Digital Locks / eCylinder Tutorial

Author: Brian Rhodes, Published on Feb 07, 2012

In some applications ‘traditional’ panel/controller based Electronic Access Control are difficult to justify the total cost. After the costs of hardware, cabling, installation, and training are all tallied, it is not uncommon to spend upwards of $2500 USD per controlled opening (i.e. door, gate, entry, etc...). This can quite simply prove to be too expensive to consider, no matter the need.

In other applications, installation of the prevalent form factor Access Control equipment (Controller Panels, Power Supplies, Card Readers, etc) may be difficult or impossible. In still other cases (such as records storage cabinets or controlled substance carts), there might be a need to indeed ‘control access’ only to the same degree that keys and locks already provide, but provide additional features such as scheduling controls and audit trails against the opening.

** **** **** **** ** *** ******, *** ‘******* ****’ has ****** *********. ‘******* *****’ *** **** ******** ********** ** branding **** ** ‘**********’, ‘***-*-****’,‘*****’, ‘****’, ‘****** **’** ** **** ****** ************ **** ** ‘*******-********** *****’, ‘**** locks’, ‘***** *****’, ** ‘**** *****’ – ***** ** **** cases ***** ** * ********.

Manufacturer *********

** *** **** ******** ******, ***** *** ********** *** ************* that *** **** ******** ** *** ********; ************ **** ********* Rand, **** *****, *** ******* *** ***** **** *****. ‘******* Locks’, ** * ************ ******* ** *** ******, **** ** be ****** ** ******* **** ***** ********* (**** ** *** ‘high ********’ ***** ******) ** **** ***** ** ****. ** is ******* ******* ** *** *** ***** ‘*** *****’ ** this ****** **** ****** ** ****** ******* ******** ** *** same **** ******.

***** ***** ******* **** *** ****, ** ******* *** ‘******* lock’ ** ********* **** * *********** ************ ***. *** **** itself ******* *********, ** ** ******* ** *** ************ ** the *** **** *** ****** **** * ***** ****** ***** into *** ***. **** *****, * **** ************** ** ******** to ******* *** **** – *****, ** ******* ********** *********** takes ***** ******* *** *** *** *** ****, *** ********, with * ***** **********, *** **** **** ****** ****** ** be ****** ** *** *********** ****** ** ******** ** *** key.

***** ******** ****** ************* ******* ** ********** *****, *** **** the ********** ***** ** ********* ** ******* ******** **** **** be ******** *****. *** *** **** ** ******** ********* ************, and **** *** ** ***** ** *** ******* ** *** lock, ** *** *** **** *** ******* *** ****.

*** ***** ***** ***** *** ***** '****' ** ***** *****:

Advantages ** * '******* ****' ******

*** **** *********** ********* ** **** ****** ** *********** ****** appears ** ** *** ****** *** **** ** ************ ******** openings (*.*. ****, ****, *****, ***...) **** **** *** ******* hardware **. *** ************** ** ****-***** ********** ****** ******* ********. The **** ******* ** ***** ‘******* *****’ ***** *** ******** already ******** – ******* *********, *** *******, *** *********, *****, cam *****, ******* *****, ******** *****, *** ******** *** **** ‘digital ****’ ******** ***** *********. **** ***** **** * ****** exchange ** ******** ** *** **** ** ******** ** **** the ******** *************. **** **** ** ******** ******** **** $** to $*** *** ********* ** *** *******/**** ******, *** **** not ******* *** ************ ** *** *******, ******** ********, ** utility ** *********.

* *** ** ******** ******* **** **** ***/** *** ** stored ** *********** ****** ******* **** *********. ********, ** ** 5000 ****** *** ** ****** *** ******** ** * ******* database **** *********** *******. **** ‘***** *****’ ******* *** **** records ********** ********, *** ************ ******** ** ****.

Disadvantages ** * '******* ****' ******

*** ******* ** **** * *** ***** **** ****** * certain ********, ** ** ********* **** * *** *******, ** a ******** ******** ** ***. **** ******* ** **** ******** with ‘******* ****’ *******. *******, * ****** ************ **. *********** EAC ** ****, ** ***** ** ********** ********** * ***, each ********** ********** **** **** ** ******* **** *** ******** via ******** *********** **** ***** *****. ***** **** *** *** prove ** ** * ********* *** **** ***********, ******* ** continuously ****** **** ********** (******** ******* *** ********* ** * ‘programming ***’) **** ***’* * ********* ********** *** **** ****** deployments **** **** ***** ** **** *****.

******* ****** ************ ** ‘******* ****’ ******* *** *** ************* high ***** ** *** *** **. *********** ‘**** *****’ *** systems. ********* ***** *** ***** ** ****** *** **** **** $5 ***, ***** * ‘******* ****’ *** *** **** $**+ USD, *** ***** **** ** ** ************ *** ** ***** for ***. ***** ***** ******** ***** *** ** ******** ********* in *** ******, *** ****** ** ********* **** ** ****** restricted *** ******* ** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Free Online NFPA, IBC, and ADA Codes and Standards on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...
Massively Strong Maglock (Securitron) on Nov 16, 2016
One of the market's strongest maglocks has a twist: the 4,000 pounds claimed bond power is not purely magnetic. Securitron's hybrid MM15 maglock...
Access Control Markups 2016 on Nov 09, 2016
  Access control markups have remained solid, according to new IPVM integrator survey results. Response Breakdowns We asked...
Favorite Access Control Credentials 2016 on Nov 07, 2016
When it comes to the most popular way to unlock an access controlled door, which credential type holds the favored spot among integrators? The...
Axis Releases Access Credentials - Insecure But Convenient on Nov 02, 2016
Axis continues to build out their own end-to-end 'solution'. The company recently announced a series of credential cards, but instead of a...
Bidding Divisions (08, 26, 27, 28) For Security Systems Guide on Oct 27, 2016
Navigating the world of system specifications and bidding work can be complex and confusing, but a standard format exists, and understanding it...
Favorite Access Control 2016 on Oct 25, 2016
Integrators told us "What is your favorite access control management software/system? Why?", and the responses are interesting indeed. While no...
Axis Video Revenue Down (Q3 2016) on Oct 20, 2016
An important milestone. Axis revenue for video products is down year over year. But Axis is now focusing on 'diversification'. In this report, we...

Most Recent Industry Reports

Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...
XiongMai Master Password List Emailed By Chinese Spammer on Dec 05, 2016
XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites. After pledging to recall cameras...
Hikvision Cloud Security Vulnerability Uncovered on Dec 05, 2016
A security researcher uncovered a critical vulnerability in Hikvision's global cloud servers. This vulnerability allowed an attacker to remotely...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Pelco Favorability Results on Dec 02, 2016
This is the first in a series of studies of manufacturer favorability. 100+ integrators rated and explained their views of each manufacturer. We...
Hikvision CEO Declares 'We Do Not Cut Rates" on Dec 02, 2016
Hikvision has led another press trip to China, and this time Hikvision's CEO is sharing insights into their competitive strategy, including...
Network Security Audit App (March Networks) Examined on Dec 01, 2016
Verifying one's video surveillance devices are locked down against common cybersecurity vulnerabilities is increasing important, as hacks using...
FLIR Acquires Drone Manufacturer For $134M on Dec 01, 2016
FLIR has acquired Prox Dynamics, a Norwegian maker of small military-grade drones, for $134M.  FLIR president Andy Teich provided additional...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact