iLOQ logo

Intellligent locking platform

that maximises security and minimises lifecycle costs

One platform, many features

Thanks to opportunities offered by digitalization, you can now choose iLOQ’s key-based system, the mobile solution or even a combination of the two. With all access rights managed using the same software platform, iLOQ 5 Series fulfills the access management needs of all properties and user environments.

iLOQ telefon klucz
Office - no batteries

Battery-free access

With our key-based digital locking system, the power needed to confirm access rights and open locks comes from the motion of inserting the key into the lock. No batteries or cables are needed.

iLOQ cylinders replace existing cylinders with no modifications needed to doors or the infrastructure.

Outstanding benefits

access possibilities

Digital key – can be used as a traditional key or with a reader

Smartphone key

Key fob

PIN code

Smarter, simpler administration

One flexible, scalable, easyto-use cloud-based SaaS platform.

Device-to-device communication between keys, locks, smartphones, readers and the software platform.

State-of-the-art security

Lost, stolen or unreturned keys are immediately blocked.

Expired keys have no access without administrative actions.

Confidential data protected with strong encryption

Streamlined operations

iLOQ’s standard, open application programming interface creates a multitude of integration possibilities.

Top security features

Data security

Customer databases are located on an ISO 27001:2013-certified cloud server

A log-in procedure (separate encryption of data) is needed for the client software installed on a customer’s PC that manages the system.

Each customer has their own SQL Server database, which is completely separate from other databases and isolated from the internet (communications through a web server).

Distributed security

A physical programming key is required for security-critical programming tasks – this is connected to the customer PC’s USB port.

Secure system architecture

All communications are protected with AES-256 encryption, and devices are securely programmed to the system using a programming key

Device security

Device identity is ensured by strong PKI-based (public key infrastructure) authentication.

There is mutual authentication (AES-256-encrypted) between the key and lock.

Functionalities at a glance

  • Convenient management of locks, keys, sites
    and users on a single platform
  • Access rights quickly and simply defined, updated and canceled
  • Real-time views of access rights, access codes, keys, locks and readers on property floor plans
  • Time restrictions can be set
  • Possibility to overwrite automatic keys
  • Lost or stolen keys can be immediately blocked
  • Audit trail reports track use and help prevent misuse
  • Quick and simple multi-site management
  • 24/7 Internet connection
  • Fast and easy installation
  • Automatic backups and updates
  • User-friendly graphical user interface
  • High system security
  • Powerful data encryption methods
  • No need to invest in dedicated hardware and software IT
  • No in-house server maintenance costs
  • Device-to-device communication
  • Secure login with a physical token
  • API integration

iLOQ products

Would you like to know more? Contact us!