Maintenance 2 Understanding Master Key Structures

PURPOSE
1. Learn about a Master Key System and
How it works
2. Learn about Master Levels/Hierarchy
3. Initial Planning
4. Questions to Ask
5. Key Control Best Practices
What Is Master Key System?
Systematic generation of security
codes in a hierarchical structure
Why Master Key?
• To Protect People (Student and Facility)
• To Protect Property (Valuable Assets)
• To Protect Data/Information
You Do All This:
1. Because it is part of your Responsibility
2. In order not to be determined negligent
Basis Master Key Terms:
1. Barrel: Chamber of a core that accepts pin segments which then interact
with the depths on keys to provide access control. Cores typically have six
or seven barrels.
2. Cut: A single key depth, part of a code, corresponding to pin segments in a
core.
3. Code: A sequence of cuts (six or seven) that complete the cutting
information for a key and determine the combination of pin segments
used in all the barrels of a core. Codes are commonly referred to as keys.
The position of cuts in a code are referred to as barrels because of their
association with cores. For example, a code of 3476289. There is a 3 cut in
the first barrel; a 4 cut in the second barrel; a 7 cut in the third barrel, etc.
4. System Type: Name associated with a set of mathematical principles that
determine how codes are generated, what depths are made on keys, and
what pin segment types are used in cores.
Basis Master Key Terms Cont:
• 5. Control (CT): A key/code that extends and retracts the
control lug of a core, allowing the core to be installed and
removed from the lock.
• 6. Grand Master (GM): A key/code that works all of the
codes in a system. The GM code generates all other codes
in the system.
• 7. Master (M): A key/code that works a set portion of codes
in the system.
• 8. Submaster (SM): a key/code that works a set portion of
codes within a Master.
• 9. Operating: a key/code that only works its own
combination; a single-function code.
Example of Master Perimeters
• 16,384
• 4,096
• 1,024
•
256
•
64
•
16
•
4
Example of College
Hierarchy
HIERARCHIES 
SPECIAL REQUIREMENTS
Selectivity?
– Definition: Crossing Codes not setup
in the normal Hierarchy of the system.
Issue: Creates other keys to operate the core
other than crosses “Ghost Keys”
Increases Liability or Risk
• Selectivity (also called Cross-keying) works best if it is
planned out before the system is installed
• After the fact, it is much more difficult to control
• Keep it as simple and limited as possible
• Cross-keying can “eat-up” codes reducing the system
capacity
HIERARCHIES -
SPECIAL REQUIREMENTS
Reasons to Use Selective Masters
1. A person or group needs access to a lot of doors
keyed under several Masters, but not every door
under every Master
• Decrease the size of your Master Key System
• Increase Liability to those Selective Special Keys
HIERARCHIES -
SPECIAL REQUIREMENTS
Selectivity
INITIAL PLANNING
Build a Security/Safety Team
Departments to Consider:
Administration
Facilities
Security/Campus Police
Access Control
IT Department
Note: Keep the Security Team Small.
You may not need all the members
for Master Key Planning
INITIAL PLANNING
If possible, obtain copies of the door
schedules or floor plans of your campus
• This will give you an idea of the top level planning
of the Master Key Plan
• And Bottom Level Planning Floor to Floor
INITIAL PLANNING
 Complexity can shorten the life of the system
•
•
Strive to make the process & system as simple as possible
while still satisfying the customers
Plan around Departments not People. People Come and Go
Departments and Building Structure Stay.
QUESTIONS TO ASK:
 One system for the entire organization
or separate systems?
 Example: Separate Facilities and Housing
 How many levels of keying?
Masters, Sub Masters, Operator Keys
 How should we do the exterior doors?
Single Key under Bldg Master
Ext Door Core to pass all Codes for Master
 What about Services Rooms
Mechanical, Electrical, Janitorial, Data
 Is electronic access control a better
choice for high traffic/turnover areas?
How do we key the electronic doors?
QUESTIONS TO ASK: CONT
Do you care if keys can be
duplicated off campus?
Difference between Standard or
Patented Keyway
Do you need different keyways
or a multi-keyway system?
Larger Campuses Bigger Systems
KEY CONTROL BEST PRACTICES
• All Support with Key Control has to come from the Top
Down.
• Grandmasters must have limited distribution. Everyone
don’t need a GM.
– GM’s are a tremendous liability to the facility if lost.
• Good practice to set a Key Approval Structure (GM,
Masters, Subs, and Operators etc)
– Ex. President (GM), VP (Masters), etc.
•
•
•
•
One show importance
Two Maintain Control.
Three Remove the pressure off Key Issuers
Four Stop unwarranted key issuances
KEY CONTROL BEST PRACTICES
• Central Source for Key Cutting and Dispensing (ex Lock shop)
• Good Practice to have HR at the Facility involved with the Key Shop
(Lock shop)
– Change over in personal is the big reason why key records don’t stay
current
– Piggy backing or keys getting past down without updating records is
also part of this reason
• Good Practice to have keys where they are needed in a secure
location in order to minimize personal from carrying around keys all
the time
–
–
–
–
Example, Building Masters, Mechanical, Electrical, & Data Keys.
Manual Key Sign out
Retainer Box Setup
Electro-mechanical Key Box
KEY CONTROL BEST PRACTICES
• Need to have Good Records
• Know where cores are and what they are
keyed to
• Key sign out and return agreements
• Being able to track who and where
• Good Key Control Software
– All this an more can be done with Software
KEY CONTROL BEST PRACTICES
• Make sure you have a plan for Key Changes or
Lost Keys
– Importance Level
– How to administer Key Change
– Documentation/Reporting
– Liability?
– Penalty?
• Governing Body?