procontrol ProxerSafe Series User manual

1/ 23
KeySafe Lock User Guide
PROCONTROL®
ProxerSafe family
KeySafe Lock
RFID-technology based safety key cabinet
User Guide
Version: 14.1
Date: October 2018

2/ 23
KeySafe Lock User Guide
Table of contents
Table of contents..............................................................................................................................................2
Security guide...................................................................................................................................................4
KeySafe Lock datasheet...................................................................................................................................5
Properties..................................................................................................................................................6
Options......................................................................................................................................................6
Operation..........................................................................................................................................................7
Rights for removing keys...........................................................................................................................7
Key identification........................................................................................................................................7
Multi-level security...................................................................................................................................... 8
Authorization check...................................................................................................................................8
Sabotage protection..................................................................................................................................8
Alarm functions (options): .........................................................................................................................8
Power outage mode..................................................................................................................................9
User interface/Cabinet software.....................................................................................................................10
User levels...............................................................................................................................................10
User rights...............................................................................................................................................10
Functions of the KeySafe Cabinet Software (KCS) for key users..................................................................10
Select Language .......................................................................................................................................11
Login ..........................................................................................................................................................11
Login using card......................................................................................................................................11
Login using PIN code..............................................................................................................................11
Login with combination of card and PIN code.........................................................................................12
Login with fingerprint...............................................................................................................................12
Login with combination of fingerprint and PIN-code ...............................................................................12
Key handling..............................................................................................................................................13
Key map..................................................................................................................................................13
Picking up keys .......................................................................................................................................14
Returning keys ........................................................................................................................................14
Keys in wrong key positions....................................................................................................................15
Find a key (Where are my keys?)............................................................................................................15
Finding subkeys ......................................................................................................................................16
Vehicle search...........................................................................................................................................16
Functions of the KeySafe Cabinet Software (KCS) for Admin users .............................................................18
Key cards with admin rights....................................................................................................................18
Edit users...................................................................................................................................................18
Add new user ..........................................................................................................................................18
Modify a user...........................................................................................................................................19
Delete a user...........................................................................................................................................19
Edit key rights ...........................................................................................................................................20
Edit keys..................................................................................................................................................20
Replacing RFID key holders ...................................................................................................................20
Assign keys to / revoke key rights from users.........................................................................................21
Time settings.............................................................................................................................................21
Event logs..................................................................................................................................................22

3/ 23
KeySafe Lock User Guide
Check user event log...............................................................................................................................22
Monitoring –using other functions ........................................................................................................23
KeySafe cabinet –Questions and Answers ...................................................................................................23
Installation.......................................................................................................................................................23
Installation guide is in the Administrator Manual............................................................................................23

4/ 23
KeySafe Lock User Guide
Security guide
Please read this guide carefully before installing
and using the device. Please use the device
properly and as described in the following manual.
The guarantee is insured only if the device is used
with the implements approver or specified by the
manufacturer, and it is cleaned and maintained as
described in this guide.
•The manufacturer does not take warranty for
the faults arising from improper use.
•Incorrect installation
•Connecting to inappropriate electric network
•Incorrect maintenance
•Not approved modifications, interventions
•Using non-original spare components
•Do not store and operate the device out of the
given temperature ranges, it can lead to
malfunction
•Do not try to modify or dismount any part of the
device
•Do not allow this product to come into contact
with water or other liquids.
•Do not store the device close to a heat source
or direct flame, because the device may
explode.
•Use the device only the proper way as
described in the guide.
•Use the equipment only for the purpose it has
been designed for.
About the security
Use the power supply provided by manufacturer
for the device. Use electric power connection as
specified in this guide.
Attention!
The device should be connected only into a
grounded outlet on a protective relay equipped
network.
To avoid fire and electrical shock
Be aware that nobody pushes trash, gums and
other stuffs into the slots of the device.
Do not install attachments and accessories that
are not designed for this device. Unplug the device
in case you do not use it for a very long time.
At installation time
At the back of the device there are heat deflector
slots. Do not cover these slots, because it may
cause dysfunctions in the device and this may
cause fire.
Cleaning
Power down the device before starting the
cleaning process. Use wet cleaning rag.
General rights and responsibilities
Procontrol Ltd has the exclusive right for producing
the device.
Procontrol Electronics Ltd. reserves the right to
modify this documentation and software without
notice.
In no event shall Procontrol Ltd. be liable for any
claim, damages or other liability out of or in
connection with the usage of the device.
Warranty period is 2 years.

