MENU

How CyberLock Works

We are a certified provider of CyberLock.

What's happening inside the key?

Each CyberKey contains:
  • A unique identification number that cannot be changed or duplicated.
  • A list of up to 3900 access events: lock ID, date and time, and type of event.
  • The access permissions for that specific key.
  • Encrypted access codes, created by the software and derived from your password.

What's happening inside the lock?

Each CyberLock contains:
  • A unique identification number that cannot be changed or duplicated.
  • A list of the most recent 1100 access events: key ID, date and time, and type of event.
  • Encrypted access codes, created by the software and derived from your password.

How do the locks and keys communicate with one another?

When a key contacts a lock, a sequence of events occur:
  • The battery in the key energizes the circuitry in the lock.
  • The lock and key exchange IDs.
  • The key checks that the lock ID is on its list of locks it may open.
  • The key checks that it is at the lock at an authorized day and time.
  • The lock and key compare access codes to verify they are from the same system.
  • The key gains permission to open the lock, and an "Authorized to open" event is stamped and stored in both lock and key.

How do the locks and keys communicate with the software?

Communication between the locks, keys, and software can be done either at the computer, or from remote locations. The options for communication available to you depend on which of the two different software management systems you decide to use, CyberAudit 2.0 or CyberAudit Web.