Landwell i-keybox Electronic Key Tracking System

Short Description:

The electronic key tracking system makes the process easier by preventing unauthorized access to your keys. In other words, it helps you protect your important keys and assets. It happens because of the smart key identified by a unique RFID system.

You can easily track and identify the keys using the RFID technology. Moreover, it also allows you to track the use of your keys with the help of user terminal. This process confirms every activity of the keys.

Product Detail

Product Tags

Keys remain a vital part of any security solution yet their importance is often overlooked. Knowing quickly who, when and where they are means you are always in control and keys are accounted for.

Basic Information

Convenient Features Include

  • Big, bright 7″ Android touchscreen
  • Keys are securely attached using special security seals
  • Keys or keysets are individually locked in place
  • PIN, Card, fingerprint access to designated keys
  • Keys are available 24/7 to authorized staff only
  • Instant reports; keys out, who has key and why, when returned
  • Remote control by the off-site administrator to remove or return keys
  • Audible and visual alarms
  • Networked or Standalone

i-keybox is ideal for

  • Prisons
  • Police and Emergency Services
  • Government and Military
  • Retail Environments
  • Airports
  • Property
  • Fleet Management
  • Utilities
  • Banking and Finance
  • Factories

Key Tag Receptors Strip

Landwell i-keybox Digital Key Cabinets Electronic05

There are two types of receptor strips in the i-keybox systems, which come standard with 10 key positions and 8 key positions. The locking receptor strips lock the key tags in position and will only unlock them to users authorized to access that particular item. So, Locking Receptor Strips provide the highest level of security and control for those who can access protected keys, and it's recommended for those requiring a solution of restricting access to each individual key.

Dual-color LED indicators at each key position guide the user to quickly locate keys, and provide clarity as to which keys a user is allowed to remove.

Another function of the LEDs is that they illuminate a pathway to the correct return position, should a user place a key set in the wrong place.

RFID Key Tags

The RFID Key Tag is the heart of the key management system. It is a passive RFID tag, which contains a small RFID chip that allows the key cabinet to identify the attached key.

Thanks to the RFID-based smart key tag technology, the system can manage almost any form of physical key and therefore has a wide range of applications.


Android Based User Terminal

A-180E Electronic Key Management System2

The embedded Android user terminal is the field-level control center of the electronic key cabinet. Big, and bright 7-inch touchscreen makes it friendly and easier to use.

It integrates with smart card reader and biometric fingerprint and/or facial reader, allowing the vast majority of users to use existing access cards, PINs, fingerprints, and faceID to gain access to the system.

User Credentials

Sign in securely & authentication

The key control system can be operated in various ways, with different registration options, via the terminal. Depending on your requirements and situation, you can make the best choice – or combination – for the way in which users identify themselves and use the key system.

H3000 Mini Smart Key Cabinet14
H3000 Mini Smart Key Cabinet15
H3000 Mini Smart Key Cabinet16
H3000 Mini Smart Key Cabinet17


Modular, scalable, future-proof system

Landwell i-keybox key cabinets are available in a matching range of different sizes and capacities with a choice of either a solid steel or window door. The modular design makes the system fully adaptable to future expansion requirements while meeting current needs.




The cloud-based management system eliminates the need to install any additional programs and tools. It only needs an Internet connection to be available to understand any dynamics of the key, manage employees and keys, and grant employees the authority to use the keys and a reasonable use time.

Two-way authorization

The system allows configuring key permissions from both user and key perspectives.


User Perspective


Key Perspective

H3000 Mini Smart Key Cabinet19


Same as The Two-man Rule, is a control mechanism designed to achieve a high level of security for especially physical keys or assets. Under this rule all access and actions requires the presence of two authorized people at all times.

Multi-verification gives multiple protection of key safety. It means that if one user wishes to use a key, he or she is required to obtain another user's permission or finalization of the request, the key will then be released. Important keys that lead to vital assets usually are suggested to use the multi-verification function.


Double Authentication

Is an additional level of security that uses multiple pieces of information to verify your identity.

What user credentials are activated?

And which pair of credentials combination?

The electronic key management systems have been applied to a range of sectors across the world and help to improve security, efficiency and safety.


Is it right for you

An intelligent key cabinet might be right for your business if you experience the following challenges:

  • Difficulty keeping track of and distributing a large number of keys, fobs, or access cards for vehicles, equipment, tools, cabinets, etc.
  • Time wasted in manually keeping track of numerous keys (e.g., with a paper sign-out sheet)
  • Downtime looking for missing or misplaced keys
  • Staff lack accountability to look after shared facilities and equipment
  • Security risks in keys being brought off premised (e.g., accidentally taken home with staff)
  • The current key management system not adhering to the organization’s security policies
  • Risks of having no re-key the entire system if a physical key goes missing

Take Action Now

H3000 Mini Smart Key Cabinet212

Wondering how key control can help you improve business security and efficiency? It starts with a solution that fits your business. We recognize that no two organizations are the same - that's why we are always open to your individual needs, willing to tailor them to meet the needs of your industry and specific business.

Contact us today!

  • Previous:
  • Next:

  • Write your message here and send it to us