Accuracy and Precision

Importance of Accuracy in Key Duplication Services

Key duplication services are a common service that many of us have used at some point in our lives. Whether it's duplicating keys for our homes, cars, or businesses, accuracy is crucial when it comes to this process. The importance of accuracy in key duplication services cannot be overstated.


When it comes to duplicating keys, even the smallest discrepancy can cause a key to not work properly. A key that is not accurately duplicated may not fit into the lock properly, may not turn smoothly, or may not work at all. This can be frustrating and time-consuming for the customer who is relying on the duplicated key to work correctly.


In some cases, an inaccurate duplicate key can also pose a security risk. If a key does not work properly in a lock, it may be easier for someone with malicious intent to gain access to a property or vehicle. This could result in theft or other criminal activity.


Accuracy is also important when it comes to duplicating high-security keys, such as those used in commercial buildings or government facilities. These keys often have intricate designs and unique features that require precision in order to duplicate accurately. Any errors in the duplication process could compromise the security of these facilities.


Overall, accuracy is essential when it comes to key duplication services. Customers rely on these services to provide them with reliable duplicates that work properly and keep their property secure. By prioritizing accuracy in key duplication services, locksmiths and other professionals can ensure that their customers receive high-quality duplicates that meet their needs and expectations.

Importance of Accuracy in Key Duplication Services

Methods for Ensuring Precision in Key Duplication

Key duplication is a common service provided by locksmiths and hardware stores to help individuals create copies of their keys for convenience and security. However, ensuring precision in key duplication is crucial to guarantee that the duplicate key will work seamlessly with the original lock.


There are several methods that can be employed to ensure accuracy and precision in key duplication. One of the most important steps is to use high-quality key cutting machines that are properly calibrated. These machines are equipped with precise cutting tools that can replicate the unique grooves and ridges of the original key accurately.


Another method for ensuring precision in key duplication is to use advanced software programs that can generate exact replicas of the original key based on its specifications. These programs can analyze the shape and size of each groove on the key and create a template for cutting the duplicate key with utmost accuracy.


Additionally, experienced locksmiths or technicians who have undergone extensive training can also play a crucial role in ensuring precision in key duplication. Their expertise allows them to carefully examine the original key, identify any imperfections or irregularities, and make necessary adjustments during the duplication process.


Overall, employing these methods for ensuring precision in key duplication is essential to avoid issues such as keys not fitting properly or getting stuck in locks. By investing in high-quality equipment, utilizing advanced software programs, and relying on skilled professionals, individuals can rest assured that their duplicate keys will be accurate and reliable.

Technology and Tools for Accurate Key Duplication

Key duplication is a common service that many people require at some point in their lives. Whether it's for a spare house key, a car key, or a key to a lockbox, accuracy and precision are essential when creating duplicates. Thankfully, advancements in technology have made the process of key duplication more accurate and reliable than ever before.


One of the most important tools in accurate key duplication is the use of computerized key cutting machines. These machines are able to create precise duplicates by reading and replicating the exact dimensions of the original key. This eliminates human error that can occur with manual cutting methods, resulting in keys that fit perfectly every time.


Another breakthrough in key duplication technology is the development of laser cutting machines. These machines use high-powered lasers to cut keys with incredible precision, ensuring that each duplicate is an exact replica of the original. Laser cutting also allows for more intricate designs and patterns to be replicated accurately, making it ideal for specialized keys such as those used in high-security locks.


In addition to advanced cutting machines, computer software plays a crucial role in accurate key duplication. Key duplication software can store detailed information about different types of keys, including their unique shapes and sizes. This information can then be used to program cutting machines to create precise duplicates quickly and efficiently.


Overall, technology has revolutionized the process of key duplication, making it faster, more accurate, and more reliable than ever before. With computerized cutting machines, laser technology, and sophisticated software programs at our disposal, we can confidently duplicate keys with unparalleled accuracy and precision.

Types of Keys Overland Park, KS
Technology and Tools for Accurate Key Duplication

Quality Control Measures for Precision in Key Duplication

Quality control measures for precision in key duplication are essential to ensure accuracy and consistency in the final product. When it comes to duplicating keys, even the slightest deviation can result in a key that does not fit properly or work as intended.


To maintain precision in key duplication, several measures can be taken. Firstly, using high-quality materials and equipment is crucial. Cheap materials or outdated machinery can lead to inaccuracies in the duplication process. Investing in top-of-the-line key cutting machines and quality key blanks can help ensure that each duplicate key is made with precision.


Additionally, regular maintenance and calibration of key cutting machines are necessary to guarantee accuracy. Machines that are not properly maintained may produce keys that are slightly off, leading to issues when trying to use the duplicate key.


Furthermore, training and supervision of staff members who are responsible for key duplication is vital. Proper training ensures that employees understand the importance of precision and follow established protocols for duplicating keys accurately.


Lastly, conducting quality checks on a sample of duplicate keys is essential to identify any potential issues early on. By randomly selecting duplicates for inspection, any discrepancies or errors can be detected and corrected before they become widespread.


In conclusion, implementing quality control measures for precision in key duplication is crucial to ensuring accurate and reliable duplicate keys. By using high-quality materials, maintaining equipment, providing proper training to staff members, and conducting regular quality checks, businesses can maintain high standards of accuracy and precision in their key duplication processes.

TL-15 Burglary Rated Safe
Basic steel safe with an electronic lock.

