Key: Difference between revisions

From Lockwiki
Jump to navigationJump to search
m (is this how to make an anchor?)
(→‎External Links: Added a citation for the source of the history)
 
(7 intermediate revisions by 2 users not shown)
Line 1: Line 1:
=Key=
=Key=


{{cleanup}}
 


[[Image:Lockwiki_Keys.jpg|thumb|350px|A variety of different keys.]]
[[Image:Lockwiki_Keys.jpg|thumb|350px|A variety of different keys.]]


A '''key''' is a physical object that is used to open a [[lock]]. Keys are inserted into a lock to cause internal components to align, allowing the lock to open. In [[Electronic_lock|electronic]] locks, keys may transmit information electronically rather than manipulate physical components. Some keys are [[Key patent expiration dates|patent protected]] to prevent unauthorized manufacturing of keyblanks.
A '''key''' is a physical object that is used to open a [[lock]]. Keys are inserted into a lock to cause internal components to align, allowing the lock to open. In [[Electronic_lock|electronic]] locks, keys may transmit information electronically rather than manipulate physical components. Some keys are [[Key patent expiration dates|patent protected]] to prevent unauthorized manufacturing of key blanks.


Because of their use, keys have become symbolic of knowledge, power, responsibility, and trust. Keys have been used in countless pieces of art and literature throughout history, especially in religion. The papal insignia and the symbol of St. Peter are two such examples.
Because of their use, keys have become symbolic of knowledge, power, responsibility, and trust. Keys have been used in countless pieces of art and literature throughout history, especially in religion. The papal insignia and the symbol of St. Peter are two such examples.
Line 12: Line 12:


== History ==
== History ==
Add to me!
There is evidence of key facilitated locking mechanisms up to 4,000 years ago in ancient Egyptian society. Interestingly, both Western as Eastern (mostly China) developed the idea of the lock and key, with little sign of cultural exchange until later as evidenced by stylistic similarities. Persia (the Middle East and especially Iran) too had a unique generation of the lock and key. In these societies the key attained alternate meanings, using Iran as an example there is extensive evidence of keys being used in religious and symbolic senses. Two sources which provided imense historical background were Locks from Iran and Door Locks form Persia; the authors point to the spiritual and psychological need for keys. Iranian culture uses locks and keys at religious sites (such as temples), as love charms, and as a gift to signify the virginity of a young bride. I delve deeper into the interpersonal relations on the People & People page.
 
Another source from which scholars derive their historic timeline of the lock and is the Bible. There are a number of passages that reference the mechanisms, such as the book of Isaiah chapter xxii, verse 22: "And the key of the house of David will I lay on his shoulder". Also in the Book of Nehemiah, chapter 3, it is stated that when repairing the old gates of the City of Jerusalem - probably in 445 B.C. - they "set up the doors thereof, and the locks thereof, and the bars thereof."
 
A short historical anecdote: Several centuries ago, in Spain, there was a great distrust of locks. To be safe, the householders of a block hired a watchman to patrol the neighborhood and carry the keys to their dwellings. To enter or leave a house, the resident clapped his hands vigorously to summon the watchman with his key, so, all comings and goings became a matter of public record. While there is little scholarship to back this claim up, it is an interesting example of a community relinquishing privacy by foregoing the possesion of a key.
 
Keys and locks were originally constructed from wood until mankind developed metal-working skills that could produce more precise pieces (the skeleton key). Metal keys are clearly used in Medieval society (front gates of fortifications, castles, etc.); the proliferation of the flat metal keys we are familiar with occurred in the 20th century with the invention of a duplication device.


== Parts of a Key ==
== Parts of a Key ==
Line 19: Line 25:
[[Image:Lockwiki_Key_back.jpg|thumb|125px|Master Lock key, back.]]
[[Image:Lockwiki_Key_back.jpg|thumb|125px|Master Lock key, back.]]


; {{anchor|bitting}}Bitting
; {{Anchor|Bitting}} Bitting
: The part of the key that makes contact with internal components. Cuts on the bitting allow internal components to be moved to different positions.
: The part of the key that makes contact with internal components. Cuts on the bitting allow internal components to be moved to different positions.


Line 25: Line 31:
: The shaft of the key which holds the wards, bitting, and cuts.
: The shaft of the key which holds the wards, bitting, and cuts.


; Bow
; {{Anchor|Bow}}Bow
: The handle which is used to turn the key. Commonly contains the lock manufacturer's logo, the keyway type, and key codes. Bows are generally patented, allowing keys to be quickly associated with certain manufacturers.
: The handle which is used to turn the key. Commonly contains the lock manufacturer's logo, the keyway type, and key codes. Bows are generally patented, allowing keys to be quickly associated with certain [[Lock_manufacturer|manufacturers]].


; Code(s)
; {{Anchor|Code}}Code(s)
: Characters stamped on the bow of the key that define what the cut depths for the key are or what model the keyway is. Some keys stamp the exact bitting code on the bow to facilitate key duplication. Others obfuscate the code and require software or a codebeook to decipher the bitting code. These are known as ''direct'' and ''indirect'' key codes, respectively.
: Characters stamped on the bow of the key that define what the cut depths for the key are or what model the keyway is. Some keys stamp the exact bitting code on the bow to facilitate key duplication. Others obfuscate the code and require software or a codebeook to decipher the bitting code. These are known as ''direct'' and ''indirect'' key codes, respectively.


Line 54: Line 60:
: A key with several sets of cuts, thus giving them multiple bitting surfaces. Common in [[high security locks]] that have auxilliary locking mechanisms, such as a [[Sidebar|sidebar]].
: A key with several sets of cuts, thus giving them multiple bitting surfaces. Common in [[high security locks]] that have auxilliary locking mechanisms, such as a [[Sidebar|sidebar]].


; Convenience
; {{Anchor|Convenience}}Convenience
: A key with duplicate cuts but only one actual bitting surface, allowing the key to be functional when inserted in any orientation.
: A key with duplicate cuts but only one actual bitting surface, allowing the key to be functional when inserted in any orientation.


Line 73: Line 79:
Non-electronic keys are made with aluminum, brass, iron, nickel-silver, steel, or zamak. The material used depends on the type of lock and the required durability and longevity of the key.
Non-electronic keys are made with aluminum, brass, iron, nickel-silver, steel, or zamak. The material used depends on the type of lock and the required durability and longevity of the key.


Most keys are duplicated using a key-cutting machine. These machines can copy a key using a working key or by inputting the bitting code of the desired key. Manual key copying machines are available but uncommon. Many key machines use the original key as a template to control the cutting mechanism to duplicate the bitting onto a blank key. Key machines, regardless of duplication method, include one or more cutting wheels and a deburring wheel to clean and smooth the edges of a newly-cut key.
Most keys are duplicated using a key-cutting machine. These machines can copy a key using a working key or by inputting the bitting code of the desired key. Manual key copying machines are available but uncommon. Many key machines use the original key as a template to control the cutting mechanism to duplicate the bitting onto a blank key. Key machines, regardless of duplication method, include one or more cutting wheels; some also have a deburring wheel to clean and smooth the edges of a newly-cut key.


== Compromise of Keys ==
== Compromise of Keys ==


The compromise of a key or keying system may constitute a serious vulnerability in a locking system. Keys that are examined, borrowed, or stolen can be [[Impressioning|impressioned]] or [[Decoding|decoded]]. Analysis of keys within a [[Master_Key|master]] system may also contribute to compromise of the overall system, depending on the specifics of the system and the key obtained.
The compromise of a key or keying system may constitute a serious vulnerability in a locking system. Keys that are examined, borrowed, or stolen can be [[Impressioning|impressioned]] or [[Decoding|decoded]]. Analysis of keys within a [[Master_Key|master]] system may also contribute to compromise of the overall system, depending on the specifics of the system and the key obtained.
== External Links ==
* [https://www.youtube.com/watch?v=mYNhKEtDmLg Museo della Chiave](video)
* https://www.brown.edu/Departments/Joukowsky_Institute/courses/13things/7639.html


==See also==
==See also==
* [[Decoding]]
* [[Differs]]
* [[Differs]]
* [[Master Key]]
* [[Impressioning]]
* [[Lock]]
* [[Lock]]
* [[Decoding]]
* [[Impressioning]]
* [[Key control]]
* [[Key control]]
* [[Keyway gallery]]
* [[Master Key]]


[[Category:Keys| ]]
[[Category:Keys| ]][[Category:Key profiles| ]]

Latest revision as of 17:34, 18 January 2024

Key

A variety of different keys.

A key is a physical object that is used to open a lock. Keys are inserted into a lock to cause internal components to align, allowing the lock to open. In electronic locks, keys may transmit information electronically rather than manipulate physical components. Some keys are patent protected to prevent unauthorized manufacturing of key blanks.

Because of their use, keys have become symbolic of knowledge, power, responsibility, and trust. Keys have been used in countless pieces of art and literature throughout history, especially in religion. The papal insignia and the symbol of St. Peter are two such examples.

History

There is evidence of key facilitated locking mechanisms up to 4,000 years ago in ancient Egyptian society. Interestingly, both Western as Eastern (mostly China) developed the idea of the lock and key, with little sign of cultural exchange until later as evidenced by stylistic similarities. Persia (the Middle East and especially Iran) too had a unique generation of the lock and key. In these societies the key attained alternate meanings, using Iran as an example there is extensive evidence of keys being used in religious and symbolic senses. Two sources which provided imense historical background were Locks from Iran and Door Locks form Persia; the authors point to the spiritual and psychological need for keys. Iranian culture uses locks and keys at religious sites (such as temples), as love charms, and as a gift to signify the virginity of a young bride. I delve deeper into the interpersonal relations on the People & People page.

Another source from which scholars derive their historic timeline of the lock and is the Bible. There are a number of passages that reference the mechanisms, such as the book of Isaiah chapter xxii, verse 22: "And the key of the house of David will I lay on his shoulder". Also in the Book of Nehemiah, chapter 3, it is stated that when repairing the old gates of the City of Jerusalem - probably in 445 B.C. - they "set up the doors thereof, and the locks thereof, and the bars thereof."

A short historical anecdote: Several centuries ago, in Spain, there was a great distrust of locks. To be safe, the householders of a block hired a watchman to patrol the neighborhood and carry the keys to their dwellings. To enter or leave a house, the resident clapped his hands vigorously to summon the watchman with his key, so, all comings and goings became a matter of public record. While there is little scholarship to back this claim up, it is an interesting example of a community relinquishing privacy by foregoing the possesion of a key.

Keys and locks were originally constructed from wood until mankind developed metal-working skills that could produce more precise pieces (the skeleton key). Metal keys are clearly used in Medieval society (front gates of fortifications, castles, etc.); the proliferation of the flat metal keys we are familiar with occurred in the 20th century with the invention of a duplication device.

Parts of a Key

Master Lock key, front.
Master Lock key, back.
Bitting
The part of the key that makes contact with internal components. Cuts on the bitting allow internal components to be moved to different positions.
Blade
The shaft of the key which holds the wards, bitting, and cuts.
Bow
The handle which is used to turn the key. Commonly contains the lock manufacturer's logo, the keyway type, and key codes. Bows are generally patented, allowing keys to be quickly associated with certain manufacturers.
Code(s)
Characters stamped on the bow of the key that define what the cut depths for the key are or what model the keyway is. Some keys stamp the exact bitting code on the bow to facilitate key duplication. Others obfuscate the code and require software or a codebeook to decipher the bitting code. These are known as direct and indirect key codes, respectively.
Cuts
The cuts made on the bitting of the key. Cuts are used to properly align internal components of the lock, allowing the key to actuate the locking mechanism and unlock the lock.
Keyway
The profile of the key created by the blade and the wards. This is the inverse of the keyway of the lock.
Shoulder
The part of the key that connects the bow to the blade. The shoulder is commonly responsible for stopping the key from being inserted further, allowing the cuts to be properly aligned in the lock.
Tip
The end of the key opposite of the bow. Some locks use the tip of the key to align cuts instead of the shoulder.
Warding
Distortions to the blade of the key to prevent it from being used in a lock with a different keyway. Warded locks use this as their primary means of security.

Types of Keys

Single Bitted
The traditional key with one set of cuts on the bitting.
Multi Bitted
A key with several sets of cuts, thus giving them multiple bitting surfaces. Common in high security locks that have auxilliary locking mechanisms, such as a sidebar.
Convenience
A key with duplicate cuts but only one actual bitting surface, allowing the key to be functional when inserted in any orientation.
Cruciform
A key that has four bittings, giving it a star shaped tip. May not actually use all four, like a convenience key.
Transponder Key
A key that has an electronic transponder in the bow of the key that transmits a code to a receiver in the lock. Most commonly seen in automotive keys. Requires specialized equipment to copy.
Valet Key
A special type of automotive key that can be used by a valet driver. Typically, a valet key can operate the doors and ignition of a car, but can't open the glove compartment or trunk.
Blank Key
A key that has had no bitting cuts applied to it. "Blanks" are a common locksmithing item used for duplicating keys, impressioning, and creating bump keys.

Manufacturing of Keys

Non-electronic keys are made with aluminum, brass, iron, nickel-silver, steel, or zamak. The material used depends on the type of lock and the required durability and longevity of the key.

Most keys are duplicated using a key-cutting machine. These machines can copy a key using a working key or by inputting the bitting code of the desired key. Manual key copying machines are available but uncommon. Many key machines use the original key as a template to control the cutting mechanism to duplicate the bitting onto a blank key. Key machines, regardless of duplication method, include one or more cutting wheels; some also have a deburring wheel to clean and smooth the edges of a newly-cut key.

Compromise of Keys

The compromise of a key or keying system may constitute a serious vulnerability in a locking system. Keys that are examined, borrowed, or stolen can be impressioned or decoded. Analysis of keys within a master system may also contribute to compromise of the overall system, depending on the specifics of the system and the key obtained.


External Links

See also