Home Smart 100 2011 Real Angel (SMART 100)

Real Angel (SMART 100)


Show your support for this innovation. Tweet it. Like it on Facebook. Leave a comment.

The following SMART 100 profile and the information it contains is a duplication of content submitted by the applicant during the entry process. As a function of entry, applicants were required to declare that all details are factually correct, do not infringe on another’s intellectual property and are not unlawful, threatening, defamatory, invasive of privacy, obscene, or otherwise objectionable. Some profiles have been edited for reasons of space and clarity. More about the SMART 100.

Real Angel

This innovation initially came to life when…

This innovation came to life after seeing how poorly managed were many hundreds of keys held in businesses such as real estate, especially building managers’ large premises as they used low-security-level paper records to keep track of these valuable keys.

I have wanted to introduce this some years back, however my research needed to establish the best way to collect data from keys and their tags. I have a patent on ‘T’ capture used in our “Guardian Angel’ cabinets, so we have developed a new and easier way to read key tags with bar codes and the ‘T’ slot.


The purpose of this innovation is to…

Real Angel is designed to stop keys from becoming the bain of staff when being issued or secured or trying to find who has them. Current paper audit trails give little control over keys, yet it is the most common way to manage them.

It does this by…

This innovation uses our patented T slot paneland bar codes on key tags, ‘T’ slot and panels. By using bar code reading technology and management software we can control the keys.

Each key panel of 100 T slots is able to have another panel fitted onto it, so it grows up to 5x panels (500 T slots form a nest).


This innovation improves on what came before because…

It takes away the failings of a manual key register, the overcrowded key cabinets currently on offer, and delivers a true and accurate ‘what happened’ trail when it comes to who has had the keys or when the keys were issued.

Its various benefits to the customer/end-user include…

Users can control audit their key management system and get reports on all keys in their system, such as who has a particular set, when they were issued and if they are returned late. All via hand-held bar code reader.


In the past, this problem was solved by…

The historical problem was that keys were poorly secured and key registration was by paper report form. Some have built a private Excel spreadsheet to record keys and the status of who has them or if they are being held.

Its predecessors/competitors include…

Many key cabinets have become overloaded and impossible to control or close. There are a number of ‘high security’ cabinets which control who takes a key. The key point cost is prohibitive to mass key management.


It is made for…

Ask any company that has to manage many hundreds of keys and they will respond with a rolling of eyes and a tirade of hatred for the time lost, useless information to find who’s got the keys. Real estate, schools, large institutions, universities, housing rental management. Vehicles in storage are just some of the target users.

As many premises use restricted keys, the loss of a single ‘master key’ can cost some hundreds of thousands of dollars to rekey.


It is available for sale through…

We are able to market direct to clients or through specialist distributors such as locksmiths, security consultants, architects working on major projects, property developers, automotive dealers, government departments, and anyone managing a large property portfolio.

Our marketing strategy is to…

We are presenting at a number of trade shows, Security in Government, ASIAL, Locksmiths Trade show, industry magazines and field demonstrations and trial periods.



Voting for the Readers’ Choice Index has concluded, but you can still show your support!

  1. Tweet it: Top left of each page
  2. Trigger a Reaction: Facebook ‘Like’, etc.
  3. Leave a Comment: Anonymous comments excluded*