Sarl cf2i

Back to Home
Page FR Gestion Clés

Key Management Software


Gestion ClésClick here to download the full but limited version of Key & Access Management software


Price : 495 € ATI
(With CD-ROM support: add the supplement indicated here)
SARL CF2i - 30 Rue Gambetta - 08200 Sedan, France - Phone : 03 24 29 00 35 - Fax: 03 24 29 01 03 - mail: antibulle@wanadoo.fr

Key management software

- Educational institutions,
- Communities (Municipalities ...),
- Associations,
- Barracks,
- Any institution or institution that has to manage many accesses and keys ...

The key management software can simultaneously manage the links between Keys + Doors + Personnel of a school, a municipality, a fire station, ... An institution that must manage hundreds of different accesses with hundreds of people, with different rights.

Important note
You can start during the year and easily register the trousseaux already lent (key + borrowers + loan date etc ...). At any time, the software is operational very quickly!


Gestion ClésClick here to download the full but limited version of Key & Access Management software


Key Features of Key Management Software

It is not necessary to re-write all the files! The Key Management software can import (possibly existing) Personal files and Keys and Access in Excel format. Key Management knows how to answer the following questions instantly:

- what is the key (or what are the keys) that opens the door to room 202?
- who has access to room 202?
- who had access to room 202?
- what are the keys that this or that person possesses?
- what are the keys to order?
- what are the characteristics of the door of room 202? (length of the barrel for example, which avoids going to check on the spot if necessary)
- what is the supplier of such key?
- who lent such a keychain?
- who has recovered such keychain?

Key Management lends keys in 4 different ways :
- method 1: either by looking for the keys to be lent according to the doors (the accesses) necessary to the borrower (conventional loan) Then just select the necessary access and then ask to display all the realizable keychains
- method 2: by re-lending, for example, in September, the keys returned in June Useful, in a school, the day of the return!
- method 3: either by directly entering the keys by their name (for example, either because we already know the keys to lend, or because we have already lent the keys before acquiring the software)
- method 4: either by group: we can create groups of doors, for example the group WORKSHOP, the group CUISINES, the group BUILDING A, etc. Just select the group concerned, and the software displays all combinations of keys: then just choose the most appropriate ...

Key Management automatically creates the correct keyring in seconds (Keychain deduced by the software according to the access that must use the borrower)

It allows to create in a few mouse clicks and in a few seconds the minimal keychain needed by a teacher, a service agent, an outside worker, etc.

Example (method 1)
1. A service agent must access :
- in rooms 201, 202, 203, 204 on the 2nd floor Building F
- at corridor gates PC22, PC24 and PC26
- Rooms 11, 12, 13, 14 of the 1st floor Building E
- PC11 and PC20 corridor doors.
- in rooms 311,312, 133, 314 on the 1st floor Building A
- PC121 and PC200 corridor doors.

Problem
What are the keys to give him, knowing that the following constraints must be met, and according to the quality of the applicant:
- give a minimum of keys
- avoid giving keys that also open doors other than those needed
- avoid giving "sensitive" keys (of the "partial pass" type)
- and of course give keys in stock!

Solution
- The agent selects the borrower from the list of staff
- then select the requested accesses
- and Key Management calculates in a few seconds, among the thousands of theoretical combinations,
1. the right combinations
2. Those achievable.
3. Optionally, in the event that keys are missing, Gestion Clés will then propose to memorize them and then order them.

In just a few seconds, and thanks to a unique algorithm, the Key Management software calculates all the possible keychains and displays them sorted according to the priority defined for the best set of keys to be provided (in adequacy with the applicant). - and (on request), print the receipt that just need to be signed by the agent and the borrower!

Magic Wand Icon
The software can calculate and display, as requested, dozens and dozens of possible results. This can be complicated to manage: but the Magic Wand command allows you to select, in one click, and automatically 2 or 3 (maximum) key sets most appropriate, depending on the quality of the applicant, or:
- a set of normal access keys: in general, no more keys, and only the necessary doors are accessible
- a set of restricted access keys: in general, significantly fewer keys, but with partial passes, and the necessary doors accessible + more other doors
- a set of keys very restricted access: in general, the .... general pass! Magical !

IMPORTANT:
The user agent does not need to know exactly which keys are being accessed. Indeed, it is sufficient for the agent to select from the list of doors those concerned by the borrower, and the software calculates all the possible combinations (there may exist from 1 to n!) And displays them. Depending on the category to which the borrower belongs, then he will decide to provide such keychain (less keys but containing passes for example) or such other (more keys but without pass) ..


