Low-Tech Access Control: Master Keying Explained

By: Brian Rhodes, Published on Jan 09, 2020

Mechanical keys are one of the most fundamental forms of access control. 'Master Keying' can allow individually different credential keys to segment access, but requires no electricity, no network, and uses regular door locks.

*** ****** **** **** is *** ****** **********. In **** ********, ** explain:

  • *** **** ***** ****
  • ******* *** '*****' ** Each ***
  • *** ***** ***** *** So *********
  • *** ****** *** ******* Are *********
  • ****** **** ** * Huge ****
  • ******* ****** *** *****

*******, ***** *******,**** *** * ******** quiz.

Basic **** ********

*** ****** ** '*** tumbler' ***** ***** *** not ******* ***** *** original ******* ***** ** the *****. *** **** are **** ****** **** globally, **** *** **** the **** ***** ********.

*** ******** *** ***** offers * **** *********** on *** *** *** interacts *** ********** ***** a ****:

*** ********* ** ******: the **** ******** ******* (usually ******* * - 7) ******** **** ** different *******. * *** is **** **** ** turn *** **** ** the '****** ***********' ** key **** ******* *** length ** *** ****.

* ***** *** ******** the ****** ** *** the **** ** ***** top "***** *****" ***** between *** **** (*** part **** *****) *** the ******* (*** ******, outside ****) ** *** lock. ** ******* *** may ** **** ** slide **** *** ****, but *** ****** *** cuts ** *** ******** align *** ****, ********** the **** **** *******.

Codes ****** ****

**** *** *******, *** the ********** ****** ** key **** **** **** them, *** ******** ********* in ****.

* ************ *** **** is **** ****** * locksmith ** *** * replacement *** ***** ****** and **** ** ***** work **** * ****. Various ********** ** * code ****** ******* **** models, **** *** ******** depth ** * ***, the ***** ** * cut, ** **** *** width ** * ***, but *** ************ ** a '*** ****' ** fairly **********.

*******, *** ***** ** a *** ***** **** eight ** **** ******** depths, ***** * "*" depth ********* *** *** is *** *** ** all, *** * "*" cut ******* **** *.***" in ********. ***** *** range ** ****** ** not ***********, * **** is ********* ********, *** even *.***" ******** *** be *** ********** ******* a **** ******* *** remaining ******.

**** *** ****** ** five ** *** ****, the **** ** ********* as * ****** ** depths **** **** ******* representing *** *** ****** for * ***** *** position.

*** ******* *** ***** has * **********, **** **** ****-**-*****:

** * ****** ***** system, ***** *** ********* so **** **** **** one ****** *** **** opens ****. ** **** explain *** **** ******* in *** ********* ********.

Master ****** *******

*********** * ****** *** is * ****** *** that *** **** **** locks. * ******* ****** keying ****** ********* *** plan *****.

**** **** ***** ****** of **** ********** ** roles/jobs **** **** ****** credentials ********* *** ******:

******** ** *** ****** and ******* **:

  • ****** ****:***** *** **** ****** to ***** *** **** need ****** ** * single ****; ********'* *** offices, ****** ********, ***. These **** ********* **** only *** ****.
  • ****** (** ***-******) ****:***** *** **** ****** to ********, **** *** able ** **** * range (*** *** ***) doors. *** *******, *** Engineering ******** ** **** to **** *** ********** engineering *******, *** ** on.
  • ***** ****** ****:*** ***** ****** *** opens *** *****, ********** of ***** ***-****** ** patron **** *** **** in ***. *** *******, building *************** **** ***** keys ** **** ****** to *** **********.

** *** **** ** the ***** *****, *** will *** **** **** key ***** - ******, Master, *********** - ** shown **** * ********* bitted ***********, *** **** key ******* ** *** same "****** ****** ******". Master *** *********** **** often ****** **** *** other ***.

Master **** ********* *** *** **** ****

***** *** ****** ** a **** ******** ***, they *** ********* ******* controlled *** ******.

** **** *****, ****** keys *** *** **** be ********** **** ***** actually ******, *** **** destroyed ***** *** ** maintain ***** *******.

Same ******* *** ********* ****

*** ********** ** ******* alone ** *** * Master ****** ****** *****. Locks ** * ****** keyed ****** *** ***** to **** *** ********* key *** ************.

***** **** *** *** differently, **** *** *** the **** **** *******. Locks ** ***** ******* typically ****** ** **** in *** **** ****** Key ******. ** ***** this ******* ** ****** in ****** **** ****** *******: Restricted ************.

Losing ****** **** **** ****

*** ** *** ******* weaknesses ** * ****** key ****** ** * high-level ***, **** * Master, ***********, ** **** Great *********** *** ***** lost ** ******. ** that *******, **** ***** door ** ** ***** for ** *********** ** risk ** ***** ******, and *** **** '***' is ** ***** ***** door **** - *********** hundreds ** ***** *** many ********* ** ******* in ********* *** *** key ******** *****.

**** **** ****** ********** a ****** *** ****, the ******* *** ***** staggering - **** **** story ***** * ** college ******** **** *** ******* at **** ******* ******** dollars.

**** ********* ***** ******** not ******* ** ******* master **** ** *** despite *** ********* ***** available. ** **** ** one ** *** ******* advantages ** ********** ****** control, ***** ** * credential ** **** ** stolen, ** *** ** immediately ****** *** *** made ** ** ******* - ** ******* ***** or ****** ********.

Shear ***** **** ****** ****** ********

*** ********* ***** ***** how * **** ***** when ** **** *** a ****** '***** ****', or ***** *** ******* that ******* ** ** even ********** ******* **** halves.

*******, ******* ** ***** single **** ** ********* lengths, ****** **** ******* use **** **** ** of ******* ********* ****** (wafer *********). *** ***** below ***** ****, ***** a ****** '***' **** be ******** *********** ** 4 ** * *****, and ***** **** **** one ********* ***** **** is ******** ****** * pin *******:

*** ************ ** ******** shear ***** ** * pin ***** *** *********** of ******* ********* **** opening *** **** ****. In * ****** *** system, *** ***** *** built **** * ****** multiple ***** *****. *******, the **** **** *** them *** ******* **********. Therefore, *** ***** ******* the *** ** * common ***, *** **** common *** ** **** issued ** '****** ***'.

*** ***** ***** ** another **** ** *** concept, ***** ********* ** a ****:

*** *** ***** *****, the *** ******** *** open *** ****. **** key *** * ******* code ********.

*******, * *** ***************** **** **** **** lock, ** ***** * key *********, ** *** ***** subsequent ***** *********** **** matches * ***** **** up ** **** *** lock ****.

** ***** ******** ***** lines, **** **** **** no ******** *********** ** another *** *********** **** the **** ****. ** administratively ********* ******** ***** line ************ **** *** master/grandmaster ****, ****** ****** systems ** ********* ** locks *** ** *****, all *********** ******** **** a ****** ***.

Master ****** *****

*** **** ** ******** a ****** ****** ****** is ******* ******** ** a ***-****** ****** ****** and ***** ********* **** per **** **** ********** access.

** *******, **** *** tumbler ***** *** ** constructed ** ******* **** a ******, *** *** wafer **** *** ****** supply ***** *** **** locksmiths. ******* * **** for *** ** * master *** ****** ******** more ***** *** ** handling **** ****, *** usually ** *** **** more **** * *** dollars **** *** **** lock ** *******.

*** **** ********** ******* of ******** * ****** keying ****** ** ********** each ********** *** **** and **** ******* ****, however, **** **** ************* and **** ******** ************ will ** **** *** no **** **** ****** hardware. ********** *********-***** ******** can ** ********* *** less **** $***, *** even ******** ******** *** be **********, ******** ******* for **** ***** ** locks/keys *** ** *******.

*******, *** ******* **** in * ****** ****** system ** *** ********** management ** ****. ** order *** *** ****** to ****** ******, ***** time * *** ** issued ** ********* ** must ** **********. ***** most ***** ******* ******** shear *****, * ********* should ***** ** ***** to *** *** **** without ***** ******* *** those ***** ***** *** being ****, ** **** they *** ************* *** a ****** ** *********** key *** ****** ***.

****

*******, ***** *******,**** *** * ******** quiz.

Comments (19)

**** ****** ******** ***** lines **** *** **** easier ** ****?

*********** ********.

** ******* ** ***, multiple ***** ***** **** a **** ****** ** pick. ** **** *****, multiple ***** ***** *** easier ** '****' ** well.

*** ******* * ****, even **** ******** ***** lines, ** **** ******* than **** ****** *** TV *******. ** *** take ***** ** **** a * *** ****. :(

** **** *******/******* **** difficult, **** ****** ***** use '******** ****' **** tapered ******** **** **** a ********* ****** '***** positives' **** ******* * lock:

*** *** *** *** is ******** '*****' **** it *** **** ****** and *** **** ***** for *** **** ** be ******** ****** ** the ******'* ********. *** in *******, *** *** is ***** *** ** a ***** **** *** the **** **** **** secure.

******* ******* ** **** mostly ** **** *** not *****, **** ** an ********* *********.

* ****** ** * lock *** *** *** how ** **** **** years ***. ***** **** in *** **** ****** "if *** ***'* **** the **** ** * mins **** *** **** in"

* ****, **'* ****.

*'* *** * *** reader, *********** ******:

*** ******* * ****, even **** ******** ***** lines, ** **** ******* than **** ****** *** TV *******. ** *** take ***** ** **** a * *** ****.

**, * ***'* ****** with ****** *** **. I **** ***** **** Picking ******. *** *******:

** ******, *** ** slightly ****** ** **** picking **** **** ******.

** ******** ** **** picking, *** ***** ****** to **** * **** installed ** * **** is ****** ********* **** uninstalled ** * ***** vise.

