Lock Keyways For Access Control Guide

By Brian Rhodes, Published Mar 23, 2017, 09:20am EDT

Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently commented:

My biggest problem is specifying the right hardware with the wrong keyway

In this note, we examine keyways, identify which ones are most commonly used, how to identify them, and how they improve lock security.

Keyways Explained

The hole inside a lock is designed to fit specific shapes of keys. This key path is critically important, because not only does it keep potentially invalid keys out, it also precisely indexes a valid key in the right spot to move pins for unlocking it:

If not properly identified, the keyway will physically prevent a key from fitting into it.  Within the context of physical access control, proper keyway identification is as fundamental as choosing the right lock type or evaluating door swing.

Common Keyways

In the commercial door hardware market, there are thousands of different lock keyway profiles, but comparatively few are widely used. In terms of modern mainstream global use, these five keyways are the most commonly adopted:

***** ******** ******** *** vary, *** ******* ***** are ********* ***** ** small-medium ********** *** *********** locks, ******** ***** *** in ****-******** ***** ** not ********.

**** ***** ******** ** the ******, ***** ******* were ********** ** *******, but *********** ***** *** have *** **** ** use *** ******** ******* (75+ *****), ****** ********** has ****** *** *** designs *** ****** ***********.  Despite ***** ******* ******* brand ***** **** '****', 'Schlage', *** '*******', ***** keyways *** *********** **** by ********* ****** *** fit *********** ************ *** blanks **** ** ******.

***** **** *** ****** close ************ ******* ***** profiles. *** *******, *** keys *** ****** *** keyways, *** **** *** open *** ****.  **** is *** ** *** 6-pin *********** ** *** locks ****** *** *-*** variants ** ***.  ** while *** ******** ***** of *** ******* ** the ****, **** ***** require ********* *** ***** and *********** *** ********** as ********* *******.

Determing ****** ****

**** ********* **** *******, the ******* *** **** accurate ****** *** ******* keyway ***** **** ******* a *** ********* ****** for ***:

*. *** **** *******

*** ***** ** *** key's ***, ** ***** your ******* ***** **, can ******* **** *** which ****** ** ***** used. *** **** ************ may *** ******* ********* key *** ******** *******, each *** ******** ** a ********** ******. **** profile *** ** ******** to ********* *******, *** ******* ** the **** *********** ****** for **** ***** *****.  Hardware ************ *** **** supply ********* ***** **** these ******** *** ** a *********** ****, *** the ******** ********** ** stock **** ******* **** distribute.

*. **** ********

** **** *****, *** head ** *** ** they *** **** ******* be ******* **** *** particular ******. **** *********** makes ******* *** ****** simple, ******** **** **** may *** ****** ** present, ********** ** *********** or ******* *********.  ***** stamps *** ********* ******* on *** ** ******* keyblanks.

*. ******* ********

*** **** ********* *** mistake ***** ****** ******** 'reading' *** ******* ** the **** *** ******** it ** *** **** represented ** ********* *******. ***** **** ****** takes ******* ********* ** detail, ********** ********* ****** up *** ******* ** only * ******* ****** of ******* *** ********* used ** * ********** region.

Important **** ******** *****

** ***** ** ****** control ***, ********* *** correct ******** ***** ******** ordering *** ***** **** use ******** *******. *** nomenclature **** **** ******** varies, *** ***** **** correlation ***** ******* ******* and **** ***** *****:

**** ****** ********** *****, *** ***** ****** is ********* **** ***** manufacturer, **** ** * particular **** ****** *** not ** ******** ** every **** ******.  *******, once *** ****** ** known, ********** **** ***** can ** ******* *******, and **** ********** *** systems **** ******* **** various *******.

Restricted *******

** ** *** ****** a *** ******** ** use ******** *******/****.  ** fact, **** **** ******** **** manufacturers ***** '********** *******' or **** *********** ****** locks ** * ******** feature, *** ** *** limited ************ ** ********* in *** ***** **** can ** *** ** match *****. ***** *** sign *********** ********** **** manufacturers **** **** **** proprietary *** ** ******* and * ***** ******** process ** ******* ********* to ******** ********* ** personnel *** ** ****.

*** **** ** ******* 'adding ********' ********* ***** from *** ******* **** the ****** ** **** that *** ** **** to *** *** **** can ** ******* **********.  In **** *****, ********** locks *** **** *** more ****** **** ******, because *** ***** *** keys ************ ** *****-*** batches ***** ** *** unit ********** *****.

Keyway ******** ****** 

***** *** **** **** examples ***** *** ****** itself ******** ********** ******* lock ******* ** ******* attacks, ***** *** **** that * **** **** cannot ** ******** **** the ******. **** *** HYT **** [**** ** longer *********] *** *******, that **** * ****** key ** ***** * curved, ***-****** ******:

*** ****** ***** ***** examines *** *** ***-**-********** lock ** ******, ******** the **** **** **** ($300+), ******* *** ******, and ********** ********** **** limited ********** ********** ** the keyway **** ** ****.

Other ****** *****

***** **** *** '*** 5' ******** ****** *****, the ****** *** ******* of ***** ** ****** use ****** **** * thousand *****. ******* ************ like ********** *** **** versed ** *** ***** of *******, *** * close ******* ************ **** a ************ *** ***** make ***** **** ** identifying *** ***** ******.

Comments (0)

Read this IPVM report for free.

This article is part of IPVM's 6,653 reports, 896 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now
Loading Related Reports