Download presentation
1
Videx CyberLock Access Control System
WELCOME Videx CyberLock Access Control System Welcome (Talk Track) This presentation is about the Videx CyberLock access control system. It provides you with background information on Videx, and gives an overview of how the CyberLock system operates. Previous Next Stop
2
Videx History Computer Display Cards Portable Data Collectors
Videx History (Talk track) Videx was founded during the explosive growth phase of the computer industry with the introduction of display products that expanded monitor capability so computers could be used in business applications. In 1985 we manufactured our first portable data collector for remote site use. Today we manufacture over a hundred individual products that are used in a wide range of applications: from very ordinary applications like security routes and asset tracking, to exotic applications such as cargo tracking in space. Videx History Computer Display Cards Portable Data Collectors Access Control Systems Previous Next Stop
3
Past Experience Ability to miniaturize technology
Durable products for harsh environments Maximizing battery performance Past Experience (Talk track) Our past has served us well. From our experience in the data collection industry, we learned to miniaturize the technology by manufacturing powerful data collectors that fit comfortably in a person’s hand. Often these portable data collectors were used in harsh environments and we were required to manufacture them with a high degree of durability. And we learned how to create software that would properly manage the power within a battery in order to maximize its longevity. We bring this valuable experience to the CyberLock family. In 1998 we started manufacturing our family of access control products. Previous Next Stop
4
What You Get Today CyberLock System Hardware Software Pricing
Access Privileges Audit Report Pricing What You Get Today (Talk-track) Today we’ll provide an overview of the CyberLock product family, product features, software installation, setting up access privileges, generating an audit report, and pricing for a system. Previous Next Stop
5
What are the most important features of the CyberLock system?
Replacement of mechanical cylinders Set individual access privileges Comprehensive audit report One key for an entire system What are the most important features of the CyberLock? (Talk-track) What are the most important features of a CyberLock System? CyberLock technology has been incorporated into many different types of cylinders. These electronic cylinders are the exact dimensions of the mechanical cylinders they are replacing. This makes the installation as easy as removing one cylinder and installing another. No wiring is needed. The battery is in the key. The CyberLock system allows you to set access privileges for each authorized user to the exact hour, minute, and second in a day. A comprehensive audit report of each entry is stored in both the key and lock. One key can be used for an entire system, from the outside entryway, to inside doors, to cabinets and containers. Previous Next Stop
6
CyberLock System CyberLock CyberKey CyberKey Station CyberAudit
CyberLock System (Talk-track) There are four components to the CyberLock system… The CyberLock cylinder, its companion CyberKey, the CyberKey Base Station, which is used to upload and download information from the CyberKey, and the CyberAudit software. Previous Next Stop
7
CyberLocks for Doors CyberLock for Doors – Talk-track
CyberLock cylinders can be installed in many different types of door hardware such as knob and lever sets, mortise, and rim locks. Previous Next Stop
8
CyberLock for Cabinets, Drawers, Padlocks, and Vending Machines
The uniqueness of the CyberLock cylinders is the ability to provide access control for cabinets, drawers, padlocks, and vending machines. No other electronic lock can do this. Previous Next Stop
9
Cylinder Intelligence
Circuit board with processor Family access codes Unique ID number 1100 entries Blocked key list CyberLock Features (Talk-track) The CyberLock cylinder has a circuit board with micro-processor and memory. Four types of information are stored in the cylinder: family access codes that ensure that only keys within the system work with the lock, the unique ID number of the lock cylinder, a record of the last 1100 entries, and a list of blocked key IDs to eliminate access by any key that is missing or lost. Previous Next Stop
10
Cylinder Security Tamper pin Re-lockers Torque brake Stun gun
