Cyber Locks

Overview About Cyber Locks

CyberLock is an access control system that increases key control and accountability throughout your organization. Based on a unique design of electronic lock cylinders and intelligent keys, CyberLock solves security problems that no other system can.

Electronic padlock being opened at gate.CyberLock cylinders replace standard mechanical lock cylinders. Cylinders install without wiring, easily converting your existing lock hardware into an access control system.

This concept of electronic cylinders means there are CyberLock solutions for much more than just doorways. For customers large and small, CyberLocks secure cabinets, cash boxes, trucks, gates, narcotic boxes, safes, vending machines, cell tower sites, traffic control boxes, server cabinets and, yes, doors around the world.

CyberKeys are programmed by the software with the access permissions for each user. Keys work only during specific hours, and only for the locks each person is allowed access to. Because these intelligent keys restrict access and cannot be duplicated, the need to re-key a facility is eliminated.

Key with lever lock Each time a key is used, a record of that event is stored in the key and the cylinder, for later transfer to the management software. For convenience, this information transfer can be done securely in a variety of ways, either at the computer where the software is being accessed or from remote locations. The data gathered is a valuable tool to better understand workplace efficiencies and areas of possible risk.

And, there’s management software to meet the needs of every user: small-to medium-sized businesses to large campus settings and international corporations.

To learn more about the locks, keys, communicators, and software that make a system work, click the navigation tabs above.

Cyber Locks Types

6-pin schlage CyberLock cylinders come in many shapes and sizes. That�s because each one is made to the same mechanical specifications as the cylinder it is replacing. Installation is as easy as removing the mechanical cylinder and replacing it with the CyberLock version, all without wiring.

CyberLock cylinder facts:

  • Inside, CyberLocks are all electronic: they have a circuit board rather than a keyway and pins like a mechanical cylinder.
  • The electronics are sealed, for installation indoors or out.
  • Each cylinder has a unique ID assigned at the time it is manufactured which cannot be changed or duplicated.
  • Cylinders contain encrypted access codes to identify the system they belong to.
  • CyberLock memory stores the most recent 1100 access events.
  • Cylinders may contain a list of lost keys to prevent lost keys from gaining access.
  • CyberLock cylinders have no battery and are powered by the battery in the key.

The comprehensive line of cylinder designs provides solutions for standard locks and specialized applications. A number of CyberLock cylinders incorporate additional drill-resistant features for applications such as cash handling and high-security doorways.

Cyber Keys Types

Cyberkey, IR7 CyberLock is a "key-centric system" because the key is doing most of the work. It�s the CyberKey that is programmed with the permissions of what users may do: what locks they may open and the days and times they may open them.

CyberKey Facts:

  • Each CyberKey has a unique ID assigned at the time of manufacturing that cannot be changed or duplicated. This ID is what identifies the key in the management software. So although two keys can be programmed alike, they each leave their own unique footprint in the system.
  • CyberKey - RBTCyberKeys contain encrypted access codes to identify the system they belong to.
  • CyberKey memory records up to 3900 events, both authorized openings and denied attempts. 
  • CyberKey batteries provide the power to the system: choose CyberKeys with either an easy-to-replace 3-volt lithium battery or an extended-life rechargeable lithium ion polymer battery.

CyberKey - RXDWhat happens when a key touches a lock? When a key touches a lock, they communicate in a fraction of a second to determine if that key should open that lock: they exchange IDs, compare access codes, check to see if the lock ID is on the key�s list of authorized locks, confirm the key is there at the right time, and ensure the key is not on the lock�s list of lost keys. If everything checks out, the lock can be opened.

How are lost keys managed? There are two ways to manage lost keys: proactively and reactively. When keys are first programmed for use, they can be set with an expiration date. Expirations are flexible and can be set according to the security required: hourly, daily, weekly, and monthly are common examples. When a key is lost, it may not be necessary to do anything if it expires at the end of the day. However, if the expiration is too far in the future to ensure your security, loading the lost key ID into the lock memory keeps the key from working.

