Digital Locks / eCylinder Tutorial

By: Brian Rhodes, Published on Feb 07, 2012

In some applications ‘traditional’ panel/controller based Electronic Access Control are difficult to justify the total cost. After the costs of hardware, cabling, installation, and training are all tallied, it is not uncommon to spend upwards of $2500 USD per controlled opening (i.e. door, gate, entry, etc...). This can quite simply prove to be too expensive to consider, no matter the need.

In other applications, installation of the prevalent form factor Access Control equipment (Controller Panels, Power Supplies, Card Readers, etc) may be difficult or impossible. In still other cases (such as records storage cabinets or controlled substance carts), there might be a need to indeed ‘control access’ only to the same degree that keys and locks already provide, but provide additional features such as scheduling controls and audit trails against the opening.

In this gray area of the market, the ‘Digital Lock’ has gained attention. ‘Digital Locks’ are also commonly identified by branding such as ‘eCylinders’, ‘Mul-T-Lock’ [link no longer available], ‘LOGIC’ [link no longer available], ‘CLIQ [link no longer available]’, ‘NEXGEN XT’ or by more common nomenclature such as ‘electro-mechanical locks’, ‘chip locks’, ‘smart locks’, or ‘RFID locks’ – which in some cases might be a misnomer.

Manufacturer Landscape

In the Door Hardware market, there are relatively few conglomerates that own huge portions of the industry; corporations like Ingersoll Rand, ASSA ABLOY, and Stanley are among this group. ‘Digital Locks’, as a merchantable product in the market, seem to be driven by various ASSA ABLOY offerings (lead by the ‘high security’ brand MEDECO) at this point in time. It is unclear whether or not the other ‘big names’ in this market will choose to pursue similar products in the same form factor.

While exact feature sets may vary, in general the ‘digital lock’ is partnered with a specialized accompanying key. The lock itself remains unpowered, or is powered by the introduction of the key into the keyway from a power source built into the key. Most often, a dual authentication is required to resolve the lock – first, an encoded credential handshaking takes place between the key and the lock, and secondly, with a valid permission, the lock will permit itself to be opened in the traditional manner by rotation of the key.

These products remain substantially similar to mechanical locks, but have the additional layer of proximity or contact encoding that must be resolved first. The key must be properly logically credentialed, and also cut to match to the bitting of the lock, or the key will not resolve the lock.

The image below shows the basic 'look' of these locks:

Advantages of a 'Digital Lock' system

The most significant advantage of this method of controlling access appears to be the rather low cost of retrofitting existing openings (i.e. door, gate, entry, etc...) with only new locking hardware vs. the implementation of full-blown electronic access control hardware. The form factors of these ‘digital locks’ match the hardware already deployed – mortise cylinders, ICC systems, rim cylinders, knobs, cam locks, cabinet locks, showcase locks, and padlocks all have ‘digital lock’ retrofit units available. This means that a simple exchange of hardware is all that is required to gain the enhanced functionality. This cost is normally anywhere from $85 to $850 USD depending on the product/form factor, and does not require any modification to the opening, auxilary hardware, or utility to implement.

A log of activity against each lock and/or key is stored in nonvolatile memory onboard each component. Commonly, up to 5000 events can be stored for download to a central database when opportunity permits. This ‘audit trail’ feature not only records successful openings, but unsuccessful attempts as well.

Disadvantages of a 'Digital Lock' system

The ability to make a key valid only during a certain schedule, or to otherwise make a key invalid, is a mainstay function of EAC. This feature is also possible with ‘digital lock’ systems. However, a marked disadvantage vs. traditional EAC is that, in order to completely invalidate a key, each previously resolvable lock must be updated with new settings via physical interaction with those locks. While this may not prove to be a challenge for some deployments, needing to continuously update lock scheduling (commonly through the insertion of a ‘programming key’) just isn’t a practical constraint for many larger deployments with many doors or many locks.

Another marked disadvantage of ‘digital lock’ systems are the comparatively high costs of the key vs. traditional ‘card based’ EAC systems. Proximity cards can often be issued for less than $5 USD, while a ‘digital lock’ key can cost $80+ USD, and still need to be mechanically cut in order for use. While blank inactive cards may be commonly available in the market, the source of supplying keys is highly restricted and limited by design.

Comments : Members only. Login. or Join.

Related Reports

Wireless / WiFi Access Lock Guide on Nov 12, 2019
For some access openings, running wires can add thousands in cost, and...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Door Fundamentals For Access Control Guide on Aug 24, 2020
Doors vary greatly in how difficult and costly it is to add electronic access...
Converged vs Dedicated Networks For Surveillance Tutorial on Feb 12, 2020
Use the existing network or deploy a new one? This is a critical choice in...
Vehicle & Long Range Access Reader Tutorial on Jan 21, 2020
One of the classic challenges for access control are parking lots and...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Covert Elevator Face Recognition on Oct 24, 2019
Covert elevator facial recognition has the potential to solve the cost and...
Multipoint Door Lock Tutorial on Jan 23, 2020
Despite widespread use, locked doors are notoriously weak at stopping entry,...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass...
Help Security End Users Facing Coronavirus Improve Remote Access on Mar 24, 2020
Many end-users and integrators are struggling with the impact of coronavirus...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring...
Anyvision Raises $43 Million, Focusing on Access Control And Remote Authentication on Sep 04, 2020
While Anyvision has had a tumultuous 2020 with significant layoffs, the...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...

Recent Reports

New Products Show Fall 2020 Starts Tomorrow! on Sep 27, 2020
Tomorrow, IPVM's sixth online show will feature New Products from over 25...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
This is a unique installation course in a market where little practical...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...