Low Tech Access Control: Restricted Keyways

Author: Brian Rhodes, Published on May 20, 2015

Access control is sometimes as simple as good management of mechanical keys and locks. While the market is jammed packed with electronic systems that make management of users and their credentials easy, sometimes the most effective step is keeping copies of keys out of the wrong hands.

Restricted or Proprietary keys are often overlooked, but can be effective in improving door security and access control. Inside, we explain:

  • Keyway profile variations
  • Why Do Not Duplicate statements are useless
  • Differences between Unrestricted vs Restricted vs Proprietary 
  • Strengths and Weaknesses of these approaches
  • Common Providers and Pricing

****** ******* ** ********* ** ****** ** **** ********** ** mechanical **** *** *****. ***** *** ****** ** ****** ****** with ********** ******* **** **** ********** ** ***** *** ***** credentials ****, ********* *** **** ********* **** ** ******* ****** of **** *** ** *** ***** *****.

********** ** *********** **** *** ***** **********, *** *** ** effective ** ********* **** ******** *** ****** *******. ******, ** *******:

  • ****** ******* **********
  • *** ** *** ********* ********** *** *******
  • *********** ******* ************ ** ********** ** *********** 
  • ********* *** ********** ** ***** **********
  • ****** ********* *** *******

[***************]

********

********* ***** *** ****** ** ********* *** *********** ******** *** control ** *****. ** *** **** *** *** ****, **** the ********* ****** ** ****** ************ ** ****** **** ***** be ******* *********, *** ******* **** **** ************ **** **** than *** **** ***** ** ******.

** ******* ********, **** ****** *********** ** ********* ****** ******** for ***** ***** *** ****. *** ***** ** *** *** varies ******** ** **** ** **** **** * ******* ***** or **** ** ****. **** *** *****, *** ****** ** profiles *** ***** ** ********, ** *** *********, ** ********* profiles. 

** *** **, **** ** *** **** ****** ******** *** shown *****:

*** *******, *** '*******' (***) ****** ** **** ****** ** the ** *********** ******, *** **** ***-******* ***** ***** **** ********** use ** *** ****. ******* * **** **** ** **** ***** ******* * *********** **** ** ** **** ********* **** stopping ** * ******** ***** *** ******** * *** *******.

**** ******** * ****** ** ********: ** ********* ********* **** or ***** ** ** ****, ****** - **** ********* - can *** **** ** ****** ****, ****** *** *********** *** of **** *** ***** *** *********** ****** ******* **** *********.

DND ********** *********

**** ************* ** ***** ******* ** ******* ******** ** ******** or ********* **** **** '** *** *********' ** '** ************ Copies' ** *** ***** * ************* ********* ** ******** ***** **** refuse ** **** * **** ******* ******** ******** **** * security *******.

*** ******* ******* **** **** ********: *** '*******' ** ********** ignored, ** ******* ** ************* ******,*** *** ******* ***** ****** (**** ******** ****** **** **********) *** ********* ** ************ *** retail ******.

Better *******

*******, ********* *** ********* ** *** *********, ******** ** **** prove ** ** **** *********. ** ******** '**********' ** **** 'Proprietary' *******, ***** *** ************ ***** *** *********** ** ********** key ******.

*** ***** ***** ****** **** *** **** ** **** ** these *******:

*** ********** ******* *** *******:

  • ************:*** *** *** ************ ** ****** ******** ** *** *******, and ********** ********** ******** *** ************ ** ******
  • **********: *** *** *** ************ ** ****** ******** ** ******* and **********. ******* ***** ****** *** ******* ** ******* ******* the **** *** * **** ************, *** ******* ** ******* use ** *** ******* ** **** * *** ***** *** are *** ******* ******* *** ****** *********** ******* *** ******** ** a ***** ****** ** ******* *********. ** ****, *********** ****** are **** ******** ** ******** *********** **** ***.
  • ***********: ****** **** *********** ********* ***** ** * *** *********, there ** **** *** ****** ****.  *********** * ************ ***** up *** ******** **** *** **** *** **** *** ********. 

*********

** *******, ******** ****** ********** ** *********** ******* ***** ** unauthorized ****** ** ***** ** **** *** ********. *** **** does **** ******** *** **** ** ******* *********** ******* *** credentials, ** ****** *** **** ** ******* ***** ******** ********* **** ****** ** *** **** ** ********* * ************ available ********.

**********

*******, *** ***** ******* *** *********. *********, *** ******* ****** of ******** ***** *** ********** ** ****** **** *** *********** keyways ** ******. ******* ** ******* $* ** **** *** a *** *** ** * ***** *****, ** *** **** 10X **** ****** *** **** ****.

********* ** *** **** ** ******* *** ************* ***** *** a ***** ****** ** ********* ********* **** *** ********* ***** to ******** ********** ********** **** * *********** **** **** *** range **** ******* ******* ** ******* ******** *******. ** *******, the ******* *** ********** ** **** *** ***** ***** *** keyway, *** ****** **** *** ** *** ********* ** **** volumes ******* *** ******** *** ***** ********** *****.

** *******, *** ****** ** ********** ** ******** ******* ********* ** limited ** ****.  ******* ** ** ***-**** ******** *** ******* based ** ***** ** ******* *****, ***** * ********** ****** limits *** ******** ********* ** *** ** * ***, *** ordering *********** ***** **** ****** *** ****** *** **** **** or *****.

******* ******** * ********** ****** ******* ** **** **** *** maintained *** *******, *** ** *** ******** *********** *** ******** of *** **** *** ***** ** ** *** ****'* ******.

Common *********

** *** ******, ********** ***/** *********** **** *** ********* **** certain *************:

  • ******:***** ******** ***** ***** ** *************, ********** **** *** ***** *** ********* *** * ********** premium ** $**** - $****.
  • *******:*** *******'******** *** ************* *** **********, ******* ** ********** **** ******* $**** - $7500 ***** ** *******.
  • ****: ******** ****** ****** ****** ******* *** ***** *******, *** ** * ****** premium **** ********* ** *** **** **** $**** *** ******.

** *******, ***** *** *** ****** ********** *****, *** *** service ** ******** **** ** *********** **** * ******* ****** of *********.

Comments (5)

********** ****** ******* **** * ******* ******* ** **** ***: "Facility *****"

** *******, *** ********** **** **** *** ***** ******** **** in ***** ** ** ******** *** ******** ** *** ******.

** *** **** *** ** * *** *** *** *** into * **** ******* ** ****** ********, *** ********** ****** be **** ******* *** **** *****'* *****.

*********** *** *********** ** *** ********, ** ***** *** ***** in ***** **** **** ** ****** *** ***? ** *********** or ** ***** ******** ***** ***** ** ***** ******* *********?

***** **** **** ******* **** **'* ***** ***** *** *** the **** ********* ***** *** ** ****** ********** *******. *** the ********* ** **** ***: ****://***.*********.***/****-******-***-*******/

********* ***** ****** *******'* ** **** ***********.

********** *** *** *** **** **** **** *** *********** ***** just ** ****** ******** ** *** *******.

**** **** ****** ********* ********* ** ****** ***** *** ***** designs *** ******* **** **** ***** **** ** ****** ******* a ***** ***** ** ******** *********. *** **** *** ****** of ** ********, ***** ************ ***’* **** *********** **** ** printing ***** *** ****** *** ****** **** **** **** ****

** *** * ***** ****** ****** *** *** *** *** cylinders *** * ******** ** **** *** ******** (*/* ****, mortise, ***.) *** *** *** ******** *** ********* **** **** 3rd ***** ********. * ***'* *** *** *** **** ** with ***** ****** *******? ** *** ******* ********* ** ** entire ****** **** * *** ** **** *** ****. ** course ** *** **** *** **** **** *** *** *** in * ***** ********** & ******** ****** **** ** ** going ** **** **** *** *** ** * ***** ******. Each ****** *** ***** *** ****** ***** ******* ***** *****. You **** ** ** ** **** ****** ** *** *** keys. **'* *** **** *** *** ******* *** ******** **** coming ** *** *** **** *** ** *** *** ***** them *** ***** *** ***. **** *** **** *** ****** knowing ***** **** *** ****** *** **** ** *** **** do **.