Cyber Locks Communication

Communication devices are the interface between the CyberLock hardware and the CyberAudit Software. With a communication device, you download your keys into the software, and update your keys with new schedules and permissions.

CyberLock has many options for communicators, depending on the level of software used:

IR EncoderIR Encoder

The IR Encoder is a small and portable infrared device that connects to
a USB port. Simply line up the key infrared port and IR Encoder infrared port to begin the communication process.

USB StationUSB Station

The USB Station is a desktop device that connects by cable to the computer's USB port. This communication device recharges the battery
of the rechargeable CyberKey.


The WebStation is also a desktop device that can be used at a computer, or anywhere inside the facility where there is a network connection. The WebStation also recharges the battery of the rechargeable CyberKey.

hubAuthorizer System

The Authorizer system is designed for remote key programming and downloading. The Authorizer system provides convenience for key users because it updates keys without direct access to a computer.

The Authorizer system is comprised of two parts, the keyport
and the hub. mini keyport keyportThe keyport is a wall-mounted device that connects
back to the management software through the hub over the
internet or on a local network. There can be two keyports connected to a single hub. There are two kinds of a keyports, a keyport with a number pad (Authorizer Keyport), and a keyport without a number pad (Authorizer Mini Keyport). The keypad allows for the use of PINs or Mission numbers (see the Software section for more information). Keyports may be installed at an area where there is not a desktop computer,
such as outside an office door, in a hallway, or by the main door of your facility.

Sk vualtCyberKey Vault, Single Key Cabinet

The CyberKey Vault is a small cabinet that holds a single unprogrammed CyberKey securely. The single key cabinet requires
an authorized RFID card before it will program and release the key.
The Vault itself is connected to the internal network and reports back to the management software key and cabinet activity.The single key cabinet also recharges the battery of rechargeable CyberKeys.

Vault 20CyberKey Vault 20, Multiple Key Cabinet

The CyberKey Vault 20 is a key cabinet that can hold up
to twenty extra-durable rechargeable CyberKeys (CK-RXD). The keys are stored in the cabinet, unprogrammed, until a PIN or RFID card is presented. When the key is returned to the cabinet, the cabinet reports back to the software all CyberKey activity. The cabinet also reports to the software when the door was opened and closed. The multiple key cabinet recharges the battery of the CK-RXD CyberKey.

Cyber Locks Softwares

There are three levels of software. When choosing a software package, consider the following:

CyberAudit-Web Lite

Lite is an easy-to-use program for smaller CyberLock installations. With Lite, you can set key expirations and assign access to specific locks. With a simple matrix design of locks, keys, and access schedules, the security of your facility is easily managed.

Lite installs on a local PC or Mac, and is intended for systems of up to 50 locks and 50 keys. In addition to software, a complete Lite system includes CyberLocks, CyberKeys, a Grand Master Key, and either an IR Encoder or USB Station for communication between the keys and the computer.

CyberAudit-Web Professional

Professional is an excellent choice for small-to medium-sized companies that need key control, reporting, and additional options on how to communicate with the software. Professional offers you all the features of Lite, plus email notifications, assigning a lost key, and grouping together locks, people, or access permissions. Professional also works with a wider range of communication devices, such as WebStations and Authorizers.

Professional is designed to be used with up to 500 locks and 500 keys. Professional installs on your PC, Mac, or server and accommodates about 5 concurrent users.In addition to the Professional software, a complete system includes CyberLocks, CyberKeys, one or more communicators, and a Grand Master.

CyberAudit-Web Enterprise

Enterprise is a feature-rich system that is ideal for large or geographically widespread installations. Enterprise is packaged on a server and offers all the features of Professional as well as advanced options like shared locks, programming any key with temporary access for a specific user, and the ability to operate one cohesive system across multiple time zones.

Enterprise accommodates thousands of locks and keys and can be expanded as needed. Through using a hierarchy of administrators, different locations may view and control only their facility. Enterprise also works with more advanced CyberLock hardware, such as CyberKey Blue, which uses Bluetooth technology in conjunction with PDA cell phones, and the CyberKey Vault 20 key cabinet.