Investigating electronic locks and keys

July 2016 Access Control & Identity Management, Asset Management

The million-dollar question is whether you would be happy having your keys fall into the hands of someone who might have criminal intent? Rhetorical question? Perhaps. But what are you actively doing to ensure that each key your business owns is traceable and remains within your facilities?

Wouter du Toit, Salto Systems.
Wouter du Toit, Salto Systems.

As a precursor to the discussion, it is important to point out that there is a marked difference between electronic keys and electronic locks. Wouter du Toit of Salto Systems says that his company has been in the business of designing and manufacturing electronic locks for a wide variety of industries over a number of years.

The beauty of an electronic lock is that it can use some of the elements of existing mechanical locks and is accessed with RFID cards. These electronic lock sets work with mechanical mortice locks in the door itself.

In addition, Salto’s range also includes escutcheons which are finding growing popularity for use at fire doors and emergency exits. All Salto locks require no external power supply and they are completely wireless.

Electronic locks, says Du Toit, can be integrated with a building’s access control element on the door to provide additional security. These locks are quicker to install than a standard access control reader and can be accessed and controlled via a mobile phone or fob.

Hosea Malope, Zonke Monitoring Systems.
Hosea Malope, Zonke Monitoring Systems.

Hosea Malope of Zonke Monitoring Systems (ZMS), says that monitoring of keys, whether electronic or manual, will provide organisations with greater assurance that their assets are protected. A reputable key management system should both log keys and track them, with predefined instructions on who is permitted to take a specific key and when the key must be returned to the safety of the key box. In addition, the system should have the ability to raise an alert when the key is not returned within the given time parameters.

Tracking can be performed through a web based system that is accessible via a mobile device or PC. This system will provide a real-time indication of where a key is at all times and can remotely allocate a key, as well as the specific function of the key, to a particular person.

Du Toit says that electronic locks can be integrated with access control systems through a mobile phone using mobile apps with Bluetooth functionality or near field communication (NFC). The connection with the remote server will establish whether you have the pre-programmed functionality to enter the door. Presently, Salto locks are enabled to work on Samsung Android devices and iOS phones.

“Rather than opening the door as such, this technology is used to update the RFID card which performs the role of a key for the door in question. This is particularly useful for mobile workforces, specifically where no network infrastructure is available. One therefore uses one’s phone for updating the credentials of the card,” says Du Toit.

Mobile solutions via Bluetooth started this initiative in the hospitality sector, where guests were sent the credentials of their hotel room access. They then use a mobile app and Bluetooth on their phone which is activated to unlock their particular room on the correct day. The benefits derived from applications in the hospitality arena have spilled over into the business access control sector, where consumer driven demand has resulted in a growing number of applications. Consumers concerned about phone batteries dying will not be left high and dry as the RFID card is used as a backup.

Du Toit says that the Salto locks use their own software and systems but they have also been integrated with the software and hardware of many leading access control developers. These integrations are enabled through both web interfaces and a cloud based system.

Malope says that ZMS key box units currently interface with 11 of the more well-known access control systems and the company continues to develop interfaces to further systems as the need arises or consumer demand dictates.

What about electronic keys?

Both Du Toit and Malope are wary about the use of electronic keys due to both the additional initial outlay as well as the cost involved in replacing them should they be lost or stolen. In addition, backup batteries are expensive, so it is always a good idea to ensure that one closely monitors the current battery level to ensure that these keys remain operational. They point out that the upside, however, is that they are difficult to duplicate, adding an additional element of security.

Another advantage of electronic keys that both interviewees acknowledge is that if a key is lost or stolen, it can be invalidated online. Systems can also call for regular revalidation of keys and when this does not occur, the key will be taken offline and will therefore stop working. If someone then tries to revalidate the electronic key at a revalidation point the system will indicate that the key is invalid. Loss of a mechanical key is more serious as one would then need to completely replace the lock to ensure complete security.

The bottom line here, says Malope is that you need to keep all keys in a key box on company premises before the key holder exits the premises. When in use, it needs to be traceable to the user and its location should be known at all times. In specific industries, such as the mines and in the gaming sector, the deposit of the key in a key box before an employee departs after a shift is legislated and non-negotiable. Not only does this ensure that keys are not stolen or lost, but the safety of the employee, who could be construed as a soft target when carrying a key outside company premises, is increased. The system can be programmed to automatically issue an exception report when a key which is allocated for daily use, has not been accessed on a particular day.

Mechanical keys are in many instances being superseded by technology such as RFID cards embedded with data that allow access by the allocated user. Lost cards for electronic locks can be cancelled on the fly, allowing an extra level of security not provided by conventional offline access card based systems. Salto has in fact instituted a system whereby revalidation is required and customisable time periods set for various people’s security levels – hourly, daily or weekly. An online solution using controllers can send a blacklist of users to any device by updating the card.

Du Toit suggests that where possible, one should use a mortice lock rather than a mag lock as this is the most secure element inside the door and is always fail secure unlike a mag lock which is failsafe.

Ultimately, the goal is to safeguard company assets and this can be assisted through knowing where the keys are at any given point and by protecting them through the use of an appropriate key box system. Furthermore, where budget allows, electronic door locks combined with RFID cards, will provide enhanced security due to their ability to be activated and deactivated remotely.

Product focus

All Zonke key boxes allow a number of access control modes to be used, including biometric fingerprint, card and PIN, either individually or in combination, depending on the security levels required. The key boxes range from a simple box built into the wall with a PIN used to open it, to more sophisticated vault-style applications. Options are available for private households and also for remote sites.

The Security Asset Manager (SAM) range includes key boxes in 8, 16, 32-, 64, or 96-key designs that house various options such as direct entrapment, interchangeable cores, custom cylinder mounting, tamper-proof key rings as well as KSI keys. The company’s electronic Tamper-Proof Key Rings provide high level security. After the key(s) are attached to the Tamper-Proof-Key Ring, the ends are sealed using a crimping tool. Every ring is stamped with a unique serial number, allowing complete audit of the ring and key.

SAM offers a self-contained fingerprint reader that stores biometric profile data directly in ZMS’ GFMS database. PIN and fingerprint verification provides dual security at the time of authorisation and users may enrol from either a desktop workstation or directly at any device within the GFMS network.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Know where your asset is - not was
IoT & Automation Asset Management
To properly prevent loss of movable assets, companies need an early warning system, traceability throughout the chain of custody, and intelligence on parameters such as temperature, humidity, and impact.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.