High Security Cylinders and Keys Go Electronic

The evolution of mechanical locks into electromechanical locks has been occurring for more than a quarter of a century. The electromechanical lock offers many benefits that are not possible when controlling access with a mechanical lock. Many of these...


To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login

Register in seconds by connecting with your preferred Social Network.

OR

Complete the registration form.

Required
Required
Required
Required
Required
Required
Required
Required
Optional
Required
Required

CyberLock electronic cylinders install without batteries or wiring. The power required to operate a lock is provided by the CyberKey’s battery. The contact portion of the CyberLock key appears similar to a modified tubular lock key. The tip of the key fits into the face of the mechatronic cylinder.

There are no mechanical tumblers in the lock cylinder or mechanical bittings in the CyberKey, making the cylinders pick and forced rotation resistant. Each CyberLock key has it own specific identity that provides a unique record when operating a mechatronic cylinder. CyberKeys can be programmed with access privileges during specific days and times. According to Videx, a CyberKey holds a list of up to 3300 lock cylinders it may operate as well as the schedule of the days and times. A master CyberKey can be programmed to operate as many lock cylinders as is part of access control system.

The Videx CyberLock system is based on encrypted, proprietary technology. When a CyberKey inserted into a CyberLock cylinder, the battery in the key powers the circuitry in the lock cylinder. The key and lock cylinder exchange identification (ID). The CyberKey checks that the lock ID is in its list of lock that can be operated. At the same time, the key checks that it is the proper day and time. And the final part of the handshake is when the CyberKey and CyberLock cylinder compare access codes to verify they are programmed to the same system.

If everything is satisfactory, the key gains permission to operate the electronic lock cylinder, which in turn operates the lock mechanism.

The key records up to 3900 of the most recent access attempts and events containing the lock identification, date and time. The lock records up to 1100 of the most recent access attempts and events containing the key identification, date and time.

The keys and electronic cylinders are programmed using Videx CyberLock software. There are three levels of the CyberLock software. Two of the levels, Lite and Professional, accommodate most locksmith applications. The CyberAudit-Web Lite software installs on a local PC or Mac and is intended for managing small, entry level installations of up to 50 locks and 50 keys. Lite provides the basics of access control: setting schedules for access, retrieving the audit trails from locks and keys, setting expiration dates on keys, and setting holidays. Management of locks, keys, and schedules is done using a matrix view; the schedule that a key will use to open a lock is added where the key and lock intersect on the matrix.

CyberAudit-Web Professional software installs on a PC, Mac, or server for managing approximately 500 locks and 500 keys. Professional builds on the Lite’s functionality and adds setting multiple-key mode and delay opening on locks for high-security applications, grouping locks and people, blocking and disabling lost keys, creating report templates, and receiving email notification of flagged events, key battery status, and key expirations.

A standard CyberLock system includes cylinders, keys, a Grand Master key, communicator(s), and the software. The Grand Master key is used for programming additional locks and keys and downloading audit events from locks.

The communicators are the interface between the CyberLock hardware and the management software. CyberKeys upload and download information using a communicator that includes updated program information and renewed expirations, and audit trail data. The Videx IR Encoder and USB Station Basic communicators are used at a computer or workstation. Remote Authorizers, Web Stations, and key vaults may be installed at remote facilities. They communicate with the system software over the internal network or the Internet.

The Videx CyberLock Product Warranty provides repair or replacement of Videx hardware at no cost during the first year. After the first year, Videx has a graduated service fee that includes a renewable warranty. For more information, contact Videx, Telephone 541-738-5500. Web Site: www.videx.com.

To read additional Locksmith Ledger articles on Videx products, visit http://tinyurl.com/videx0112.

We Recommend