5/ 23
KeySafe Lock User Guide
KeySafe Lock datasheet
Intelligent secure key safe
The KeySafe Lock is a safety key-storage cabinet, that can be opened only with personal RFID proximity card
(transponder) or/and with a PIN code, optionally using fingerprint identification. The offline type has an built-
in computer. It is possible to connect it to a computer network and to check remotely who and when took
which key and for how long time.
The KeySafe Lock does not allow taking any key, just the ones the person is entitled to!
More cabinets can be connected to a single data cable or handled in one network, monitored and managed
with a ProxerNet KeySafe Management Software (a Windows application running on a PC) Cabinets can be
integrated into a building management system as well.

6/ 23
KeySafe Lock User Guide
Properties
•Intelligent, safety key-rack that can be opened with
ID card / PIN code –as per request the Client’s own
proximitycards can be used. Optionally the cabinet
can be set with NFC or biometric (fingerprint)
opening.
•RFID proximity key holder plugs automatically
locked by bolts
•Records data like person, time, keys and their
relations (who, what, when, how long); logs also
the door openings
•Rights for keys can be given and withdrawn
individually, even via Internet from a remote
computer
•Key identification is automatic using RFID key
holder plugs
•More cabinets can be set and managed as one
system
•Cabinets can be extended by modules including 16
key units (one row) or 8 key units (half row)
•Numbered key plug sockets (it locks the key-
holders with electronic latches)
•Offline-online communication (operates in its own,
manageable via the touchscreen of the built-in PC
and can be managed from a remote PC via
Internet)
•Can be combined with the access and time management modules of its management software, the
ProxerNet
•Power supply: 230V 50-60 Hz (12V/230V power supply included)
•Steel housing with safety glass door, optionally with metal door or without door
•Built-in PC with touchscreen
•Built-in secure RFID based magnet lock; built-in identifier: RFID key-holder plugs for each key individually;
built-in LEDs to show the “closed / opened” status
•KeySafe Lock cabinets are made in a wall-mountable version in robust steel housing, in RAL7035 colour.
Other colour or design (brushed stainless steel, outdoor design) can be ordered.
•Key reservation function
•Key finder (Where is my key?) function
Options
•E-mail message to a given address about key movements
•Alarm (email or sound) can be triggered at keys not returned in a specific time.
•Password protection
•Wi-Fi communication

7/ 23
KeySafe Lock User Guide
•KeySafe terminal with biometric fingerprint reader
•KeySafe cabinet can be set to accept Client’s existing cards
•Key storage capacity according to unique demands
•Mounting options per request
•Direction of door opening can be changed upon request
•Outdoor version
•At returning car keys it is obligatory to record the odometer reading
•More cabinets can be put in a string
Operation
The cabinet can be opened only with personalized RFID proximity tags or/and PIN code, optionally using
fingerprint identification (KeySafe Lock Bio). Each key has a unique RFID identifier that allows key
identification and monitoring of key movements. The software logs when a key is taken, returned, and by
whom. The right to be able to remove a key can be given separately. Without this right, the cabinet does not
let the person take out any key.
Each key has a plug equipped with RFID transponder. If you return the plug into the right slot, the RFID reader
reads the transponder, and it sends the ID to the PC software. In case of a closing command a latch locks
into the plug’s notch, preventing to be able to pull out the plug.
•The module’s own RFID reader reads the available RFID IDs and sends them to the PC software.
•When someone identifies himself, the cabinet starts to investigate, whether the user has the rights to take
one or more keys.
•If the person has sufficient rights, the cabinet door will open, and the device automatically unlocks the
keys for what the person has pick-up rights. Should the door be closed again, all slots will be locked.
•The PC software records all the events, since it is possible to monitor and control the key movements.
The intelligent modules containing key positions are connected to an RS485 network inside the cabinet. This
network is connected via Ethernet to the cabinet’s management software running on external PC. The RFID
reader, the other storage units, the cabinet door locks and the door state sensors are also connected to the
same RS485 network.
Rights for removing keys
More than one key-ID can be assigned to one person. The right to remove a key can be given for keys one
by one individually.
Key identification
The cabinet recognizes what key is in which slot. Who, when and which keys he has removed or returned - It
will be saved in the event log. If you take or put back more than one keys, the system will know the key holder
ID numbers of all of them.

