0% found this document useful (0 votes)
97 views

Key & Core Control: Keystone® 600N5

Uploaded by

sam quinn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views

Key & Core Control: Keystone® 600N5

Uploaded by

sam quinn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

KEY & CORE CONTROL

KEY & CORE CONTROL


Keystone® 600N5
SOFTWARE

KEYSTONE® 600N5 SOFTWARE


The Stanley/Best Keystone® 600N5 key and core
control software offers all of the same security,
convenience, and functionality found in the
original Keystone® 600 program, but with the
added ability to operate in a network configuration.
Keystone® 600N5 will assist you with the tedious
task of managing your key and core records in
today’s environment, in which multiple people in
different locations may need to access the data
simultaneously. Keystone® 600N5 can also work as
a stand-alone application.

Designed to operate over modern network


environments, such as Windows® 2003 or 2008
server. Keystone® 600N5 includes special help
screens that can be accessed whenever you need
assistance.

Complex commands and detailed menu trees are


eliminated by the function key index at the bottom
of each screen. Select the information tab desired
and the appropriate screen is called up.Instructions
Demo Facility and help screens are immediately available.
KEYSTONE® 600N5 FEATURES
FEATURES

Security People
• Password restricted logins enable administration to restrict • Displays people, keys, keyrings, cores, locks on one record
individuals access for designated cards • Maintains list of deleted employees (and doors) with the ability to
Buildings display and reactivate them
• Designed to support multiple facilities • Searches for and identifies people by name, ID, department, title
• Display people, keys and departments with access to a building and type
• Lists departmental access, designating the people, keys and • Cross-references people to cores, doors, buildings they access
keyrings that have access to that department Locks
• Displays buildings with doors, cores and locks in the building • Displays locks, lock location and the people, keys and departments
Keys with access to that lock
• List all keys and items currently due back (or due back by any day • Lists manufacturer product records with items connected
designated) specifically to that manufacturer’s product
• Lists keys that have been issued and keyholders Doors
• On-screen display of BEST masterkey code records entered • Shows the doors with cores, locks and other items that are
• Records issuance of keys, keyrings, cores and locks to people installed on the door
• Maintains historical records on all keys, keyrings, cores and locks • Displays doors and people, keys and departments that can access
• Shows all “keyrings”, keyring holders, and what buildings, cores those doors
and doors the keyring accesses
• Maintains “key cabinet” records displaying the keys, keyrings and Software – general
locks located on a “hook” • Comprehensive list of reports available with the report generator
• Tracks “out-of-service” keys, keyrings and other items that are • Built-in easy-to-use backup program
lost, stolen or destroyed • Program always displays date of last backup
• Displays cores, departments, doors, buildings keys can access • Lists users who made backups with dates
• Dynamic searching capability for all records
Cores • Large note field available on all card records
• Lists all cores and their location, buildings and doors • On-screen indicator appears when notes are present on a record
• Cross-references employees, keys and departments • Able to operate in an Windows network environment with TCPIP
protocol
• Multiple users can access program at same time
• Stanley service that Imports data
• Mass deletion
• Extra logins and databases available
• Activity logo record user transactions

2 K E YS TO N
SCREEN TAB DEFINITIONS
SCREEN TAB DEFINITIONS

This card allows you to track the door, This card tracks With this card, locks can be identified by:
cores and locks in each building. It also all keys, keyrings • manufacturer • nomenclature
cross-references the employees, keys and locks issued • serialization
and departments that access the and reports their It also displays the core used in the des-
designated building. status when due ignated lock (includes historical
for return. This information for installed cores). It also
function allows permits the cross-referencing of that
you to view items due for return today lock to employees, keys, and depart-
and for previous days. This card ments. This card can also report the
displays a summary count of buildings, lock’s “disposition” (defined as the
When special departments, doors, employees, cores, location of that lock, i.e. cabinet, door,
“selective” keying keys, keyrings, and locks in the facility employee, hook, destroyed, lost, stolen
is designed and database. It also tracks the dates. or unassigned.
used in a facility Backups are made and identifies who
system, these did the backup.
cards will track
the keys that can This card allows
operate a selective core. These cards for the tracking
maintain historic information of cores of a product by:
and cross-references the employees, • manufacturer’s
These cards display the key marks, key name catalog
keys and departments that operate the serial numbers and any history of a key.
core. They also maintain the building number
They permit the cross-referencing of • type of product
and door location of a core. An auto- the employees with keys issued and the
mated pin segment calculator is (key, core, lock or other). It also gives
associated cores, doors, and depart- the past history of locks that have been
available with these cards. ments that can be accessed by that key. used in that product.

