skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 68328 Find in a Library
Title: HIGH SECURITY LOCK AND KEY CONTROL
Journal: SECURITY MANAGEMENT  Volume:24  Issue:6  Dated:(JUNE 1980)  Pages:55-62
Author(s): M E HARTER
Date Published: 1980
Page Count: 8
Format: Article
Language: English
Country: United States of America
Annotation: TO HELP SECURITY MANAGERS CHOOSE PROPER LOCK AND KEY SYSTEMS FOR HIGH SECURITY, BITTINGS AND BITTING CODES, LOCK CYLINDERS, AND KEY DISTRIBUTION AND CONTROL ARE DISCUSSED.
Abstract: AN EXCELLENT QUALITY LOCK CYLINDER FOR HIGH SECURITY WILL RESIST PICKING OR FORCING, BE MADE OF HARD AND SUITABLE MATERIALS, AND CONTAIN HARDENED STEEL ANTIDRILL PINS AT VULNERABLE POINTS. THE NUMBER OF KEYS FITTING THE CYLINDER SHOULD BE KEPT AS LOW AS POSSIBLE, BUT THE NUMBER OF KEYS THAT CAN OPERATE MORE THAN ONE CYLINDER IS DETERMINED BY THE VARIETY OF POSSIBLE BITTING CODES IN A SYSTEM. THE BITTING CODE FOR A KEY IS CUT; THE LARGER THE NUMBER OF PINS, THE GREATER THE VARIETY OF THE BITTING CODES POSSIBLE IN A LOCK CYLINDER ARE IMPRACTICAL OR ABLE TO BE OPERATED BY SEVERAL DIFFERENT KEYS. FOR HIGH SECURITY SITUATIONS, THEREFORE, CYLINDERS OFFERING 23 MILLION OR MORE NONINTERCHANGEABLE BITTING CODES ARE RECOMMENDED. THE MANUFACTURER OF A HIGH-SECURITY CYLINDER OFFERING MANY BITTING CODES ASSIGNS A PERSONAL BITTING CODE TO EACH CUSTOMER AND THEN REMOVES THE ASSIGNED CODE FROM HIS CODE BOOK FOR CERTAIN TYPES OF KEYS. WHEN SELECTING RESTRICTED KEYS, THE CUSTOMER SHOULD CONSIDER THE MECHANICS AND TIME INVOLVED IN ACQUIRING EXTRA KEYS, SINCE SOME TYPES OF RESTRICTED KEYS CAN BE DUPLICATED ONLY AT THE FACTORY, OR NOT AT ALL. AFTER SELECTING THE PROPER LOCK AND KEY SYSTEM, THE SECURITY MANAGER SHOULD SELECT AN OVERALL KEY CONTROL PLAN BASED ON BUDGET LIMITATIONS AND SECURITY LEVEL, SELECT A KEY THAT CANNOT BE DUPLICATED BY ORDINARY MEANS, AND ENSURE PERSONNEL AND MANAGEMENT SUPPORT. IMPLEMENTING A KEY CONTROL PROGRAM INVOLVES STUDYING THE AREA IN WHICH IT WILL BE ESTABLISHED, RECORDING WHO IS TO GET KEYS, AND ESTABLISHING PROPER KEY STORAGE. ACQUIRING ADDITIONAL KEYS AND CYLINDERS AND WHEN TO CHANGE LOCKS ARE ALSO DISCUSSED. ILLUSTRATIONS ARE INCLUDED. (PAP)
Index Term(s): Intrusion detectors; Locks
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=68328

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.