8/ 23
KeySafe Lock User Guide
Multi-level security
Authorization check
The cabinet knows already at the time of PIN code or card (optionally fingerprint) identification whether the
person has authorization for a key, and which keys he is allowed to remove.
There are users set in the system with admin (superuser) rights, having all access and modification rights
related to users, keys and system properties.
Sabotage protection
The system can send alert if an unauthorized person wants to remove a key. It can also give a warning beep
if you put the key into an incorrect slot.
The device checks by default if the key has been put back to its original position. Keys switched are indicated,
but the system allows putting in the key to another slot and logs the event. Sound signal can be turned on.
Deliberate exchange of keys on key holder plugs (with RFID transponder) can be prevented by using vandal-
proof key rings.
Alarm functions (options):
•The key has been removed violently from a locked position (alarm-out, email)
•The cabinet door was pried open (alarm tone, alarm out)
•Removal of connector-cover plate (tamper switch, alarm tone, alarm out)
•The motor mechanics of the key latch get jammed (alarm-out, email)
•The door was left open for too long: successful identification, keys have been removed, but the door
remained open (Alarm tone, Timeout in 60 sec, alarm signal after 120 sec)
•The key was out too long, the person forgot to bring it back (Timeout, alarm message after 24 hours)
•Incoming external alarm (alarm inputs): there is fire or emergency, the key cabinet will be completely
unlocked, but it records all key removals and events
•End of incoming external alarm (alarm inputs): key cabinet locks again; if the door is still open, “the door
was left open for too long” alarm type will be active.
•Optionally: If someone fails to login within a time interval more than 3 or 5 times, it is an unauthorized
access and the cabinet sends an alarm notification and an e-mail to the administrator (if suitable network
connection is available).
The alarm signal sounds through the built-in piezo buzzer and the PC speaker. Network connection and SMTP
configuration is needed to send an e-mail alert.
Optional SMS can be sent to the specified phone numbers, through a built-in optional GSM/GPRS
communicator.
Please note: The alarm functions set at the given cabinet may alter from the ones described above. Please
contact us if you wish to implement certain features.

9/ 23
KeySafe Lock User Guide
Power outage mode
The KeySafe cabinet has an own UPS. In case of power outage, the KeySafe switches to power outage mode,
and it still operates and communicates for 24 hours.
In case of power failure, first the key module LEDs go out and the brightness of the screen reduces; at the
end the screen completely darkens. The PIN keypad flashes in every 10 seconds to show that the device can
be used. The cabinet can be woken up by using a card. Login after waking up is possible as usual.
In case of KeySafe Lock Bio type, the fingerprint reader works only after the device has waken, when the
fingerprint reader is blue.
During power outage mode the key LEDs light only at use. The key modules check the keys in every 10
seconds, so changes in key locations, removal, placing back are shown with some delay. Changes are
followed up more slowly on the screen as well. After the time set the screen goes dark again if there is no
activity.
The time while the cabinet is awake, the screen brightness decrease time and the time when the cabinet goes
sleep can be set. For further information and setting possibility see the administrator guide.
When the power is restored, every device restores into normal mode, even if the power supply unit has run
down.

10/ 23
KeySafe Lock User Guide
User interface/Cabinet software
Cabinet management software can be split into two parts:
•software running on the cabinet’s built-in computer: KCS
•software running on the external management computer in the network (ProxerNet software KeySafe
Module): KMS
They have different functionalities. In this document only KCS is discussed.
User levels
There are two user types in KCS:
1. Key user
2. Superuser/ Admin
The difference between the key user and the superuser is in their rights.
User rights
Key user has right to login, select, pick up and return keys.
Superuser is authorized to login, select, pick up and return keys, and also for basic management functions.
The Admin menu is displayed only for Superusers/ Admins in KCS.
Functions of the KeySafe Cabinet Software (KCS) for key
users
Detailed management functions are available only in external cabinet management software, ProxerNet
software KeySafe module.
The main screen of the KCS software looks like:
The actual time and date are displayed in the upper right corner of the screen.

11/ 23
KeySafe Lock User Guide
On the main screen you can see the device serial number (SN), which correctly identifies the KeySafe. You
can see the actual software version too.
Three kinds of symbols can be seen there in the bottom left corner of the screen:
Empty: in this case all connections are OK
Gear: no connection to hardware
Connector plug: no connection to Hardware Server
Bell: tamper or fire alarm
Select Language
The language of the software is English by default. To select other available languages, please consult the
Admin Guide. At request other translations can be available.
Login
Login using card
Place your card close to the card reader (next to the screen). In case the card is not valid, KCS will display
an orange screen with “Not authorized” note. It means the login has failed.
Login using PIN code
If you would like to login to KCS using PIN code, tap the screen, enter your PIN code and press the OK button.
Having mistyped a number, you can restart adding the PIN with Cancel.
In case of a not valid PIN code, KCS displays an orange screen with “Not authorized” warning. It means the
login has failed.

12/ 23
KeySafe Lock User Guide
Login with combination of card and PIN code
Place your card close to the card reader on the top of the cabinet, then enter your PIN code on the screen.
The order can be changed (so first typing the PIN then using the card), but both PIN code and card must be
valid and authorized for a successful login.
Software displays on screen for which authentication it is still waiting.
Login with fingerprint
Put your finger on the fingerprint reader. The device beeps at the fingerprint scan. In case a fingerprint is not
entitled, a “Not authorized” message appears on the screen.
In case of success, the fingerprint reader flashes blue.
Login with combination of fingerprint and PIN-code
Enter your PIN code and place your finger to the fingerprint reader. The order is interchangeable. If both IDs
are valid, the login is successful. The software shows on the screen which identification is still needed.
In case of unsuccessful login, the door of KeySafe remains closed.

13/ 23
KeySafe Lock User Guide
Key handling
Key map
After a successful login KCS highlights the keys available for you on the screen (with key location). Numbered
rectangles filled with different colours will indicate the keys.
•The full green rectangles mark the keys available for you.
•If keys are reserved, the software shows them in full orange rectangles.
•The full grey rectangle means that another user, who also has right for this key, has picked up that
key.
•The full red rectangle means you do not have rights for these keys.
If the KeySafe manages bunch of keys (see the Admin guide for this setting) and you choose one of the keys
on the touch screen, you can see the subkeys in a pop-up window:

14/ 23
KeySafe Lock User Guide
Picking up keys
Baseline: door is closed, all keys are locked, and all LEDs are red.
•Sign in with your card and/or PIN code. The built-in terminal checks if you are entitled to use key
cabinet. If you have the necessary rights, the cabinet beeps and the lock releases.
•You can open the door. In case of plug lock, pull the handle toward you.
(The key on the photo is for emergency opening only, the administrator of
the cabinet must take a good care of it.)
•After logging in, the LEDs turn green on the key positions you are entitled
to remove keys from. You can remove them.
•The event log records the user’s identity.
•Keys without authorization stay locked and the LEDs above them are red.
The cabinet does not release these keys.
•When you are done, close the door.
After removing the keys, the bolts are locked again and the LEDs light in red.
The red LED indicates always a locked key latch, while the green an open one.
If the person has no activity for 90 sec after the door has been opened, the latches of the opened key slots
will lock again (timeout).
Key position slots also close, if the user leaves the door open after their activity (timeout). The terminal
displays a warning message that the door must be closed.
Please note: The ID card and/or PIN code will be logged always together with the user’s name. Therefore, it
is recommended that only one person shall pick up keys at a given time and then the door shall be immediately
closed.
Returning keys
The LEDs do not light above the empty key slots after logging in.
•You must return the key into the correct (numbered) slot. The latch mechanics allows to return the
keys.
•When the user returns a key to or picks up a new one from the correct slot, the program records the
event in the log.
Note: Keys must be inserted into their correct (numbered) positions till impact. Key recognition is
acknowledged by a beep sound.
Note: The key holder plugs contain magnet, therefore small metal parts can stick to them. Please check if
there is no dirt or swarf on them!

15/ 23
KeySafe Lock User Guide
Someone else (another person, who has no rights for this particular key) can return removed keys too. In this
case, the program assigns and records event information about the person who returned the key and not
about the person, who has picked it up originally.
Keys in wrong key positions
Key position monitoring and marking the mixed-up keys with icon
A person has rights for the keys, not for the key slots. If you put the key back into an incorrect slot, (for example
key No. 22 into the slot of key No. 30) the cabinet accepts the key and locks it. The cabinet recognizes the
key, and remembers the slot number, where a given key is. If someone wants to remove the key No. 22, he
can do it also from slot No. 30.
This way you can always find the keys with the key finder function.
Switching off marking the misplaced keys - optional
The function described in the previous paragraph can be switched off. In this case, the key map does not
show the keys placed in a wrong position, but the key finder list shows the current place.
Prohibiting misplacing the keys –sound signal at keys returned to wrong position - optional
If someone returns a key into an incorrect slot, the terminal can notify him with a beep sound, and the locked
slot will be immediately opened. The key can get into the correct slot only.
Find a key (Where are my keys?)
After a successful login you can see in the Find Key menu, where your keys (key positions, key names) are.
The background colours of the rows indicate where the keys are. The colour corresponds to the ones seen
after the login screen.
1. Orange: Reserved key. The user’s name, who has reserved the key and the reservation time intervals
are displayed on the screen.

16/ 23
KeySafe Lock User Guide
2. Grey: Picked up key. Shown with the user’s name, who has last picked up the key, and the pick-up
date.
3. Green: Currently available.
4. White: Picked up key, returned into another KeySafe cabinet. The name of the person, who picked
up the key, and the place, where the key is now, are displayed on the screen.
Press the Back button to return to the login page.
Finding subkeys
If you use the KeySafe for managing bunch of keys, in the FindKey menu you can see the subkeys, which
belong to a key. The key position number of the subkey is the same as of the main key.
If you choose one of the subkeys on the touch screen, the LED light (which belongs to the main key)
flashes.
Vehicle search
If the system records vehicles and theirs keys, it can be set that the vehicles available are shown on the
screen immediately after login.
About a vehicle, you can see the following data:
•key position in the cabinet
•key name
•type of the vehicle
•registration number
•identification number
•motor number
•colour

17/ 23
KeySafe Lock User Guide
•if the key is in its place (True: in its place, False: not in the cabinet)
Optionally it can be set if the car keys not in the cabinet are shown or not.
Select any column to search for a vehicle. Use the keyboard in the lower right corner.
E.g., let’s search for vehicles with letter C. It is possible to search in more columns at once; the search result
will be displayed accordingly. To close the keyboard, click “CLOSE”.
If you pick up a key, then it disappears from the list, or the software marks it as False in the column “In place”
with “False”, according to system settings.
Log out with tapping the “Back”button or closing the door.

18/ 23
KeySafe Lock User Guide
Functions of the KeySafe Cabinet Software (KCS) for Admin
users
Key cards with admin rights
Two key cards are given with the cabinets, which have the rights to unlock all key positions and access the
Admin menu. Owners of these cards have the rights to add new users into the system, manage all the keys
and user rights per keys, set time and read event logs.
User cards can be also requested. These can be used to open the cabinet and certain key slots, if the rights
are given to the card owner.
Edit users
In the Users menu under the Admin menu you can add new users to the system or you can modify/delete an
existing user. Tapping on a username, their data are shown on the right.
Add new user
You can add new users by pressing the “Add new”button.

19/ 23
KeySafe Lock User Guide
Enter new user’s data (ID, name, if user has admin privileges and card number. In the “Pincode” field chosen
PIN can be entered; at the “Pincode 2” field the entered PIN is to be confirmed). Then press Save.
Modify a user
When you tap on a username, their data is shown on the right. You can edit those data (a pencil icon appears
next to the username), and when ready, tap Save.
Delete a user
To remove a user, just select it, and press the Delete button (a waste-bin icon will appear next to the chosen
username). Finally tap the Save button.

20/ 23
KeySafe Lock User Guide
If you want to delete a user with admin rights, first, you have to take away the admin rights. Then it is possible
the delete the user. Otherwise, the system does not let you delete this user, and displays a warning message
on the screen.
Edit key rights
Edit keys
You can change the name and modify the RFID number of a selected key in “Admin menu / Key edit” menu.
Choose a key, modify its data and finally tap Save.
Replacing RFID key holders
To replace a key holder, go to Admin Menu/Edit key menu, and delete the RFID number belonging to the key,
and then plug in the new key holder into the right place. The RFID number of the new key holder will appear
in the text box. Tap Save and start using the new RFID key holder plug.
This manual suits for next models
1
Table of contents