SlideShare a Scribd company logo
1 of 14
Room Division
Topic – Room Key Card & Electronic Locking System
Session - 2020-21
COURSE - BHMCT+MBA (B1)
Semester - 7th
Submitted To - Submitted By -
Mr. Vikrant N. Meshram Mohit Kataria
KEY-CARDS
Metal room keys are being replaced by electronically coded key-cards.
A key card is a plastic card which stores a digital signature that is used
with electronic access control locks. It is normally a flat, rectangular
piece of plastic and may also serve as an ID card.
Master keys can be changed in a matter of a few keystrokes and lost key-
cards are easily removed from the system.
One of the best security features is the ability of the computer to
investigate each door lock and get a printout of everyone who accessed
a particular room. This dramatically cuts down on theft from the rooms
by hotel employees.
The security advantage of the key-cards has made it popular and many
medium and large sized hotels are adopting this key-card system.
Types
Memory Card:
A memory card is equipped with a memory chip to store lock access
codes and records. They can store data from 2 kilobyte (KB) (it can carry
25 different key lock codes), 8 KB (it can carry up to 125 different key
lock codes), or 64 KB (it can carry up to 1350 different key lock codes).
These are great for staff members or managers who have access to
multiple locks.
 Smart Card:
A smart card, chip card, or Integrated Circuit Card (ICC), is defined as any
pocket-sized card with embedded integrated circuits which can process
information. Smart cards can store more data than the memory cards.
Smart cards can also process data, allowing it to serve as an electronic
purse or ID.
Biometric Card:
The first generation of biometric ELS was seen in 2004 Saflok was one of
the first companies to introduce the biometric locks. The guest registers
his/her fingerprint or iris scan or other biometric metric (i.e. hand scan,
palm scan) at the time of check-in.
Radio-Frequency Identification (RFID) :
It is an automatic identification method, relying on storing and remotely
retrieving data using devices called RFID tags or transponders. There are
two main components of a RFID ELS:
RFID Lock: This is the key lock that looks for a RFID tag to grant
access
RFID tags (keys): These are the identification codes for key locks.
They can be in the shape of a plastic keycard, or can be stored in
different devices, such as a wristband
Magnetic Strip Card:
The key card is used by presenting it to a card reader; swiping or
inserting of magnetic stripe cards, merely being brought into close
proximity to a sensor Key-cards have the capability of being randomly
coded at the point of registration, which re emphasizes the guest
perception of room security.
Key-card control is computer-based and therefore creates the necessary
audit trail automatically.
Magnetic Strip Card Biometric Lock
Radio-Frequency
Identification (RFID)
Smart Card
Security
Above keys will not open the lock when the Guest has Double Locked it
from inside. From a security point of view, master keying is undesirable;
but from a practical point of view it is necessary.
Master keying presents two security drawbacks:
First is the danger that if a master key is lost or stolen, several locks
in the system would be compromised, thus providing access to all
those locks
Second is the loss of master key
ADVANTAGES
1. It ensures complete security as no room number is printed on card.
2. At the time of issue more than one keycard can be given to the guest
if there is a double occupancy in the room
3. It is possible to trace the receptionist who issues the keys from the
print out at the end of the day (to avoid unnecessary or extra
duplication which may call for security problems).
4. An alarm is set on when a wrong key card is used thereby alerting
security.
5. It helps the guest to avail other credit facilities form the various
outlets of the hotel
6. It also helps in conserving electricity in the guest room
Electronic Locking Systems (ELS)
These are new and improved way of being able to access a room
without having to use a bulky keys. These kind of locks are opened with
a keycard which resembles a credit/debit card. About 85 percent of
lodging establishments in the world have electronic locking systems
installed.
Types:
Hardwired ELS
Micro-processor based
a) One-way communication ELS
b) Two-way communication ELS
Hard-wired ELS :
Hard-wired system is an example to a first generation ELS. They operate
through a centralized master code console interfaced to every single key
lock
Very Expensive to wire each door
Great security
Micro-processor based ELS:
a) One-way communication: This system uses a microcomputer
(keycard console) with an electronic key encoder, a device used to
encode new lock combinations on guest keycards at check-in.
Disadvantages of one-way ELS:
i. One key can not be used in multiple locks
ii. If the guest decided to change rooms, he/she has to go to front
desk to recode the key
iii. If a wrong key is inserted into a lock, it does not alert security staff.
b) Two-way communication ELS:
•Two-way communication keys are more expensive to install; however,
they offer several security and convenience features
•In the two-way communication locks, a central database
communicates to locks wirelessly
•One key can be used in multiple places (i.e. pool, health club,
concierge floor)
Advantages of ELS over Mechanical Keys
1. Unique keys
2. Light plastic, magnetic stripe keys
3. Security
4. Replaceable
5. The cost of a new key is low
6. Recyclable
7. The cost of rekeying is non existent
8. Access control
9. Audit-trail capability
10. Privacy Feature
Electronic key-card & ELC;elc

