Digital Locks / eCylinder Tutorial

By: Brian Rhodes, Published on Feb 07, 2012

In some applications ‘traditional’ panel/controller based Electronic Access Control are difficult to justify the total cost. After the costs of hardware, cabling, installation, and training are all tallied, it is not uncommon to spend upwards of $2500 USD per controlled opening (i.e. door, gate, entry, etc...). This can quite simply prove to be too expensive to consider, no matter the need.

In other applications, installation of the prevalent form factor Access Control equipment (Controller Panels, Power Supplies, Card Readers, etc) may be difficult or impossible. In still other cases (such as records storage cabinets or controlled substance carts), there might be a need to indeed ‘control access’ only to the same degree that keys and locks already provide, but provide additional features such as scheduling controls and audit trails against the opening.

In this gray area of the market, the ‘Digital Lock’ has gained attention. ‘Digital Locks’ are also commonly identified by branding such as ‘eCylinders’, ‘Mul-T-Lock’, ‘LOGIC’, ‘CLIQ’, ‘NEXGEN XT’ or by more common nomenclature such as ‘electro-mechanical locks’, ‘chip locks’, ‘smart locks’, or ‘RFID locks’ – which in some cases might be a misnomer.

Manufacturer Landscape

In the Door Hardware market, there are relatively few conglomerates that own huge portions of the industry; corporations like Ingersoll Rand, ASSA ABLOY, and Stanley are among this group. ‘Digital Locks’, as a merchantable product in the market, seem to be driven by various ASSA ABLOY offerings (lead by the ‘high security’ brand MEDECO) at this point in time. It is unclear whether or not the other ‘big names’ in this market will choose to pursue similar products in the same form factor.

While exact feature sets may vary, in general the ‘digital lock’ is partnered with a specialized accompanying key. The lock itself remains unpowered, or is powered by the introduction of the key into the keyway from a power source built into the key. Most often, a dual authentication is required to resolve the lock – first, an encoded credential handshaking takes place between the key and the lock, and secondly, with a valid permission, the lock will permit itself to be opened in the traditional manner by rotation of the key.

These products remain substantially similar to mechanical locks, but have the additional layer of proximity or contact encoding that must be resolved first. The key must be properly logically credentialed, and also cut to match to the bitting of the lock, or the key will not resolve the lock.

The image below shows the basic 'look' of these locks:

Advantages of a 'Digital Lock' system

The most significant advantage of this method of controlling access appears to be the rather low cost of retrofitting existing openings (i.e. door, gate, entry, etc...) with only new locking hardware vs. the implementation of full-blown electronic access control hardware. The form factors of these ‘digital locks’ match the hardware already deployed – mortise cylinders, ICC systems, rim cylinders, knobs, cam locks, cabinet locks, showcase locks, and padlocks all have ‘digital lock’ retrofit units available. This means that a simple exchange of hardware is all that is required to gain the enhanced functionality. This cost is normally anywhere from $85 to $850 USD depending on the product/form factor, and does not require any modification to the opening, auxilary hardware, or utility to implement.

A log of activity against each lock and/or key is stored in nonvolatile memory onboard each component. Commonly, up to 5000 events can be stored for download to a central database when opportunity permits. This ‘audit trail’ feature not only records successful openings, but unsuccessful attempts as well.

Disadvantages of a 'Digital Lock' system

The ability to make a key valid only during a certain schedule, or to otherwise make a key invalid, is a mainstay function of EAC. This feature is also possible with ‘digital lock’ systems. However, a marked disadvantage vs. traditional EAC is that, in order to completely invalidate a key, each previously resolvable lock must be updated with new settings via physical interaction with those locks. While this may not prove to be a challenge for some deployments, needing to continuously update lock scheduling (commonly through the insertion of a ‘programming key’) just isn’t a practical constraint for many larger deployments with many doors or many locks.

Another marked disadvantage of ‘digital lock’ systems are the comparatively high costs of the key vs. traditional ‘card based’ EAC systems. Proximity cards can often be issued for less than $5 USD, while a ‘digital lock’ key can cost $80+ USD, and still need to be mechanically cut in order for use. While blank inactive cards may be commonly available in the market, the source of supplying keys is highly restricted and limited by design.

Comments : PRO Members only. Login. or Join.

Related Reports

Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Mining Company Security Manager Interview on May 10, 2019
First Quantum Minerals Limited (FQML) is a global enterprise with offices on 4 continents and operations in 7 countries with exploratory operations...
10 Facial Recognition Providers Review (Secutech) on May 09, 2019
Adding to our 19 Facial Recognition Providers Profiled report from ISC West, IPVM focused on facial recognition technology for our Day 2 coverage...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Restaurant Security Manager Interview on May 06, 2019
Wright’s Gourmet House in Tampa, Florida has been around for over 50 years. During most of that time, there were no security measures in place. Now...
Door Closers Access Control Tutorial on May 02, 2019
Door Closers have an important job: automatically shut doors when they are opened, because an open door cannot control access. In this note, we...

Most Recent Industry Reports

Verkada Video Quality Problems Tested on May 23, 2019
Verkada suffers from numerous video quality problems, not found in commercial IP cameras, new IPVM testing of Verkada vs Axis and Hikvision...
Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
US Considers Sanctions Against Hikvision and Dahua on May 22, 2019
The US government is considering blacklisting "up to 5" PRC surveillance firms, including Hikvision and Dahua, Bloomberg reported, with human...
Dahua USA Celebrates 5 Years of Errors on May 21, 2019
Dahua USA is, in their own words, 'celebrating' 5 years in North America or as trade magazine SSN declared: Dahua Technology finds success in...
Axis ~$150 Outdoor Camera Tested on May 21, 2019
Axis has released the latest in their Companion camera line, the outdoor Companion Dome Mini LE, a 1080p integrated IR model aiming to compete with...
Covert Facial Recognition Using Axis and Amazon By NYTimes on May 20, 2019
What if you took a 33MP Axis camera covering one of the busiest parks in the US and ran Amazon Facial Recognition against it? That is what the...
Amazon Ring Public Subsidy Program Aims To Dominate Residential Security on May 20, 2019
Amazon dominates market after market. Quitely, but increasingly, they are doing so in residential security, through a combination of significant...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact