TOTAL SECURITY SOLUTION

SOLUTION

SECURITY APPLICATION SOLUTION

The composition

OUT LINE

The KEY WATCHER system uses key rings with built-in “Smart IC Chip” rather than just storing keys, and can only use designated keys with authorized cards and passwords, and can be monitored and controlled on key use and return times, user-connected operating PCs.

Patrol management system

The composition

External intrusion detection system

The composition

OUT LINE

The outer intrusion detection system is a device that installs a cable on an outer fence to receive information sensed on the cable through a controller and outputs it through an operation program. The system is configured to simultaneously detect tension and vibration in order to minimize the false alarm rate.

Applied location

01

Outer security of important national facilities.

02

External security of corporate research institutes.

03

Detection of intrusion into a large factory.

System introduction

01

Alarm to the operator by receiving relevant information from the operating software controller.

02

A relay device that connects controller data cables and multi-cables, receives information sensed by multi-cables, and outputs signals to operating PCs and other devices.

03

It is a system that simultaneously adopts the advantages of an electronic Taut Wire with a very low multi-sensor cable malfunction rate and a precise vibration system with excellent sensing, and exhibits excellent intrusion detection capability.

Hotel room management system

The composition

OUT LINE

This system promotes security and convenience for hotel guests when using various room amenities, and allows hotel managers to manage hotel rooms and facilities more efficiently and conveniently.
Cards will be issued and managed to guests and employees through central devices, and the system will be established to check and settle usage details when using convenience facilities such as restaurants, bars, and saunas as well as access to rooms using issued cards. In addition, each device is designed to suit the dignity of a luxury hotel, which can have a great effect on enhancing the image of the hotel as well as systematic convenience.

System introduction

01

Hotel Management S/W: Automation of quick and accurate room card issuance and settlement

02

Card encoder: Information injection and issuance of smart and magnetic cards

03

Portable programmer: Employees can check and download information about the room.

04

Smart card lock: It is a lock for the room, and the issued card is inserted and opened.

05

Energy Saving Device: A device that controls power such as lighting, power, air conditioner, heater, etc. for a corresponding room.

Apartment unmanned security system

The composition

OUT LINE

This system is a digital bus-type unmanned security system that can contribute to reducing security personnel, complete access control, crime prevention, and prevention of disaster prevention through cutting-edge digital exchange and video technology and various systems.

01

The BUS method makes it easy to construct and easily install in existing buildings.

02

Safety has been further enhanced by strengthening safety and access control functions.

03

In the event of an abnormality within the generation, various call functions are concentrated in the security office (management office), so you can live with confidence.

04

You can feel a remarkable reduction in management labor costs.

05

Asset value is guaranteed compared to nearby apartments.

개인정보 수집 및 이용 동의서

 

개인정보 보호법 제15조에 따라 개인정보를 수집·이용함에 있어 정보 주체의 동의를 받고자 합니다. 아래의 내용을 충분히 읽어보신 후 동의 여부를 결정해 주시기 바랍니다.

 

1. 개인정보 수집 항목

회사는 다음과 같은 개인정보를 수집합니다.

•이름

•업체명

•연락처 (전화번호 또는 휴대전화번호)

•이메일 주소

•문의 내용

 

2. 개인정보 수집 및 이용 목적

수집된 개인정보는 다음의 목적을 위해 이용됩니다.

•문의 내용 확인 및 상담 진행

•서비스 제공 및 관련 안내

•고객 요청 사항 처리 및 응답

•서비스 품질 향상을 위한 내부 데이터 분석

 

3. 개인정보 보유 및 이용 기간

수집된 개인정보는 수집·이용 목적 달성 시까지 보관하며, 목적 달성 후에는 지체 없이 파기합니다. 단, 관련 법령에 따라 보관이 요구되는 경우 해당 기간 동안 보관합니다.

 

4. 동의 거부 권리 및 불이익 안내

정보 주체는 개인정보 수집 및 이용 동의를 거부할 권리가 있습니다. 다만, 동의를 거부할 경우 서비스 제공 및 상담 진행이 제한될 수 있습니다.

 

5. 개인정보 제3자 제공 및 위탁

회사는 정보 주체의 동의 없이 수집된 개인정보를 제3자에게 제공하거나 외부에 위탁하지 않습니다.

 

6. 개인정보 처리 방침

기타 개인정보 처리에 대한 상세한 내용은 회사의 [개인정보 처리방침](링크 또는 안내문)을 참조해 주시기 바랍니다.