CyberLock high security

Cyberlock High Security

Cyberlock is a stand alone electronic locking system that does not require hard-wiring. A no wiring access control system allows locks to be located in any location such as office doors, gates, glass plate doors and even padlocks. There is no expense of running cables and no power outlets required for any Cyberlock lock.

CyberLock_Cylinders

The advantage of Cyberlock does not stop with a truly wireless access control system.

Until nowcyberlock communications, if you installed different types of locking systems you had no choice except to operate and manage them independently. Sitting side-by-side, the result is more expense, more operational work for facility and asset managers, and more opportunities for security breaches.

Cyberlock Access Control

EKA access control solves this through a system that can deliver single, unified access control. Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks electronic strikes, and even bio-metric devices.

 

Thcyber keye EKA CyberKey is an electronic, programmable
smart key that cannot be duplicated. Via a
communicator, each key can be programmed with
the permissions for every system lock a key holder
is allowed to access: what locks the key can open,
as well as the days and times each lock can be opened. In this way, each user only needs one key to access any lock in a system, whether it’s a major entry door, or an obscure and remote cabinet padlock. Because it’s electronic, permissions can be revoked.

cyberlock 590 cylinderAdministrators can set key expirations to occur regularly (daily, weekly or more often) and can also do this on an ad-hoc basis when keys are lost. Each EKA key contains four levels of intelligence: encrypted access codes to ensure the key is from the same installation; the unique ID number of the key; access privileges for the user of the key; and storage of up to the last 3,900 events, both entries and denied entries.

The unique exchange of encrypted access codes between the lock and key gives a high degree of key integrity. The encrypted codes ensure keys from other systems cannot work in your system.

 

The CyberKey

  • Standard, rechargeable and Bluetooth versions available
  • Permanent memory holds access events, even if battery fails
  • Made from impact-resistant nylon for high durability
  • Cannot be duplicated
  • Can be set to expire
  • Water-resistant, coated electronics
  • Sacrificial brass tip prevents wearing of lock
  • Brass tip easily replaced in the field
  • Will not function once expired
  • Can be programmed for one lock, or many locks

 

CYBERLOCKS

cyberlock padlockCyberLocks are the exact dimensions of the mechanical cylinders they replace. They retrofit into the lock hardware with the ease of a mechanical cylinder, and do not change how the lock operates.

More than 300 existing CyberLock designs enable it to be installed in an enormous variety of interior and exterior doors, padlocks, containers and cabinets. There’s no wiring and no battery. All power is provided by the CyberKey: when a key comes in contact with the cylinder, it powers up the lock’s circuitry so key and lock communicate. If the key is not on the lost key list and the permissions are correct, the lock will open.

cyberlock PD cylinderThe circuitry stores four types of information: encrypted codes that ensure only keys within the system work with the lock; the unique ID number of the CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminate access by any key that is missing or lost.

cyberlock rim cyliderCyberLocks offer superior physical security. They have no conventional keyway that is vulnerable to being picked plus a tamper plug prevents the lock from opening if the front of the cylinder is struck.

Moreover, if torque is applied to cylinder, the front part separates from the back half. The back half of the cylinder expands, causing a brake effect that engages the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in the locked position.

 

Communications

Cyberlock CyberPointsCommunicators underpin the flexibility of EKA Access Control Solution.

A network of communicators (each communicator can be given an IP address) allows users to validate their CyberKeys without returning to where the EKA software is hosted, instantly downloading audit trail data and receiving updated access permissions. Communicators are also designed to recharge rechargeable CyberKeys.

Communicators are so versatile that they can be mounted almost anywhere, maximising ability to control access to even the remotest assets.Single-key vault cabinet. Remote locations such as maintenance sheds often have many people areas requiring access. By allocating a PIN access code or swipe card to each user, one key is shared among many users, yet every user’s access history can be individually audited.

Cyberlock 20-key vault cabinet.

Ideal for large offices, this intelligent key cabinet stores keys in an inactive state. A swipe or PIN code is required to activate a key, and when staff return keys they are deactivated until they are next retrieved.cyberkey vault

Authoriser keypad.

An authoriser keypad is a durable, weather-proof unit that is fitted to the exterior of a building or facility. Users present their key to the authoriser and enter a PIN code to obtain permission privileges.

Mini keyport.

This smaller version of the authoriser can be employed when the additional security of keypad and PIN codes are not required.

USB station.

In a smaller office, when your EKA software might only sit on a desktop, a simple USB station port is a cost-effective way to authorise keys.

Web station.

Web stations multi-point access and updating via cat-5 are ideal for larger, network server systems.

IR encoder.

This compact USB dongle connects to any CyberKeys via infra-red connection. It’s ideal for remote and mobile workers.

Cyberlock Australian-Government

Leave a Reply