Knowledge

Key duplication

Source 📝

258: 522: 1080: 213:
Keys may also be made in this fashion without an original as long as the depth of each notch and the type of key blank are known. This is particularly useful for institutions with a great number of locks for which they do not want to maintain a wide variety of archived copies. Code books or on-line resources may be used to program the key clipper/punch settings from the code stamped on the lock, listed in the owner's manual, or available from the vehicle's
25: 1115: 221: 331:
ID before a locksmith will cut additional keys using restricted blanks. Some companies, such as Medeco High Security Locks, have keyways that are restricted to having keys cut in the factory only. This is done to ensure the highest amount of security. These days, many restricted keys have special in-laid features, such as magnets, different types of metal, or even small computer chips to prevent duplication.
1103: 1091: 137: 122: 234:
respectively. The lateral-feed clutch on the top of the machine is then thrown, and the vertical feed rod released into action and power applied through the combination hand-crank power wheel on the right of the machine, until the cutter has passed over the entire length at the blank. A duplicate of the pattern key is obtained in about one minute.
209:
adjusted to match the corresponding measured depth and a lever is depressed, which cuts the entire notch at once. As the lever is raised the key automatically advances to the next indexed position and the slider is adjusted appropriately to the next measured depth. This cycle is continued until the key is complete.
330:
A restricted keyblank has a keyway for which a manufacturer has set up a restricted level of sales and distribution. Restricted keys are often protected by patent, which prohibits other manufacturers from making unauthorized productions of the key blank. In many cases, customers must provide proof of
272:
A "do not duplicate" key (or DND key, for short) is one that has been stamped "do not duplicate", "duplication prohibited" or similar by a locksmith or manufacturer as a passive deterrent to discourage a retail key cutting service from duplicating a key without authorization or without contacting the
248:
In recent years, dual key cutting machines have come on to the market, enabling cutting of both mortice and cylinder keys on one machine. These machines are primarily manufactured in the Far East and save a key cutter a significant amount of money compared with using two separate dedicated machines.
212:
Duplicating keys by this process is more labor intense and requires somewhat better trained personnel. However, keys made in this fashion have clean margins and the depth of the notches are not subject to wear induced changes encountered when heavily worn keys are duplicated using a pattern grinder.
326:
Some common examples of restricted key systems include master key systems, where a single key can open multiple locks within a building, and key control systems which allow for precise tracking of key usage and access control. Overall, restricted keys are an important tool for maintaining security
188:
In the UK, the majority of the mobile locksmiths will have a dual key cutting machine on their van. The key duplication machine will be able to cut both cylinder and mortise keys, as these are the most popular types of keys in circulation. However, very few will carry a laser key cutting machine,
334:
Another way to restrict keys is trademarking the profile of the key. For example, the profile of the key can read the name of the manufacturer. The advantage of a trademark is that the legal protection for a trademark can be longer than the legal protection for a patent. However, usually not all
208:
Rather than using a pattern grinder to remove metal, keys may also be duplicated with a punch machine (the Curtis key clipper is a recognised example). The key to be duplicated is measured for the depth of each notch with a gauge and then placed into a device with a numeric slider. The slider is
233:
The key to be duplicated is placed in one vise and the blank key to be cut in a corresponding vise under the cutting disk. The vise carriage is then into such position by means of a lateral-feed clutch that the shoulders of both the pattern and blank keys just touch the guide disk and cutter
277:
system for the owner of the key, such as a maintenance person or security guard, to identify keys that should not be freely distributed or used without authorization. Though it is intended to prevent unauthorized key duplication, copying DND keys remains a common security problem.
318:
A restricted key is a type of key that is designed to limit access to a specific area or object. These keys are typically used in high-security environments, such as government facilities, military bases, and certain businesses that require strict access control.
143: 141: 138: 322:
Restricted keys are unique in that they are only able to be duplicated by authorized individuals or locksmiths who have the proper identification and authorization to do so. This helps to ensure that the key cannot be copied or used by unauthorized individuals.
142: 127: 126: 123: 128: 140: 125: 335:
features of the profile are necessary to create a working key. By removing certain unnecessary features, a non restricted profile can be derived, allowing the production and distribution of non restricted key blanks.
