Lock Keyways For Access Control Guide

Author: Brian Rhodes, Published on Mar 23, 2017

Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently commented:

My biggest problem is specifying the right hardware with the wrong keyway

In this note, we examine keyways, identify which ones are most commonly used, how to identify them, and how they improve lock security.

Keyways Explained

The hole inside a lock is designed to fit specific shapes of keys. This key path is critically important, because not only does it keep potentially invalid keys out, it also precisely indexes a valid key in the right spot to move pins for unlocking it:

If not properly identified, the keyway will physically prevent a key from fitting into it. Within the context of physical access control, proper keyway identification is as fundamental as choosing the right lock type or evaluating door swing.

Common Keyways

In the commercial door hardware market, there are thousands of different lock keyway profiles, but comparatively few are widely used. In terms of modern mainstream global use, these five keyways are the most commonly adopted:

**** ******* *** ** *** ********** ******* * **** ******* or ***. ************* ******* ** ********* *** ****** *******. ******,* ****** ******** *********:

** ******* ******* ** ********** *** ***** ******** **** *** wrong ******

** **** ****, ** ******* *******, ******** ***** **** *** most ******** ****, *** ** ******** ****, *** *** **** improve **** ********.

Keyways *********

*** **** ****** * **** ** ******** ** *** ******** shapes ** ****. **** *** **** ** ********** *********, ******* not **** **** ** **** *********** ******* **** ***, ** also ********* ******* * ***** *** ** *** ***** **** to **** **** *** ********* **:

** *** ******** **********, *** ****** **** ********** ******* * key **** ******* **** **. ****** *** ******* ** ******** access *******, ****** ****** ************** ** ** *********** ** ******** the***** **** ****** ************** *****.

Common *******

** *** ********** **** ******** ******, ***** *** ********* ** different **** ****** ********, *** ************* *** *** ****** ****. In ***** ** ****** ********** ****** ***, ***** **** ******* are *** **** ******** *******:

[***************]

***** ******** ******** *** ****, *** ******* ***** *** ********* found ** *****-****** ********** *** *********** *****, ******** ***** *** in ****-******** ***** ** *** ********.

**** ***** ******** ** *** ******, ***** ******* **** ********** by *******, *** *********** ***** *** **** *** **** ** use *** ******** ******* (**+ *****), ****** ********** *** ****** and *** ******* *** ****** ***********. ******* ***** ******* ******* brand ***** **** '****', '*******', *** '*******', ***** ******* *** essentially **** ** ********* ****** *** *** *********** ************ *** blanks **** ** ******.

***** **** *** ****** ***** ************ ******* ***** ********. *** example, *** **** *** ****** *** *******, *** **** *** open *** ****. **** ** *** ** *** *-*** *********** of *** ***** ****** *** *-*** ******** ** ***. ** while *** ******** ***** ** *** ******* ** *** ****, they ***** ******* ********* *** ***** *** *********** *** ********** as ********* *******.

Determing ****** ****

**** ********* **** *******, *** ******* *** **** ******** ****** for ******* ****** ***** **** ******* * *** ********* ****** for ***:

*. *** **** *******

*** ***** ** *** ***'* ***, ** ***** **** ******* twist **, *** ******* **** *** ***** ****** ** ***** used. *** **** ************ *** *** ******* ********* *** *** geometry *******, **** *** ******** ** * ********** ******. **** profile *** ** ******** ** ********* *******, *** ******* ** *** **** *********** ****** *** **** blank *****. ******** ************ *** **** ****** ********* ***** **** these ******** *** ** * *********** ****, *** *** ******** correspond ** ***** **** ******* **** **********.

*. **** ********

** **** *****, *** **** ** *** ** **** *** will ******* ** ******* **** *** ********** ******. **** *********** makes ******* *** ****** ******, ******** **** **** *** *** always ** *******, ********** ** *********** ** ******* *********. ***** stamps *** ********* ******* ** *** ** ******* *********.

*. ******* ********

*** **** ********* *** ******* ***** ****** ******** '*******' *** profile ** *** **** *** ******** ** ** *** **** represented ** ********* *******. ***** **** ****** ***** ******* ********* ** ******, ********** generally ****** ** *** ******* ** **** * ******* ****** of ******* *** ********* **** ** * ********** ******.

