Investigating electronic locks and keys

July 2016 Access Control & Identity Management, Asset Management

The million-dollar question is whether you would be happy having your keys fall into the hands of someone who might have criminal intent? Rhetorical question? Perhaps. But what are you actively doing to ensure that each key your business owns is traceable and remains within your facilities?

Wouter du Toit, Salto Systems.
Wouter du Toit, Salto Systems.

As a precursor to the discussion, it is important to point out that there is a marked difference between electronic keys and electronic locks. Wouter du Toit of Salto Systems says that his company has been in the business of designing and manufacturing electronic locks for a wide variety of industries over a number of years.

The beauty of an electronic lock is that it can use some of the elements of existing mechanical locks and is accessed with RFID cards. These electronic lock sets work with mechanical mortice locks in the door itself.

In addition, Salto’s range also includes escutcheons which are finding growing popularity for use at fire doors and emergency exits. All Salto locks require no external power supply and they are completely wireless.

Electronic locks, says Du Toit, can be integrated with a building’s access control element on the door to provide additional security. These locks are quicker to install than a standard access control reader and can be accessed and controlled via a mobile phone or fob.

Hosea Malope, Zonke Monitoring Systems.
Hosea Malope, Zonke Monitoring Systems.

Hosea Malope of Zonke Monitoring Systems (ZMS), says that monitoring of keys, whether electronic or manual, will provide organisations with greater assurance that their assets are protected. A reputable key management system should both log keys and track them, with predefined instructions on who is permitted to take a specific key and when the key must be returned to the safety of the key box. In addition, the system should have the ability to raise an alert when the key is not returned within the given time parameters.

Tracking can be performed through a web based system that is accessible via a mobile device or PC. This system will provide a real-time indication of where a key is at all times and can remotely allocate a key, as well as the specific function of the key, to a particular person.

Du Toit says that electronic locks can be integrated with access control systems through a mobile phone using mobile apps with Bluetooth functionality or near field communication (NFC). The connection with the remote server will establish whether you have the pre-programmed functionality to enter the door. Presently, Salto locks are enabled to work on Samsung Android devices and iOS phones.

“Rather than opening the door as such, this technology is used to update the RFID card which performs the role of a key for the door in question. This is particularly useful for mobile workforces, specifically where no network infrastructure is available. One therefore uses one’s phone for updating the credentials of the card,” says Du Toit.

Mobile solutions via Bluetooth started this initiative in the hospitality sector, where guests were sent the credentials of their hotel room access. They then use a mobile app and Bluetooth on their phone which is activated to unlock their particular room on the correct day. The benefits derived from applications in the hospitality arena have spilled over into the business access control sector, where consumer driven demand has resulted in a growing number of applications. Consumers concerned about phone batteries dying will not be left high and dry as the RFID card is used as a backup.

Du Toit says that the Salto locks use their own software and systems but they have also been integrated with the software and hardware of many leading access control developers. These integrations are enabled through both web interfaces and a cloud based system.

Malope says that ZMS key box units currently interface with 11 of the more well-known access control systems and the company continues to develop interfaces to further systems as the need arises or consumer demand dictates.

What about electronic keys?

Both Du Toit and Malope are wary about the use of electronic keys due to both the additional initial outlay as well as the cost involved in replacing them should they be lost or stolen. In addition, backup batteries are expensive, so it is always a good idea to ensure that one closely monitors the current battery level to ensure that these keys remain operational. They point out that the upside, however, is that they are difficult to duplicate, adding an additional element of security.

Another advantage of electronic keys that both interviewees acknowledge is that if a key is lost or stolen, it can be invalidated online. Systems can also call for regular revalidation of keys and when this does not occur, the key will be taken offline and will therefore stop working. If someone then tries to revalidate the electronic key at a revalidation point the system will indicate that the key is invalid. Loss of a mechanical key is more serious as one would then need to completely replace the lock to ensure complete security.

The bottom line here, says Malope is that you need to keep all keys in a key box on company premises before the key holder exits the premises. When in use, it needs to be traceable to the user and its location should be known at all times. In specific industries, such as the mines and in the gaming sector, the deposit of the key in a key box before an employee departs after a shift is legislated and non-negotiable. Not only does this ensure that keys are not stolen or lost, but the safety of the employee, who could be construed as a soft target when carrying a key outside company premises, is increased. The system can be programmed to automatically issue an exception report when a key which is allocated for daily use, has not been accessed on a particular day.

Mechanical keys are in many instances being superseded by technology such as RFID cards embedded with data that allow access by the allocated user. Lost cards for electronic locks can be cancelled on the fly, allowing an extra level of security not provided by conventional offline access card based systems. Salto has in fact instituted a system whereby revalidation is required and customisable time periods set for various people’s security levels – hourly, daily or weekly. An online solution using controllers can send a blacklist of users to any device by updating the card.

Du Toit suggests that where possible, one should use a mortice lock rather than a mag lock as this is the most secure element inside the door and is always fail secure unlike a mag lock which is failsafe.

Ultimately, the goal is to safeguard company assets and this can be assisted through knowing where the keys are at any given point and by protecting them through the use of an appropriate key box system. Furthermore, where budget allows, electronic door locks combined with RFID cards, will provide enhanced security due to their ability to be activated and deactivated remotely.

Product focus

All Zonke key boxes allow a number of access control modes to be used, including biometric fingerprint, card and PIN, either individually or in combination, depending on the security levels required. The key boxes range from a simple box built into the wall with a PIN used to open it, to more sophisticated vault-style applications. Options are available for private households and also for remote sites.

The Security Asset Manager (SAM) range includes key boxes in 8, 16, 32-, 64, or 96-key designs that house various options such as direct entrapment, interchangeable cores, custom cylinder mounting, tamper-proof key rings as well as KSI keys. The company’s electronic Tamper-Proof Key Rings provide high level security. After the key(s) are attached to the Tamper-Proof-Key Ring, the ends are sealed using a crimping tool. Every ring is stamped with a unique serial number, allowing complete audit of the ring and key.

SAM offers a self-contained fingerprint reader that stores biometric profile data directly in ZMS’ GFMS database. PIN and fingerprint verification provides dual security at the time of authorisation and users may enrol from either a desktop workstation or directly at any device within the GFMS network.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.