A safe (also called a strongbox or coffer) is a secure lockable enclosure used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body and door may be cast from metal (such as steel) or formed out of plastic through blow molding. Bank teller safes typically are secured to the counter, have a slit opening for dropping valuables into the safe without opening it, and a time-delay combination lock to foil thieves. One significant distinction between types of safes is whether the safe is secured to a wall or structure or if it can be moved around.

History

[edit]

The first known safe dates back to the 13th century BC and was found in the tomb of Pharaoh Ramesses II. It was made of wood and consisted of a locking system resembling the modern pin tumbler lock.[1]

In the 16th century, blacksmiths in southern Germany, Austria, and France first forged cash boxes in sheet iron. These sheet-iron money chests served as the models for mass-produced cash boxes in the 19th century.[2]

In the 17th century, in northern Europe, iron safes were sometimes made in the shape of a barrel, with a padlock on top.[3]

In 1835, English inventors Charles and Jeremiah Chubb in Wolverhampton, England, received a patent for a burglar-resisting safe and began a production of safes.[4] The Chubb brothers had produced locks since 1818. Chubb Locks was an independent company until 2000 when it was sold to Assa Abloy.

On November 2, 1886, inventor Henry Brown patented a "receptacle for storing and preserving papers". The container was fire retardant and accident resistant as it was made from forged metal. The box was able to be safely secured with a lock and key and also able to maintain organization by offering different slots to organize important papers.[5][6]

Specifications

[edit]

Specifications for safes include some or all of the following parameters:

It is often possible to open a safe without access to the key or knowledge of the combination; this activity is known as safe-cracking and is a popular theme in heist films.

A diversion safe, or hidden safe, is a safe that is made from an otherwise ordinary object such as a book, a candle, a can, or wall outlet. Valuables are placed in these hidden safes, which are themselves placed inconspicuously (for example, a book would be placed on a book shelf).

Strongbox multiple locking mechanism

Fire-resistant record protection equipment consists of self-contained devices that incorporate insulated bodies, doors, drawers or lids, or non-rated multi-drawer devices housing individually rated containers that contain one or more inner compartments for storage of records. These devices are intended to provide protection to one or more types of records as evidenced by the assigned Class rating or ratings; Class 350 for paper, Class 150 for microfilm, microfiche other and photographic film and Class 125 for magnetic media and hard drives. Enclosures of this type are typically rated to protect contents for 12, 1, 2, or 4 hours; they will not protect indefinitely. They may also be rated for their resistance to impact should the safe fall a specified distance onto a hard surface, or have debris fall upon it during a fire.[7]

Burglary-resistant safes are rated as to their resistance to various types of tools and the duration of the attack.

Safes can contain hardware that automatically dispenses cash or validates bills as part of an automated cash handling system.

Room-sized fireproof vaults

[edit]

For larger volumes of heat-sensitive materials, a modular room-sized vault is much more economical than purchasing and storing many fire rated safes. Typically these room-sized vaults are utilized by corporations, government agencies and off-site storage service firms. Fireproof vaults are rated up to Class 125-4 Hour for large data storage applications. These vaults utilize ceramic fiber, a high temperature industrial insulating material, as the core of their modular panel system. All components of the vault, not just the walls and roof panels, must be Class 125 rated to achieve that overall rating for the vault. This includes the door assembly (a double door is needed since there is no single Class 125 vault door available), cable penetrations, coolant line penetrations (for split HVAC systems), and air duct penetrations.

There are also Class 150 applications (such as microfilm) and Class 350 vaults for protecting valuable paper documents. Like the data-rated (Class 125) structures, these vault systems employ ceramic fiber insulation and components rated to meet or exceed the required level of protection.

In recent years room-sized Class 125 vaults have been installed to protect entire data centers. As data storage technologies migrate from tape-based storage methods to hard drives, this trend is likely to continue.[8]

Fire-resistant safes

[edit]
A reinforced, fireproof cabinet for dangerous chemicals

A fire-resistant safe is a type of safe that is designed to protect its contents from high temperatures or actual fire. Fire resistant safes are usually rated by the amount of time they can withstand the extreme temperatures a fire produces, while not exceeding a set internal temperature, e.g., less than 350 °F (177 °C). Models are typically available between half-hour and four-hour durations.

In the UK, the BS EN-1047 standard is set aside for data and document safes to determine their ability to withstand prolonged intense heat and impact damage.

  • Document safes are designed to maintain an internal temperature no greater than 177 °C (351 °F) while in a constantly heated environment in excess of 1,000 °C (1,830 °F).
  • Data safes are designed to maintain an internal temperature no greater than 55 °C (131 °F) while in a constantly heated environment in excess of 1,000 °C (1,830 °F).

These conditions are maintained for the duration of the test. This is usually at least 30 minutes but can extend to many hours depending on grade. Both kinds of safe are also tested for impact by dropping from a set height onto a solid surface and then tested for fire survivability once again.[9]

In the United States, both the writing of standards for fire-resistance and the actual testing of safes is performed by Underwriters Laboratories.

An in-floor safe installed in a concrete floor is very resistant to fire. However, not all floor safes are watertight; they may fill with water from fire hoses. Contents can be protected against water damage by appropriate packaging.

Reinforced, fireproof cabinets are also used for dangerous chemicals or flammable goods.

Wall safes

[edit]

Wall safes are designed to provide hidden protection for documents and miscellaneous valuables. Adjustable depth allows the maximization of usable space when installed in different wall thicknesses. Some wall safes have pry-resistant recessed doors with concealed hinges. A painting or other wall decoration may be hung over a wall safe to hide it.

Small safes may be fixed to a wall to prevent the entire safe being removed, without concealment. Very small secure enclosures known as key safes, opened by entering a combination, are attached to the wall of a building to store the keys allowing access, so that they are available only to a person knowing the combination, typically for holiday lets, carers, or emergency use.[10][11]

Safe-cracking

[edit]

Safe-cracking is opening a safe without a combination or key. There are many methods of safe-cracking ranging from brute force methods to guessing the combination. The easiest method that can be used on many safes is "safe bouncing", which involves hitting the safe on top; this may cause the locking pin to budge, opening the safe[citation needed].

Physicist Richard Feynman gained a reputation for safe-cracking while working on the Manhattan Project during the Second World War. He did this for recreation, describing his experiences and methods in detail in his book Surely You're Joking, Mr. Feynman!. He made the point that the secure storage he successfully opened clandestinely (to which he would have been given access if he asked) contained contents far more important than any thief had ever accessed, all the secrets of the wartime atomic bomb project.[12]

UL Safe Standards

[edit]

Underwriters Laboratories (UL) testing certifications are known to be some of the most rigorous and most respected in the world.[13] UL provides numerous ratings, the most common security and fire ratings as discussed below. UL ratings are the typical rating standards used for safes within the United States. They are only matched by B.T.U/VDMA certifications (Germany).[14]

Fire ratings

[edit]
UL 1 Hour Fire Label

UL provides a variety of fire rating classifications, 125, 150, and 350 representing the maximum internal temperature in degrees Fahrenheit the safe may not exceed during the test. The classifications come in durations from

12-hour to 4 hours in length. The safe is exposed to gradually higher temperatures depending on the duration of the test. The most common standards being the 350 one hour (1,700 degrees) and 350 two hour (1,850 degrees) ratings as the temperature paper chars is approximately 451 degrees Fahrenheit.[15]

Burglary ratings

[edit]

UL standards are one of the principal North American protection standards.[16] The resistance time limit specifies "tools on the safe" time without access to contents.[17] The test might take hours to run and can be repeated as many times as the UL staff feel necessary to ensure that all prospective avenues of attack have been thoroughly explored.

Residential Security Containers (RSC)

[edit]

This is the entry level security rating offered by Underwriters Laboratories and it has its own standard: (UL 1037).[18] The standard originally had one level, now known as RSC Level I. The standard was expanded in 2016 providing a greater range of security options.[19] This standard also involves a drop test for products weighing not more than 750 pounds, simulating attempting to gain entry by dropping the safe.[20]

  • RSC Level I - Must withstand a five-minute attack by one technician using common hand tools such as drills, screwdrivers and hammers.
  • RSC Level II - Must withstand a ten-minute attack by two technicians who use more aggressive tools such as picks, sledgehammers, pry bars, high-speed carbide drills and pressure applying devices. In addition, the technicians will attempt to make a six-square-inch opening in the door or the front face of the safe.
  • RSC Level III - Also gives two technicians a ten-minute window to perform the test, but the range of tools become even more aggressive, and the size of the maximum attack opening must not exceed two square inches.

Tool-Resistant Safe (TL)

[edit]
UL TL-15 Tool-Resistant Safe Label

Safes at this level are typically, but not exclusively, used for commercial applications such as jewelers and coin dealers. These ratings are granted to combination locked safes that successfully resist when attacked by two technicians with common hand tools, picking tools, mechanical or portable electric tools, grinding points, carbide drills and pressure applying devices or mechanisms. In addition to those requirements, the safe must weigh at least 750 pounds or come with instructions for anchoring, and have body walls of material equivalent to at least 1" open hearth steel with a minimum tensile strength of 50,000 psi. The UL Standard for tool-resistant safes and above are governed by UL Standard 687.[21][22]

  • TL-15 - This is a combination-locked safe that offers limited protection against combinations of common mechanical and electrical tools. The safe will resist abuse for 15 minutes from tools such as hand tools, picking tools, mechanical or electric tools, grinding points, carbide drills and devices that apply pressure. While the UL 687 defines this as a "limited degree" of protection, that standard is used for commercial applications, and the TL-15 rating offers significantly better protection than many unrated safes.
  • TL-30 - This safe offers moderate protection against combinations of mechanical and electrical tools. The safe will resist abuse for 30 minutes from the same tools as the TL-15 test, plus more aggressive tools including cutting wheels and power saws.
  • TL-30x6 - This is safe can withstand the same assaults as the TL-30 but protection is offered on all six-sides of the body as opposed to only the door.

Torch & Tool Resistant Safe (TRTL)

[edit]
  • TRTL-30x6 - This is a combination-locked safe that offers high protection against combinations of mechanical, electrical, and cutting tools. The safe will resist abuse for 30 minutes from tools such as hand tools, picking tools, mechanical or electrical tools, grinding points, carbide drills, devices that apply pressure, cutting wheels, power saws, impact tools and, in addition, can withstand an oxy-fuel welding and cutting torch (tested gas limited to 1,000 cubic feet (28 m3) combined total oxygen and fuel gas.)[23]
  • TRTL-60x6 - This class will withstand the same assaults as Class TRTL-30x6 for 60 minutes.

Torch, Explosive & Tool Resistant Safe (TXTL)

[edit]
  • TXTL-60x6 - This class meets all the requirements for Class TRTL-60x6 and in addition can withstand detonation of one charge of 4 ounces (110 g) of nitroglycerin, or other high explosive of equivalent energy. Multiple charges up to a total of 8 ounces (230 g) may be used.

