Lock Keyways For Access Control Guide

Author: Brian Rhodes, Published on Mar 23, 2017

Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently commented:

My biggest problem is specifying the right hardware with the wrong keyway

In this note, we examine keyways, identify which ones are most commonly used, how to identify them, and how they improve lock security.

Keyways Explained

The hole inside a lock is designed to fit specific shapes of keys. This key path is critically important, because not only does it keep potentially invalid keys out, it also precisely indexes a valid key in the right spot to move pins for unlocking it:

If not properly identified, the keyway will physically prevent a key from fitting into it. Within the context of physical access control, proper keyway identification is as fundamental as choosing the right lock type or evaluating door swing.

Common Keyways

In the commercial door hardware market, there are thousands of different lock keyway profiles, but comparatively few are widely used. In terms of modern mainstream global use, these five keyways are the most commonly adopted:

**** ******* *** ** *** ********** ******* * **** ******* or ***. ************* ******* ** ********* *** ****** *******. ******,* ****** ******** *********:

** ******* ******* ** ********** *** ***** ******** **** *** wrong ******

** **** ****, ** ******* *******, ******** ***** **** *** most ******** ****, *** ** ******** ****, *** *** **** improve **** ********.

Keyways *********

*** **** ****** * **** ** ******** ** *** ******** shapes ** ****. **** *** **** ** ********** *********, ******* not **** **** ** **** *********** ******* **** ***, ** also ********* ******* * ***** *** ** *** ***** **** to **** **** *** ********* **:

** *** ******** **********, *** ****** **** ********** ******* * key **** ******* **** **. ****** *** ******* ** ******** access *******, ****** ****** ************** ** ** *********** ** ******** the***** **** ****** ************** *****.

Common *******

** *** ********** **** ******** ******, ***** *** ********* ** different **** ****** ********, *** ************* *** *** ****** ****. In ***** ** ****** ********** ****** ***, ***** **** ******* are *** **** ******** *******:

[***************]

***** ******** ******** *** ****, *** ******* ***** *** ********* found ** *****-****** ********** *** *********** *****, ******** ***** *** in ****-******** ***** ** *** ********.

**** ***** ******** ** *** ******, ***** ******* **** ********** by *******, *** *********** ***** *** **** *** **** ** use *** ******** ******* (**+ *****), ****** ********** *** ****** and *** ******* *** ****** ***********. ******* ***** ******* ******* brand ***** **** '****', '*******', *** '*******', ***** ******* *** essentially **** ** ********* ****** *** *** *********** ************ *** blanks **** ** ******.

***** **** *** ****** ***** ************ ******* ***** ********. *** example, *** **** *** ****** *** *******, *** **** *** open *** ****. **** ** *** ** *** *-*** *********** of *** ***** ****** *** *-*** ******** ** ***. ** while *** ******** ***** ** *** ******* ** *** ****, they ***** ******* ********* *** ***** *** *********** *** ********** as ********* *******.

Determing ****** ****

**** ********* **** *******, *** ******* *** **** ******** ****** for ******* ****** ***** **** ******* * *** ********* ****** for ***:

*. *** **** *******

*** ***** ** *** ***'* ***, ** ***** **** ******* twist **, *** ******* **** *** ***** ****** ** ***** used. *** **** ************ *** *** ******* ********* *** *** geometry *******, **** *** ******** ** * ********** ******. **** profile *** ** ******** ** ********* *******, *** ******* ** *** **** *********** ****** *** **** blank *****. ******** ************ *** **** ****** ********* ***** **** these ******** *** ** * *********** ****, *** *** ******** correspond ** ***** **** ******* **** **********.

*. **** ********

** **** *****, *** **** ** *** ** **** *** will ******* ** ******* **** *** ********** ******. **** *********** makes ******* *** ****** ******, ******** **** **** *** *** always ** *******, ********** ** *********** ** ******* *********. ***** stamps *** ********* ******* ** *** ** ******* *********.

*. ******* ********

*** **** ********* *** ******* ***** ****** ******** '*******' *** profile ** *** **** *** ******** ** ** *** **** represented ** ********* *******. ***** **** ****** ***** ******* ********* ** ******, ********** generally ****** ** *** ******* ** **** * ******* ****** of ******* *** ********* **** ** * ********** ******.

Important **** ******** *****

** ***** ** ****** ******* ***, ********* *** ******* ******** often ******** ******** *** ***** **** *** ******** *******. *** nomenclature **** **** ******** ******, *** ***** **** *********** ***** between ******* *** **** ***** *****:

********** ********** *****, *** ***** ****** ** ********* **** ***** ************, **** as * ********** **** ****** *** *** ** ******** ** every **** ******. *******, **** *** ****** ** *****, ********** lock ***** *** ** ******* *******, *** **** ********** *** systems **** ******* **** ******* *******.

Restricted *******

** ** *** ****** * *** ******** ** *** ******** keyways/keys. ** ****, **** **** ******** **** ************* ***** '********** keyways' ** **** *********** ****** ***** ** * ******** *******, due ** *** ******* ************ ** ********* ** *** ***** that *** ** *** ** ***** *****. ***** *** **** exclusivity ********** **** ************* **** **** **** *********** *** ** keyways *** * ***** ******** ******* ** ******* ********* ** specific ********* ** ********* *** ** ****.

*** **** ** ******* '****** ********' ********* ***** **** *** concept **** *** ****** ** **** **** *** ** **** to *** *** **** *** ** ******* **********. ** **** cases, ********** ***** *** **** *** **** ****** **** ******, because *** ***** *** **** ************ ** *****-*** ******* ***** up *** **** ********** *****.

Keyway ******** ******

***** *** **** **** ******** ***** *** ****** ****** ******** protection ******* **** ******* ** ******* *******, ***** *** **** that * **** **** ****** ** ******** **** *** ******. Take ****** ******* *******, **** **** * ****** *** ** ***** * curved, ***-****** ******:

*** ****** ***** ***** ******** *** *** ***-**-********** **** ** detail, ******** *** **** **** **** ($***+), ******* *** ******, and ********** ********** **** ******* ********** ********** ** *** ****** idea ** ****.

Other ****** *****

***** **** *** '*** *' ******** ****** *****, *** ****** and ******* ** ***** ** ****** *** ****** **** * thousand *****. ******* ************ **** ********** *** **** ****** ** the ***** ** *******, *** * ***** ******* ************ **** a ************ *** ***** **** ***** **** ** *********** *** right ******.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Ladders For Installers Guide on Sep 25, 2018
Ladders are one of the most important pieces of worksite equipment for the surveillance technician. Too often, however, even highly experienced...
Favorite Access Control Reader Manufacturer 2018 on Sep 25, 2018
Favorite reader votes are in, and it is not close. A global access giant ran away with the votes in a one-sided contest. But for many, the...
UTC, Owner of Lenel, Acquires S2 on Sep 20, 2018
UTC now owns two of the biggest access control providers, one of integrator's most hated access control platforms, Lenel, and one of their...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
VMS Export Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone on Sep 13, 2018
When crimes, accidents or problems occur, exporting video from one's video surveillance system is critical to proving incidents. But who does it...
Door Fundamentals For Access Control Guide on Sep 12, 2018
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
IP Camera Cable Termination Guide on Sep 06, 2018
Terminating cables properly is critical to network performance, but it can be a tricky task with multiple steps. Fortunately, this task is easy to...
Access Control Course Fall 2018 on Sep 06, 2018
Registration IS CLOSED ends this Thursday. Register now. If you are looking to strengthen your ability to design and deploy access systems or...
Drain Wire For Access Control Reader Tutorial on Sep 04, 2018
An easy-to-miss cabling specification plays a key role in access control, yet it is commonly ignored. The drain wire offers protection for readers...

Most Recent Industry Reports

Ladders For Installers Guide on Sep 25, 2018
Ladders are one of the most important pieces of worksite equipment for the surveillance technician. Too often, however, even highly experienced...
Favorite Access Control Reader Manufacturer 2018 on Sep 25, 2018
Favorite reader votes are in, and it is not close. A global access giant ran away with the votes in a one-sided contest. But for many, the...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
4MP Camera Shootout - Axis, Dahua, DW, Hanwha, Hikvision, Uniview, Vivotek on Sep 24, 2018
4MP usage continues to climb, especially for low cost fixed lens models. To see who was best, we bought and tested seven 4MP models from Axis,...
Alexa Guard Expands Amazon's Security Offerings, Boosts ADT's Stock on Sep 21, 2018
Amazon is expanding their security offerings yet again, this time with Alexa Guard that delivers security audio analytics and a virtual "Fake...
UTC, Owner of Lenel, Acquires S2 on Sep 20, 2018
UTC now owns two of the biggest access control providers, one of integrator's most hated access control platforms, Lenel, and one of their...
BluePoint Aims To Bring Life-Safety Mind-Set To Police Pull Stations on Sep 20, 2018
Fire alarm pull stations are commonplace but police ones are not. A self-funded startup, BluePoint Alert Solutions is aiming to make police pull...
SIA Plays Dumb On OEMs And Hikua Ban on Sep 20, 2018
OEMs widely pretend to be 'manufacturers', deceiving their customers and putting them at risk for cybersecurity attacks and, soon, violation of US...
Axis Vs. Hikvision IR PTZ Shootout on Sep 20, 2018
Hikvision has their high-end dual-sensor DarkfighterX. Axis has their high-end concealed IR Q6125-LE. Which is better? We bought both and tested...
Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact