an introduction to key system technologiesmaster key systems: finding the proper balance 17 public...

13
20191115 1 © ASSA ABLOY. All rights reserved Public An Introduction to Key System Technologies Cody Dorsett ASSA ABLOY Door Security Solutions Public An Introduction to Key Systems 2 Purpose: To provide a high level overview and introduce the AAFAME members to current technologies, practices, and ways to manage their key system. Process: Discuss how keys and cylinders work, cylinder options, keyways, levels of security, the basics of master keying, how to manage your key system, and the future of key systems. Payoff: AAFAME members will leave with a better understanding of available security options to protect their people, assets, and facilities. 1 2

Upload: others

Post on 22-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

1

© ASSA ABLOY. All rights reserved

Public

An Introduction to Key System TechnologiesCody DorsettASSA ABLOY Door Security Solutions

Public

An Introduction to Key Systems

2

Purpose: To provide a high level overview and introduce the AAFAME members to current technologies, practices, and ways to manage their key system.

Process: Discuss how keys and cylinders work, cylinder options, keyways, levels of security, the basics of master keying, how to manage your key system, and the future of key systems.

Payoff: AAFAME members will leave with a better understanding of available security options to protect their people, assets, and facilities.

1

2

Page 2: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

2

© ASSA ABLOY. All rights reserved

Public

The History of Keys

3

Ancient Egypt: 2000 BC

Public

The History of Keys

4

The Roman Empire

Skeleton Keys

3

4

Page 3: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

3

© ASSA ABLOY. All rights reserved

Public

The History of Keys

Public

The Mechanics of a Cylinder The shear line is where the inner

cylinder ends and the outer cylinder begins. The shear line is created when a key’s cuts align the pins in the cylinder and allow the plug to rotate within the shell.

When a key with the wrong cuts is inserted into the cylinder, the bottom and top pins won’t align and will block the rotation of the plug.

6

5

6

Page 4: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

4

© ASSA ABLOY. All rights reserved

Public

Door Locking Hardware: Cylinder OptionsConventional

Must disassemble or remove lock to remove and rekey.

Interchangeable CoreRemovable with a control key. Hardware remains on the door.

Public

Interchangeable CoresSmall Format

Interchangeable Cores SFIC products are removable by a

special control key

SFIC is an industry standard size which will allow end users to change key system manufacturers very easily.

Large Format Interchangeable Cores

LFIC products are removable by a special control key. Some LFIC systems use a special key for this removal.

LFIC products vary in size with specifications dependent on the manufacturer.

7

8

Page 5: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

5

© ASSA ABLOY. All rights reserved

Public

Ask: “Do you need a system that can be easily maintained with cores that can be swapped quickly

for maintenance or rekeys?”

Interchangeable Core Key Systems allow quick change of keying without having to remove or disassemble the lock.

VS

Public

What is a Keyway?

10

A keyway is the hole in the face of a lock which receives and guides a key. There are many different types and shapes of keyways. These keyways can be specific to a manufacturer or even specifically to an end user. There is also the option for security professionals, locksmiths, and end users to have their own keyway for a geographic region.

9

10

Page 6: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

6

© ASSA ABLOY. All rights reserved

Public11

A Closer Look at the Levels of Key System Security

Public

What Makes a Key System Patented or High Security?

12

11

12

Page 7: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

7

© ASSA ABLOY. All rights reserved

Public

Ask: “Do you need a key system which protects you from unauthorized duplication of your keys?”

If so, a patent protected key system may be right for you!

Public

Ask: “Is your facility vulnerable or looking to protect against physical attacks on your key system?” 

If so, a UL437 listed High Security Cylinder and Key System may be right for you

13

14

Page 8: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

8

© ASSA ABLOY. All rights reserved

Public

Master Key Systems

A Master Key System should have a structure like that of a corporate organizational chart.

The less powerful keys at the bottom are called change keys. Each one operates only one lock, or one group of keyed alike locks. The higher up the hierarchy, the more powerful the key.

A 2-level system comprises a master key operating a group of change keys.

A 3-level system is nothing more than two or more 2-level systems tied together under a higher level key called a grand master key.

15

Public

Master Key Systems: Opposing Forces

16

15

16

Page 9: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

9

© ASSA ABLOY. All rights reserved

Public

Master Key Systems: Finding the Proper Balance

17

Public

Maintaining Your Key System: Record Keeping

A key management software program is essential for any type of organization. Keeping track of the key holders in a master key system is critical for maintaining key control and ensuring the security and integrity of the system

18

17

18

Page 10: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

10

© ASSA ABLOY. All rights reserved

Public

Maintaining Your Key System: Key Storage

19

Public

The Problem of Degraded Security

20

19

20

Page 11: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

11

© ASSA ABLOY. All rights reserved

Public

The Problem of Degraded Security

21

Public

The Threat of New Technology

21

22

Page 12: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

12

© ASSA ABLOY. All rights reserved

Public

Intelligent Keys and Key Control

23

Public

Ask: “Is 24/7 Access appropriate for every key-holder?”

Schedule by day of weekSchedule by dateSchedule to expire

23

24

Page 13: An Introduction to Key System TechnologiesMaster Key Systems: Finding the Proper Balance 17 Public Maintaining Your Key System: Record Keeping A key management software program is

2019‐11‐15

13

© ASSA ABLOY. All rights reserved

Public

Ask: “Would the ability to audit this opening be helpful”?

Some of the most critical openings are the most difficult to monitor… Audit in padlocks solves real security problems

Public

Thank youassaabloyopeningsolutions.com

25

26