Generics can simplify how we consider and work with incidental master keys.
The change key might raise the pins so that the shear line is just above the top of the master wafer, while the master key would raise the pins so the shear line is at the bottom of the master wafer. In both cases, there is a gap at the shear line and the key is able to turn. We recommend prior to purchasing a Masterkey System that you review both our Master Key Design Guide and Key Control Design Guides and most importantly ensure you have a SIPA agreement in place with your Authorised Service Agent. MasterKing® will guide you through the development of simple or complex master key systems step by step. With this locksmith master keying software, you can set up systems very quickly using defaults and factory specifications or adjust and fine tune almost every aspect of your system to tailor it to your needs.
Master keying is the ability to use one key to open one or more locks that are not keyed the same. This is frequently found in commercial setups, like businesses, where a user may have a key to their office that can also open the bathroom, or a janitor may have a single key that opens every door in the building.
By using Generics, locksmiths can easily develop master keys, or develop key characteristics from key bittings.
Generics can simplify how we consider and work with incidental master keys.
The last article (October 2004 Locksmith Ledger) demonstrated how to determine the power and characteristics of a random key in the master key system by decoding the key bittings. Generic Types were used to target how the key performed within the master key system and on a page, demonstrating the power of the key.
This article will demonstrate the reverse. A Generic Type will be selected from within a master key system, and the key bitting will be determined. To do this, you will need the Key Bitting Array (KBA, Figure 1) and a worksheet specifically designed to determine key bittings from Generic Types.
Before starting, let' s review what a Generic Type is.
In Figure 2, the KEEWERX template, the mechanism that creates Generics is px. This refers to the relationship to the number of change key bittings under the master bitting. In the KBA, this is expressed as rows for change key bittings and columns for the number of key bittings.
With most systems, there are four change key bittings under the system bitting in the KBA. When 'p' in px equals 4 (the rows) and 'x' equals the 6 (the columns), the results are 41+1+1+1+1+1 or 46 or 4x4x4x4x4x4, or 4096. This is the total amount of change keys that can be progressed in a standard six-pin master key system.
Other systems have five, six or seven change bittings under the master bitting, so the 'p' in px accommodates all of these master key systems. As a system progresses, Generics are created. The term px can be used to express how the master key system progresses.
At p0, the beginning of progression is occurring in the first column. At p1, the first column is fully progressed and current progression is ready to start in the second column. At p2, the first two columns have fully progressed and current progression is starting in the third column. At p3, the first three columns have fully progressed and current progression is starting in the fourth column. At p4, the first four columns have fully progressed and current progression is starting in the fifth column. At p,5 the first five columns have fully progressed and current progression is starting in the sixth column. At p6, all six columns have been fully progressed.
Table 1 (page 36) reveals the creation of a Generic during steps of standard progression. There are only eight Generics Types: X0; X1;X2;X3; Y1; Y2; Z1; Z2.
For every three columns that progress, a new level of keys are created. The first three progressed columns create a complete hierarchy of key functions for each page of the master key system. The next three progressed columns create a hierarchy of key functions that occur within the pages of the first hierarchy.
This article is limited to Generic activity within 5- and 6-pin systems. Note that this process continues infinitely and that is there is a P7 (when dealing with 7-pin systems, etc).
Generic References for 5- and 6-pin systems are visually designed to reveal where and how the key functions. To do this, the Generic Reference is separated into two parts, a prefix and a suffix. We will examine the Generic Reference and its two components.
Consider the Generic Reference for a change key: X0X0. The first two characters represent the first Generic Type XO (the prefix), and the remaining two characters represent the second Generic Type XO (the suffix). Generic Types in the prefix position represent how the key functions throughout all pages. Generic Types in the suffix position represent how the key functions on a given page.
The numbers in both designate the power of the key. In the case of X0X0, the key operates keys on a single page, and can only operate a single change on a page (See Figure 2).
As a second example, consider the reference: X0X3. This key operates keys on a single page (p0=40), and can operate 64 (p3=43) keys on a page. Remember the numbers always reveal the power of the key (p3).
Find the Key Bittings from a Generic Type
To maintain consistency, the Key Bitting Array (KBA) and the Generic example used in the last article will be discussed: Y2X2. Refer to Figure 3 as the worksheet titled: 'Develop a Master Key (6-pin).'
The Key Bitting Array was filled out using the provided KBA in Figure 1.
As shown in 'Step 1,' the selected Generic (Y2X2) was split into two equal parts and entered on the 'A' and 'B' line.
In 'Step 2', any cuts in common with the TMK were identified by following the instructions: The part of the Generic that was entered on the 'A' line, 'Y2' is located to the left (row header) of the Alignment Chart. Any 6, 5, or 4 that appears on the same line in the Alignment Chart is circled. In this case a '6' and '4' was circled.
The part of the Generic that was entered on the 'B' line, 'X2,' is located to the left (row header) of the Alignment Chart and any 3, 2, or 1 that appears on the same line in the Alignment Chart is also circled. In this case a '2' and a '1' was circled.
In 'Step 3' the Sequence Of Progression (SOP) from the KBA is transferred down into cells provided to the right of the step. The number in each cell is compared to numbers circled in the Alignment Chart. If a circled number in the Alignment Chart matches the number in the cell, the number in the cell is also circled.
In 'Step 4', check each cell in the 'Step 3' to see if it is circled. If it is circled enter the number from the TMK line in the KBA that appears in line with the same column. Do this for each cell. In the example the first two cells in 'Step 3' were not circled, so nothing was entered into the cells in 'Step 4'. The last four cells in 'Step 3' were circled so the numbers that appear on the TMK line of the KBA were entered into each cell of 'Step 4.'
Any change key is entered into the cells of 'Step 5.' This is usually a change key that is being used for a specific master key project in which a master key is needed.
The final step, 'Step 6,' integrates both the selected change key ('Step 5') and the cells that were entered in 'Step 4.' For each cell to the right of 'Step 6,' enter the same number, in the same position, from 'Step 4'. If the cell is blank, enter instead, the number from the cell in the same position from 'Step 5'.
When completed, the key bitting for the master key, Y2X2, appears on 'Step 6.'
A blank worksheet (Figure 4) is provided so that you can use this procedure to determine master keys for your own master key systems. Although the worksheet seems to work like a magician's number trick, it simply relies on the tried-and-true premises already established in Standard Progression Format (SPF). Each step in the worksheet is designed to 'guide' the locksmith through a process that enforces SPF rules.
A crucial step in the worksheet is guiding the locksmith through the implementation of the Alignment Chart. The chart is deceivingly simple, even though much research has gone into its creation. The Alignment Chart is a table that notes when and where TMK bittings will appear in a targeted key. It charts the evolution of master keys as keys sequentially progress. The Alignment Chart in Figure 3 is designed for both 5- and 6-pin systems.
Developing a Key Bitting Array when it doesn't exist
Essential to good master keying procedure is the establishment of a static Key Bitting Array.
Locksmiths tell me many of their existing master key systems do not come with a KBA, rather they exist in the form of pages of records. Lock manufacturers often provide these pages to locksmiths, not as a complete 'book' but as the part of the 'book' that the locksmith currently needs. For these locksmiths, there is a process to determine the original Key Bitting Array.
When information is not readily available to complete the KBA, a decision has to be made. If support regarding the existing system is ongoing, you will need to discuss the completion of the KBA with the source of the existing system.
If no updates are anticipated, the KBA can be carefully filled-in by honoring the rules of Standard Progression Format.
Here are the rules to follow:
Regarding the sequence of progression, each number represents the order in which the columns progress; therefore, numbers have to be sequential and cannot be repeated in the SOP.
How To Master Keying Locks
When filling in missing change progressions, remember that TMK bittings (in the same column position) must not appear in the change progression cells. This would cause unwanted interchanges of change keys.
Each column of change progression cells must use unique numbers that are part of a working subset for the column. For example, in any given column a working subset might be {1,3,5,7,9}. If the TMK bitting is 5, then the remaining available numbers are the subset {1,3,5,9}. In a column of change progression cells, these four numbers would be entered in the cells in any order.
Once the KBA has been established, all worksheets described in this article can be implemented.
Table 1. Creation of a Generic
Developing Columns | Generic Types Produced | Hierarchy |
---|---|---|
PO | XO | Changes on a Page |
P1 | X1;Y1;Z1 | Changes on a Page |
P2 | X2;Y2;Z2 | Changes on a Page |
P3 | X3 | Changes on a Page |
P4 | X0 | Pages in a System |
P5 | X1, Y1, Z1 | Pages in a System |
P6 | X2, Y2, Z2 | Pages in a System |
A master key operates a set of several locks. Usually, there is nothing special about the key itself, but rather the locks into which it will fit. These master-keyed locks are configured to operate with two, or more, different keys: one specific to each lock (the change key), which cannot operate any of the others in the set, and the master key, which operates all the locks in the set. Locks that have master keys have a second set of the mechanism used to operate them that is identical to all of the others in the set of locks. For example, master keyed pin tumbler locks often have two shear points at each pin position, one for the change key and one for the master key. A far more secure (and more expensive) system has two cylinders in each lock, one for the change key and one for the master key.
Master keyed lock systems generally reduce overall security.[1] The fact that some pin chambers have two shear points allows for more options when picking and it also allows for more keys to operate. For example, a standard 6 pin cylinder, which was designed to be operated by only one key, can be operated by up to 26 = 64 keys if there are two shear points in each chamber.
Larger organizations, with more complex systems, may have several levels of master keys, where the top level key works in all of the locks in the system. To visualize this, it can be thought of as a hierarchical chart, or a tree.
A practical attack exists to create a working master key for an entire system given only access to a single master-keyed lock, its associated change key, a supply of appropriate key blanks, and the ability to cut new keys.[1]
Locksmiths may also determine cuts for a replacement master key, when given several different key examples from a given system.
Maison key system[edit]
A Maison key system is a keying system that permits a lock to be opened with a number of unique, individual keys.[2] Maison key systems are often found in apartment building common areas, such as main entrance or a laundry room where individual residents can use their own apartment key to access these areas. Unlike a master key system, where each individual lock has one individual operating key and one common master key, Maison lock is designed to be operated by every key within the system.
Because of the inherent lack of security in the Maison key system, some jurisdictions prohibit the use of Maison key systems in apartment and condominium complexes. In such locations, access is usually facilitated by either a high-security, key-controlled system or the use of electronic access control systems such as a card reader.
See also[edit]
References[edit]
- ^ abBlaze, Matt (March 2003). 'Rights amplification in master-keyed mechanical locks'(PDF). IEEE Security & Privacy. 99 (2): 24–32.
- ^'The Maison Key System and Its Uses'. www.altonalocksmiths.com.au. Retrieved 2017-01-28.