European safe standards

[edit]

Depending on the usage, the European Committee for Standardization has published different European standards for safes. Testing and certification according to these standards should be done by an accredited certification body, e.g. European Certification Body.[24]

  • EN 1143-1 is the main testing standard for safes, ATM safes, strongroom doors and strongrooms. For safes it features eleven resistance grades (0, I, II, ..., to X). From one grade to the next the security rises by approximately 50%. Testing is based on a free choice of attack tools and methods. Testing requires partial access (hand hole) and complete access attempts, on all sides of the product. The security is calculated by using ratings of tools and the attack time. The result is expressed in resistance units (RU).[25]
  • EN 14450 is a testing standard for secure cabinets and strongboxes. The standard covers products meant for purposes where the security resistance required is less than that of EN 1143–1.[26]

For fire-resistant safes the EN 1047-1 (fire resistance standard similar to the fire resistance safe standard of UL) and EN 15659 (for light fire storage units) were published.[27]

[edit]

See also

[edit]

References

[edit]
  1. ^ "The History of Safes". Insafe International Limited. 18 February 2015. Archived from the original on 2020-06-30. Retrieved 2020-06-30.
  2. ^ "Sixteenth and seventeenth century money chests and cash boxes". Historical Locks. Archived from the original on 2020-06-30. Retrieved 2020-06-30.
  3. ^ Barrel Safe https://elizabethstreetgallery.com/barrel-safe/ Archived 2022-07-11 at the Wayback Machine
  4. ^ "History". Archived from the original on 2010-09-09.
  5. ^ "Henry Brown". Inventors. About.com. 2011. Archived from the original on January 16, 2013. Retrieved 9 March 2012.
  6. ^ Chamberlain, Gaius (November 26, 2012). "Henry Brown". The Black Inventor Online Museum. Archived from the original on July 8, 2020. Retrieved June 30, 2020.
  7. ^ "Five reasons you need a Home Safe". Archived from the original on 2017-04-20. Retrieved 2017-04-19.
  8. ^ "Protection for the Modular Data Center". Cision PRWeb. 2008-08-26. Archived from the original on 2022-03-11. Retrieved 2020-06-30.
  9. ^ Standard document: BS EN 1047-2:2000
  10. ^ "Key safes". Kirklees Council. Retrieved 5 October 2024.
  11. ^ "Key Safe Information Sheet" (PDF). Derbyshire County Council. 18 November 2022.
  12. ^ Feynman, Richard (1997). Surely You're Joking, Mr. Feynman!. W. W. Norton & Company. p. 60. ISBN 978-0-393-31604-9.
  13. ^ "Cracking the Code: A Glimpse into UL's Burglary Testing of Safes". Underwriters Laboratories (UL). 2019-09-10. Archived from the original on 2020-06-30. Retrieved 2020-06-30.
  14. ^ "EN 1143-1, EN 1143-2 and EN 14450". Verband Deutscher Maschinen- und Anlagenbau. Archived from the original on 2020-07-01. Retrieved 2020-06-30.
  15. ^ "UL Fire Rating". www.klsecurity.com. Retrieved 2024-03-25.
  16. ^ sage (2018-09-11). "Understanding the New UL RSC Level II Burglary Safe Rating". Antique Sage. Retrieved 2024-03-25.
  17. ^ Meilink TL30 Safe Burglary Test at UL, retrieved 2024-03-25
  18. ^ "UL 1037: Standard for Antitheft Alarms and Devices". Underwriters Limited. 1999-02-24. Archived from the original on 2016-07-31. Retrieved 2016-07-01.
  19. ^ sage (2018-09-11). "Understanding the New UL RSC Level II Burglary Safe Rating". Antique Sage. Retrieved 2024-03-25.
  20. ^ "Residential Security Container Standard Revised". UL Solutions. Retrieved 2024-03-25.
  21. ^ "UL 687: Standard for Burglary-Resistant Safes". Underwriters Limited. 2011-07-19. Archived from the original on 2016-08-18. Retrieved 2016-07-01.
  22. ^ "UL 687 Burglary Safe". www.klsecurity.com. Retrieved 2024-03-25.
  23. ^ Salazar, Diet (2020-06-15). "Safes: Everything You Need to Know". Archived from the original on 2020-06-30. Retrieved 2020-06-30.
  24. ^ EN 1143-1:2012, clause 7.2
  25. ^ "CEN". Archived from the original on 2020-10-21. Retrieved 2014-04-10.
  26. ^ "CEN". Archived from the original on 2014-04-13. Retrieved 2014-04-10.
  27. ^ "EN 1047-1, EN 1047-2 and EN 15659". Archived from the original on 2014-04-13. Retrieved 2014-04-10.

Further reading

[edit]
  • Locks, Safes, and Security: An International Police Reference, published by Charles Thomas Publishers, Springfield, Illinois, United States. (2000) ISBN 0-398-07079-2.
[edit]
  • Media related to Safes at Wikimedia Commons

 

An illustration of a German locksmith, 1451.

Locksmithing is the work of creating and bypassing locks. Locksmithing is a traditional trade and in many countries requires completion of an apprenticeship. The level of formal education legally required varies by country, ranging from no formal education to a training certificate awarded by an employer, or a full diploma from an engineering college, along with time spent as an apprentice.

Terminology

[edit]

A lock is a mechanism that secures buildings, rooms, cabinets, objects, or other storage facilities. A "smith" is a metalworker who shapes metal pieces, often using a forge or mould, into useful objects or to be part of a more complex structure. Thus locksmithing, as its name implies, is the assembly and designing of locks and their respective keys by hand. Most locksmiths use both automatic and manual cutting tools to mold keys, with many of these tools being powered by batteries or mains electricity.

