Homeland Security has captured the attention of large corporations and companies whose assets and employees are exposed to terrorist threats. Funding is available for companies that focus on bolstering security. The government contributes significant funding for those companies willing to...
To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login
Register in seconds by connecting with your preferred Social Network.
Complete the registration form.
Initially, Cyber products are more expensive to retrofit into existing locks when compared to a high security keying system retrofit but over time there is a break-even point. Figure 1 shows start-up expenses and ongoing expenses relating to day-to-day rekeys combined with periodic “whole-system” upgrades.
The ongoing expense to maintain high-security keying systems is attributed to labor. Lock cylinders are continually rekeyed as access to areas change. Rekeying requires visits to the location where the lock is and time-intensive bench work involving re-combination.
Expenses relating to CyberLocks® are less labor intensive and pertain to the initial retrofit of the lock cylinder.
Figure 2 shows how many times a “whole-system” change out should occur within a high-security keying system. Unfortunately the decision to rekey is often delayed even when it needs to be done. The cost to perform a change-out becomes an issue and a decision is made to leave the system in a continuing state of low integrity.
The performance level of CyberLocks® is also displayed in Figure 2. Unaccounted keys are not an issue and CyberLocks® do not rely on patent protection to maintain integrity. Even after patents expire, the product is inherently secure.
Once installed, the Cyber system has all the advantages of both an electronic access system and high-security keying system. These facts alone may not be enough to convince management to invest in a Cyber system.
Company time clocks or kiosks that normally allow employees to “clock-in” or “clock-out” can be replaced with Cyber Authorizers (and hubs). Employees clocking in-or-out can insert their CyberKey® into the Authorizer, and then enter a personal identification number.
This action is sent to the company's in-house applications that are responsible for time management.
Not only does this facilitate the timekeeping process, bit it also allows the CyberKey® to download past activity into the Authorizer while the Authorizer uploads new access instructions into the CyberKey®.
When completed, some of the instructions loaded to the key govern how long the key can be used. Keys can be programmed to stop working after the shift, rendering the key useless. This can mean that most employees leaving work do so with no means to re-enter without authorization.
Changes made to an employee's access list are uploaded into the CyberKey® the next time the employee uses an Authorizer. This usually occurs at the beginning of a shift.
These features exceed the capabilities of keying systems and card-driven electronic access systems.
Today, large companies automate their business practices using customized software designed for their specific needs. Cyber products free up time by collecting the data that employees input via keyboard. This is especially effective when freeing up those employees who don't normally use keyboards in their job functions.
From the key holder's perception, the CyberKey clocks them in and out, tracks when and where they use company vehicles, logs them on and off work orders and energizes their keys during their shift.
While the perception is inaccurate, it does act as a powerful reminder that everything is being accounted for.
Technically, what is downloaded from the CyberKey® (from the Authorizer) is a list of transactions. Each transaction includes: a key, lock, or point serial number; the user of the key; the location of the transaction; time of the transaction and the result.
Some results of the transaction can be reported as “denied,” “out of schedule,” “lost key” and “key authorized.”
The downloaded list of transactions is appended to a transaction table. Because each asset is identified by a unique serial number, the transaction table can be used by the company's in-house applications to develop work order history and to validate preventative maintenance schedules.
Cyber systems save time and money as they work to gather data for time management applications while providing world-class security.