More Related Content

What's hot (20)

Smart card
Smart cardSmart card
Smart card
 
Smart Cards Evolution
Smart Cards EvolutionSmart Cards Evolution
Smart Cards Evolution
 
Smart card
Smart cardSmart card
Smart card
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card
Smart cardSmart card
Smart card
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
smart card
smart cardsmart card
smart card
 
Smartcard
SmartcardSmartcard
Smartcard
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 
Smart card
Smart cardSmart card
Smart card
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Contact less Smart Card
Contact less Smart CardContact less Smart Card
Contact less Smart Card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 

Similar to Electronic key-card & ELC;elc

Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation ppriteshs
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3grantlerc
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfssuser5b47c8
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Keysolvecore
 
Smart card Technology
Smart card TechnologySmart card Technology
Smart card TechnologyDharaneeshwar
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
 
Guestroom Technologies
Guestroom TechnologiesGuestroom Technologies
Guestroom TechnologiesAnil Bilgihan
 
Iot based low cost smart locker security system
Iot based low cost smart locker security systemIot based low cost smart locker security system
Iot based low cost smart locker security systemIJARIIT
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future walletAbbas Ambawala
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfssuser5b47c8
 

Similar to Electronic key-card & ELC;elc (20)

Smart Card based Robust Security System
Smart Card based Robust Security SystemSmart Card based Robust Security System
Smart Card based Robust Security System
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Key
 
Smart card Technology
Smart card TechnologySmart card Technology
Smart card Technology
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Guestroom Technologies
Guestroom TechnologiesGuestroom Technologies
Guestroom Technologies
 
Iot based low cost smart locker security system
Iot based low cost smart locker security systemIot based low cost smart locker security system
Iot based low cost smart locker security system
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
smartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdfsmartcard-121018150432-phpapp01.pdf
smartcard-121018150432-phpapp01.pdf
 

Recently uploaded

Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxSaujanya Jung Pandey
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentationthomas851723
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectivesmintusiprd
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentationthomas851723
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607dollysharma2066
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 

Recently uploaded (20)

Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptx
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentation
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Training Methods and Training Objectives
Training Methods and Training ObjectivesTraining Methods and Training Objectives
Training Methods and Training Objectives
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentation
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 

