Every update simultaneously downloads key activity and updates key permissions
CyberLock communicators are the vital interface devices that bridge the physical CyberLock hardware (keys and cylinders) with the CyberAudit management software. They transfer access permissions to the smart keys and download detailed audit trail information from the keys, ensuring a secure and accountable access control system.
How CyberLock communicators work
Types of CyberLock communicators
CyberLock offers a variety of communicators to suit different needs, from desktop units for office use to remote units for field workers.
- USB Station: A compact desktop unit that connects to a computer’s USB port to update and charge keys.
- IR Encoders: Plug directly into a computer to program infrared CyberKeys.
- WebStation 2 can be connected via Ethernet cable to a network or the internet
- Authorizer Keyports: Durable, weatherized units installed in remote areas that allow users to update their keys with a network connection, even without a computer.
- Web Stations: Wall-mounted or desktop communicators that connect over a network to update keys.
- Flex System Keyport: A modular device that functions as a communicator and a component of the Flex System for wired access control.
- CyberKey Blue and Air: Modern smart keys that use Bluetooth or Wi-Fi to update permissions and download audit trails using a mobile phone and the Cyber Access app. This allows for on-the-go programming and real-time updates.
Keypad Authoriser
The CyberLock AKG2R-01 is a networked Authorizer Keyport, a type of communicator used to remotely manage CyberKey smart keys. It serves as a secure interface between CyberLock hardware and the CyberAudit management software, allowing for the quick and efficient updating of key permissions and collection of audit data.
Weather-resistant design: Built with black powder-coated cast aluminum, the device is weather-resistant and can be installed in both indoor and outdoor environments.
For added security, administrators can set key permissions to expire after a certain period, requiring users to regularly reauthorize their keys at a communicator like the Keyport.