Vending T-handle Torque brake Stun gun Rare earth magnet Cylinder Security – Talk-track There are several hardware security features in a CyberLock. Inside each cylinder is a tamper pin. If the front of the cylinder is struck with blunt force, the tamper pin will drop into position, preventing the lock from opening. The tamper pin is “re-positioned” back to its pre-impact position by touching an authorized user key to the face of the lock. The vending machine cylinders have re-lockers. These re-lockers are activated when a drill bit or foreign object detaches the wires connecting the re-lockers. When the re-lockers are released into the cylinder’s shell, the cylinder cannot be turned. Each cylinder has a torque brake. If torque is applied to the front of the cylinder, the front part of the cylinder will pull away from the back half. The back half of the cylinder will expand, causing the brake effect that engages the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in the locked position. CyberLock cylinders have been tested for electrical current using a stun gun rated at 300,000 volts, and with magnets rated in excess of 18,000 gauss. The cylinders remain in a locked position and continue to perform normally. Previous Next Stop
11
Mechanical cylinder CyberLock cylinder Pick proof
No conventional key way Potted circuit board Mechanical vs. CyberLock cylinder (Talk-track) In contrast to mechanical pin-based locks, the CyberLock cylinders have a unique physical design that prevents the use of standard lock picking tools. This, combined with the family access codes within the cylinder, makes the CyberLock virtually pickproof. The circuit board inside the cylinder is potted, which provides protection from environmental hazards like salt air, dust, and water. This allows installations in both indoor and outdoor applications. Previous Next Stop
12
Remove mechanical lock cylinder Insert CyberLock cylinder
Easy installation (Talk track) Installation is as easy as removing the existing mechanical cylinder and replacing it with the CyberLock cylinder. Full-functioning system Previous Next Stop
13
6-pin cylinder 6-pin Cylinder (Talk-track)
The 6-pin cylinder can be installed in a variety of locks. Many knob and lever set locks, cabinet locks, and padlocks take the standard 6-pin cylinder. Padlock manufacturers that support the 6-pin cylinder include Master, National, and Hampton. 6-pin cylinder Previous Next Stop
14
Interchangeable Core IC Cylinder (Talk-track)
The CyberLock IC cylinder can also be installed in a variety of lock hardware: padlocks, cabinet and drawer locks, and, for doorway applications, knob sets, lever sets, rim locks, and mortise locks. Previous Next Stop
15
IC Cylinder Install Remove mechanical core
IC Cylinder Install – Talk-track The IC cylinder installation is completed quickly with a control key. Remove mechanical core Using control key, insert CyberLock IC core Full-functioning system Previous Next Stop
16
Mortise Rim Polished Brass Nickel Mortise & Rim Locks (Talk-track)
Both the mortise and the rim CyberLocks are available in brass and nickel finishes. The mortise cylinder is a standard Schlage-type mortise with standard cam. The rim cylinder is sold with the mounting bracket, two breakaway screws, a driver, and a breakaway tail piece. Previous Next Stop
17
Cam Cylinder Settings 90° Key rotation Key Retention
90° Cam latch rotation Key Removal 360° Key rotation 1.125” length Cam cylinder (talk-track) The cam lock is a ¾” diameter cam that is ideal for securing cabinets and containers. Two different key actions are available: Key retention and Key releasing. The standard cam lock has a flat or straight latch on the back. .75” diameter Previous Next Stop
18
Vending machine T-handle lock
Dead Bolt Latch Hardened Steel Face & Deadbolt Self Locking Latch Vending machine T-handle lock (Talk-track) The T-handle cylinder works with a variety of vending machines, arcade equipment, and coin changers. The vending machine T-handle cylinder has a hardened steel deadbolt latch and a hardened steel face. The dimensions are ¾” diameter by 1 ½”. Currently in production is the deadbolt version of the vending machine T-handle cylinder. Contact Videx for information regarding the self-locking latch version of this product. Previous Next Stop
19
CyberLock Programming Key
Metal User Key Metal Tip User Key CyberKeys CyberKey Capabilities (Talk-track) Let’s examine the capability of the CyberKey… Shown here are four types of CyberKeys. The first key shown in the upper left hand corner is an all metal user’s key made of high-grade aircraft aluminum. The second key shown is the standard user key made with high impact plastic with a metal head. These user keys are used to gain access to cylinders, download a lock, create master keys, and create reset keys. The third key is the “CyberLock Programming Key,” which is used with the Professional version of the software to program CyberLock cylinders. The last key is a control key used for removal of the CyberLock IC cylinders. CyberLock Programming Key Control Key Previous Next Stop