Electronic key-card & ELC;elc

  • 1. Room Division Topic – Room Key Card & Electronic Locking System Session - 2020-21 COURSE - BHMCT+MBA (B1) Semester - 7th Submitted To - Submitted By - Mr. Vikrant N. Meshram Mohit Kataria
  • 2. KEY-CARDS Metal room keys are being replaced by electronically coded key-cards. A key card is a plastic card which stores a digital signature that is used with electronic access control locks. It is normally a flat, rectangular piece of plastic and may also serve as an ID card. Master keys can be changed in a matter of a few keystrokes and lost key- cards are easily removed from the system. One of the best security features is the ability of the computer to investigate each door lock and get a printout of everyone who accessed a particular room. This dramatically cuts down on theft from the rooms by hotel employees. The security advantage of the key-cards has made it popular and many medium and large sized hotels are adopting this key-card system.
  • 3. Types Memory Card: A memory card is equipped with a memory chip to store lock access codes and records. They can store data from 2 kilobyte (KB) (it can carry 25 different key lock codes), 8 KB (it can carry up to 125 different key lock codes), or 64 KB (it can carry up to 1350 different key lock codes). These are great for staff members or managers who have access to multiple locks.  Smart Card: A smart card, chip card, or Integrated Circuit Card (ICC), is defined as any pocket-sized card with embedded integrated circuits which can process information. Smart cards can store more data than the memory cards. Smart cards can also process data, allowing it to serve as an electronic purse or ID.
  • 4. Biometric Card: The first generation of biometric ELS was seen in 2004 Saflok was one of the first companies to introduce the biometric locks. The guest registers his/her fingerprint or iris scan or other biometric metric (i.e. hand scan, palm scan) at the time of check-in. Radio-Frequency Identification (RFID) : It is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. There are two main components of a RFID ELS: RFID Lock: This is the key lock that looks for a RFID tag to grant access RFID tags (keys): These are the identification codes for key locks. They can be in the shape of a plastic keycard, or can be stored in different devices, such as a wristband
  • 5. Magnetic Strip Card: The key card is used by presenting it to a card reader; swiping or inserting of magnetic stripe cards, merely being brought into close proximity to a sensor Key-cards have the capability of being randomly coded at the point of registration, which re emphasizes the guest perception of room security. Key-card control is computer-based and therefore creates the necessary audit trail automatically.
  • 6. Magnetic Strip Card Biometric Lock
  • 8. Security Above keys will not open the lock when the Guest has Double Locked it from inside. From a security point of view, master keying is undesirable; but from a practical point of view it is necessary. Master keying presents two security drawbacks: First is the danger that if a master key is lost or stolen, several locks in the system would be compromised, thus providing access to all those locks Second is the loss of master key
  • 9. ADVANTAGES 1. It ensures complete security as no room number is printed on card. 2. At the time of issue more than one keycard can be given to the guest if there is a double occupancy in the room 3. It is possible to trace the receptionist who issues the keys from the print out at the end of the day (to avoid unnecessary or extra duplication which may call for security problems). 4. An alarm is set on when a wrong key card is used thereby alerting security. 5. It helps the guest to avail other credit facilities form the various outlets of the hotel 6. It also helps in conserving electricity in the guest room
  • 10. Electronic Locking Systems (ELS) These are new and improved way of being able to access a room without having to use a bulky keys. These kind of locks are opened with a keycard which resembles a credit/debit card. About 85 percent of lodging establishments in the world have electronic locking systems installed. Types: Hardwired ELS Micro-processor based a) One-way communication ELS b) Two-way communication ELS
  • 11. Hard-wired ELS : Hard-wired system is an example to a first generation ELS. They operate through a centralized master code console interfaced to every single key lock Very Expensive to wire each door Great security Micro-processor based ELS: a) One-way communication: This system uses a microcomputer (keycard console) with an electronic key encoder, a device used to encode new lock combinations on guest keycards at check-in. Disadvantages of one-way ELS: i. One key can not be used in multiple locks ii. If the guest decided to change rooms, he/she has to go to front desk to recode the key iii. If a wrong key is inserted into a lock, it does not alert security staff.
  • 12. b) Two-way communication ELS: •Two-way communication keys are more expensive to install; however, they offer several security and convenience features •In the two-way communication locks, a central database communicates to locks wirelessly •One key can be used in multiple places (i.e. pool, health club, concierge floor)
  • 13. Advantages of ELS over Mechanical Keys 1. Unique keys 2. Light plastic, magnetic stripe keys 3. Security 4. Replaceable 5. The cost of a new key is low 6. Recyclable 7. The cost of rekeying is non existent 8. Access control 9. Audit-trail capability 10. Privacy Feature