When multiple keys are issued to an This card allows for a vast array of
individual, many times a “keyring” is standardized reports to be generated by:
These cards allow you to record and
used to organize the issuance and • employee name or identification
reference the cores, keys locks, and
control. This card tracks the keyring as • door location
keyrings that are located in your cabinet.
a single file. This card shows current • core
and historic information of the keys • key
attached to the assigned keyring. It • department or building
This card lists the employees, cores, also cross-references the keyring keys • others
keys, and key rings that are associated to associated employees, cores, doors
with a department. It cross-references and buildings involved.
the cores, buildings and doors that a
This card iden-
department can access.
tif-ies the list of
This card allows
facili-ties that are
you to display
being tracked,
BEST® masterkey
This card allows you to maintain as well as the
code sheets for
records of the cores and locks in a list of users with
your system. It
designated door and provides a cross- program access.
also includes a
reference to the employees, keys and manual pin
departments that can access that door. segment calculator (requires that all
key cut numbers have to be typed in for This card displays records on keys,
each key). cores, keyrings, and locks when a key
cabinet is not used for organizing key
This card
storage.
maintains records
on the keys, This card tracks and maintains historic
cores, key-rings information for items (i.e. cores, keys,
and locks issued. keyrings, and locks) that are reported This card maintains records for the
It references the lost, destroyed or stolen. setting of security passwords allowing
cores, doors, and various levels of access to the
buildings that a person can access Keystone® 600N5 program by security
with their keys and keyrings. personnel and program users.

E® 600N5 3
SPECIFICATIONS

SPECIFICATIONS
Hardware Requirements
The Stanley/Best Keystone® 600N5 Key and Core Control software
requires the following hardware configuration for operation:
• 100 Meg HD space
• 2 Gig Memory
• 640 x 400 up to and including 1020 x 800 video resolution
Server Platforms
• Windows® 2003 or 2008 server
• Windows® XP or Windows® 7
• Works peer to peer on NOVELL
Workstation Platforms
• Windows® XP or VISTA or Windows® 7
PIN SEGMENTS

PIN SEGMENTS

Automated Pin Segment Calculator Manual Pin Segment Calculator


• BEST® pin segments generated automatically from • Simple entry of key cut numbers determines proper pin segments
information entered into the Keystone® 600N5 program • Determine single/double shear line combinations
• Security “work slip” feature allows printing of segments for
combinating BEST® products without revealing key cuts
• Accommodates combinating of complex selective BEST® masterkeying
• Instantly displays BEST® pin segments for combinating BEST® cores
HOW TO ORDER

HOW TO ORDER
KS 600N 1 1
Series Product Number of Logins Facility Database Number
KS – key control software 600N – full install for KS600N software* 1 – 5 logins (default) 1 – one facility database (default)
600NUP – upgrade from KS600 V3.53 or higher 2 – 10 logins 2 – two facility databases
600N5 – upgrade from KS600N 3 – 15 logins 3 – three facility databases, etc.
*Upgrades from G600 or a KS600 versions below 3.53 requires a full installation of KS600N

KS 600NLU 1 KS 600NDB 1
Series Product Number of Logins Series Product Number of Logins
KS – key 600NLU – increase 1 – add 5 logins KS – key 600NDB – add 1 – add 1 facility database
control the number of 2 – add 10 logins control more facility 2 – add 2 facility database
software logins for an 3 – add 15 logins, etc. software databases to an 3 – add 3 facility database,
existing KS600N existing KS600N etc.
installation installation

© 2013 Stanley Security Solutions, Inc. www.stanleysecuritysolutions.com BA-0022 • 03/13

You might also like