What’s an encrypted block?

Print anything with Printful



Cipher locks are programmable keypads used to limit access to sensitive areas. The Cypher Lock® by Continental Instruments is a specific type. They can have four or five buttons and be mechanical or electronic. They can be combined with alarms and time settings for added security.

A lock refers to a number of types of devices for securing a door. While there are combination locks, smart card locks, and keyed locks, the mechanism known as a cipher lock is opened with a programmable keypad and, by definition, is not a true lock. There is also a specific type of cipher lock called the Cypher Lock®, developed by Continental Instruments, now a division of Napco Security Group.

The United States military distinguishes the use of cipher locks and keyed locks, stating that the purpose of keyed locks is to maintain physical security, while the purpose of cipher locks is to control access, limiting intrusion without warning or unescorted entry to particular areas of a facility that are sensitive. Cipher locks are used to control access to areas such as airport control towers, computer rooms, corporate offices, embassies, areas within financial institutions, research and development laboratories, and storage areas that hold weapons, controlled substances, etc.

A cipher block may have four or five buttons, depending on the manufacturer. Even with five buttons, the code can be one to five digits. When the cipher lock unit is set up, the code is programmed and shared with authorized personnel. It can be changed at any time.

Encrypted padlocks come in a variety of metallic colors and can be fitted with a knob or a lever. The system can be mechanical, as in the case of encrypted locks made by Simplex or electronic, such as the Cypher Lock®. An electronic system allows the door to be unlocked from a point inside the room when a visitor without the code arrives.

The Cypher Lock® in particular can be combined with a pre-set time for the door to open and a battery stand system. There are three types of alarm system available. An anti-theft interface is available to indicate when the port is breached. An error alarm can reveal someone trying to guess the code. Finally, a hostage alarm can be triggered to indicate that entry has been made under duress.




Protect your devices with Threat Protection by NordVPN


Skip to content