20
Battery is in the key Battery Yield 2000 - 5000 uses Solenoid duration
Power level CyberKey battery (Talk-track) A standard lithium 3-volt battery located in the CyberKeys provides the power of the CyberLock system. When the key comes in contact with the cylinder, it powers up the circuitry in the lock so that the key and lock can communicate. Previous Next Stop
21
CyberKey Intelligence
Family access codes Unique ID Access privileges Data storage CyberKey Features (Talk-track) The CyberKey contains four levels of intelligence: Family access codes to ensure the key is from the same installation, the unique ID number of the key, access privileges for the user of the key, and storage of the last 1150 events, both entries and denied entries. The unique exchange of family access codes between the lock and key gives a high degree of key integrity. What is meant by key integrity is that even if another key is brought to the lock, it will not work unless it has been programmed by the same software and password used to program the lock it is attempting to open. Previous Next Stop
22
CyberSystem Enhanced Security
Multiple key custody Timed activation Delayed access Enhanced Security Features (Talk-track) There are three additional features that provide an even higher level of security: The mode feature sets up multiple key custody and is used when you would like 2, 3, or 4 keys presented to a lock before a lock will grant access. For example, 2 key mode requires 2 authorized keys to be presented to the lock within 60 seconds before the first key can be used to gain access. Timed activation allows you to set a start date and an end date that a key can gain access. Delayed access is used in customer applications that require a delay of a few seconds or up to 20 minutes between when the key is presented to the lock and when the lock opens. Previous Next Stop
23
Communication Established
CyberSystem Security Power transfer Communication Established Lock & key ID’s exchanged Block key list Lock ID in key’s list Correct day & time Access code CyberSystem Security – Talk-track Here’s what happens when a key comes in contact with a cylinder. First, the key supplies power to the cylinder, and communications are established. Then a sequence of events occurs, in a fraction of a second, to determine if the key can open the lock: The cylinder and key exchange ID numbers. The cylinder checks to see if the key is on its blocked key list. The key verifies that it has access to that lock ID, and that the key is there during its scheduled access times. The key sends its password to the lock, and, if the password matches the lock’s password, the lock opens. Previous Next Stop
24
CyberAudit – Main Menu (Talk-track)
The software we are reviewing today is the Professional version of CyberAudit software for the CyberLock. This software is a Windows based program developed for point and click ease. The CyberAudit software provides an easy-to-learn interface that allows setting up access privileges and viewing the dual audit trail, and provides special features such as mode, delayed access, and time activation periods. This is the Main menu of CyberAudit. The first screen that we will look at is Locks… Previous Next Stop
25
CyberAudit – Locks (Talk-track)
The first column is the lock Serial No. Each cylinder has its own unique ID that cannot be changed. The second column, Lock name, is a user-defined description or name. For example, the first line shows a description of where the lock is located. Column three, Mode, is where we set up multiple key custody. Column four is where we set a delayed access time. The final column shows when a change is pending for a lock. Previous Next Stop
26
CyberAudit – Keys (Talk-track)
This window is used to assign each key to the individual responsible for that key. The key is also assigned to one of the schedules created in the Schedules window. The first column, Serial No., shows the unique ID for each key in the system. The Name column shows who the key is assigned to. The Schedule column allows you to assign a schedule to a key. The next three columns are specific to the Professional version of the software. The Begin column is used to set a beginning date for activation of the key. The Expires column is used to set the date for expiring a key. The Block column is used to block access by a lost key. The final column is the Change icon column. This column shows which keys have pending changes. When the change has been completed, the yellow change icon will disappear. Previous Next Stop
27
CyberAudit – People (Talk-track)
This window is used to maintain pertinent information on the employees or users that are assigned a CyberKey and access to locks. Even a picture of the user can be added to this information to allow you to have a visual of the user. Previous Next Stop
