EKA | CyberLock

CyberKey

SMART KEY

CYBERKEY

smart
key

The CyberKey is an electronic, programmable smart key that cannot be duplicated.

Each CyberKey can be configured with access permissions for every CyberLock, specifying which locks a user’s key can open and the specific days and times each lock may be accessed.

In this way, each user only needs one CyberKey to access any CyberLock in a system, whether it’s a major entry door, or an obscure and remote cabinet or padlock.

Since the CyberKey is electronic, permissions can be revoked. Administrators can set CyberKey expirations to occur regularly (daily, weekly or more often) and can also do this on an ad-hoc basis if CyberKeys are lost.

Each CyberKey contains four levels of intelligence: encrypted access codes to ensure the key is from the same installation; the unique ID number of the CyberKey; access privileges for the user of the CyberKey; and storage of up to the last 12,000 events, both entries and denied entries.

The unique exchange of encrypted access codes between the CyberLock and CyberKey gives the highest degree of access integrity. The encrypted codes ensure CyberKeys from other systems cannot work in your system.

PERMISSION & SCHEDULES
Each CyberKey contains a list of authorised CyberLocks and a schedule of when they may be accessed.

For example, a CyberKey can be programmed to allow access to one or several CyberLocks from 8am to 6pm on weekdays and 10am to 4pm on Saturdays. CyberKeys presented outside of this schedule are denied access.

All user CyberKeys can be configured to program any Cyberlock to block other user CyberKeys in the event of a CyberKey being lost or stolen.

CYBERKEY EXPIRATIONS
CyberKeys can be assigned a start date and an expiration date. This means CyberKeys can be issued before they become active, and can be set to expire at a specific time in the future.

Administrators must authorise CyberKeys before access will be granted again.

Setting short-term expiration dates is an excellent way to minimise risk due to lost or stolen CyberKeys.

CYBERKEY RANGE
There are several CyberKeys available including our Generation 2 CyberKeys which feature the latest technology advancements and improvements and include a larger memory capacity, improved battery life and faster speeds.

Another notable addition to the CyberKey family is the ValidiKey Ring. The ValidiKey Ring is designed to allow CyberLock ValidiKey Vaults to control mechanical keys alongside CyberKeys. Several mechanical keys can be attached to a ValidiKey Ring and can be checked out the same way a CyberKey can, by presenting credentials to the vault such as an approved access number or RFID card. ValidiKey Rings are tracked just as CyberKeys are and administrators can be notified if the Ring is not returned within a specified time frame.

GENERATION 2 CYBERKEYS
We have now introduced a number of Generation 2 (Gen 2) CyberKeys and are in the process of phasing out all legacy Generation 1 CyberKeys. Gen 2 Cyberkeys feature the latest technology advancements and improvements and provide larger memory capacity, improved battery life and faster processing.

Smart Key Features

  • Standard, rechargeable, Bluetooth and Wi-Fi versions available
  • Contains a unique ID that cannot be changed or duplicated
  • Has the ability to store thousands of access records: Lock ID, Date & Time, Event Type
  • Carries access schedules for the specific key holder
  • Retains encrypted access codes that bind the key to a specific system
  • Includes a battery which energises both the CyberKey and each CyberLock it touches
  • Includes rechargeable key options or CR2 lithium battery
  • Non-volatile memory holds access events, even if the battery fails
  • Made from impact-resistant nylon for high durability
  • Water-resistant, coated electronics
  • Sacrificial brass tip prevents wearing of CyberLock cylinders
  • Brass tip easily replaced in the field
  • Can be programmed for one or many CyberLock cylinders
  • Multiple notifications (beeps, flashes or even email notifications) for low battery on CyberKeys

250

Lock Download Capacity

With lock list of 500 locks and audit trail of 1000 events

1000

Lock Programming Jobs

12000

Audit Trails

3900 to 12,000 audit trails depending on CyberKey model

12000

Lock Access Schedules

Requires lock list filtering SEM

ONE TOUCH

Programming for New Locks

List of available keys

CyberKey X2

The RoHS compliant CyberKey X2 is an electronic key used to operate CyberLock cylinders. It has memory that contains encrypted access codes, a list of accessible locks, schedules of authorised dates and times, and a begin-end date range during which the key will operate. The battery from a CyberKey energises the electronics within a CyberLock cylinder.

CyberKey USB

The CyberKey USB is an electronic key used to operate CyberLock cylinders. It has memory that contains encrypted access codes, a list of locks it may access, schedules of authorised dates and times it may access locks, and a begin-end date range during which the key will operate. The battery from a CyberKey energises the electronics within a CyberLock cylinder.

CyberKey Go

The CyberKey Go is an electronic key used to operate CyberLock cylinders. It has memory that contains encrypted access codes, a list of accessible locks, schedules of authorised dates and times, and a begin-end date range during which the key will operate. The battery from a CyberKey energizes the electronics within a CyberLock cylinder.

CyberKey Blue 3

The Bluetooth 5.0 is activated with the push of a button and allows users to update access permissions on the go using an Android or iOS app. CyberKey Blue 3 has a convenient micro-USB port for charging on the go.

ValidiKey Ring

Several mechanical keys can be attached to a ValidiKey Ring and can be checked out the same way a CyberKey can, by presenting credentials to the vault such as an approved access number or RFID card. ValidiKey Rings are tracked just as CyberKeys are and administrators are notified if the Ring is not returned within a specified time frame.