An electronic lock (or electric lock) is a
locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an
access control
In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and to unlock.
Operation
Electric locks use magnets,
solenoid
upright=1.20, An illustration of a solenoid
upright=1.20, Magnetic field created by a seven-loop solenoid (cross-sectional view) described using field lines
A solenoid () is a type of electromagnet formed by a helix, helical coil of wire whos ...
s, or motors to actuate the lock by either supplying or removing power. Operating the lock can be as simple as using a switch, for example an apartment intercom door release, or as complex as a
biometric
Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
based
access control
In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
system.
There are two basic types of locks: "preventing mechanism" or operation mechanism.
Types
Electromagnetic lock
The most basic type of electronic lock is a
magnetic lock
An electromagnetic lock, magnetic lock, or maglock is a Lock (security device), locking device that consists of an electromagnet and an armature plate.
Operation
The principle behind an electromagnetic lock is the use of electromagnetism to ...
(informally called a "mag lock"). A large electro-magnet is mounted on the door frame and a corresponding armature is mounted on the door. When the magnet is powered and the door is closed, the armature is held fast to the magnet. Mag locks are simple to install and are very attack-resistant. One drawback is that improperly installed or maintained mag locks can fall on people, and also that one must unlock the mag lock to both enter and to leave. This has caused
fire marshal
A fire marshal, in the United States and Canada, is often a member of a state, provincial or territorial government, but may be part of a building department or a separate department altogether. Fire marshals' duties vary but usually include ...
s to impose
strict rules on the use of mag locks and access control practice in general. Additionally,
NFPA 101 (Standard for Life Safety and Security), as well as the
ADA (Americans with Disability Act) require "no prior knowledge" and "one simple movement" to allow "free egress". This means that in an emergency, a person must be able to move to a door and immediately exit with one motion (requiring no push buttons, having another person unlock the door, reading a sign, or "special knowledge").
Other problems include a
lag time (delay), because the collapsing
magnetic field
A magnetic field (sometimes called B-field) is a physical field that describes the magnetic influence on moving electric charges, electric currents, and magnetic materials. A moving charge in a magnetic field experiences a force perpendicular ...
holding the door shut does not release instantaneously. This lag time can cause a user to collide with the still-locked door. Finally, mag locks fail unlocked, in other words, if electrical power is removed they unlock. This could be a problem where security is a primary concern. Additionally, power outages could affect mag locks installed on
fire listed doors, which are required to remain latched at all times except when personnel are passing through. Most mag lock designs would not meet current fire codes as the primary means of securing a fire listed door to a frame. Because of this, many commercial doors (this typically does not apply to private residences) are moving over to stand-alone locks, or electric locks installed under a
Certified Personnel Program
Certification is part of testing, inspection and certification and the provision by an independent body of written assurance (a certificate) that the product, service or system in question meets specific requirements. It is the formal attestatio ...
.
The first mechanical recodable card lock was invented in 1976 by
Tor Sørnes, who had worked for
VingCard since the 1950s. The first card lock order was shipped in 1979 to
Westin Peachtree Plaza Hotel, Atlanta, US. This product triggered the evolution of electronic locks for the hospitality industry.
Electronic strikes
Electric strikes (also called electric latch release) replace a standard strike mounted on the door frame and receive the
latch
A latch or catch (called sneck in Northern England and Scotland) is a type of mechanical fastener that joins two or more objects or surfaces while allowing for their regular separation. A latch typically engages another piece of hardware on the ...
and latch bolt. Electric strikes can be simplest to install when they are designed for one-for-one drop-in replacement of a standard strike, but some electric strike designs require that the door frame be heavily modified. Installation of a strike into a fire listed door (for open backed strikes on pairs of doors) or the frame must be done under listing agency authority, if any modifications to the frame are required (mostly for commercial doors and frames). In the US, since there is no current Certified Personnel Program to allow field installation of electric strikes into fire listed door openings, listing agency field evaluations would most likely require the door and frame to be de-listed and replaced.
Electric strikes can allow mechanical free egress: a departing person operates the
lockset in the door, not the electric strike in the door frame. Electric strikes can also be either "fail unlocked" (except in Fire Listed Doors, as they must remain latched when power is not present), or the more-secure "fail locked" design. Electric strikes are easier to attack than a mag lock. It is simple to lever the door open at the strike, as often there is an increased gap between the strike and the door latch.
Latch guard plates are often used to cover this gap.
Electronic deadbolts and latches
Electric mortise and cylindrical locks are drop-in replacements for door-mounted mechanical locks. An additional hole must be drilled in the door for electric power wires. Also, a power transfer hinge is often used to get the power from the door frame to the door. Electric mortise and cylindrical locks allow mechanical free egress, and can be either fail unlocked or fail locked. In the US, UL rated doors must retain their rating: in new construction doors are cored and then rated. but in retrofits, the doors must be re-rated.
Electrified exit hardware, sometimes called "panic hardware" or "
crash bars", are used in fire exit applications. A person wishing to exit pushes against the bar to open the door, making it the easiest of mechanically-free exit methods. Electrified exit hardware can be either fail unlocked or fail locked. A drawback of electrified exit hardware is their complexity, which requires skill to install and maintenance to assure proper function. Only hardware labeled "Fire Exit Hardware" can be installed on fire listed doors and frames and must meet both panic exit listing standards and fire listing standards.
Motor-operated locks are used throughout Europe. A European motor-operated lock has two modes, day mode where only the latch is electrically operated, and night mode where the more secure
deadbolt
A deadbolt or deadlock is a type of lock morticed into a wooden door where a bolt is thrown into the door frame, using a key from either side, to secure the door. It is distinct from a spring bolt lock because a deadbolt can only be opened by ...
is electrically operated.
In South Korea, most homes and apartments have installed electronic locks, which are currently replacing the lock systems in older homes. South Korea mainly uses a lock system by Gateman.
Passive electronic lock

The "passive" in passive electronic locks means no power supply. Like
electronic deadbolts, it is a drop-in replacement for mechanical locks. But the difference is that passive electronic locks do not require wiring and are easy to install.
The passive electronic lock integrates a miniature electronic single-chip
microcomputer
A microcomputer is a small, relatively inexpensive computer having a central processing unit (CPU) made out of a microprocessor. The computer also includes memory and input/output (I/O) circuitry together mounted on a printed circuit board (P ...
. There is no mechanical keyhole, only three metal contacts are retained. When unlocking, insert the electronic key into the keyhole of the passive electronic lock, that is, the three contacts on the head end of the key are in contact with the three contacts on the passive electronic lock. At this time, the key will supply power to the passive electronic lock, and at the same time, read the ID number of the passive electronic lock for verification. When the verification is passed, the key will power the coil in the passive electronic lock. The coil generates a magnetic field and drives the magnet in the passive electronic lock to unlock. At the moment, turn the key to drive the mechanical structure in the passive electronic lock to unlock the lock body. After successful unlocking, the key records the ID number of the passive electronic lock and also records the time of unlocking the passive electronic lock. Passive electronic locks can only be unlocked by a key with unlocking authority, and unlocking will fail if there is no unlocking authority.
Passive electronic locks are currently used in a number of specialized fields, such as power utilities, water utilities, public safety, transportation, data centers, etc.
Programmable lock
The programmable electronic lock system is realized by programmable keys, electronic locks and software. When the identification code of the key matches the identification code of the lock, all available keys are operated to unlock. The internal structure of the lock contains a cylinder, which has a contact (lock slot) that is in contact with the key, and a part of it is an electronic control device to store and verify the received identification code and respond (whether it is unlocked). The key contains a power supply device, usually a rechargeable battery or a replaceable battery in the key, used to drive the system to work; it also includes an electronic storage and control device for storing the identification code of the lock.
The software is used to set and modify the data of each key and lock.
Using this type of key and lock control system does not need to change user habits. In addition, compared with the previous mechanical device, its advantage is that only one key can open multiple locks instead of a bunch of keys like the current one. A single key can contain many lock identification codes; which can set the unlock permission for a single user.
Authentication methods

A feature of electronic locks is that the locks can deactivated or opened by
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
, without the use of a traditional physical
key:
Numerical codes, passwords, and passphrases
Perhaps the most common form of electronic lock uses a keypad to enter a numerical code or
password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
for authentication. Some feature an audible response to each press. Combination lengths are usually between four and six digits long.
Security tokens
Another means of authenticating users is to require them to scan or "swipe" a
security token
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked door ...
such as a
smart card
A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit card-sized card with an Embedded system, embedded integrated circuit (IC) chip. Many smart ...
or similar, or to interact a token with the lock. For example, some locks can access stored credentials on a
personal digital assistant
A personal digital assistant (PDA) is a multi-purpose mobile device which functions as a personal information manager. Following a boom in the 1990s and 2000s, PDAs were mostly displaced by the widespread adoption of more highly capable smar ...
(PDA) or smartphone, by using
infrared
Infrared (IR; sometimes called infrared light) is electromagnetic radiation (EMR) with wavelengths longer than that of visible light but shorter than microwaves. The infrared spectral band begins with the waves that are just longer than those ...
,
Bluetooth
Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is li ...
, or
NFC data transfer methods.
Biometrics
As
biometrics
Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
become more and more prominent as a recognized means of positive identification, their use in security systems increases. Some electronic locks take advantage of technologies such as
fingerprint
A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfa ...
scanning,
retinal scan
A retinal scan is a biometric technique that uses unique patterns on a person's retina blood vessels. It is not to be confused with other ocular-based technologies: iris recognition, commonly called an "iris scan", and eye vein verification that ...
ning, iris scanning and
voice print identification to authenticate users.
RFID
Radio-frequency identification
Radio-frequency identification (RFID) uses electromagnetic fields to automatically Automatic identification system, identify and Tracking system, track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, ...
(RFID) is the use of an object (typically referred to as an "RFID tag") applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. This technology is also used in some modern electronic locks. The technology has been approved since before the 1970s, but has become much more prevalent in recent years due to its usages in things like global supply chain management and pet microchipping.
See also
*
Access badge
*
Common Access Card
The common access card, also commonly referred to as the CAC, is the standard identification for active duty United States defense personnel. The card itself is a smart card about the size of a credit card. Defense personnel that use the CAC inc ...
(CAC)
*
Credential
A credential is a piece of any document that details a qualification, competence, or authority issued to an individual by a third party with a relevant or ''de facto'' authority or assumed competence to do so.
Examples of credentials include aca ...
*
Electric strike
An electric strike is an access control device used for door frames. It replaces the fixed strike faceplate often used with a latch (also known as a ''keeper'').
Description
Like a fixed strike plate, an electric strike plate normally prese ...
*
Electromagnetic lock
An electromagnetic lock, magnetic lock, or maglock is a locking device that consists of an electromagnet and an armature plate.
Operation
The principle behind an electromagnetic lock is the use of electromagnetism to lock a door when energi ...
*
Keycard
*
Physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physi ...
References
{{Locksmithing
Locks (security device)
Electronic circuits
Articles containing video clips