Physical key management hanging on the last thread
The PRISM security solution eliminates the cost, security risk and complexity of physical key management.
(+27) 012-665-3158
PROGRAMMABLE
RELIABLE
INTELLIGENT
SECURE
MAINTAINABLE
Overview of PRISM software and hardware architecture
Software
The software is proprietary and runs on e-Thele SQD Networks servers. The software is used to create users allowed to access certain sites, locks, or areas.
The software is capable of allowing and restricting users to certain functionalities. The functionalities include generating v-Keys to unlock certain sites and registering new users to the software.
The software uses encryption throughout to protect the systems as well as the users from being compromised. The software generates encrypted access v-Keys (which act as keys) to access different functionalities on the Prism device such as unlocking and locking a system. Upon standing down from a site or system, the v-Keys are then invalidated and can not be used again – new v-Keys are required.
The software which is accessed from a mobile device or PC communicates directly with the Prism device to control different functionalities. The software can also be used while the device has no internet connectivity, thus the reason for primary communication with the Prism device being
Bluetooth.
Hardware and Communication
The Prism device’s main method of communication and access is through Bluetooth Low Energy.
The customer can also opt for a WiFi enabled unit if there is a need to remotely access the unit or if they would prefer over-the-air updates.
The sensors and locking mechanism attached to the PRISM device is a customer’s choice as it must comply with their requirements.
The customer also has the choice to supply their own hardware with regards to locks and sensors, e-Thele will also supply the hardware if needed.
Any additional hardware will be tested by e-Thele as well as the customer to ensure compatibility.
Integration is a possibility if there are requirements from the client. Software integration can easily be done as the software is Web Based and uses API’s for data transmission.
e-Thele also owns the software and has dedicated developers who are willing to work with clients and/or third parties to enable integration.
If a client wishes to use a third party to supply usermanagement/ token management, this can also be discussed to the full extent of the requirements of the client.
Features
Features
PRISM Smart Controller PRO
Connectivity
- Bluetooth
- Wi-Fi
- NFC
Protection
- Reverse Polarity
- Over voltage
- Under voltage
- Over current
Security
- End to end encryption
- Key encryption
- Tamper detection
- Intelligent door sensor
Software
- Open software architecture
- Over the air technology
- SMS Fallback
- Web Interface
v-Keys
- Manage
- Issue
- Add
- Remove
- One Time
Use Cases
Telecommunications
Manage staff & contractors’ access to remote sites without any physical keys to unlock Base Transceiver Stations, Bunkers, and cages without any connectivity. Get a full access report with photos ensuring the person onsite takes accountability that the site is secured when leaving. P.R.I.S.M intelligently monitors all hardware connected to the unit to ensure the site is ready to stand down when leaving. Set schedules, giving a time by which v-Keys expire.
Critical Infrastructure
Restrict access to authorized personnel and prevent staff from leaving the site with physical keys. If a contractor or staff member token expires, so to will their access rights. v-Keys for access can not be shared or replicated and is site specific. Have online visibility of who accessed restricted access based on working hours and shifts. Improve staff accountability that the site is secured when leaving.
Renewable Energy
Avoid keys being lost or master keys being copied. Control access with high levels of security to ensure contractors or staff can access critical areas when needed to. Easily manage users, access groups, locations, and permissions. Add, remove v-Keys and determine who has access, and when.
Medical
No more looking for keys or sharing keys by nurses to access medicine cabinets. Get a full audit report on who accessed the cabinet and equipment stores. Security or administration can oversee everything, make changes in one central location and view an audit trail.
Warehousing
Manage, control and report on the use of shared access areas such as high value cages, reducing losses and making users accountable. Safeguard who can access areas, by ensuring only staff with the correct access credentials enter certain areas.
Mining
Ensure only authorized personnel access secure applications, such as access to substations, explosives and equipment rooms, and only if correct Health and Safety procedures have been followed and correct PPE is worn. Get alerted when doors are being tampered with or forced open.