Work

[edit]

Locks have been constructed for over 2500 years, initially out of wood and later out of metal.[1] Historically, locksmiths would make the entire lock, working for hours hand cutting screws and doing much file-work. Lock designs became significantly more complicated in the 18th century, and locksmiths often specialized in repairing or designing locks.

Although replacing lost keys for automobiles and homes, as well as rekeying locks for security purposes, remains an important part of locksmithing, a 1976 US Government publication noted that modern locksmiths are primarily involved in installing high-quality lock-sets and managing keying and key control systems.

Locksmith specialisations

[edit]

Most locksmiths also provide electronic lock services, such as programming smart keys for transponder-equipped vehicles and implementing access control systems to protect individuals and assets for large institutions.[2] Many also specialise in other areas such as:

  • Auto Locksmithing
  • Safes

Regulation by country

[edit]

Australia

[edit]

In Australia, prospective locksmiths are required to take a Technical and Further Education (TAFE) course in locksmithing, completion of which leads to issuance of a Level 3 Australian Qualifications Framework certificate, and complete an apprenticeship. They must also pass a criminal records check certifying that they are not currently wanted by the police. Apprenticeships can last one to four years. Course requirements are variable: there is a minimal requirements version that requires fewer total training units, and a fuller version that teaches more advanced skills, but takes more time to complete. Apprenticeship and course availability vary by state or territory.[3]

Ireland

[edit]

In Ireland, licensing for locksmiths was introduced in 2016,[4] with locksmiths having to obtain a Private Security Authority license. The Irish Locksmith Organisation has 50 members with ongoing training to ensure all members are up-to-date with knowledge and skills.

United Kingdom

[edit]

In the UK, there is no current government regulation for locksmithing, so effectively anyone can trade and operate as a locksmith with no skill or knowledge of the industry.[5]

United States

[edit]

Fifteen states in the United States require licensure for locksmiths. Nassau County and New York City in New York State, and Hillsborough County and Miami-Dade County in Florida have their own licensing laws.[6] State and local laws are described in the table below. 15 states require locksmith licensing: Alabama, California, Connecticut, Illinois, Louisiana, Maryland, Nebraska, New Jersey, Nevada, North Carolina, Oklahoma, Oregon, Tennessee, Texas and Virginia

US Locksmith Licensing[7][6]
State Regulatory body Requirements
Alabama Alabama Electronic Security Board of Licensure Certification course, continuing education, background check every two years
California California Department of Consumer Affairs, California Contractors State License Board; California Bureau of Security and Investigative Services California requires a C-28 Lock and Security Equipment Contractor license, with renewal every two years, in addition to a background check.[8][9]
Connecticut Department of Consumer Protection Background check, registration (renews biennially)
Florida No statewide regulation. Counties of Hillsborough and Miami-Dade require licensure for locksmiths and locksmith firms. Miami-Dade's ordinance covers locksmithing, as well as the installation of security alarm closed-circuit television systems. Miami-Dade: must register with county and receive license. Each business performing locksmith services must have at least one license-holder in its employ. Fingerprinting and criminal background check accompany license application. Initial applicants must have a locksmith permit for one year before full licensure. Any work involving electrical systems must be done by someone who also holds a state electrician's or contractor's license.[10] Hillsborough: must apply for a biennial locksmith license. The cost is $500 for an individual or firm of up to five employees, $750 for a firm of six to ten employees, and $1000 for a firm of more than ten employees. A background check and proof of insurance are also required.[11]: 1 Pinellas County: The City of Clearwater requires fingerprints applied by Clearwater police.
Illinois Illinois Department of Financial and Professional Regulation Must not have been convicted of a felony in the last ten years, must take twenty-hour licensure course, must pass examination[12]
Louisiana Louisiana Office of State Fire Marshall Must pass examination, pay initial registration of $250, and maintain registration for $50 annually thereafter. Additional training and certification are required for locksmiths dealing with locks on fire and safety equipment and alarm systems.[13]
Maryland Maryland Locksmith Licensing Program, Maryland Department of Labor Must apply for a license and submit to a criminal records check, and after issue, must carry a state-issued locksmith license card at all times when performing work. Prior felony and misdemeanor convictions will be weighed by the Secretary of Labor according to statutorily-determined factors, including length of time since the offense and applicant's behavior since, when deciding to grant or withhold a license. The licensee must carry liability insurance, and submit proof of insurance to the secretary.[14]
Nebraska County Clerk Registration with the county clerk in the county in which the locksmith's business is located
Nevada County Sheriff Must not be in arrears on child support, and must register with the county sheriff of the county in which the business is located
New Jersey New Jersey Board of Examiners of Electrical Contractors Must be at least eighteen years of age, must complete three years of supervised locksmith work, working an average of at least twenty hours a week, or complete a formal two-year apprenticeship in a program approved by the United States Department of Labor, must not have been convicted of certain crimes within a ten-year period prior to application, and must pass an examination before being granted license.[15]
New York No statewide licensing requirement. In Nassau County, a county license is required.[16] Nassau County requirements include submission of passport-style photos for photo identification license card for the principal applicant; business or home address and phone number and proof of number operability in the form of a recent telephone bill; a listing of all employees and officers of the company along with passport photos; recent utility bill for the business location if the business is not operated from home; a statement of all criminal convictions for all employees and officers, along with court records if requested; statement all trade names used by the business, and incorporation documents, if applicable; proof of insurance; proof of workers' compensation registration; a federal employee identification number, and a state sales tax number, if applicable; and fingerprint records for all applicants, in addition to a non-refundable processing fee.[17]: 2–3 
North Carolina North Carolina Locksmith Licensing Board Must submit documentation of criminal history. Must submit documentation of out-of-state licenses, immigration status, and military discharge, if applicable. May optionally submit training certifications and other data. Must pay an initial license fee and subsequent annual renewal fees and keep license on person at all times. Must notify state of any employees operating under the owner's locksmith license. All apprentices must be themselves licensed under an apprentice license, and may not perform certain services, except under the direct supervision of a full locksmith license holder.[18][19]
Oklahoma Alarm, Locksmith, & Fire Sprinkler Program, Oklahoma Department of Labor Must not have been convicted of a felony and must register with Alarm, Locksmith, & Fire Sprinkler Program[20]
Oregon Oregon Construction Contractors Board Must pass a criminal background check, pass a license examination, and renew registration biennially
Tennessee Tennessee Department of Commerce and Insurance Must provide documentation of citizenship or legal residency, any criminal convictions, all changes of address; business license in county or city where business operates, or a notarized statement that services will be for an employer or association and not offered directly to the public; otherwise, must submit documentation of application for, or employment by, a Tennessee Locksmith Company duly registered with the state. Conviction of a felony, or any level of drug, burglary, or breaking and entering offense may bar the applicant from licensure.[21]
Texas Department of Public Safety Private Security Board The owner or manager of a company providing locksmith services must hold a Locksmith Company License. To qualify for a license, the applicant must have two years service as a locksmith for a licensed company. Alternatively, the applicant may substitute one year's experience plus successful completion of a forty-eight hour licensure course, followed by successful completion of a comprehensive license examination.[22]
Virginia Department of Criminal Justice Services Must be over eighteen years of age. Must complete an eighteen-hour training course. Must undergo a criminal records check and submit fingerprints. Anyone convicted of a felony or misdemeanor (excluding traffic violations) in Virginia or any other jurisdiction must complete a supplemental Criminal History form detailing the circumstances of arrest and conviction, completion of sentence, and any record pertaining to parole or probation. Any false statements or omissions can provide grounds for denial of license and possible criminal sanctions.[23][24]

