Digital Locks / eCylinder Tutorial

Author: Brian Rhodes, Published on Feb 07, 2012

In some applications ‘traditional’ panel/controller based Electronic Access Control are difficult to justify the total cost. After the costs of hardware, cabling, installation, and training are all tallied, it is not uncommon to spend upwards of $2500 USD per controlled opening (i.e. door, gate, entry, etc...). This can quite simply prove to be too expensive to consider, no matter the need.

In other applications, installation of the prevalent form factor Access Control equipment (Controller Panels, Power Supplies, Card Readers, etc) may be difficult or impossible. In still other cases (such as records storage cabinets or controlled substance carts), there might be a need to indeed ‘control access’ only to the same degree that keys and locks already provide, but provide additional features such as scheduling controls and audit trails against the opening.

In this gray area of the market, the ‘Digital Lock’ has gained attention. ‘Digital Locks’ are also commonly identified by branding such as ‘eCylinders’, ‘Mul-T-Lock’, ‘LOGIC’, ‘CLIQ’, ‘NEXGEN XT’ or by more common nomenclature such as ‘electro-mechanical locks’, ‘chip locks’, ‘smart locks’, or ‘RFID locks’ – which in some cases might be a misnomer.

Manufacturer Landscape

In the Door Hardware market, there are relatively few conglomerates that own huge portions of the industry; corporations like Ingersoll Rand, ASSA ABLOY, and Stanley are among this group. ‘Digital Locks’, as a merchantable product in the market, seem to be driven by various ASSA ABLOY offerings (lead by the ‘high security’ brand MEDECO) at this point in time. It is unclear whether or not the other ‘big names’ in this market will choose to pursue similar products in the same form factor.

While exact feature sets may vary, in general the ‘digital lock’ is partnered with a specialized accompanying key. The lock itself remains unpowered, or is powered by the introduction of the key into the keyway from a power source built into the key. Most often, a dual authentication is required to resolve the lock – first, an encoded credential handshaking takes place between the key and the lock, and secondly, with a valid permission, the lock will permit itself to be opened in the traditional manner by rotation of the key.

These products remain substantially similar to mechanical locks, but have the additional layer of proximity or contact encoding that must be resolved first. The key must be properly logically credentialed, and also cut to match to the bitting of the lock, or the key will not resolve the lock.

The image below shows the basic 'look' of these locks:

Advantages of a 'Digital Lock' system

The most significant advantage of this method of controlling access appears to be the rather low cost of retrofitting existing openings (i.e. door, gate, entry, etc...) with only new locking hardware vs. the implementation of full-blown electronic access control hardware. The form factors of these ‘digital locks’ match the hardware already deployed – mortise cylinders, ICC systems, rim cylinders, knobs, cam locks, cabinet locks, showcase locks, and padlocks all have ‘digital lock’ retrofit units available. This means that a simple exchange of hardware is all that is required to gain the enhanced functionality. This cost is normally anywhere from $85 to $850 USD depending on the product/form factor, and does not require any modification to the opening, auxilary hardware, or utility to implement.

A log of activity against each lock and/or key is stored in nonvolatile memory onboard each component. Commonly, up to 5000 events can be stored for download to a central database when opportunity permits. This ‘audit trail’ feature not only records successful openings, but unsuccessful attempts as well.

Disadvantages of a 'Digital Lock' system

The ability to make a key valid only during a certain schedule, or to otherwise make a key invalid, is a mainstay function of EAC. This feature is also possible with ‘digital lock’ systems. However, a marked disadvantage vs. traditional EAC is that, in order to completely invalidate a key, each previously resolvable lock must be updated with new settings via physical interaction with those locks. While this may not prove to be a challenge for some deployments, needing to continuously update lock scheduling (commonly through the insertion of a ‘programming key’) just isn’t a practical constraint for many larger deployments with many doors or many locks.

Another marked disadvantage of ‘digital lock’ systems are the comparatively high costs of the key vs. traditional ‘card based’ EAC systems. Proximity cards can often be issued for less than $5 USD, while a ‘digital lock’ key can cost $80+ USD, and still need to be mechanically cut in order for use. While blank inactive cards may be commonly available in the market, the source of supplying keys is highly restricted and limited by design.

Comments : PRO Members only. Login. or Join.

Related Reports

Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...
Genetec Security Center 5.8 Tested on Mar 19, 2019
Genetec has released Version 5.8. This comes after a wait of more than a year that caused frustrations for many Genetec partners. Our previous...
Retired Mercury President Returns As Open Options President on Mar 18, 2019
Open Options experienced major changes in 2018, including being acquired by ACRE and losing its President and General Manager, John Berman who...
Large US University End-User Video Surveillance Interview on Mar 18, 2019
Schools have become targets in modern days of active shooters and terrorist fears. The need for video and access security is high. Universities...
Start Up Safe Zone $150 Gunfire Detector Profile on Mar 06, 2019
While gunfire detectors have been around for years, typically they are limited to enterprise level or municipal deployments. Startup AVidea, makers...
Top ISC West 2019 Booth Moves on Mar 05, 2019
With ISC West just a month away, we examine the most notable exhibitor moves including big exhibitors who dropped out and a number of significant...
Prysm PSIM Profile on Mar 05, 2019
A decade ago, PSIM promised significant potential but has always suffered from significant problems. Now, a number of PSIMs have either gone out of...
Genetec Declares "Lead With Synergis" Access Control on Mar 04, 2019
Genetec started with and is best known for its video management software. However, the company is now imploring its partners to lead with Synergis,...
Private School IT Manager Surveillance Interview on Feb 22, 2019
This IT manager describes himself as the "oft-maligned IT person" whose "opinions may not always be appreciated by the integrator crowd." But he is...
HID Favorability Results 2019 on Feb 21, 2019
HID favorability results were strong, in the 2019 IPVM integrator study of 200+ integrators, with a net +62% and low negativity as the table below...

Most Recent Industry Reports

Eagle Eye Favorability Results 2019 on Mar 21, 2019
Eagle Eye has been the biggest spender in the cloud VMS market including (via their owner) acquiring Brivo for $50 million and CameraManager from...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Covert IP Camera Shootout - Axis, Hanwha, Hikvision, March, Vivotek on Mar 20, 2019
Covert cameras were one of the last holdout areas for analog cameras. However, in the past few years, IP / HD covert cameras have become...
Top Metrics For Ensuring Integrator Profitability - Statistics on Mar 20, 2019
How do integrators ensure the profitability of their projects? As part of our profitability study, 100+ integrators answered the following...
Avigilon Launches 'Renewed Products Program' on Mar 19, 2019
There are lots of 'pre-owned' cars but pre-owned IP cameras? While such programs are common in other industries, in video surveillance, they are...
Hanwha Tax Evasion Probe, Camera Division Implicated on Mar 19, 2019
A Hanwha group subsidiary was raided as part of a tax evasion probe. While a Korean news media report listed the raided entity as 'Hanwha...
Genetec Security Center 5.8 Tested on Mar 19, 2019
Genetec has released Version 5.8. This comes after a wait of more than a year that caused frustrations for many Genetec partners. Our previous...
Retired Mercury President Returns As Open Options President on Mar 18, 2019
Open Options experienced major changes in 2018, including being acquired by ACRE and losing its President and General Manager, John Berman who...
Large US University End-User Video Surveillance Interview on Mar 18, 2019
Schools have become targets in modern days of active shooters and terrorist fears. The need for video and access security is high. Universities...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact