Master Keying 2012. Master Keying Virtually endless possibilities All Products can be master keyed Easy design & planning Simple keying & pinning User-friendly.

Slides:



Advertisements
Similar presentations
1 The Normal Distribution and Microsoft Excel. 2 Say a company has developed a new tire for cars. In testing the tire it has been determined the distribution.
Advertisements

Lecture 6; The Finite Element Method 1-dimensional spring systems (modified ) 1 Lecture 6; The Finite Element Method 1-dimensional spring systems.
Chapter 4 Systems of Linear Equations; Matrices
4.3 Matrix Approach to Solving Linear Systems 1 Linear systems were solved using substitution and elimination in the two previous section. This section.
 Microsoft Excel is an electronic spreadsheet.  As with a paper spreadsheet, you can use Excel to organize your data into rows and columns and to perform.
Microsoft Office XP Microsoft Excel
Wellhead Recovery System The wellhead system that fits the application. (Patent Pending)
Kwikset Rekey Ultramax Rekeying the Ultramax by Kwikset this presentation is designed for beginners.
Here we prefer to introduce you a typical project case study: Developing of Electro Mechanical Locking System Interactive QLIC for MUL-T-LOCK (ASSA Abloy.
Loading Excel Double click the Excel icon on the desktop (if you have this) OR Click on Start All Programs Microsoft Office Microsoft Office Excel 2003.
The Periodic Table 6.5A Students will know that an element is a pure substance represented by chemical symbols.
Steering Columns.
MOHAMMAD IMRAN DEPARTMENT OF APPLIED SCIENCES JAHANGIRABAD EDUCATIONAL GROUP OF INSTITUTES.
ASPPRATECH.
Chapter 11 Section 11.0 Review of Matrices. Matrices A matrix (despite the glamour of the movie) is a collection of numbers arranged in a rectangle or.
HAWKES LEARNING SYSTEMS math courseware specialists Copyright © 2011 Hawkes Learning Systems. All rights reserved. Hawkes Learning Systems College Algebra.
Area of Rectangles, Squares, Parallelograms, Triangles, and Trapezoids.
Mathematics Simple Angle Facts.
Solving for x December 7, Solving for x When solving an equation, the goal is to get the variable by itself on one side of the equation. Inverse.
Keys and Key Systems David M. Koenig, CPP. Today’s Topics Common Keys Key System Components Master Keying High Security Key Systems.
SnapVend, a Cans Setup Solution. SPRAY CANS -- VENDING SOLUTION FOR (USING #6 COILS) Here are some images of the process of fitting the cans. You will.
DSL 305 Series ADSL Modem. Types of DSL305 series DSL305E ADSL Modem  PPP Half-Bridge (Default)  Transparent Bridge DSL305EU ADSL Router/Modem.
Matrix Solution of Linear Systems The Gauss-Jordan Method Special Systems.
IDE Interface. Objectives In this chapter, you will -Learn about each of the ATA standards (ATA-1 through ATA-6) used in PCs -Identify the ATA connector.
ZTF Interconnecting Scheme Stephen Kaye
Increase Your Computer Competency - Practical Tips and Tricks Cheryl Gould Summer 2005.
May Young Life US Field Approver Quick Tips Guide May 2007 Logging into the Works system… 1.Open your Internet Browser. 2.Enter the following in.
Tool Kit Natasha Donovan.
The SMARTair Story 1 This is not a presentation about what SMARTair is… 2 What is SMARTair???
Copyright Silca S.p.A Marker Copyright Silca S.p.A MARKER 2000: Electronic micro-point marking machine for keys and cylinders Marker.
Moodle (Course Management Systems). Glossaries Moodle has a tool to help you and your students develop glossaries of terms and embed them in your course.
Master Keying David M. Koenig, CPP. Master Keying Is... n System Of Organizing Numbers –For Cutting Keys –For Pinning Locks n Grouping Of Locks And Keys.
Unit 3: Matrices.
Security Solutions from SurfersNet and TimePilot [Overview] [Benefits] [Time Clock] [Security]
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
4.5 Inverse of a Square Matrix
One and Two Step Equations Using Opposite Operations.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
GenTrans Technology Technical Presentation QWERTY Compact Keyboard.
Computer Architecture
Helping Your Child with Their Maths at Home
Elements, Compounds and Mixtures. Elements are substances that cannot be separated into any other substances by chemical or physical means.
Feb Key control & Master key More Safety and better Security for any facility.
Chapter 1 Section 1.5 Matrix Operations. Matrices A matrix (despite the glamour of the movie) is a collection of numbers arranged in a rectangle or an.
Lauren Burkhard Maggie Hartigan Priya Bhagat Richard Lechette.
Reaction Equilibrium Do any reactions truly go to completion??
Triangles Javier Soto. Triangles There are 3 different types of triangles, but the one that we need to focus on for the GED is called the RIGHT TRIANGLE.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
Proper Keyboarding Technique Andrea. Names The one on top is called the top row. The one in the middle is called the home row. The one on the bottom is.
Unit 3: Matrices. Matrix: A rectangular arrangement of data into rows and columns, identified by capital letters. Matrix Dimensions: Number of rows, m,
IBM Software Group © 2006 IBM Corporation Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical.
Algebra The greatest mathematical tool of all!!. This is a course in basic introductory algebra. Essential Prerequisites: Ability to work with directed.
MS Excel INFORMATION TECHNOLOGY MANAGEMENT SERVICE Training & Research Division.
Network Topology Computer network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies.
Keyboard Finger Placement Exercise
Code-It Product Presentation
Hotel lock ASL411 ASL412 ASL413.
10.5 Inverses of Matrices and Matrix Equations
Network Configurations
Century 21 Computer Skills and Applications
Holding the Shear The thumb is the cutting blade and ring finger holds the shear’s position.
Unit 3: Matrices
HOW TO REPAIR A TIRE?. INTRODUCTION Repairing your tire isn't hard and can simply be done by you in under an hour. If you don't want to do your own tire.
Century 21 Computer Skills and Applications
Yale Digital Door Lock DDL Introduction
Presentation transcript:

Master Keying 2012

Master Keying Virtually endless possibilities All Products can be master keyed Easy design & planning Simple keying & pinning User-friendly software Get rid of the overloaded key ring, Replace it with a S I N G L E K E Y. Master keying allows the customer to design which keys will or will not open which locks in the system.

Single Key Access The variety of Mul-T-Lock products for use at home, office, cars etc… can be Master keyed. ” ONE KEY - ENDLESS “POSSIBILITIES”

The design methods The highest level is the Grand Master key (GM) which may open each cylinder in the system, Lowest levels are related to keys that may open only a single cylinder The Hierarchical method The Matrix method  Using a Matrix chart, Each column represents a Cylinder and each row represents a Key  The customer, with the help of the locksmith, marks the cylinders that each key is allowed to open  Several levels of access authorization, higher levels are authorized to open lower levels

The Hierarchical Method 1 level below the General Master GM| 4 MK | 2 differs 2 levels below the General Master GM| 7 differs

Entrance door - Common cylinder ENTRANCE Several possible solutions, The best one is to use two double sided key The Hierarchical Method X

Branch Common cylinders COMMONCOMMON Supported in Tree mode Recommended only for small systems The Hierarchical method

Every Tree can be represented on a matrix chart cylinders keys Tree – Matrix Relations

We are using the following mechanical elements to create master keying: Master pins (disks) Solid Plug pins Side pins (not in MT5) Master keying profile-set Master Keying - How Does It Work? Allowing more than one key combination to operate specific cylinders. The “bottom line” of any Master-key system: To do this:

The “ Old ” Concept Toothed Key and pins – straight shear line Key Plug pins Body pins Shear line Plug Body

The “ Old ” concept Pins length – for straight shear line key Plug pins Body pins Shear line Plug Body

The “ Old ” concept Replacing plug pin with shorter pin and master pin disk key Plug pins Body pins Plug Body Master pin

The “ Old ” Concept key Plug pins Body pins Plug Body Master pins Replacing another plug pin …

Combination – None Mastered It will be locked for any other key combinations Here- same cylinder is locked for ‘D5’ or other key combinations Cylinder with ordinary pinning is open by a single key combination Here- Cylinder with D3 pins is open for ‘D3’ key combination only! 3 D 3 D

Using Master Pins Cylinder with master pins is open by several key combinations Here- same cylinder is open for ‘D5’ key combinations 2 Here- Cylinder with D3_2 pins is open for ‘D3’ key combination 3 D 2 3 D

Conventions A1 34 B3 2+ B3 1_ Internal master pin ‘4’ Internal plug pin ‘1’ External plug pin ‘A’ External master pin ‘3’ Internal plug pin ‘3’ External plug pin ‘B’ External master pin ‘1’ Internal plug pin ‘3’ External plug pin ‘B’ Solid master pin ‘2’ Available master pins Internal master pin 1 cancelled

MT5 Master Finger Pins master finger pins card

Pinning Chart Example

Pinning Chart Example (MT5)Cylinders Keys

GM Combinations Package MUL-T-LOCK provides special GM combination-card for each Master Key system. Each Package contains 10 cards (for 10 systems) with 6 digits number typed on each. An attached list refers a special GM combination for each card (system).

It is highly recommended to separate the master key products from the ordinary products by using different profiles We recommend to use the left hand MKS profiles set Security-convenience trade off

The new profiles set has a structure of 7 profiles open by one master key profile Left Hand MKS Profiles New master key-profile 99 replaces the existing master 11 Three new profiles: 33, 35, 37 are added

Solid Plug Pins New revolution in master keying concept only available in telescopic pins tumblers We took the “multiple shear line” away from the plug shear line and move it into the key side 12 pins divided into 3 different configurations A- B- C- D- AA BB CC DD Z+ A+ B+ C+ ZZ CancelledY+ CancelledZ- Cancelled

Solid Plug Pins  Pins that “ride” only on the external cut  Pins are identified by letter and (-) sign  A-, B-, C-, D- EXAMPLE: Solid Plug Pin C- operated by C4, C3, C2 key cuts. C2 C3C4 C - Shear line D4A1

Solid Plug Pins  Pins that “ride” on either the external cut, internal cut or both  Pins are identified by double letters  AA, BB, CC, DD : EXAMPLE: Solid Plug Pin CC operated by C4 and C4 key cuts. CC C4 C3 Shear line D4 C2A1

Solid Plug Pins  Pins that “ride” only on the internal cut  Pins are identified by letter double letter  Z+, A+, B+, C+ EXAMPLE: Solid Plug Pin C+ operated by C4 and D4 key cuts. C+ C4D4C3 Shear line C2A1

Solid Plug Pins - Advantages 1.Always External locking 2.Less parts inside cylinder - less probability for malfunctions 3.Easier to assembly 4.New combination possibilities

Z+ AA A-

Latest addition … drivers No # 1 Internal _1 No # 1 Solid +1

Software

KC-5 to PC Interface User-Friendly Interface Easily Import Data from MASTERpiece ™ Engraving Option Batch Design

Thank you!