Passive UHF systems
Decentralised management of textiles
Central Textile Dispensing
Automatic documentation and identification of textiles
Store keys in an organised manner and manage them transparently
The right access control for every door
Protection against running away for persons with Alzheimer in care facilities
Optimal protection against abduction and baby swapping
Utilising the textag issue and return lockers allows you to optimise and decentralise management of your scrubs and linen inventories.
Textiles can be issued and returned in less than five seconds a simple one-step interaction. The system automatically identifies both the user and the clothing that has been removed or returned, maintains complete records locallyand remotely.
texLoad is a station for manually recording textiles and loading a laundry trolley. With the incorporated tex-Check terminal, up to 10 textiles can be recorded simultaneously. Textile service employees fill a trolley/wire con- tainer with the aid of the texLoad. The textiles, as well as the laundry trolley, are equipped with UHF transponders. Once the container has been filled, the employee quits the recording process and all the laundry items are then linked to the trolley by a special transponder. The user can see the status of the filling process at all times by looking at the clearly visible signal lights.
trolleyScan is the perfect companion to texLoad. A trolleyScan can be installed in the texRoom’s entrance area below the ceiling. The UHF reader identifies the special transponder on the trolley / wire container and prompts the garments, which are in the trolley/wire container, to be added to the texRoom stock. An LED strip shows the loader that the recording process has been successfully completed.
The tamper-proof revolving door for entering and leaving the texRoom identifies every user by means of their RFID access control credential whilst recording all the textiles removed when the user leaves via the revolving door, in just 5 seconds, automatically posting these events to the employees account. The revolvingdoor has an emergency off switch, which releases the brakes and allows users to leave the texRoom at any time. The same applies in the event of a power cut. Every revolving door has three operating modes: It can be used as an entrance, exit or dually in one direction.
If necessary, its operating mode can also be switched during operation. This universal design allows the system to be used flexibly for changing tasks.
The texGate is an access tunnel to the texRoom, in which all textiles labelled with a transponder are automatically identified and added to the stock. The texGate is activated by a motion sensor or an access control reader, when a person approaches the tunnel with a laundry container. A green LED strip indicates that the tunnel is active and can be entered. This ensures that all textiles are recorded.
It is compatible with all standard wire container models, comes without doors and other components requiring servicing and is, therefore, maintenance-free. An air-permeable roof guarantees consistently good air quality inside the texGate.
In traditional access control system each door is planned individually, because the requirements vary depending on the door‘s location and function in the building.
Our product line expands the options of access control with online readers, long range readers for hands free access, digital locking components in different formats and electronic key cabintes. With these alternative solutions access control can be cost-effectively expanded to all doors in a building.
Although modern healthcare facilities manage entries through Physical Access Control Systems, there are often hundreds of keys for maintenance areas, lockers, vaults, and even master keys that can bypass electronic systems. Unmanaged keys invite theft, loss, unauthorised entry, administrative difficulty, and undocumented access. Your healthcare facility contains restricted medication, patient records, service areas, and many valuable assets. Key management provides an added layer of security, prevents loss, enforces key access policies, and reduces administrative burden.
- Prevent unauthorised use of keys
- Restrict access based upon time, days, individuals and more
- Set up alerts for if keys are not returned on-time
- Know who has what keys at any time