Digital Smart Keys

A CyberKey is a programmable, electronic “smart key” that is part of a key-centric access control system called CyberLock.

It’s designed to provide a secure and auditable solution for managing access, particularly for contractors and other mobile workers who need to access remote or multiple locations.

For the Contractor:

  • One Key for Many Locks: Instead of carrying a large, heavy key ring with dozens of mechanical keys, a contractor only needs one CyberKey. This single key can be programmed to open a wide variety of CyberLock cylinders, including those on doors, cabinets, padlocks, and more.

  • Time-Sensitive Access: The CyberKey is programmed with specific permissions for the user. This means the key will only work for the locks, dates, and times that the contractor is authorized to access. For example, a key might be programmed to work from 8 a.m. to 6 p.m. on weekdays, and will be denied access outside of that schedule.

  • Convenience: Depending on the model, CyberKeys can be updated remotely (via Wi-Fi or Bluetooth) or by using a communicator device. This allows a contractor’s access permissions to be changed or extended without them having to return to an office to get a new physical key.

  • Accountability: The CyberKey records all access attempts—both successful and denied—creating an audit trail. This helps contractors by providing a record of their movements, which can be useful for billing or for verifying that they were at a specific location at a specific time.

For the Business:

  • Enhanced Security, compliance and Control: The CyberKey system gives businesses a high degree of control over who can access their facilities and assets. Since each key is unique and cannot be duplicated, the risk of unauthorized key copies is eliminated.

  • Real-time Visibility: When a CyberKey is used, the system records a time-and-date stamped record of the event. This information is uploaded to a central software platform (like CyberAudit-Web) when the key is updated. This provides a detailed audit trail, allowing a business to monitor and track the activity of contractors.

  • Reduced Risk of Lost Keys: If a CyberKey is lost or stolen, an administrator can immediately expire the key in the system, rendering it useless. This is a significant improvement over a traditional mechanical key, where a lost key could compromise security indefinitely.

  • Simplified Key Management: Instead of managing a complex system of master keys and contractor keys, the CyberLock system simplifies the process. Businesses can issue a single key to a contractor and program it with highly specific permissions. When the contract ends, the key’s permissions can be revoked or an expiration date can be set, ensuring the key no longer works.

Types of CyberKeys:

CyberKeys come in various models, often with different features to suit different needs:

In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.

There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed in order to load the lost key ID into the lock memory and prevent that key from working.

A key can access up to 12,000 locks

Low battery warnings are provided in the software every time a CyberKey is updated via a communication device and in the key itself, through an audio or visual indicator.

Keys are updated and programmed via communication devices. When a CyberKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to CyberAudit software over a local area network or securely over the Internet.

The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.

Download our 2025 Product Catalogue