Download PDF version Contact company
The CyberKey will not open the padlock at the storage space until the driver enters a code to open the lock box and touches the CyberPoint
CyberKey designates a single CyberLock to temporarily reactivate an expired CyberKey for up to 5 minutes

CyberLock offers a variety of features for controlling access including key scheduling, key expirations, time-delay, multiple key mode, and temporary activation.

Temporary activation is an advanced CyberKey feature that allows an administrator to designate a single CyberLock or CyberPoint to temporarily reactivate an expired CyberKey for up to 5 minutes. Once the key touches the activation point it can open any lock to which it has permission.

A Midwest company wanted more accountability and control over their storage facility. They used the temporary activation feature to verify when a package was delivered by storing a CyberPoint in a combination lock box outside of the storage facility. When the delivery driver arrives with a package, they go to the front desk to pick up an expired CyberKey. The CyberKey will not open the padlock at the storage space until the driver enters a code to open the lock box and touches the CyberPoint. The driver then has 5 minutes to access the lock and deliver the packages.

“With CyberLock we have the ability to program temporary access schedules for our vendors and contractors, making our key management process more efficient."

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?