The receipt is automatically filled (the general conditions are of course modifiable and configurable)

All this in less than a second!
- Would you find all these key combinations in less than a second?

Programmable Alerts in Windows
You can also schedule alerts for key reminders without having to start the software. Very convenient ! Either at startup of Windows, or in scheduled tasks: finished keys that go never to come back!

Other Key Management Functions

1. Key Management can trace all movements (past and current): he indicates who used Room 203 1 year ago, a month ago, yesterday, etc ... and who is using it at this moment what keychain (s) have been provided, and to whom, and by whom
2. Key Management knows how to manage the final date or the users must return their keys: at each startup of the software, it displays the people whose end date of loan is less than 15 days of today, in order to their remember: finished the key parties with a contract, or an outside staff forgetting to make them in time!
3. Key Management knows how to lend several identical keys (case of staff housed)
4. Key Management knows how to check on a loan, that the borrower does not already have access to the requested doors thanks to previous loans (and forgetting to remind him ...)
5. Key Management can manage different types of access to users by passwords (not required)
6. Key Management knows how to start key management during the year: a function allows you to quickly save the keys already lent, then to continue normally with Key Management, without any worry
7. Key Management knows how to put the missing keys on hold
8. Key Management can print the list of missing keys by supplier to order. Automatically, Key Management can print by supplier all the keys designated as missing, with their quantity.
9. Keys Management knows how to handle temporary outside staff. Example: personnel of a company involved in the establishment. The deposit can be an ID, personal keys .... You can create on the fly external staff before you lend the keys.
10. Key Management knows how to manage the list of keys and access: links between Keys and Doors it knows how to link keys and doors automatically (when importing an organization chart), or manually, in a few clicks
it can indicate instantly that such key opens such door (s)
it can indicate instantly that such door is opened by such key (s)
it can indicate instantly, by borrower, all past and current loans
He can print all this information
11. Management Key knows how to manage the users of the software (the members of the service (stewardship, service heritage, ....): several people in this service can lend the keys, they will have to identify themselves, so we will always know who lent what to whom
12. Key Management can print reminders by mail: we put in the locker of the concerned personnel ...
13. Key Management knows how to make reminders by mail
14. When returning the keys, they re-enter the stock, except lost keys that are stored as such.
15. Key Management manages deposits: Key Management prints a pre-established document with each loan of keys, indicating the name of the person who gives the keys (the stewardship staff, for example), who receives the keys, the description and the quantity of the keys lent, the amount of the possible deposit and the date of imperative return of the keys.
16. The type of deposit is:
- no deposit
- a lump sum
- an amount per key, multiplied by the number of keys lent
- personal keys (in the case of staff from outside the institution)
- identity papers or other (in the case of staff outside the institution)

17. Key Management knows how to manage the location of keys in the key cabinet: as there may be hundreds of keys in a cabinet, we can locate each key by its location in the cabinet simply: key # 12345 is at line 4, column 5 for example. When creating the key ring, Key Management can print the position of each key and the Stewardship Secretary knows immediately where to look; time saving assured!
Note: There may be several key cabinets!

All files can contain thousands of files!

Key Management comes with sample files for testing.

Key Management and File Imports

Key Management can import in a few seconds existing files (eg created with Excel).

Key Management and Backup
Key Management can save all its compacted files into a single file.

Maintenance
Software maintenance is provided free of charge for the first year. Cost of maintenance in following years: Here. Maintenance allows you to benefit from new functions and after-sales service.

Order
To order
The Key Management software is sold 495 € ATI
(With CD-ROM support: add the supplement shown here)
To order, send your order form
-by fax to CF2i on 03 24 29 01 03
-or by mail to CF2i, 30 Rue Gambetta 08200 Sedan
(With CD-ROM support: add the supplement shown here)
Upon receipt of the order form, you will receive the release code. and the software will be immediately operational.

Terms of use
The software runs on Windows XP, Vista or Seven, Windows 8 and Windows 10.
It can be installed on a server, and multiple workstations can be connected, but only one at a time can connect.

Network Connections
The number of stations connected to the software depends of course on the equipment used. In Windows 10 local area network is the maximum allowed. Beyond this, the use of a Windows Server-type system or equivalent is recommended for more connections (possibly with the purchase of additional Windows licenses). Installation and simultaneous access to the Learning Network and Administrative Network can be problematic depending on the configuration. Checkpoint if you want to install the application on these two networks.

Dissemination method
The software is marketed via the internet. It is in downloadable version on this site www.antibulle.com in version flanged. To receive the code of release, it is necessary to order either by mail or by fax