Employment

[edit]
A Locksmith, 2013

Locksmiths may be commercial (working out of a storefront), mobile (working out of a vehicle), institutional (employed by an institution) or investigatory (forensic locksmiths) or may specialize in one aspect of the skill, such as an automotive lock specialist, a master key system specialist or a safe technician.[2] Many locksmiths also work as security consultants, but not all security consultants possess locksmithing skills. Locksmiths are frequently certified in specific skill areas or to a level of skill within the trade. This is separate from certificates of completion of training courses. In determining skill levels, certifications from manufacturers or locksmith associations are usually more valid criteria than certificates of completion. Some locksmiths decide to call themselves "Master Locksmiths" whether they are fully trained or not, and some training certificates appear quite authoritative.

The majority of locksmiths also work on any existing door hardware, not just locking mechanisms. This includes door closers, door hinges, electric strikes, frame repairs and other door hardware.

Full disclosure

[edit]

The issue of full disclosure was first raised in the context of locksmithing, in a 19th-century controversy regarding whether weaknesses in lock systems should be kept secret in the locksmithing community, or revealed to the public.

According to A. C. Hobbs:

A commercial, and in some respects a social doubt has been started within the last year or two, whether or not it is right to discuss so openly the security or insecurity of locks. Many well-meaning persons suppose that the discussion respecting the means for baffling the supposed safety of locks offers a premium for dishonesty, by showing others how to be dishonest. This is a fallacy. Rogues are very keen in their profession, and know already much more than we can teach them respecting their several kinds of roguery.

Rogues knew a good deal about lock-picking long before locksmiths discussed it among themselves, as they have lately done. If a lock, let it have been made in whatever country, or by whatever maker, is not so inviolable as it has hitherto been deemed to be, surely it is to the interest of honest persons to know this fact, because the dishonest are tolerably certain to apply the knowledge practically; and the spread of the knowledge is necessary to give fair play to those who might suffer by ignorance.

It cannot be too earnestly urged that an acquaintance with real facts will, in the end, be better for all parties. Some time ago, when the reading public was alarmed at being told how London milk is adulterated, timid persons deprecated the exposure, on the plea that it would give instructions in the art of adulterating milk; a vain fear, milkmen knew all about it before, whether they practised it or not; and the exposure only taught purchasers the necessity of a little scrutiny and caution, leaving them to obey this necessity or not, as they pleased.

-- From A. C. Hobbs (Charles Tomlinson, ed.), Locks and Safes: The Construction of Locks. Published by Virtue & Co., London, 1853 (revised 1868).