228:
A machine permitting rapid duplication of flat metal keys, which contributed to the proliferation of their use during the 20th century, may have been first invented in the United States in 1917 (image to the left):
162:
in a machine, with a blank attached to a parallel vise, and the original key is moved along a guide, while the blank is moved against a blade, which cuts it. After cutting, the new key is deburred: scrubbed with a
139: 124: 185:
and as a service of the specialized locksmith, though the correct key blank may not be available. More recently, online services for duplicating keys have become available.
178:
Different key cutting machines are more or less automated, using different milling or grinding equipment, and follow the design of early 20th century key duplicators.
200:; while others are simply stamped "Do Not Duplicate" to advise that key control is requested, but in the US, this disclaimer has no legal weight. 352: 1106: 436: 89: 61: 303: 295: 68: 408: 108: 257: 374: 291: 42: 75: 294:, ALOA, calls DND keys "not effective security", and "deceptive because it provides a false sense of security." 290:(unless it is an owned key), but there are patent restrictions on some key designs (see "restricted keys"). The 1025: 46: 959: 158:
based on an existing key. Key cutting is the primary method of key duplication: a flat key is fitted into a
57: 938: 685: 1040: 1030: 414: 429: 898: 782: 695: 999: 953: 883: 680: 35: 1055: 571: 1060: 1140: 1094: 1083: 994: 827: 422: 82: 964: 918: 855: 817: 716: 588: 541: 8: 913: 822: 757: 665: 593: 286:
There is no direct legal sanction in the US for someone who copies a key that is stamped
1118: 1114: 700: 660: 521: 1035: 762: 655: 506: 404: 266: 948: 807: 675: 650: 175:
which, were they not removed, would be dangerously sharp and, further, foul locks.
307: 299: 273:
locksmith or manufacturer who originally cut the key. More importantly, this is a
1045: 1009: 974: 943: 726: 721: 182: 1004: 979: 870: 812: 476: 471: 457: 1134: 923: 903: 536: 496: 491: 168: 969: 878: 845: 837: 797: 747: 731: 624: 576: 556: 453: 449: 445: 172: 444: 1065: 1050: 984: 893: 802: 752: 645: 481: 274: 193: 928: 777: 609: 220: 164: 155: 908: 888: 850: 772: 767: 690: 629: 546: 261:
A minuteKEY fully-automated self-service key duplication kiosk at a
147:
Process of advanced security key copying on professional duplicator.
24: 989: 860: 787: 619: 581: 551: 511: 501: 670: 614: 566: 561: 262: 933: 197: 792: 159: 214: 192:
Certain keys are designed to be difficult to copy, for
16:
Process of creating a new key based on an existing key
310:
deals with United States Department of Defense keys.
189:
which is sometimes needed to cut high security keys.
224:
Mechanical key duplicating machine invented in 1917
49:. Unsourced material may be challenged and removed. 1132: 302:deals with United States Post Office keys, and 430: 401:The Complete Book of Locks and Locksmithing. 181:Key duplication is available in many retail 327:and controlling access to sensitive areas. 437: 423: 132:Video showing the process of cutting a key 167:, either built into the machine, or in a 109:Learn how and when to remove this message 256: 219: 135: 120: 252: 1133: 418: 375:"Four things to know about key codes" 1102: 1090: 281: 154:refers to the process of creating a 47:adding citations to reliable sources 18: 13: 393: 14: 1152: 313: 1113: 1101: 1089: 1079: 1078: 520: 353:"Curtis#15 parts (new and used)" 292:Associated Locksmiths of America 203: 23: 34:needs additional citations for 1026:Glossary of locksmithing terms 367: 345: 1: 960:Perimeter intrusion detection 338: 939:Miniature snap-action switch 686:Time-delay combination locks 7: 1041:John M. Mossman Lock Museum 1031:Electromagnetic door holder 10: 1157: 1074: 1018: 899:Closed-circuit television 869: 836: 740: 709: 638: 602: 529: 518: 464: 783:Kensington Security Slot 696:Tubular pin tumbler lock 399:Phillips, Bill. (2005). 239:"Man And His Machines", 1000:Vandal-resistant switch 954:Passive infrared sensor 884:Alarm monitoring center 681:Rotary combination lock 530:Components and hardware 1056:Lock Museum of America 572:Bored cylindrical lock 269: 246: 225: 148: 133: 1084:Category:Locksmithing 995:Ultrasonic transducer 260: 231: 223: 146: 131: 965:Photoelectric sensor 919:Glass break detector 818:Real-estate lock box 717:Electromagnetic lock 589:Single-point locking 542:Interchangeable core 465:Fundamental concepts 355:. Hawley Lock Supply 253:Do not duplicate key 43:improve this article 1061:Musée de la Serrure 914:Fingerprint scanner 823:Steering-wheel lock 758:Chubb detector lock 666:Magnetic keyed lock 594:Three-point locking 243:XXXIII:6 April 1917 701:Wafer tumbler lock 661:Lever tumbler lock 270: 226: 149: 134: 1128: 1127: 1036:Exit control lock 763:Child safety lock 656:Disc tumbler lock 507:Physical security 282:U.S. restrictions 267:Gillette, Wyoming 144: 129: 119: 118: 111: 93: 58:"Key duplication" 1148: 1117: 1105: 1104: 1093: 1092: 1082: 1081: 949:Occupancy sensor 808:Power door locks 741:Other lock types 710:Electronic locks 676:Combination lock 651:Pin tumbler lock 639:Mechanical locks 524: 439: 432: 425: 416: 415: 387: 386: 384: 382: 371: 365: 364: 362: 360: 349: 288:do not duplicate 244: 241:The World's Work 145: 130: 114: 107: 103: 100: 94: 92: 51: 27: 19: 1156: 1155: 1151: 1150: 1149: 1147: 1146: 1145: 1131: 1130: 1129: 1124: 1070: 1046:Key to the City 1014: 1010:Window security 975:Pressure switch 944:Motion detector 871:Security alarms 865: 832: 736: 727:Electric strike 722:Electronic lock 705: 634: 598: 525: 516: 487:Key duplication 460: 458:security alarms 443: 396: 394:Further reading 391: 390: 380: 378: 373: 372: 368: 358: 356: 351: 350: 346: 341: 316: 284: 255: 245: 238: 206: 183:hardware stores 152:Key duplication 136: 121: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 1154: 1144: 1143: 1126: 1125: 1123: 1122: 1110: 1098: 1086: 1075: 1072: 1071: 1069: 1068: 1063: 1058: 1053: 1048: 1043: 1038: 1033: 1028: 1022: 1020: 1016: 1015: 1013: 1012: 1007: 1005:Water detector 1002: 997: 992: 987: 982: 980:Proximity card 977: 972: 967: 962: 957: 951: 946: 941: 936: 931: 926: 921: 916: 911: 906: 901: 896: 891: 886: 881: 875: 873: 867: 866: 864: 863: 858: 853: 848: 842: 840: 834: 833: 831: 830: 825: 820: 815: 813:Protector lock 810: 805: 800: 795: 790: 785: 780: 775: 770: 765: 760: 755: 750: 744: 742: 738: 737: 735: 734: 729: 724: 719: 713: 711: 707: 706: 704: 703: 698: 693: 688: 683: 678: 673: 668: 663: 658: 653: 648: 642: 640: 636: 635: 633: 632: 627: 622: 617: 612: 606: 604: 600: 599: 597: 596: 591: 586: 585: 584: 579: 574: 564: 559: 554: 549: 544: 539: 533: 531: 527: 526: 519: 517: 515: 514: 509: 504: 499: 494: 489: 484: 479: 477:Authentication 474: 472:Access control 468: 466: 462: 461: 442: 441: 434: 427: 419: 413: 412: 395: 392: 389: 388: 377:. CLK Supplies 366: 343: 342: 340: 337: 315: 314:Restricted key 312: 304:18 U.S.C. 296:18 U.S.C. 283: 280: 254: 251: 236: 205: 202: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 1153: 1142: 1139: 1138: 1136: 1121: 1120: 1116: 1111: 1109: 1108: 1099: 1097: 1096: 1087: 1085: 1077: 1076: 1073: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1024: 1023: 1021: 1019:Miscellaneous 1017: 1011: 1008: 1006: 1003: 1001: 998: 996: 993: 991: 988: 986: 983: 981: 978: 976: 973: 971: 968: 966: 963: 961: 958: 955: 952: 950: 947: 945: 942: 940: 937: 935: 932: 930: 927: 925: 924:Heat detector 922: 920: 917: 915: 912: 910: 907: 905: 904:Door security 902: 900: 897: 895: 892: 890: 887: 885: 882: 880: 877: 876: 874: 872: 868: 862: 859: 857: 854: 852: 849: 847: 844: 843: 841: 839: 835: 829: 826: 824: 821: 819: 816: 814: 811: 809: 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 774: 771: 769: 766: 764: 761: 759: 756: 754: 751: 749: 746: 745: 743: 739: 733: 730: 728: 725: 723: 720: 718: 715: 714: 712: 708: 702: 699: 697: 694: 692: 689: 687: 684: 682: 679: 677: 674: 672: 669: 667: 664: 662: 659: 657: 654: 652: 649: 647: 644: 643: 641: 637: 631: 628: 626: 623: 621: 618: 616: 613: 611: 608: 607: 605: 601: 595: 592: 590: 587: 583: 580: 578: 575: 573: 570: 569: 568: 565: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 534: 532: 528: 523: 513: 510: 508: 505: 503: 500: 498: 497:Master keying 495: 493: 492:Key relevance 490: 488: 485: 483: 480: 478: 475: 473: 470: 469: 467: 463: 459: 455: 451: 447: 440: 435: 433: 428: 426: 421: 420: 417: 410: 409:0-07-144829-2 406: 403:McGraw-Hill. 402: 398: 397: 376: 370: 354: 348: 344: 336: 332: 328: 324: 320: 311: 309: 305: 301: 297: 293: 289: 279: 276: 268: 264: 259: 250: 242: 235: 230: 222: 218: 216: 210: 204:Other methods 201: 199: 195: 190: 186: 184: 179: 176: 174: 170: 169:bench grinder 166: 161: 157: 153: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 1141:Locksmithing 1112: 1100: 1088: 970:Piezo switch 879:Alarm device 846:Lock bumping 838:Lock picking 798:Luggage lock 748:Bicycle lock 732:Keycard lock 625:Skeleton key 577:Mortise lock 557:Key retainer 486: 454:lock picking 450:locksmithing 400: 379:. Retrieved 369: 357:. Retrieved 347: 333: 329: 325: 321: 317: 287: 285: 271: 247: 240: 232: 227: 211: 207: 191: 187: 180: 177: 171:, to remove 151: 150: 105: 99:January 2021 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 1066:Puzzle lock 1051:Lock Museum 985:Reed switch 894:Card reader 803:Night latch 753:Bramah lock 646:Warded lock 482:Key control 381:12 November 359:12 November 308:§ 1386 300:§ 1704 275:key control 194:key control 929:Key switch 778:Door chain 610:Berlin key 339:References 196:, such as 165:wire brush 69:newspapers 909:Dual loop 889:Car alarm 851:Locksport 773:Dead bolt 768:Crash bar 691:Time lock 630:Smart key 547:Key blank 1135:Category 990:Tripwire 861:Snap gun 856:Slim Jim 828:The Club 788:Knox Box 620:Keychain 582:Rim lock 552:Key code 512:Rekeying 502:Password 237:—  671:Padlock 615:Car key 567:Lockset 562:Lockrod 537:Bitting 263:Menards 83:scholar 934:Keypad 456:, and 407:  306:  298:  198:Medeco 85:  78:  71:  64:  56:  1107:Locks 956:(PIR) 793:Latch 446:Locks 173:burrs 90:JSTOR 76:books 1119:Book 1095:Keys 603:Keys 405:ISBN 383:2019 361:2019 160:vise 62:news 265:in 215:VIN 156:key 45:by 1137:: 452:, 448:, 217:. 438:e 431:t 424:v 411:. 385:. 363:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Key duplication"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
key
vise
wire brush
bench grinder
burrs
hardware stores
key control
Medeco
VIN


Menards
Gillette, Wyoming
key control
Associated Locksmiths of America
18 U.S.C.
§ 1704
18 U.S.C.
§ 1386

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.