Traditional Mechanical Locks Issues

  • Keys are usually distributed to users or stored in a central location, which requires suppliers to spend time to collect and return those keys and requires operators to manage those keys.
  • Keys are often copied leading to theft/degradation and as a result job sites go offline or need unbudgeted maintenance, leading to service interruption.
  • Once distributed there is no control over where and when the mechanical key is used.
  • There is little or no traceability on how long the user spent on a job site and this can have serious financial impact on operations, especially on remote job sites. Mechanical locks are not safe and can be easily bumped/picked providing no security for the job site.
  • Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the job site. Despite security measures such as high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs.

Acsys Mechatronic Solutions

  • The Acsys solution offers controlled and secured access rights distribution.
  • Acsys locks CANNOT be picked or bumped and are very difficult to drill.
  • Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED. The main advantage is that keys can ONLY be used during the time the operator has configured them to work.
  • The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed, giving the operator CONTROL over the amount of time spent by suppliers on job sites (and the cost of the intervention).
  • Keys cannot be copied, so no access is possible outside the access rights working hours.
  • If someone TRIES to access without having rights, that will be stored in the key and lock.
  • Access can be granted to SPECIFIC JOB SITES and SPECIFIC ASSETS on those job sites.
  • If 3 WRONG codes are entered on the Keypad/CGS key it will automatically DISABLE itself.

Comparison with conventional access control solutions


  • Keys can and are continuously being copied, leading to theft, fraud, and loss of property, as well as loss of productive company/personal time.
  • Keys are lost and or stolen, requiring frequent replacement of existing locks and keys.
  • Mechanical locks can be picked, bumped and drilled easily.
  • Once keys are given, it is impossible to track the usage of that key.


  • It is very expensive and often impractical to wire every door in a building, also it limits expandability as wiring needs to be planned, requires drilling and mounting, and necessarily, power.
  • Card readers and magnets need constant power and will automatically open during power outages.
  • Card readers are very vulnerable to sabotage and vandalism.
  • Card systems cannot be used on remote sites or sites where there is no power such as gates/enclosures/storage areas etc…


  • Need every finger one by one on the door
  • Cannot create temporary access
  • Requires batteries and maintenance
  • Uses mechanical override lock


  • Always requires power and TCP/IP connection
  • Is not easy to install
  • Require a lot of cleaning/maintenance

Keywords: Mechatronic padlocks Programmable keys Electronic keys mechatronic lock