Using CyberLocks® to Save Time and Money

CyberLock® electronic lock cylinders easily replace the lock cylinders found in mechanical locks. Once replaced, the lock is only accessible by a CyberKey. Both CyberLocks® and CyberKeys® record who, what, when, and where with every contact.

Homeland Security has captured the attention of large corporations and companies whose assets and employees are exposed to terrorist threats. Funding is available for companies that focus on bolstering security. The government contributes significant funding for those companies willing to...

To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login

Register in seconds by connecting with your preferred Social Network.


Complete the registration form.


Figure 4 shows the company electrician logging into the system by using an Authorizer. He seats the CyberKey® into the Authorizer and enters a personal identification number; in this case his 5-digit badge number. In seconds his personal access is uploaded to his Cyberkey® and is limited so use will expire at the end of his shift.

His supervisor gives him an automated report of work orders that are still pending or were added before he came on shift.

The electrician's access for the day was partially tailored to these work orders as he may need to access locks that he normally doesn't have access to. After these work orders are cleared, so will be the temporary access.

Before starting his truck, the electrician places his CyberKey® into a CyberPoint® mounted on the dashboard. This action will be used later to account for travel time.

When the electrician arrives at the work site. He locates the asset he will be working on. The work order reports: “The power is down at the bus washer” so the asset will be the bus washer.

He locates the CyberPoint® on the bus washer and uses his CyberKey® to “log on” to the asset. This action will be used later to monitor the amount of time to service the asset.

As he leaves the site, he again “logs on” to the CyberPoint® on the dashboard of his truck. This action terminates the amount of time to service the bus washer.

The last 30 minutes of the shift is designated to reconciling work orders. Again an automated report is generated and the only activity that the electrician must enter is a brief narrative on each work order and a checkbox if the work order can be closed.

The company's in-house application generated the reports and was updated by the data collected by the Cyber products from the day before.

As the electrician leaves for the day, he “logs out” by repeating the same procedure as when he logged in.

The Authorizer downloaded all the transactions used by the electrician through the day and forwards that to the in-house applications. This information will partially update the report he will get the next day relating to pending work orders. This drastically reduces the amount of time the electrician would spend entering the information into the database. The electrician's time is better suited to performing his trade than keying information into a database.

At the same transit authority, 22,000 persons travel through a terminal daily. The restrooms are to be opened and closed at a certain hour and serviced hourly. To facilitate this type of control, deadbolts are retrofitted with CyberLock® cylinders and a CyberPoint®.

The custodian uses his CyberKey® to open the restroom in the morning. Each time he services the restroom, he “hits” the CyberPoint® in the restroom. At the certain hour the restroom is locked.

In Figure 6, a CyberPoint® is mounted to a towel holder for the custodian to use when cleaning the restroom. At any time the supervisor can run an in-house report that simply identifies how many times and when the restroom was looked at and when it was locked and unlocked. This is another example how passive supervision can be implemented.

Another example deals with persons from the city utility company coming in to check meters.

In the past, there were continual complaints that master keys left in control boxes (used exclusively by the utility company) were intermittently missing. It could not be determined exactly who opened the control box. Some utility persons would keep the keys to streamline their work.

The Cyber system identifies who last had access and makes them accountable for the keys.

Throughout the authority large numbers of non-controlled utility keys are issued. These are keys that do not open doors or gates to important areas but do open controller boxes, cabinets, metal enclosures, electrical switches, etc.

To eliminate the need to carry large quantities of utility keys, the authority placed strategic boxes at entries to rail platforms and buildings so that authorized persons could open the box and temporarily borrow keys.

Because Cyber systems can track the last person opening the box, the keys are always returned.



We Recommend