Skip to Content

LOCKS. REINVENTED. 

Not your traditional lock 

With a form factor that is a direct replacement for all your traditional locks, we can directly replace it with electronic, multi-factor authenticated locks. Adding centralised authorisation, revocation and auditing capabilities in the field. No modifications to your existing cabinets or equipment are necessary.

Find out more

Manage all your users and their access levels centrally, for real-time access on the field.

Use Cases​ 

Tony

As the site supervisor, my team and I need to access locked equipment and cabinets regularly. Having the convenience of one key in our pocket that can open everything we're meant to access, even when there are no phone or wifi service, is absolutely priceless to our productivity.

Mich

Everything we handle is sensitive in nature, from evidence to firearms. We now have the ability to assure the correct people are accessing the correct assets at all times and be accountable for it whilst in their care. The system audits every action and have significantly improved self-integrity, trust, and overall credibility of our force.

Amy 

Here in the hospital, we can tightly control our supplies without losing efficiency. Everyone knows what they need and how they can access it quickly even under a stressful situation. Manual paperwork have been substantially reduced as access records are automated, compliance and response times have both improved.

Lenka 

Electric and data components are high risk and high stakes today. We need to secure them from vandals but not be inconvenienced when we respond to urgent incidents. Traditional PIN locks used to work but they are unreliable exposed to the elements, and when multiple contractors are involved at a site and things go wrong, everyone's just pointing fingers. It's not productive.

 Dylan

Our cargo containers may route through many hands and ports in transit, this system can irrefutably prove locked containers have not been opened until it arrives at the final destination port. Legitimate inspections can also take place without breaching that integrity or trust. Being able to provide that at lower cost than the alternative is a game-changer.

 Brad

A lot of our machines and equipment require regular scheduled maintenance. Whilst we fill out logbooks, this system adds verifiable evidence to that record. It further proves that I have locked up correctly and power cycled the equipment after I'm done. We take pride in our work and this has become a tool for us to show that.

How it works


The core of our technology is our patented barrel. This barrel replaces the traditional key and pin barrel of a mechanical lock with a passive powered one. The barrel is IP58 rated and contains sealed electronic circuitry to faciliate authentication with the key. A unique challenge is sent to the key, the key requires multiple factors of authentication before it is able to calculate a response. A successful response actuates a motor inside the barrel to actuate the locking pin. The orientation of the locking pin and motor means it is not susceptible to external strong magnet attacks.


Each organisation will have their own unique access to our cloud management platform. Self-hosted options are also possible. Every lock issued to that organisation, including any subsidiaries, can be centrally managed. Access can be granted based on groups/types of locks, date/time, shift days/hours, or even with a GPS-based geo-fencing. Advanced features such as time delays, two-man rules, delegated access and emergency access for areas without internet access, are all possible. 

All user activity such as lock and unlocking events, including time and location (where possible) are securely audited to create a trust loop.

The users simply download our authentication app for their phone, login to their email address to identify who they are within the organisation. The server is now ready to authenticate their access to each lock they attempt to open. The phone communicates to the key with bluetooth low-energy profile. As long as both key and phone are in close proximity, the key will continue to work.

For organisations that expect their users to work outside of metropolitan areas, or in areas where mobile/Wi-Fi reception are unstable or not available, the administrators can opt to enable Emergency access options for the user. That will allow the app and key to work in off-line mode temporarily.

After the phone have paired with the key, the user must still activate the key itself before each use. There are several options available ranging from activation via phone app, a UserID + PIN pair entry on the key's keypad, or use the fingerprint reader once their fingerprints are enrolled. 

In a multi-person integrity implementation, all authorisers must enter their respective codes, or scan their fingerprints, on the same key, before the lock can be unlocked. 

The key itself can optionally have a unique groove milled into the blade which must match the lock's profile before electronic authentication can commence. Adding an extra layer of security for high-demand applications. 

Due to the multi-factor authentication nature of these keys, if any keys are lost or damaged in the field, the old key cannot function without genuine authority from the user. Any available key (including blank spares or another user's key) can be immediately paired to the user's phone and function exactly as their own key.


Our range of locks are ever expanding. There is already a wide range of locks that will meet most existing applications. If your existing lock uses a barrel and a key turns it, there's a good chance we can directly replace it. We can also support customisations for specialist locks. Contact us for more information


Please note whilst we have an online shop to order replacement locks and keys, these are not currently available directly to the consumer. Our products are intended for commercial applications at this stage and we must provision lock profiles for your organisation individually. This may change in the future, but until then, please contact us before you place any orders online.

Security without compromise

Secure your assets with our advanced security solutions.