Programmed with access permissions for each key holder, CyberKey smart keys serve as the gate keeper for the CyberLock system. In addition, they provide the power needed to energize the CyberLocks.
• Each CyberKey is manufactured with a unique ID which cannot be changed or duplicated
• CyberKeys contain encrypted access codes to identify the system to which they belong
• Up to 3900 access events including authorized openings and denied attempts stored in memory
• Key memory stores access schedules and a list of locks it can open
• Power is supplied by the battery in the key
• The body is composed of highly durable fiberglass-reinforced casing
• Keys cannot be duplicated
• Expiration dates can be easily set and modified
• System provides flexible key scheduling
• Date and time permissions
• Holiday scheduling
• One-time use options
What happens when a key touches a lock? In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.
How are lost keys managed? There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed in order to load the lost key ID into the lock memory and prevent that key from working.
How many locks can one key access? If programmed as a standard user key, it can access up to 3300 locks. If programmed as a master key, it can access all of the locks in the database.
How do I know when a battery is running low? Low battery warnings are provided in the software (the battery level is confirmed every time a CyberKey is updated) and in the key itself (through an audio or visual indicator).
What happens if the battery dies? Depending on the CyberKey model, either replace the battery or recharge the battery. The permissions and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.
How do keys communicate with the software? There are a variety of different communication devices which download and upload information between the CyberKey and CyberAudit-Web software.
Which key is right for me? Review the list below to find the CyberKey model that best fits your need.
Replaceable Battery CyberKey (CK-IR7)
The CK-IR7 is powered by a replaceable battery and is compatible with all CyberLock cylinders. The off-the-shelf 3-volt lithium batteries can easily be changed in the field.
Rechargeable Battery CyberKey (CK-RXD)
The CK-RXD is powered by a rechargeable battery and is compatible with all CyberLock cylinders. A variety of stand-alone recharging stations and communication devices with recharging capabilities are available.
Rechargeable Battery CyberKey with USB Port (CK-RXD2)
The CK-RXD2 is powered by a rechargeable battery and is compatible with all CyberLock cylinders. The key can be recharged via the USB port from a computer, car charger, or any other compatible USB device. Additionally, a variety of stand-alone recharging stations and communication devices with recharging capabilities are available.
CyberKey Blue (CK-RBT)
The CK-RBT is powered by a rechargeable battery and is compatible with all CyberLock cylinders. The CK-RBT can be programmed and updated using all communication devices. Additionally, the CK-RBT key has built-in Bluetooth capabilities and can be updated in the field via compatible Android and Blackberry devices.
Control Key CyberKey (CK-IR7C)
The CK-IR7C is powered by a replaceable battery and is compatible only with CyberLock interchangeable core cylinders. It is used as a control key to install or remove CyberLock interchangeable cores.
Not sure which key is right for you?