** *** *** **** ** ***** *** * ***, ******* can **** ** *** ***** *** *** *********** ** **** keys *** *** **** **** *** ** *** **** ** pay * ******** *** *** **** **** ******* *** ****** 24 ***** ** **. ****** *** **** ****** **** ***** but ** *****'* **** *** ****** **** ******* * ******* key. ********* *** **** **** **** **** ***** *** **** it ***. *** *** ******** *** *********** *** *** ******** keyway.

**** ***** ** * ********** ******* * ********** ****** *** a ********** **** ******** ********. ********** ** **** **** ** doesn't *** ******** ***** ***** **** ** ***** *********. **** security *** ******* *****. **** *** **** ****** **** *** specially *********** **** ** ******* ****. * ********** **** ***** seen ******* **** * **** ******** ****** ** ***-*-**** ********. Hardware **** **** ** **** ** * ********* ***** **** anything **** *** *** *** ****** * ******* *** *** technology *** ******** ************ ** **** ********. ** *** **** apart **** ******* ******* ****/******** **. * **** ******** *** there ** ** **********.

******** ******** **** ***** ** ****. ******* *** ****** ******* don't ****** ** * *** **** * **** ** ********** defeat * **** ** *******. *** ***** **** *** *** the ******* ****** ** **** *** **** *** *** ** your *** **** **** *** **** ***.

**** ***** ***** ** ** ****** ** ***** ** ********** since *** ****** **** ***** ** **** * *** **** may **** **** ********** ** ****** ***** ***** *** ** many ****** ******.

** ******** * ***** *** ****** ** * **** ******** restricted ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Control Course Winter 2018 on Jan 04, 2018
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in the...
2018 Access Control Book Released on Jan 02, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significantly updated for...
2018 Top Sales Interest For Integrators on Dec 20, 2017
130+ integrators answered: This is a key question, especially for manufacturers, as it impacts what areas to focus more on and what...
Lock Status Monitoring Tutorial on Dec 18, 2017
Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
ZKAccess Control Tested on Dec 04, 2017
China manufacturer ZKTeco / ZKAcces has been expanding in the West, offering a low-cost access control platform. But how good is it? And how does...
Hazardous & Explosion Proof Access Control Tutorial on Nov 27, 2017
Controlling access to hazardous environments require equipment meeting specific ratings that certify they will not start fires. Understanding those...
Top Maglock Provider Warns Against Using Maglocks on Nov 21, 2017
Do not buy my company's product. It sounds strange indeed, but a senior Allegion consultant stated that maglocks should not be used in common...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
Mobile Credentials (BLE / NFC / Apps) Guide on Nov 14, 2017
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. In this guide,...

Most Recent Industry Reports

This High Schooler Is Excited About His Future Security Career on Jan 15, 2018
A common lament is that smart, young people have little interest in surveillance systems. In fact, discussions like Should Talented Young People...
"First Of Its Kind" Stove Knob Alarm Sensor (2GIG) on Jan 15, 2018
At CES 2018, 2Gig/Nortek announced the Stove & Grill Guard, a "first of its kind" sensor in the security industry, allowing users to be...
Amazon Deep Learning Partnership With AgentVi on Jan 15, 2018
Amazon is aiming to grow its Kinesis Video Streams offering that "enables you to quickly build computer vision and ML applications" in the cloud....
Winter 2018 Camera Course Registration on Jan 14, 2018
Learn video surveillance and get certified. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times - 'day' and...
Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
CES 2018 Show Final Report on Jan 12, 2018
This is IPVM's final edition of our 2018 CES show report. Below are already numerous images and commentary, with more coming tomorrow.   CES is...
Hanwha ExtraLux Camera Tested on Jan 11, 2018
Hanwha has released the latest in their Wisenet X line, the "extraLUX" series, claiming to "capture crystal clear, true-color images in low-light...
Security Integrator Project Management Certifications on Jan 10, 2018
Certifications are a common option for technology professionals looking to improve skills and gain validation. But how about for project...
Canon Launches World's Most Expensive IP Camera (ME20F-SHN) on Jan 09, 2018
Canon has launched the ME20F-SHN , likely the world's most expensive single imager, non-thermal, IP camera at ~$20,000. And Canon subsidiary...
Hikvision Declares 'Never Click On Links In Emails' on Jan 09, 2018
Hikvision is stepping up its cybersecurity efforts with a clear recommendation - to never click on links in emails: It is a surprising change...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact