Digital Locks / eCylinder Tutorial

Author: Brian Rhodes, Published on Feb 07, 2012

In some applications ‘traditional’ panel/controller based Electronic Access Control are difficult to justify the total cost. After the costs of hardware, cabling, installation, and training are all tallied, it is not uncommon to spend upwards of $2500 USD per controlled opening (i.e. door, gate, entry, etc...). This can quite simply prove to be too expensive to consider, no matter the need.

In other applications, installation of the prevalent form factor Access Control equipment (Controller Panels, Power Supplies, Card Readers, etc) may be difficult or impossible. In still other cases (such as records storage cabinets or controlled substance carts), there might be a need to indeed ‘control access’ only to the same degree that keys and locks already provide, but provide additional features such as scheduling controls and audit trails against the opening.

In this gray area of the market, the ‘Digital Lock’ has gained attention. ‘Digital Locks’ are also commonly identified by branding such as ‘eCylinders’, ‘Mul-T-Lock’, ‘LOGIC’, ‘CLIQ’, ‘NEXGEN XT’ or by more common nomenclature such as ‘electro-mechanical locks’, ‘chip locks’, ‘smart locks’, or ‘RFID locks’ – which in some cases might be a misnomer.

Manufacturer Landscape

In the Door Hardware market, there are relatively few conglomerates that own huge portions of the industry; corporations like Ingersoll Rand, ASSA ABLOY, and Stanley are among this group. ‘Digital Locks’, as a merchantable product in the market, seem to be driven by various ASSA ABLOY offerings (lead by the ‘high security’ brand MEDECO) at this point in time. It is unclear whether or not the other ‘big names’ in this market will choose to pursue similar products in the same form factor.

While exact feature sets may vary, in general the ‘digital lock’ is partnered with a specialized accompanying key. The lock itself remains unpowered, or is powered by the introduction of the key into the keyway from a power source built into the key. Most often, a dual authentication is required to resolve the lock – first, an encoded credential handshaking takes place between the key and the lock, and secondly, with a valid permission, the lock will permit itself to be opened in the traditional manner by rotation of the key.

These products remain substantially similar to mechanical locks, but have the additional layer of proximity or contact encoding that must be resolved first. The key must be properly logically credentialed, and also cut to match to the bitting of the lock, or the key will not resolve the lock.

The image below shows the basic 'look' of these locks:

Advantages of a 'Digital Lock' system

The most significant advantage of this method of controlling access appears to be the rather low cost of retrofitting existing openings (i.e. door, gate, entry, etc...) with only new locking hardware vs. the implementation of full-blown electronic access control hardware. The form factors of these ‘digital locks’ match the hardware already deployed – mortise cylinders, ICC systems, rim cylinders, knobs, cam locks, cabinet locks, showcase locks, and padlocks all have ‘digital lock’ retrofit units available. This means that a simple exchange of hardware is all that is required to gain the enhanced functionality. This cost is normally anywhere from $85 to $850 USD depending on the product/form factor, and does not require any modification to the opening, auxilary hardware, or utility to implement.

A log of activity against each lock and/or key is stored in nonvolatile memory onboard each component. Commonly, up to 5000 events can be stored for download to a central database when opportunity permits. This ‘audit trail’ feature not only records successful openings, but unsuccessful attempts as well.

Disadvantages of a 'Digital Lock' system

The ability to make a key valid only during a certain schedule, or to otherwise make a key invalid, is a mainstay function of EAC. This feature is also possible with ‘digital lock’ systems. However, a marked disadvantage vs. traditional EAC is that, in order to completely invalidate a key, each previously resolvable lock must be updated with new settings via physical interaction with those locks. While this may not prove to be a challenge for some deployments, needing to continuously update lock scheduling (commonly through the insertion of a ‘programming key’) just isn’t a practical constraint for many larger deployments with many doors or many locks.

Another marked disadvantage of ‘digital lock’ systems are the comparatively high costs of the key vs. traditional ‘card based’ EAC systems. Proximity cards can often be issued for less than $5 USD, while a ‘digital lock’ key can cost $80+ USD, and still need to be mechanically cut in order for use. While blank inactive cards may be commonly available in the market, the source of supplying keys is highly restricted and limited by design.

Comments : PRO Members only. Login. or Join.

Related Reports

UTC, Owner of Lenel, Acquires S2 on Sep 20, 2018
UTC now owns two of the biggest access control providers, one of integrator's most hated access control platforms, Lenel, and one of their...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
Door Fundamentals For Access Control Guide on Sep 12, 2018
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
Access Control Course Fall 2018 on Sep 06, 2018
Registration IS CLOSED ends this Thursday. Register now. If you are looking to strengthen your ability to design and deploy access systems or...
Drain Wire For Access Control Reader Tutorial on Sep 04, 2018
An easy-to-miss cabling specification plays a key role in access control, yet it is commonly ignored. The drain wire offers protection for readers...
Directory Of 110+ Video Management Software (VMS) Suppliers on Aug 30, 2018
This directory provides a list of Video Management Software providers to help you see and research what options are available. Listing...
Exit Devices For Access Control Tutorial on Aug 28, 2018
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety codes the world over, and become integral parts of electronic access...
Assa Aperio Wireless Access Reader R100 Tested on Aug 23, 2018
Wireless access control is frequently promoted by manufacturers as a way to cut installation costs. Perhaps the biggest proponent of this is mega...
Synology Surveillance Station VMS Tested on Aug 22, 2018
With so many low-cost NVRs and enterprise VMSes, is there any place in the market for NAS-based VMSes? Recently, IPVM bought a Synology NAS for...
Backup Power For Maglocks Guide on Aug 20, 2018
When the main power fails, many believe maglocks must leave doors unlocked. However, battery backed up maglocks are allowed according to IBC /...

Most Recent Industry Reports

Alexa Guard Expands Amazon's Security Offerings, Boosts ADT's Stock on Sep 21, 2018
Amazon is expanding their security offerings yet again, this time with Alexa Guard that delivers security audio analytics and a virtual "Fake...
UTC, Owner of Lenel, Acquires S2 on Sep 20, 2018
UTC now owns two of the biggest access control providers, one of integrator's most hated access control platforms, Lenel, and one of their...
BluePoint Aims To Bring Life-Safety Mind-Set To Police Pull Stations on Sep 20, 2018
Fire alarm pull stations are commonplace but police ones are not. A self-funded startup, BluePoint Alert Solutions is aiming to make police pull...
SIA Plays Dumb On OEMs And Hikua Ban on Sep 20, 2018
OEMs widely pretend to be 'manufacturers', deceiving their customers and putting them at risk for cybersecurity attacks and, soon, violation of US...
Axis Vs. Hikvision IR PTZ Shootout on Sep 20, 2018
Hikvision has their high-end dual-sensor DarkfighterX. Axis has their high-end concealed IR Q6125-LE. Which is better? We bought both and tested...
Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Hikvision USA Starts Layoffs on Sep 18, 2018
Hikvision USA has started layoffs, just weeks after the US government ban was passed into law. Inside this note, we examine: The important...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact