At its core, an EKA access control  installation comprises five elements:

how-it-works-1how-it-works-2how-it-works-3how-it-works-4how-it-works-5

When an EKA CyberKey meets an EKA lock, an instant information exchange determines whether the key has access to that specific lock. Whether access is granted or denied, the time of the event and the unique ID of the key used is stored in both the lock and the key.

EKA cylinders are the exact dimensions of the normal lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to being picked. As the EKA cylinder needs no power or wiring it’s ideal for remote and mobile assets.

Each EKA CyberKey contains a battery and the individual’s access privileges. This powers all the electronics and operates the lock. For example the key can be programmed to allow access from 8am to 6pm on weekdays and 10am to 4pm Sundays. It can even be programmed to expire so it cannot function until reactivated.

Access privileges are distributed through communicators linked to your EKA software via network or internet. When validating keys, the system downloads the key’s stored data for audit. It then uploads any new access privileges. EKA access privileges can be programmed to expire. This forces users to update keys regularly.

Centralised, web based software allows facility managers to assign keys, set access permissions and expiry times. They can also create access groups and schedules, and activate new EKA locks. It also enables auditing and tracking through reports and automatic notification of suspicious activities.

Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks electronic strikes, and even bio-metric devices.