Page 3 - iLOQ_5_Series_2021-ENG
P. 3

iLOQ 5 Series

                                                 One step forward –
                                                 another step ahead

                                                 Thanks to new opportunities offered by
                                                 digitalization and the internet of things,
                                                 it is now possible to manage our unique
                                                 key-based locking system and ground-
                                                 breaking mobile-phone-based locking
                                                 solution from the same, easy-to-use
                                                 cloud-based SaaS platform.

                         Unique benefits

                     of the iLOQ 5 Series

Multiple             Smarter,                    State-of-                    Streamlined
access               more simple                 the-art                      operations
possibilities        cloud-based                 security
                     administration                                           Standard, open
Choose your way of                               •	 Access rights always      application programming
access:              •	 One flexible, scalable,       up to date              interface (API) allows
                          easy-to-use cloud-                                  integration with:
•	 iLOQ S5 key            based SaaS platform    •	 Access rights of lost,
•	 iLOQ S50 NFC                                       stolen or unreturned    •	 modern information-
                     •	 Device-to-device              keys easily blocked          sharing systems
     phone key            communication – data
•	 iLOQ S50 key fob       remotely updated       •	 Expired keys have         •	 booking systems
•	 PIN code               and shared between          no access without       •	 customer personal
                          smartphones,                administrative actions
                          readers, keys and                                        databases
                          locks before the door  •	 AES-256 encryption
                          is opened                   through all system                          3
                                                      components
   1   2   3   4   5   6   7   8