How to Control Your Keys

Updated on February 9, 2018
Tom Rubenoff profile image

Tom has 17 years experience as a commercial locksmith and over 20 years in door hardware distribution.

Key Control Systems

While you can buy locks that require special keys, called 'restricted' keys, that take special documentation or identification to have made, and you can buy special key cabinets in which to store and track keys, key control is not something you can buy. It is something you exert.

The key to key control is organization. A good key cabinet can help, but a key system must be managed by a person or persons to be effective. The key system manager must be prepared to chase down a key that has gone astray or change the system so that the errant key is eliminated. The manager must also be knowledgeable enough to know when these actions are necessary and how to help prevent breaches. I hope this article will be helpful in preparing a person to manage a key system.

Key System Structure

Think of a master key system as an army of keys. The lowest link on the chain of command is the passkey. Typically this key opens one lock in the system. The next step up would be a submaster key. Submasters open more than one lock within a system, but not all locks. One might assign submaster keys, for example, to floors in a high-rise commercial building. Above the submaster is the master key, which opens all the locks within that system. There is a step above master key, called grandmaster key, as well. Typically grandmasters are used where large numbers of locks are involved. For example, a commercial real estate management company might manage a dozen high-rise buildings each with its own master key, and they might also have a grandmaster that opens all the locks in all the buildings.

The further up you go in the chain, the greater your vulnerability. For example, if you give a pass key to a repair person and that person steals something and disappears, as key system manager you must have one lock changed. If you gave the repair person a submaster key, you would have to change all the locks that the submaster operates.

There are a finite number of key changes possible within any given key system, limited by the number of cuts, number of possible depths, permissable disparity of adjacent depths, and subtraction of unusable combinations. In addition, whenever a lock is keyed to more than one key, a number of theoretical keys, called incidental keys, could also open that lock if they were created. When these keys are created and used elsewhere in the system, it is said that those locks are cross keyed. Elimination of these incidental keys also limits the number of changes possible within a master key system.

One way lock manufacturers have worked to increase the number of possible changes is to create hierarchical key sections. The key section (or keyway) is the shape of the key that permits its insertion into a lock. Because a key of one section cannot be inserted into a cylinder of another section, changes can be effectively reused within a system, expanding the number of usable changes.

Standard keys raise tumblers inside a lock to a certain level that permits the cylinder to turn, unlocking the lock. Some cylinders incorporate what amounts to an extra set of tumblers that cause the key to perform two simultaneous mechanical processes instead of one. These high security locks have greater resistance to simple entry techniques such as picking and bumping, and sometimes drilling. Usually they also offer restricted keys - that is, keys that are difficult to get duplicated without proper documentation.

Two examples of restricted keys are Medeco and Schlage Primus.

Key Storage

The key system manager's job is to know where, who, why, and when, that is, where a key works, who it is that took the key, why they took the key, and when they took it and when they are supposed to bring it back. One of the most useful tools in handling this information is the key storage cabinet.

If keys will be handed out by an individual, the cabinet should be situated so that anyone who wants the key must ask the individual so that the individual can record the name, date, and time the key was taken. If access to keys will be supervised by an advanced technology key storage device its location is not as critical.

The key cabinet is a great place for key control and access control to collaborate. Personnel can use their proximity card, PIN code or other credential to gain access to keys. The access control system can time-stamp the event when they use their credential to gain access to the key cabinet.

Key Systems, Inc., a long time leader in key control field, offers a wide variety of sophisticated choices with their extensive line of secure storage systems. Below is a picture of their Security Asset Managers (SAMs) line of products. Notice the PIN pad access control with LED display. Visit their site to learn how a key cabinet can help keep track of keys, who is using them and when.

Source

Key Tracking and Identification

If you are managing a key system for a system of 100 locks or less and demand for keys is not constantly high, a simple spiral notebook, divided into columns for name, key number, location, time out and time in should suffice. If you are managing hundreds of locks with high traffic in and out of the key cabinet, you will be better off using a spreadsheet program. If organization is not your strong suit or you find the number of entries in your system daunting, key system management software is available from several manufacturers. Ask your locksmith or security professional for advice on which program might be best for your needs.