*** ****** ** ****** he *** ***** ** much ******* ** ******* level **** *** **** over *** **** **** if *** **** *** installed ** * **** with * ****** *** or **** ****** ******* tension ** *** *********.

** **** *******/******* **** difficult, **** ****** ***** use '******** ****' **** tapered ******** **** **** a ********* ****** '***** positives' **** ******* * lock:

****'* *********! **'** ******** to ** *** **** guys, *****?

***** *** *****

***** ******* *****.

* ***** ******* **** key "*************" *** *********** are **** ****** ********** for ************ **** *** tumbler *****.

"**** **** ****** ********** a ***** *** ****, the ******* *** ***** staggering - **** **** story ***** * ** college ******** **** *** ******* at **** ******* ******** dollars."

**** ** **** ** with *** *** ******** cylinders?

****** **** ******** ***** pick ** * ********** key ****** ** *** cheap.

**** ***** ***** ** the ****** ****** *** there, **** *** ***** people **** ***** ******* and ****** ****.

*** **** ***** *** thrown **** ***** *** locks *******.

*** ****: **** * LEVEL ****** *** ******, 10 ***** ***, **** 5000+ ***** ****, **** an *****!

** **** *****, *** lock ***** *** ******** but *** ****** ****. The **** **** *** tossed, *** **** ****'* good *** **** ** that *****.

*** ***** ** ****** labor ** ******** *** system, ********* *****, ******* new *** ******, *** distributing *** *** ****.

**** *** ****.

*** **********: *** ****** "commonly *** ******** ****" may ** ********* ***** it's "******** *** ******** ****" :)

******. * ****** **** one/ ******** ** ** avoid *** ***********.

** *** ** ****** locksmith **** * ****** key **** ** ******* at **, ******* ****** the ****?

** *****'* ***** **** it. ** *******, ******* the ******** "** *** DUPLICATE" *******, ***** ******* a ********* **** *********** duping * ******?

****, *'* ******** **** if * ** *** presented **** *** ****, a ****** *** * patron ***, ** ******'* tell *** ** *** master ** *** *****, or **** **** **** even *******.

* ***'* **** ** say '** ** **********', but ** ** ******** even ** ****** ********* could ** * ****** just ** ******* * single ***. ******** ****, maybe, *** *** **** one.

**** **** ****, * would *** ** ********* if ***** *** * savant ********* *** ***** calculate *** *********** ** a ****** ******'* ***** lines **** ** ****** a ****** ***.

****'* ***** ***** *****, but *'* ******* **** mathematical ********** *****.

**** *********** *** ** I *** ** **** a *** **** ****** Do *** *********? ****** for * ****** *** is ****** ** ***** our *** $*** ******* for * **** **** key...

*** *** *** * key-copying ***** **** ********* or *** ** *** that.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Door Closers Access Control Tutorial on May 02, 2019
Door Closers have an important job: automatically shut doors when they are opened, because an open door cannot control access. In this note, we...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Access Control Mantraps Guide on Sep 26, 2019
One of access's primary goals is keeping people out of places they should not be, but slipping through open doors (ie: Tailgating) is often...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
Lock Status Monitoring Tutorial on Oct 28, 2019
Just because access doors are closed does not mean they are locked. Unless access systems are using lock status monitoring, the doors and areas...
Tailgating: Access Control Tutorial on Oct 31, 2019
Nearly all access control systems are vulnerable to an easy exploit called 'tailgating'. Indeed, a friendly gesture in holding doors for others...
The Access Control Codes Guide: IBC, NFPA 72, 80 & 101 on Nov 07, 2019
For access, there is one basic maxim: Life safety above all else. But how do you know if all applicable codes are being followed? While the...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...
Propped Doors Access Control Tutorial on Jan 07, 2020
Doors should keep 'bad guys' out, but a common access control problem is people propping doors open, preventing them from being secure. Even...

Most Recent Industry Reports

Latest London Police Facial Recognition Suffers Serious Issues on Feb 24, 2020
On February 20, IPVM visited another live face rec deployment by London police, but this time the system was thwarted by technical problems and...
Masks Cause Major Facial Recognition Problems on Feb 24, 2020
Coronavirus is spurring an increase in the use of medical masks, which new IPVM test results show cause major problems for facial recognition...
Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...
Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz...
AI/Smart Camera Tutorial on Feb 20, 2020
Cameras with video analytics, sometimes called 'Smart' camera or 'AI' cameras, etc. are one of the most promising growth areas of video...
China Manufacturer Suffers Coronavirus Scare on Feb 20, 2020
Uniview suffered a significant health scare last week after one of its employees reported a fever and initially tested positive for coronavirus....
Cheap Camera Problems at Night on Feb 19, 2020
Cheap cameras generally have problems at night, despite the common perception that integrated IR makes cameras mostly the same, according to new...
Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...