PRODUCT SPECIFICATIONS

STEALTH KEY & CYLINDERS

 Stealth Keys make unauthorized duplication of security keys extremely difficult.
image/svg+xml image/svg+xml
Hidden Security Code

The Stealth Keys hide their mechanical code internally ensuring that it cannot be photographed nor scanned.

Fortified with Anti Drill Segments

Anti-Drill Cap & Pins made from a high resistant stainless steel,
Lock Picking & Bump Resistant

Modular Design

Modular design for easy extension based on a central connecting bar and housing extensions connected by fixing segments

7+7 Stainless Steel Discs

Durability> 100, 000 cycles,
5 million bitting combinations

NO ELECTRONIC.

NO MAGNETS.

NO KEY BLANKS.

The Stealth Keys hide their mechanical code internally ensuring that it cannot be photographed nor scanned.

Maximum Key Copy Protection

Purely Mechanical Solution

Ultimate Customization

No Key Blanks

10 Years Guarantee*
 Engineered in Switzerland


URBAN ALPS

Patents & Trademarks

Urban Alps holds the following international Patents and Trademarks.

World Patent
WO2015051475
Swiss Patent
CH710314
PCT Patent
EP3055467

International Trademark

1312061
STEALTH TECHNOLOGY

The Superiority of Stealth

Revolutionary technology with unique and superior key copy protection
Purely mechanical solutions that significantly reduce the duplication risk of high security keys
Key cuts that are practically invisible. They cannot be seen, photographed or scanned
Keys, cylinders and padlocks that are designed for harsh environments
NO maintenance. NO batteries. NO cables. NO magnets. NO errors
ULTIMATE CUSTOMISATION of cut design and key production
Stealth Cylinders fit European and US standards
Zero Management. Zero Overhead.

How Secure are your Digital Solutions?

The management of complex digital security systems are not only expensive and labour-intensive, they are also open to compromise. For every encryption or firewall developed there is equally skilled hacker just itching to break it wide open.
This is the unfortunately reality of digital security solutions. They are only robust until someone, somewhere in the world takes it down, and worse, shares the breach with everyone. Stealth technology avoids this entire Pandora’s Box by counting on robust, reliable physical security.

Require customisable solutions?

Let’s talk

CONTACT US