mechanical components of the door and cleaning and hygiene care for both the key rings and the keys themselves in order to avoid contamination and accumulation of dust or grease in the receivers of the door. cabinet. To clean the keychain contacts, you can use a cotton pad moistened with alcohol.

For further clarifications, you can contact us via email: 

Produção e personalização de report de utilização
bottom of page