Digital Locks / eCylinder Tutorial

Author: Brian Rhodes, Published on Feb 07, 2012

In some applications ‘traditional’ panel/controller based Electronic Access Control are difficult to justify the total cost. After the costs of hardware, cabling, installation, and training are all tallied, it is not uncommon to spend upwards of $2500 USD per controlled opening (i.e. door, gate, entry, etc...). This can quite simply prove to be too expensive to consider, no matter the need.

In other applications, installation of the prevalent form factor Access Control equipment (Controller Panels, Power Supplies, Card Readers, etc) may be difficult or impossible. In still other cases (such as records storage cabinets or controlled substance carts), there might be a need to indeed ‘control access’ only to the same degree that keys and locks already provide, but provide additional features such as scheduling controls and audit trails against the opening.

** **** **** **** ** *** ******, *** ‘******* ****’ has ****** *********. ‘******* *****’ *** **** ******** ********** ** branding **** ** ‘**********’, ‘***-*-****’,‘*****’, ‘****’, ‘****** **’** ** **** ****** ************ **** ** ‘*******-********** *****’, ‘**** locks’, ‘***** *****’, ** ‘**** *****’ – ***** ** **** cases ***** ** * ********.

Manufacturer *********

** *** **** ******** ******, ***** *** ********** *** ************* that *** **** ******** ** *** ********; ************ **** ********* Rand, **** *****, *** ******* *** ***** **** *****. ‘******* Locks’, ** * ************ ******* ** *** ******, **** ** be ****** ** ******* **** ***** ********* (**** ** *** ‘high ********’ ***** ******) ** **** ***** ** ****. ** is ******* ******* ** *** *** ***** ‘*** *****’ ** this ****** **** ****** ** ****** ******* ******** ** *** same **** ******.

***** ***** ******* **** *** ****, ** ******* *** ‘******* lock’ ** ********* **** * *********** ************ ***. *** **** itself ******* *********, ** ** ******* ** *** ************ ** the *** **** *** ****** **** * ***** ****** ***** into *** ***. **** *****, * **** ************** ** ******** to ******* *** **** – *****, ** ******* ********** *********** takes ***** ******* *** *** *** *** ****, *** ********, with * ***** **********, *** **** **** ****** ****** ** be ****** ** *** *********** ****** ** ******** ** *** key.

***** ******** ****** ************* ******* ** ********** *****, *** **** the ********** ***** ** ********* ** ******* ******** **** **** be ******** *****. *** *** **** ** ******** ********* ************, and **** *** ** ***** ** *** ******* ** *** lock, ** *** *** **** *** ******* *** ****.

*** ***** ***** ***** *** ***** '****' ** ***** *****:

Advantages ** * '******* ****' ******

*** **** *********** ********* ** **** ****** ** *********** ****** appears ** ** *** ****** *** **** ** ************ ******** openings (*.*. ****, ****, *****, ***...) **** **** *** ******* hardware **. *** ************** ** ****-***** ********** ****** ******* ********. The **** ******* ** ***** ‘******* *****’ ***** *** ******** already ******** – ******* *********, *** *******, *** *********, *****, cam *****, ******* *****, ******** *****, *** ******** *** **** ‘digital ****’ ******** ***** *********. **** ***** **** * ****** exchange ** ******** ** *** **** ** ******** ** **** the ******** *************. **** **** ** ******** ******** **** $** to $*** *** ********* ** *** *******/**** ******, *** **** not ******* *** ************ ** *** *******, ******** ********, ** utility ** *********.

* *** ** ******** ******* **** **** ***/** *** ** stored ** *********** ****** ******* **** *********. ********, ** ** 5000 ****** *** ** ****** *** ******** ** * ******* database **** *********** *******. **** ‘***** *****’ ******* *** **** records ********** ********, *** ************ ******** ** ****.

Disadvantages ** * '******* ****' ******

*** ******* ** **** * *** ***** **** ****** * certain ********, ** ** ********* **** * *** *******, ** a ******** ******** ** ***. **** ******* ** **** ******** with ‘******* ****’ *******. *******, * ****** ************ **. *********** EAC ** ****, ** ***** ** ********** ********** * ***, each ********** ********** **** **** ** ******* **** *** ******** via ******** *********** **** ***** *****. ***** **** *** *** prove ** ** * ********* *** **** ***********, ******* ** continuously ****** **** ********** (******** ******* *** ********* ** * ‘programming ***’) **** ***’* * ********* ********** *** **** ****** deployments **** **** ***** ** **** *****.

******* ****** ************ ** ‘******* ****’ ******* *** *** ************* high ***** ** *** *** **. *********** ‘**** *****’ *** systems. ********* ***** *** ***** ** ****** *** **** **** $5 ***, ***** * ‘******* ****’ *** *** **** $**+ USD, *** ***** **** ** ** ************ *** ** ***** for ***. ***** ***** ******** ***** *** ** ******** ********* in *** ******, *** ****** ** ********* **** ** ****** restricted *** ******* ** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Lenel President Is Out on Apr 20, 2017
Lenel's challenges continue. Now, Lenel's President is out, suddenly. This follows increasing challenges for the company who has broadly upset...
Access Control Course Spring 2017 on Apr 14, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Bosch B-Series Intrusion Tested on Apr 10, 2017
Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
Milestone / Lenel Resell Partnership on Apr 03, 2017
Lenel has never found success in video management. Nearly a decade ago Lenel OEMed an OEM of Milestone. Now, in an equally uncommon move,...
ConvergenceTP (CTP) Claims VMS Integrations Simplified on Mar 30, 2017
Developing integrations with 3rd party systems can be expensive and time consuming, especially in the physical security market with hundreds of...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...

Most Recent Industry Reports

Pelco Shutting Down Clovis Line, Laying Off 200 on May 22, 2017
Pelco's Clovis facility once turned out some of the industry's most popular products. Now, the facility is mostly building "obsolete" equipment,...
IP Camera - 15 Year Shootout on May 22, 2017
How far have IP cameras come? We bought and tested 4 cameras across the past 15 years to understand how much and where performance has...
Remote Video Monitoring Providers Directory on May 21, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...
Axis Criticizes OEMs: "When You Buy An Axis Camera, An Axis Camera Is What You Get!" on May 19, 2017
When you buy a Honeywell camera, you likely get a Hikvision, Dahua or some other company's product. The same goes for easily 100 different...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Forget The Backdoor, "ALL HIKVISION PRODUCTS" On Sale on May 18, 2017
Less than 2 weeks after the Hikvision Backdoor was confirmed, Hikvision has launched a sale "ON ALL HIKVISION PRODUCTS". In this note, we examine...
Amazon Techs Installing IP Cameras Tested on May 18, 2017
In 2015, Amazon started offering video surveillance installation. Now, Amazon has made it a lot easier, with automatic add-on options and...
Hanwha Recorder Vulnerability Analyzed on May 18, 2017
ICS-CERT has released a vulnerability notice for Hanwha SRN-4000 recorders.  Hanwha provided additional information to IPVM about this issue,...
DMP Video Doorbell / Access Reader Examined on May 17, 2017
Consumers increasingly demand video doorbells, with "doorbells selling like hotcakes, everyone wants a doorbell", according to ADT's CEO. At ISC...
ShotSpotter To IPO, Facing Low Revenue and Losses on May 17, 2017
A rare event for North American security manufacturers is upcoming. ShotSpotter is planning to IPO on the NASDAQ, aiming to raise $34.5...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact