Access Control Systems LocksmithingHow it works
At its core, an EKA access control installation comprises five elements:
When an EKA Cyber Key meets an EKA lock, an instant information exchange determines whether the key has access to that specific lock. Whether access is granted or denied, the time of the event and the unique ID of the key used are stored in both the lock and the key.
EKA cylinders are the exact dimensions of the normal lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to being picked. As the EKA cylinder needs no power or wiring its ideal for remote and mobile assets.
Each EKA Cyber Key contains a battery and the individual’s access privileges. This powers all the electronics and operates the lock. For example the key can be programmed to allow access from 8am to 6pm on weekdays and 10am to 4pm Sundays. It can even be programmed to expire so it cannot function until reactivated.
Access privileges are distributed through communicators linked to your EKA software via network or internet. When validating keys, the system downloads the key’s stored data for audit. It then uploads any new access privileges. EKA access privileges can be programmed to expire. This forces users to update keys regularly.
Centralised, web based software allows facility managers to assign keys, set access permissions and expiry times. They can also create access groups and schedules, and activate new EKA locks. It also enables auditing and tracking through reports and automatic notification of suspicious activities.
Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks electronic strikes, and even bio-metric devices.
Access Control Systems(Stand alone – wireless system)
EKA’s next-gen access control technology is the cutting-edge security solution for any industry or sector that needs a sure way to secure, control and audit assets beyond the door.
Whether it’s a cage, a cupboard, a case, a container, a cash bag or a gate, if you can put a lock on it, EKA can secure and control it.
How EKA works for users
EKA is simple and intuitive to use. Users are issued a Cyber key loaded with the individual’s access privileges. These privileges are distributed through Communicators linked to the EKA software via a network or internet. User simply enters their Cyberkey into the Communicator to update access privileges.
How EKA compares to other remote access systems
EKA is the only access control system that can secure, control and audit all assets from the front door
to assets in remote locations.
Make an Enquiry