Notable locksmiths

[edit]

See also

[edit]

References

[edit]
  1. ^ "Lock Manufacturers and Brands". 24 7 Locksmiths. Archived from the original on 2019-06-15. Retrieved 2017-08-13.
  2. ^ a b Statistics, United States Bureau of Labor (1976). Occupational Outlook Handbook. U.S. Department of Labor, Bureau of Labor Statistics, Division of Occupational Outlook. pp. 416–417. Retrieved 15 October 2018.
  3. ^ "Certificate III in Locksmithing". TAFE Queensland. Retrieved 2021-01-22.
  4. ^ "Licensing of Locksmiths".
  5. ^ "Are locksmiths licensed in the UK?". The National Guild of Certified Locksmiths. April 9, 2021. Retrieved May 23, 2023.
  6. ^ a b "State Licensing Laws". Associated Locksmiths of America. Retrieved January 19, 2021.
  7. ^ Carpenter, Dick M. III; Knepper, Lisa; Sweetland, Kyle; McDonald, Jennifer. "License to Work: A National Study of Burdens from Occupational Licensing". Institute for Justice. Retrieved January 19, 2021.
  8. ^ "Locksmith Company and Locksmith Employee Fact Sheet". California Bureau of Security and Investigative Services. July 2020. Retrieved January 19, 2021.
  9. ^ "Licensing_Classifications: C-28 Lock And Security Equipment". s. Retrieved January 25, 2021.
  10. ^ "Locksmith License". Miami-Dade County. Retrieved August 4, 2021.
  11. ^ "Hillsborough County Locksmith Services Business Licensing Application and Important Information" (PDF). Hillsborough County. Retrieved August 4, 2021.
  12. ^ "Locksmith". Illinois Department of Financial and Professional Regulation. Retrieved January 19, 2021.
  13. ^ "Life Safety & Property Protection Training Requirements". Louisiana Office of State Fire Marshalln. Retrieved January 19, 2021.
  14. ^ "Maryland Locksmith Licensing Program". Maryland Department of Labor. Retrieved January 19, 2021.
  15. ^ "New Jersey Office of the Attorney General: Application for a Locksmith License" (PDF). New Jersey Attorney General. Retrieved January 19, 2021.
  16. ^ "Local Law 19-2007: A Local Law to amend the Administrative Code in relation to locksmith licenses". Nassau County Legislature. Retrieved July 10, 2021.
  17. ^ "General Instructions for the Locksmith License". Nassau County Department of Consumer Affairs. Retrieved July 10, 2021.
  18. ^ "North Carolina Locksmith Licensing Board: Application for a Locksmith License" (PDF). North Carolina Locksmith Licensing Board. Retrieved January 24, 2021.
  19. ^ "North Carolina Locksmith Licensing Board: Application for a Locksmith Apprentice License". North Carolina Locksmith Licensing Board. Retrieved January 24, 2021.
  20. ^ "Alarm, Locksmith, & Fire Sprinkler Program". Oklahoma Office of the Department of Labor. Retrieved January 19, 2021.
  21. ^ "TN Regulations: Locksmith". Tennessee Department of Commerce and Insurance. Retrieved January 28, 2021.
  22. ^ "Private Security Administrative Rules:RULE §35.123 Locksmith Company License" (PDF). Texas Department of Public Safety. Retrieved February 1, 2021.
  23. ^ "Licensure and Regulatory Affairs: Locksmith". Virginia Department of Criminal Justice Services. Retrieved February 1, 2021.
  24. ^ "Licensure and Regulatory Affairs: Criminal History". Virginia Department of Criminal Justice Services. Retrieved February 1, 2021.
  25. ^ Lea, Robert (2010). "Going for Growth: why Banham is not going to bolt now" The Times
  26. ^ Evening Standard. 9/25/2014, p73. 1p.
  27. ^ "Lock cylinder". Archived from the original on 2017-12-31.
  28. ^ "Door fastening device". Archived from the original on 2017-12-31.
  29. ^ "Banham - Experts in Security Services". Banham. Archived from the original on 2017-01-25.
  30. ^ "Opening an Antique Bramah Box Lock". Hygra.com. Archived from the original on 2012-03-27. Retrieved 2012-08-15.
  31. ^ "Bramah Locks". Crypto.com. Archived from the original on 2012-09-04. Retrieved 2012-08-15.
[edit]

 

Lock(s) or Locked may refer to:

Common meanings

[edit]

Arts and entertainment

[edit]

Fictional characters

[edit]

People

[edit]

Places

[edit]

Sports

[edit]

Technology

[edit]

Computing

[edit]
  • Lock (computer science), a bookkeeping object used to serialize concurrent access
  • Lock (database), a feature used when multiple users access a database concurrently
  • File locking, describes a mechanism that restricts access to a computer file
  • SIM lock, a restriction on mobile phones to work only in certain countries or with certain providers

Other technologies

[edit]
  • Lock and key, a mechanical device used to secure items of importance
  • Lock (firearm), the ignition mechanism of small arms
  • Lock (water navigation), a device for boats to transit between different levels of water, as in a canal
  • Lock (weapons guidance), missile navigation system's target acquisition fix
  • Fermentation lock, a device in beer and wine making that allows carbon dioxide to escape while not allowing air to enter
  • Rope lock, a device used in theater fly systems
  • Airlock, a compartment for transfer between environments with different atmospheres
  • Lockheed Martin, a military aerospace company

Other uses

[edit]

See also

[edit]
Video showing the process of cutting a key
Process of advanced security key copying on professional duplicator.

Key duplication refers to the process of creating a key based on an existing key. Key cutting is the primary method of key duplication: a flat key is fitted into a vise in a machine, with a blank attached to a parallel vise, and the original key is moved along a guide, while the blank is moved against a blade, which cuts it. After cutting, the new key is deburred: scrubbed with a wire brush, either built into the machine, or in a bench grinder, to remove burrs which, were they not removed, would be dangerously sharp and, further, foul locks.

Different key cutting machines are more or less automated, using different milling or grinding equipment, and follow the design of early 20th century key duplicators.

Key duplication is available in many retail hardware stores and as a service of the specialized locksmith, though the correct key blank may not be available. More recently, online services for duplicating keys have become available.