28
CyberAudit – Schedules (Talk-track)
This screen helps to organize your keys and locks by schedules. There are three separate elements to this screen: Schedules, Access Times, and Locks. Let’s work through an example of how these work… The Maintenance schedule has access privileges from 6:15 AM to 12:15 PM Monday, Wednesday, and Friday, on Tuesdays, and Thursdays, from 12:15 PM to 6:00 PM, and from 8:30 AM to 10:00 AM on Saturdays. The Maintenance crew has access from 6 AM to 12 PM on Holidays. The “Locks” column on the right shows checkmarks for the locks that the Maintenance schedule has access to. To add a new schedule, click on the Add Schedule button. In the Schedules window in the upper left hand corner, “Schedule #” will be highlighted. Type the description for the new schedule. The Access Times window will show 24 hour a day 7 days a week access. This will be represented by 12:00:00 AM to 12:00:00 AM with every day of the week checked. Change the times to fit the schedule you are creating. Deselect the days that do not pertain to this schedule. You can have up to seven time slots for each schedule. In the Locks window, check the locks you would like to apply to this schedule. You have the option of allowing access on holidays. The Holidays button opens a screen where you enter the holidays for your installation. Previous Next Stop
29
Previous Next Stop
30
Holiday Window – Talk track
The Holiday window is used to create a holiday schedule for each data base. To add a holiday to your schedule, click on the Add button, use the drop-down menu to select the day you would like to add to your holiday schedule, and add a description in the column on the right. Previous Next Stop
31
Data Transfer CyberAudit CyberKey CyberLock Data Transfer (Talk-track)
Either the CyberLock Programming Key or a user key is used as a messenger between the cylinders and the CyberAudit software. When a change is made in the software that affects a cylinder, the CyberLock programming key is used to update the cylinder. A standard user key that has access privileges to a cylinder can be used to download access events from a cylinder. That key is then placed in a CyberKey Base station and the audit trail from the cylinder is downloaded into CyberAudit software. The data from the cylinder can be viewed in the logs screen, and auditing reports can be formatted and printed from there. At this time, a key can download one lock at a time. Eventually multiple downloads will be available using a handheld organizer. Previous Next Stop
32
Audit Report Audit Report (Talk-track)
The audit report displays all the information gathered by the locks and keys. Each event record shows the key name, the lock name, the date and time of the event, the status of the event, and whether the information was originally recorded in the key or in the lock. For example, the first record shows that Greg Ross gained access to the Research Library on May 17, 2001 at 8:41 AM, and the source of this information is the lock. Previous Next Stop
33
Retail Pricing CyberLock 6-pin Cylinder $148 CyberLock Mortise $175
CyberLock Rim $175 CyberLock Cam $148 Vending T-Handle Cylinder $148 Interchangeable Core $175 CyberKey $88 CyberKey Metal $98 CyberLock Programming Key $88 CyberKey Station $249 CyberAudit Professional $500 CyberAudit Lite $250 Pricing for CyberLock System (Talk-track) Let’s look at pricing of the CyberLock system. Lock cylinders retail for $148 or $175, depending on the cylinder. The user keys retail for $88 or $98. The CyberLock Programming key retails for $ The CyberKey base station retails for $249. The CyberAudit software comes in two versions: a full-featured Professional package for $ and a basic, Lite package for $ Contact Videx for current pricing. Previous Next Stop
34
Starter Kit Lock CyberKeys CyberKey Base Station Serial Cable
1 Lock 2 CyberKeys 1 CyberKey Base Station 1 Serial Cable Starter Kit (Talk-track) A starter kit is available from Videx. The starter kit includes 1 CyberLock cylinder, 2 CyberKeys, 1 CyberKey Base Station, 1 serial cable, and 1 CyberAudit Lite software package. 1 CyberAudit Lite Software Previous Next Stop
35
Starter Kit Retail Pricing
6-pin Kit $582 Cam Kit $582 Vending Kit $582 Starter Kit Pricing (Talk-track) The 6-pin, cam, and vending starter kits are $ The rim, mortise, and IC cylinder starter kits are $ Rim Kit $609 Mortise Kit $609 IC Kit $609 Previous Next Stop
36
Where to Get More Information
Videx Sales Department Phone (541) Fax (541) – Where to get more information (Talk-track) If you need any more information, please contact Videx by telephone at (541) , by fax at (541) , or by at Previous Next Stop
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.