AccessPilot software screenshots

Computer requirements

  • Windows-compatible PC with 2 GB hard disk space available.
  • Windows 10, Windows 8, Windows 7, Windows Vista, Windows 2012 Server or Windows 2008 Server.
  • USB port.
  • CD/DVD drive. (Prefer to download the software? It's right here.)

TimePilot created its AccessPilot software to give you absolute control over the CrossOver X15, X25, X45 and Doorstrike Controller. Using the software, you can:

  • Set up iButtons for employees.
  • Set the electronic clock that resides inside each lock.
  • Order individual locks to lock or unlock at various times.
  • Program the locks to allow access only to certain employees.
  • Program the locks to only allow access at certain times of day or certain days.
  • See who used the lock—or tried to use the lock—and when the event occurred.

The software comes as a part of our Lock Management Kit. Only one kit is necessary to use all the features of our CrossOver Locks, no matter how many locks you own. The software is simple to use and comes with an illustrated manual. Click here to see a copy of the manual in Adobe Acrobat (PDF) format. You can also view and download CrossOver lock installation templates by clicking here.

Some screenshots:

AccessPilot's main screen lists users and locks.

The software's main screen (above) lists users down the left side and the locks on the right. To get more information about a user or a lock, just double-click it. When you double-click a lock, the Lock Properties screen appears (shown below).

The Lock Properties screen shows who is authorized to use the lock. This is also where you set up your restrictions and apply them to users.

In this screenshot, you can see the name of the lock and its location at the top of the screen. At the bottom is a list of all users. The dot in the first column indicates that a user's iButton will operate a lock. Want to give another user permission? Just click the empty space next to their name to make the dot appear and transfer the change to the lock. Want to delete permission? Just click the dot to remove it and transfer the changes.

You can see that four of the six users have been given permission to operate the lock. The screen shows that:

  • The first user with permission is Brian Estok. He uses an iButton to operate the lock (as opposed to a keycode) and his access is not limited by date ("No Expiration"—see the fourth user, below, for an explanation). His daily access is limited to the Night Shift, which has been set up by his supervisor to give employees access Monday through Friday from 5 p.m. to 1 a.m. If he tries to operate the lock at any other time, he will be refused.
  • The second and third users with permission, Mike Hanlon and Sheree Womack, also use iButtons and are not limited by date. They work the day shift, which has been set up to give them access only Tuesday through Saturday between 7 a.m. and 6 p.m.
  • The fourth user, Tim Hanlon, works for an outside company that cleans ductwork. He needs access to the building, but not unlimited access. A supervisor issued him an iButton and has set up a Date Restriction called "Duct Cleaning" that limits his access to the lock to between October 21 at 8 a.m. and October 23 at 5 p.m. He'd better get the job done on time, because after 5 p.m., his iButton will not longer operate the lock! At the end of the job, Tim will turn in his iButton and the supervisor will re-program it for use by another employee or contractor.

Each lock keeps a list of who tapped their iButton to it (whether they had permission or not) and when. Supervisors can download that list, called an audit trail, whenever necessary. Below is a sample:

The Audit Trail screen shows who has tapped their iButton to the lock and when. Successful operations are in green; unsuccessful ones are in red.

This audit trail, from a lock called "HR Storeroom," shows the times an iButton was tapped to the lock on August 11, 2009. According to the first line, Sheree Womack tapped her iButton to the lock at 10:36:59 a.m., the lock unlocked and then re-locked itself. Successful operations are displayed in green.

Six seconds later, Doug Marsh tapped his iButton to the lock. He did not have permission to operate the lock, so it denied him access. The unsuccessful operation is displayed in red.

At the bottom of the screenshot, at 10:38:36 a.m., someone tried to access the lock and was denied. It is listed as "User Unknown" because the person's iButton is not listed in the AccessPilot database as a user.

AccessPilot software comes as a part of the CrossOver Lock Management Kit. Order a Management Kit and CrossOver Locks today!