In the UK, the majority of the mobile locksmiths will have a dual key cutting machine on their van. The key duplication machine will be able to cut both cylinder and mortise keys, as these are the most popular types of keys in circulation. However, very few will carry a laser key cutting machine, which is sometimes needed to cut high security keys.

Certain keys are designed to be difficult to copy, for key control, such as Medeco; while others are simply stamped "Do Not Duplicate" to advise that key control is requested, but in the US, this disclaimer has no legal weight.

Other methods

[edit]

Rather than using a pattern grinder to remove metal, keys may also be duplicated with a punch machine (the Curtis key clipper[1] is a recognised example). The key to be duplicated is measured for the depth of each notch with a gauge and then placed into a device with a numeric slider. The slider is adjusted to match the corresponding measured depth and a lever is depressed, which cuts the entire notch at once. As the lever is raised the key automatically advances to the next indexed position and the slider is adjusted appropriately to the next measured depth. This cycle is continued until the key is complete.

Duplicating keys by this process is more labor intense and requires somewhat better trained personnel. However, keys made in this fashion have clean margins and the depth of the notches are not subject to wear induced changes encountered when heavily worn keys are duplicated using a pattern grinder. Keys may also be made in this fashion without an original as long as the depth of each notch and the type of key blank are known. This is particularly useful for institutions with a great number of locks for which they do not want to maintain a wide variety of archived copies. Code books or on-line resources may be used to program the key clipper/punch settings from the code stamped on the lock, listed in the owner's manual, or available from the vehicle's VIN.[2]

Mechanical key duplicating machine invented in 1917

A machine permitting rapid duplication of flat metal keys, which contributed to the proliferation of their use during the 20th century, may have been first invented in the United States in 1917 (image to the left):

The key to be duplicated is placed in one vise and the blank key to be cut in a corresponding vise under the cutting disk. The vise carriage is then into such position by means of a lateral-feed clutch that the shoulders of both the pattern and blank keys just touch the guide disk and cutter respectively. The lateral-feed clutch on the top of the machine is then thrown, and the vertical feed rod released into action and power applied through the combination hand-crank power wheel on the right of the machine, until the cutter has passed over the entire length at the blank. A duplicate of the pattern key is obtained in about one minute.

— "Man And His Machines", The World's Work XXXIII:6 April 1917

In recent years, dual key cutting machines have come on to the market, enabling cutting of both mortice and cylinder keys on one machine. These machines are primarily manufactured in the Far East and save a key cutter a significant amount of money compared with using two separate dedicated machines.

Do not duplicate key

[edit]
A minuteKEY fully-automated self-service key duplication kiosk at a Menards in Gillette, Wyoming

A "do not duplicate" key (or DND key, for short) is one that has been stamped "do not duplicate", "duplication prohibited" or similar by a locksmith or manufacturer as a passive deterrent to discourage a retail key cutting service from duplicating a key without authorization or without contacting the locksmith or manufacturer who originally cut the key. More importantly, this is a key control system for the owner of the key, such as a maintenance person or security guard, to identify keys that should not be freely distributed or used without authorization. Though it is intended to prevent unauthorized key duplication, copying DND keys remains a common security problem.

U.S. restrictions

[edit]

There is no direct legal sanction in the US for someone who copies a key that is stamped do not duplicate (unless it is an owned key), but there are patent restrictions on some key designs (see "restricted keys"). The Associated Locksmiths of America, ALOA, calls DND keys "not effective security", and "deceptive because it provides a false sense of security." 18 U.S.C. § 1704 deals with United States Post Office keys, and 18 U.S.C. § 1386 deals with United States Department of Defense keys.

Restricted key

[edit]

A restricted key is a type of key that is designed to limit access to a specific area or object. These keys are typically used in high-security environments, such as government facilities, military bases, and certain businesses that require strict access control.

Restricted keys are unique in that they are only able to be duplicated by authorized individuals or locksmiths who have the proper identification and authorization to do so. This helps to ensure that the key cannot be copied or used by unauthorized individuals.

Some common examples of restricted key systems include master key systems, where a single key can open multiple locks within a building, and key control systems which allow for precise tracking of key usage and access control. Overall, restricted keys are an important tool for maintaining security and controlling access to sensitive areas.

A restricted keyblank has a keyway for which a manufacturer has set up a restricted level of sales and distribution. Restricted keys are often protected by patent, which prohibits other manufacturers from making unauthorized productions of the key blank. In many cases, customers must provide proof of ID before a locksmith will cut additional keys using restricted blanks. Some companies, such as Medeco High Security Locks, have keyways that are restricted to having keys cut in the factory only. This is done to ensure the highest amount of security. These days, many restricted keys have special in-laid features, such as magnets, different types of metal, or even small computer chips to prevent duplication.

Another way to restrict keys is trademarking the profile of the key. For example, the profile of the key can read the name of the manufacturer. The advantage of a trademark is that the legal protection for a trademark can be longer than the legal protection for a patent. However, usually not all features of the profile are necessary to create a working key. By removing certain unnecessary features, a non restricted profile can be derived, allowing the production and distribution of non restricted key blanks.

References

[edit]
  1. ^ "Curtis#15 parts (new and used)". Hawley Lock Supply. Retrieved 12 November 2019.
  2. ^ "Four things to know about key codes". CLK Supplies. Retrieved 12 November 2019.

Further reading

[edit]
  • Phillips, Bill. (2005). The Complete Book of Locks and Locksmithing. McGraw-Hill. ISBN 0-07-144829-2.
Our reputation for providing reliable and accurate key duplication services speaks for itself, giving you peace of mind that your keys will be duplicated correctly.