When it comes to maintaining security with keys, the three most important rules are Control, Control and Control. Control the keyway and locks Control key distribution Control where and when the keys will work Controlling the keyway is perhaps the most obvious solution. Without a...
To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login
Register in seconds by connecting with your preferred Social Network.
Complete the registration form.
The current conventional masterkeying software packages still support management of the mechanical portion of the system, but none have adopted the electronic potion as of this response. The electronic management is handled through the M3 Logic management software – either online or locally installed.
Can you describe what happens in the cylinder when a key is inserted?
The cylinder will only operate when a key is inserted that has been cut to the proper combination required for that cylinder, AND when it has been given electronic access. The cylinder employs five mechanical pin stacks that must be satisfied by the proper key cut. Simultaneously, the key must have electronic permission to open the cylinder, which causes an electronic blocking mechanism to “unlock” the cylinder. If the key was cut to the proper combination but the key was programmed to NOT open the cylinder, it would not open (and an audit event would be left on both the key and the cylinder of the attempt).
What impact will NFC and similar Bluetooth products have on your position in the security marketplace?
We currently have Bluetooth programming devices that allow keyholders to update their key access rights through a mobile phone or Bluetooth-enabled PC from virtually anywhere in the world – which is especially useful for applications where access is needed without advance knowledge. In such cases, the keyholder can simply call an administrator to have the changes made, then insert their key into a mobile programmer and receive the updates. One of the major advantages to this is that any user key can be updated this way.