The Glam Solution comprises three components, each with the following features:
- Centralised Management Platform
The platform controls the entire system from which all access requests are managed. The platform utilises a Linux operating system and server with a windows internet browser application for user access. The keys are pre-authorised for access on an individual node basis. Parameters such as key serial numbers, lock and latch serial numbers and time intervals, are all utilised in the authorisation and authentication process to grant access to an individual user. The system is centralised, but user access can be from any location required, with specific user profile limitations on end users. The system supports a referenced GIS data application model to represent all Gridlocks and Smart keys located on the system.
The locking device or Gridlock is an encapsulated electronic dead lock, which requires no power connection or communication infrastructure. The device is water, dust and grit proof, certified to IP67 and contains no active energy source. It is manufactured from ABS Plastic and secured within a stainless steel shroud and mounting bracket which makes it self-contained, maintenance free and also provides high physical strength to the unit. This device is also resistant to a wide range of chemicals. The lock is “energised” by a key, however no physical contact between the key and the lock is required as all communication to the lock is by way of an encrypted proprietary inductive communication circuit. The dead-lock can be customised for a wide variety of locking applications.
This unit “energises” the lock from an internal power source that is rechargeable. The key manages all communication with the lock to authenticate and operate the system. It also manages the data communication back to the management platform over the GSM (Global System for Mobile communications) network. The key also captures all events relating to an access incident in a log file and updates the central platform of all activity and status on completion. As a hardware protection feature, keys can be disabled from the central platform, should the need arise. The key engages with the lock through a key hole and the lock is thus not accessible to be tampered with in any way. In addition, keys can be GPS located and tracked on the system. Access requests are pre-authorised and downloaded to keys, prior to granting of access to any user. Currently two smart key versions are available, the first has an integrated SIM card, display and interface buttons. The second version comes without a display and is linked to a standard external Android device via Bluetooth. The GSM modem and GPS antenna of the device is used as a communication channel to the centralised platform while the display serves as a user interface.