There are traditional numbers used by locksmiths to identify keys within a system. You can use the traditional system or devise your own and give it to the locksmith to apply to your key system.

The most important factor concerning key tracking is that you do it. If you don't do it, you don't have key control; you have key OUT OF CONTROL.

The traditional key numbering system goes more or less like this with variations depending on who you talk to. The system designates the top key, "A". if "A" is a grand master, masters might be designated "AA", "AB", "AC", etc. Submasters under each master would go like this: "AAA", "AAB", etc. Pass keys would have numbers like this: "AAA1", "AAB2", etc. In this system, the key, "AAB3" would be key number 3 under submaster AAB under master AA under grand master A.

What is important about a key numbering system is that it helps the key system manager quickly identify any key within the system. However, any key numbering system can be defeated by users who duplicate keys without having the numbers from the original stamped on the duplicate. This is another reason to use locks that have restricted keyways that only allow key duplication by those authorized by the factory to do so. Some companies have keys that are even more secure.

The Medeco lock company, for example, offers patented keyways that are effectively controlled and keys that have on-board electronic credentials that make them more secure, much more difficult to duplicate and much easier to identify and track.

The final message I would like to leave you with about key control is that it is not a thing you buy but a force that you, as manager of your key system, exert. No technology will help those who lack vigilance and organization; but if you are vigilant and organized, there are many technologies available to help you.

May you always feel secure.

Questions & Answers

    © 2008 Tom rubenoff

    Comments

      0 of 8192 characters used
      Post Comment

      • profile image

        Keith B 

        3 years ago

        I just wrote a blog post about the same topic. Feel free to comment on it and continue this discussion.

        http://www.safepakcorp.com/common-key-control-prob...

      • Tom Rubenoff profile imageAUTHOR

        Tom rubenoff 

        6 years ago from United States

        Very true, Lee, thank you. A master key system is really the ultimate test of key control. It has its place - hotels, assisted living facilities - but if one loses control of the master key it is the same as losing control of all the keys.

      • profile image

        Lee 

        6 years ago

        Just know that Masterkeying locks is a convenience item. Not a security item. (one way to put it is that "Masterkeying is the organized destruction of security.")

        Masterkeying that is not done properly, that is - done according to a properly laid out system, with documentable charts, schedules, etc.. is even worse !! Utter Chaos !!

      • profile image

        Pete johansson 

        8 years ago

        Really useful post there i work at a leisure centre and am currently having a renovation will be very helpful.

      • Tom Rubenoff profile imageAUTHOR

        Tom rubenoff 

        8 years ago from United States

        Thank you, Mr. Edwards!

      • profile image

        Billy B. Edwards Jr., CML 

        8 years ago

        Good article. Another thing that will help is to have an established policy whether you have 25 locks or 2500. Your policy should cover issuing key and returns, deposits that may be required, established procedures for rekeying and even lists of authorizing people in larger organizations.

        As far as I know Locksoft is the only company that has such policies already written as well as the tracking software you mention.

      working

      This website uses cookies

      As a user in the EEA, your approval is needed on a few things. To provide a better website experience, dengarden.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

      For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://dengarden.com/privacy-policy#gdpr

      Show Details
      Necessary
      HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
      LoginThis is necessary to sign in to the HubPages Service.
      Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
      AkismetThis is used to detect comment spam. (Privacy Policy)
      HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
      HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
      Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
      CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
      Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
      Features
      Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
      Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
      Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
      Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
      Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
      VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
      PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
      Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
      MavenThis supports the Maven widget and search functionality. (Privacy Policy)
      Marketing
      Google AdSenseThis is an ad network. (Privacy Policy)
      Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
      Index ExchangeThis is an ad network. (Privacy Policy)
      SovrnThis is an ad network. (Privacy Policy)
      Facebook AdsThis is an ad network. (Privacy Policy)
      Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
      AppNexusThis is an ad network. (Privacy Policy)
      OpenxThis is an ad network. (Privacy Policy)
      Rubicon ProjectThis is an ad network. (Privacy Policy)
      TripleLiftThis is an ad network. (Privacy Policy)
      Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
      Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
      Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
      Statistics
      Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
      ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
      Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)