Important **** ******** *****

** ***** ** ****** ******* ***, ********* *** ******* ******** often ******** ******** *** ***** **** *** ******** *******. *** nomenclature **** **** ******** ******, *** ***** **** *********** ***** between ******* *** **** ***** *****:

********** ********** *****, *** ***** ****** ** ********* **** ***** ************, **** as * ********** **** ****** *** *** ** ******** ** every **** ******. *******, **** *** ****** ** *****, ********** lock ***** *** ** ******* *******, *** **** ********** *** systems **** ******* **** ******* *******.

Restricted *******

** ** *** ****** * *** ******** ** *** ******** keyways/keys. ** ****, **** **** ******** **** ************* ***** '********** keyways' ** **** *********** ****** ***** ** * ******** *******, due ** *** ******* ************ ** ********* ** *** ***** that *** ** *** ** ***** *****. ***** *** **** exclusivity ********** **** ************* **** **** **** *********** *** ** keyways *** * ***** ******** ******* ** ******* ********* ** specific ********* ** ********* *** ** ****.

*** **** ** ******* '****** ********' ********* ***** **** *** concept **** *** ****** ** **** **** *** ** **** to *** *** **** *** ** ******* **********. ** **** cases, ********** ***** *** **** *** **** ****** **** ******, because *** ***** *** **** ************ ** *****-*** ******* ***** up *** **** ********** *****.

Keyway ******** ******

***** *** **** **** ******** ***** *** ****** ****** ******** protection ******* **** ******* ** ******* *******, ***** *** **** that * **** **** ****** ** ******** **** *** ******. Take ****** ******* *******, **** **** * ****** *** ** ***** * curved, ***-****** ******:

*** ****** ***** ***** ******** *** *** ***-**-********** **** ** detail, ******** *** **** **** **** ($***+), ******* *** ******, and ********** ********** **** ******* ********** ********** ** *** ****** idea ** ****.

Other ****** *****

***** **** *** '*** *' ******** ****** *****, *** ****** and ******* ** ***** ** ****** *** ****** **** * thousand *****. ******* ************ **** ********** *** **** ****** ** the ***** ** *******, *** * ***** ******* ************ **** a ************ *** ***** **** ***** **** ** *********** *** right ******.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...
Axis 2N Intercom Tested on Nov 08, 2018
Axis expanded its video intercom business buying Czech-based 2N in 2016. Despite competing against owner Axis' intercoms, 2N recently registered as...
Haven Targets School Security with Lockdown Lineup on Nov 08, 2018
Haven, a US startup founded in 2014 as a residential-focused company, has now raised funding and is offering a lineup of commercial grade locks for...
Directory Of Video Doorbells on Nov 06, 2018
Video doorbells are one of the fastest growing categories in video surveillance, especially among residences. The optimal placement of these...
Winter 2019 IP Networking Course on Nov 05, 2018
This is the only networking course designed specifically for video surveillance professionals.  Lots of network training exists but none of it...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
Worst Products on Nov 03, 2018
Security integrators periodically report on their favorite and worst products to IPVM. These are known integrators who IPVM pays to answer surveys....
Solar-Powered, Smart-Phone-Based Access Kit (VIZPin) Examined on Nov 02, 2018
Cloud-based access control company VIZPin is releasing a solar-powered and smart phone based access control system for gates and other remote...

Most Recent Industry Reports

Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
ASIS Offering Custom Research For Manufacturers on Nov 15, 2018
Manufacturers often want to know what industry people think about trends and, in particular, the segments and product they offer.  ASIS and its...
ISC East 2018 Mini-Show Report on Nov 15, 2018
ISC East, by its own admission, is not a national or international show, billed as the "Largest Annual Northeast U.S. Security...
Hikvision Silent on "Bad Architectural Practices" Cybersecurity Report on Nov 14, 2018
A 'significant vulnerability was found in Hikvision cameras' by VDOO, a startup cybersecurity specialist. Hikvision has fixed the specific...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Integrator Credit Card Alternative Divvy on Nov 13, 2018
Most security integrators are small businesses but large enough that they have various employees that need to be able to expense various charges as...
Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...
Magos Radar Company Profile on Nov 12, 2018
Magos America General Manager Yaron Zussman admits when he first came across Magos, he asked himself: "What's innovative about radar?" Be that as...
Genetec Privacy Protector Tested on Nov 12, 2018
Genetec has built Kiwi Security's Privacy Protector into Security Center, an analytic which anonymizes individuals in cameras' fields of view...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact