The CyberKey is an electronic, programmable smart key that cannot be duplicated.
Each CyberKey can be programmed with the permissions for every CyberLock: which CyberLocks a users CyberKey can open, as well as the days and times each CyberLock can be opened.
In this way, each user only needs one CyberKey to access any CyberLock in a system, whether it’s a major entry door, or an obscure and remote cabinet or padlock.
Since the CyberKey is electronic, permissions can be revoked. Administrators can set CyberKey expirations to occur regularly (daily, weekly or more often) and can also do this on an ad-hoc basis if CyberKeys are lost.
Each CyberKey contains four levels of intelligence: encrypted access codes to ensure the key is from the same installation; the unique ID number of the CyberKey; access privileges for the user of the CyberKey; and storage of up to the last 12,000 events, both entries and denied entries.
The unique exchange of encrypted access codes between the CyberLock and CyberKey gives the highest degree of key integrity. The encrypted codes ensure CyberKeys from other systems cannot work in your system.
PERMISSION & SCHEDULES
Each CyberKey contains a specific list of authorised CyberLocks and a schedule of when they may be accessed.
For example, a CyberKey can be programmed to allow access to one or several CyberLocks from 8 a.m. to 6 p.m. on weekdays and 10 a.m. to 4 p.m. on Saturdays. CyberKeys presented outside of this schedule are denied access.
All user CyberKeys can be programmed to block other user CyberKeys in the event of a CyberKey being lost or stolen.
CyberKeys can be assigned a start date and an expiration date. This means CyberKeys can be issued before they become active, and can be set to expire at a specific time in the future.
Administrators must authorise CyberKeys before access will be granted again.
Setting short-term expiration dates is an excellent way to minimise risk due to lost or stolen CyberKeys.
Smart Key Features
Lock Download Capacity
With lock list of 500 locks and audit trail of 1000 events
Lock Programming Jobs
3900 to 12,000 audit trails depending on CyberKey model
Lock Access Schedules
Requires lock list filtering SEM