Lock Keyways For Access Control Guide

Author: Brian Rhodes, Published on Mar 23, 2017

Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently commented:

My biggest problem is specifying the right hardware with the wrong keyway

In this note, we examine keyways, identify which ones are most commonly used, how to identify them, and how they improve lock security.

Keyways Explained

The hole inside a lock is designed to fit specific shapes of keys. This key path is critically important, because not only does it keep potentially invalid keys out, it also precisely indexes a valid key in the right spot to move pins for unlocking it:

If not properly identified, the keyway will physically prevent a key from fitting into it. Within the context of physical access control, proper keyway identification is as fundamental as choosing the right lock type or evaluating door swing.

Common Keyways

In the commercial door hardware market, there are thousands of different lock keyway profiles, but comparatively few are widely used. In terms of modern mainstream global use, these five keyways are the most commonly adopted:

**** ******* *** ** *** ********** ******* * **** ******* or ***. ************* ******* ** ********* *** ****** *******. ******,* ****** ******** *********:

** ******* ******* ** ********** *** ***** ******** **** *** wrong ******

** **** ****, ** ******* *******, ******** ***** **** *** most ******** ****, *** ** ******** ****, *** *** **** improve **** ********.

Keyways *********

*** **** ****** * **** ** ******** ** *** ******** shapes ** ****. **** *** **** ** ********** *********, ******* not **** **** ** **** *********** ******* **** ***, ** also ********* ******* * ***** *** ** *** ***** **** to **** **** *** ********* **:

** *** ******** **********, *** ****** **** ********** ******* * key **** ******* **** **. ****** *** ******* ** ******** access *******, ****** ****** ************** ** ** *********** ** ******** the***** **** ****** ************** *****.

Common *******

** *** ********** **** ******** ******, ***** *** ********* ** different **** ****** ********, *** ************* *** *** ****** ****. In ***** ** ****** ********** ****** ***, ***** **** ******* are *** **** ******** *******:

[***************]

***** ******** ******** *** ****, *** ******* ***** *** ********* found ** *****-****** ********** *** *********** *****, ******** ***** *** in ****-******** ***** ** *** ********.

**** ***** ******** ** *** ******, ***** ******* **** ********** by *******, *** *********** ***** *** **** *** **** ** use *** ******** ******* (**+ *****), ****** ********** *** ****** and *** ******* *** ****** ***********. ******* ***** ******* ******* brand ***** **** '****', '*******', *** '*******', ***** ******* *** essentially **** ** ********* ****** *** *** *********** ************ *** blanks **** ** ******.

***** **** *** ****** ***** ************ ******* ***** ********. *** example, *** **** *** ****** *** *******, *** **** *** open *** ****. **** ** *** ** *** *-*** *********** of *** ***** ****** *** *-*** ******** ** ***. ** while *** ******** ***** ** *** ******* ** *** ****, they ***** ******* ********* *** ***** *** *********** *** ********** as ********* *******.

Determing ****** ****

**** ********* **** *******, *** ******* *** **** ******** ****** for ******* ****** ***** **** ******* * *** ********* ****** for ***:

*. *** **** *******

*** ***** ** *** ***'* ***, ** ***** **** ******* twist **, *** ******* **** *** ***** ****** ** ***** used. *** **** ************ *** *** ******* ********* *** *** geometry *******, **** *** ******** ** * ********** ******. **** profile *** ** ******** ** ********* *******, *** ******* ** *** **** *********** ****** *** **** blank *****. ******** ************ *** **** ****** ********* ***** **** these ******** *** ** * *********** ****, *** *** ******** correspond ** ***** **** ******* **** **********.

*. **** ********

** **** *****, *** **** ** *** ** **** *** will ******* ** ******* **** *** ********** ******. **** *********** makes ******* *** ****** ******, ******** **** **** *** *** always ** *******, ********** ** *********** ** ******* *********. ***** stamps *** ********* ******* ** *** ** ******* *********.

*. ******* ********

*** **** ********* *** ******* ***** ****** ******** '*******' *** profile ** *** **** *** ******** ** ** *** **** represented ** ********* *******. ***** **** ****** ***** ******* ********* ** ******, ********** generally ****** ** *** ******* ** **** * ******* ****** of ******* *** ********* **** ** * ********** ******.

Important **** ******** *****

** ***** ** ****** ******* ***, ********* *** ******* ******** often ******** ******** *** ***** **** *** ******** *******. *** nomenclature **** **** ******** ******, *** ***** **** *********** ***** between ******* *** **** ***** *****:

********** ********** *****, *** ***** ****** ** ********* **** ***** ************, **** as * ********** **** ****** *** *** ** ******** ** every **** ******. *******, **** *** ****** ** *****, ********** lock ***** *** ** ******* *******, *** **** ********** *** systems **** ******* **** ******* *******.

Restricted *******

** ** *** ****** * *** ******** ** *** ******** keyways/keys. ** ****, **** **** ******** **** ************* ***** '********** keyways' ** **** *********** ****** ***** ** * ******** *******, due ** *** ******* ************ ** ********* ** *** ***** that *** ** *** ** ***** *****. ***** *** **** exclusivity ********** **** ************* **** **** **** *********** *** ** keyways *** * ***** ******** ******* ** ******* ********* ** specific ********* ** ********* *** ** ****.

*** **** ** ******* '****** ********' ********* ***** **** *** concept **** *** ****** ** **** **** *** ** **** to *** *** **** *** ** ******* **********. ** **** cases, ********** ***** *** **** *** **** ****** **** ******, because *** ***** *** **** ************ ** *****-*** ******* ***** up *** **** ********** *****.

Keyway ******** ******

***** *** **** **** ******** ***** *** ****** ****** ******** protection ******* **** ******* ** ******* *******, ***** *** **** that * **** **** ****** ** ******** **** *** ******. Take ****** ******* *******, **** **** * ****** *** ** ***** * curved, ***-****** ******:

*** ****** ***** ***** ******** *** *** ***-**-********** **** ** detail, ******** *** **** **** **** ($***+), ******* *** ******, and ********** ********** **** ******* ********** ********** ** *** ****** idea ** ****.

Other ****** *****

***** **** *** '*** *' ******** ****** *****, *** ****** and ******* ** ***** ** ****** *** ****** **** * thousand *****. ******* ************ **** ********** *** **** ****** ** the ***** ** *******, *** * ***** ******* ************ **** a ************ *** ***** **** ***** **** ** *********** *** right ******.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
Access Control Course Winter 2018 on Dec 07, 2017
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
ZKAccess Control Tested on Dec 04, 2017
China manufacturer ZKTeco / ZKAcces has been expanding in the West, offering a low-cost access control platform. But how good is it? And how does...
IP Camera Manufacturer Compression Comparison on Nov 27, 2017
Despite the use of standards-based video compression (H.264/H.265), our tests show that default image quality settings for different manufacturers...
Hazardous & Explosion Proof Access Control Tutorial on Nov 27, 2017
Controlling access to hazardous environments require equipment meeting specific ratings that certify they will not start fires. Understanding those...
Top Maglock Provider Warns Against Using Maglocks on Nov 21, 2017
Do not buy my company's product. It sounds strange indeed, but a senior Allegion consultant stated that maglocks should not be used in common...
CBR vs VBR vs MBR - Surveillance Streaming on Nov 21, 2017
How you stream video has a major impact on quality and bandwidth. And it is not simply CODEC choice (e.g., H.264 vs H.265). Regardless of the...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
PoE UPS Tested (Energy Reconnect) on Nov 15, 2017
In security, backup power is important, but most often requires UPS systems or extra cabling to devices for low voltage power. Now, some have...

Most Recent Industry Reports

Integrator Managing Projects Statistics on Dec 14, 2017
Who actually manages projects for security integrators? Does the average security integrator have dedicated project managers, or are technicians,...
Hikvision NVR Load Testing on Dec 14, 2017
IPVM members recently debated Hikvision NVR's performance under load in Hikvision 30+ Cameras On NVR - Apps And Client Really Slow Down And CPU...
Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Hiring Camera Calculator Product Manager on Dec 12, 2017
We are working on making the Camera Calculator even better and hoping you can help us find the right person to join our team. IPVM is hiring a...
Testing $20 WyzeCam, The Money Losing Amazon Vet Startup on Dec 12, 2017
This startup is perfecting the old adage: We lose money on every sale, but make it up on volume But it is no joke. The company, Wyze Labs, is...
Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks on Dec 12, 2017
The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by...
Robot Vandalism on Dec 11, 2017
Vandalism of security systems is a common concern. It is so common that camera vandalism statistics show that designers routinely sacrifice camera...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact