Master Key System Design Guide
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Keyboard Shortcuts for Windows Computers
AbilityNet Factsheet – May 2019 Keyboard Shortcuts for Windows computers This factsheet highlights some of the actions you can carry out quickly on your computer by using key combinations rather than using the mouse to navigate menus and options. These key combinations are referred to as shortcuts as they are often a much quicker way of carrying out tasks. They can also be particularly useful for repetitive actions. AbilityNet Factsheet: Keyboard Shortcuts Page 1 of 12 www.abilitynet.org.uk/factsheets May 2019 Contents 1. What are shortcuts ............................................................................................. 3 A note on Apple (Mac) computers ........................................................................... 3 Conventions ............................................................................................................. 3 Navigating Within Windows Using the Keyboard ..................................................... 4 Reference Chart ...................................................................................................... 7 Autocorrect as a shortcut ......................................................................................... 9 2. How can AbilityNet help? ................................................................................. 10 Free advice and home visits .................................................................................. 10 My Computer My Way ........................................................................................... 10 Workplace -
Locking Systems for Physical Protection and Control
kh = - - _ l - ;- '' . .: ffk $' .; , , x ! ^ ' j , - _ __ --- .; _. ''O . % 7 ${ _ _ _ _" ,-" - L, ~"7- d j 4" , Wg' * * . K g | | ' ' * . J1 , 1 || I A()| ' ^ ' : , + \bh $ ' ?,v . , . ; y, t w;w .a- v ys , . 1, - - .- . teg pay x " ' . Y _. _ }Y , i . .m \ "' ' t $ .! ?% @$ N ;;;hi [ ' ' ' h * kf:ff . :" . 5. .-- i .a; .' . |" . y(f ' '' ; - .. % 09 4 [ N s g.p c.h i , ,. g - ? ]- 3 . - =q .' , , y . j _. -. ' ' '- - 1. I, | . ., - I j j ; , , , i ii , en n I y "4 , _ _ _ MH! :'- ji il - af . .t' * | . ' ^ * '" ' 6 L. 1 . | , - , i > |$ [ , . 9 ' ' - ;- , . | . -1 [ . ' .- " i J- g . , - g10 g 921130' J w : ' CR-5929 R ( - - ' ' PDR . =' .' . , b := :=. _ _. .\ Q my afQ p%WWW%$WQMQWWm&:)MWhwv r% ng%w%w%wAw&mWpg: o pr ~ %wmy' n# ~wAguynw aga u . m, wr mu m%m www 4- e-ma vp , y;a%ee wempy&m~ehn p ga,,w sm s p y w@m g: wpqy>;m%www;m n % y p i Ngeu * gmw7: r v%n;a ,W m- F p D % fy q m % aw yb h @ w/ y M M h d M [ %y hw.:c,+[[ dkk h[n s^ u'QQ:na~ 7M , M~, , w[M ; %hd[n w $N' ~ h & M C|$ U N k # ( , nag n ,, , v me w w a f3m m&e MW , M4' b < ,. J <+ . w g M$b M h [ h h %w;% p:e&gh- n w n%w m ~n g &w e %z u n : n #'' w& p& lif Maym h n W W M- v 'An= +, +~ %~ + f'+w m&Wna ''*st y4 W W~ % m|M * M& ,~ o , W|% p k N+( &w # .- , % W W ny- m ,. -
REMOVABLE CORE) ASSEMBLY for Installation Assistance, Contact SARGENT at 800-727-5477 •
INSTRUCTIONS FOR REKEYING THE SARGENT® (65-)11-10- (6300) LARGE FORMAT INTERCHANGEABLE (REMOVABLE CORE) ASSEMBLY For installation assistance, contact SARGENT at 800-727-5477 • www.sargentlock.com The 6300 series LFIC (Removable Core) uses a control key whose bittings match the Top Master Key of the key system in positions 1, 2, 5 and 6. The control bittings in positions 3 and 4 are selected from the Key Bitting Array of the master key system. This method significantly reduces the bittings available in the Key Bitting Array of any Top Master Key. Increasing the levels in the master keying system and cross keying also has a significant impact on the yield of keys at each selected level. The chamber stack value for the 6300 series LFIC (removable core) is normally calculated by using a stack value of 15 in positions 1, 2, 5, and 6. This is the total value of the bottom pins, master splits and driver pins that would be required to pin the core (based on the keying levels). In chambers 3 and 4 of the 6300 series LFIC (removable core), the stack value is 20. This is done to allow the control key to achieve a shear line in chambers 3 and 4 of the control sleeve. Important Cylinders master keyed at the factory prior to January 2009 use hollow drivers and SARGENT recommends their continued use. Hollow drivers must be used in chambers 3 and 4. A different spring is used in conjunction with the hollow drivers. These special drivers and springs are included in a special pinning kit #437 RC/UL. -
Mortise / Rim / Key in Knob / Lever Cylinders Large Format and Small
Mortise / Rim / Key in Knob / Lever Cylinders Large Format and Small Format Interchangeable Core Cylinders 6605 Flotilla Street, Commerce, California 90040 U.S.A. 1-323-888-6601 1-323-888-6699 { [email protected] www.crpsecurities.com EDED CONTENTS EDED System Controls and Levels of Security 1 Product Information 2 x Key Blanks x Pin and Key Cutting Information x Side Bars, Side Pin, Stainless Bottom Pin Specifications Standard Cylinder Information 4 x Technical Design Information x Components x Cylinders Servicing x Cylinder Keying and Pinning Large Format Cylinder Information 7 x Design Information x Components x Cylinders Servicing x Cylinder Keying and Pinning Small Format Cylinder Information 10 x Design Information x Components x Cylinders Servicing x Cylinder Keying and Pinning Tools and Service Kits 17 x Pinning Kits x Cam Kits x Service Kits x UL Pin Kit x Small Format Parts Master Keying Cylinders and Keying Systems Applications 21 Appendix x APPENDIX A – Key cutting key technical information for LFIC x APPENDIX A-1 - HSK cut form / Maximum cut range x APPENDIX B - Key cutting key technical information for SFIC x APPENDIX C – (HSK MC/RC Shell) - Tail Piece Shears x Sample Dealer Agreement x Tool Resources System Controls and Levels of Security High Security Cylinder Program Levels Level 1 The “A” Standard keying and “1A” Small Format Interchangeable Core are open locksmith Keyway *** See Authorization Card Below Level 2 The Locksmith Service Center program assigns specific Keyways by geographical areas with care to not overlap keyways between Service Areas. Key Duplication is controlled at the Service Center by Authorized personnel and Registered Card Program. -
Keying Systems and Nomenclature
KEYING SYSTEMS AND NOMENCLATURE Keying Procedures, Systems, and and the authors of the previous FOREWORD Nomenclature was first published in editions should take pride in the 1965, revised in 1969, 1975 and again results. in 1978. It introduced a procedural There are still some misapplications system of keying terminology radically and misunderstandings of the system different from that commonly used and it is the purpose of this edition to prior to 1965. The need for standard clarify the system to avoid terminology was clear but the misunderstanding. With this in mind, acceptance of the new system was text and format changes have been slow. made with the aim of introducing Manufacturers, Distributors, Building criteria in their order of complexity, to Owners, and Operators were make the manual an even better frustrated over the use of various and instructional tool for those progressing differing terms. Among those using the through basic, intermediate, and terms, different meanings and advanced study of the subject. interpretations were applied. As a Since the manual does not cover result, errors were made, and frequent actual keying procedures, the title of correspondence occurred between the manual has been changed. For manufacturers and distributors, those interested in the actual seeking clarification. The consumer techniques of keying or the sometimes had a sketchy mathematics of setting up a key understanding of the key system he system, many fine books and had purchased. publications are offered by the lock- Since its inception, the procedures smithing industry. outlined in this manual have been taught at the DHI Technical Programs Robert Perry, AHC/CDC John R. -
Section D - Cabinet Locks & Latches
Section D - Cabinet Locks & Latches SECTION D - TABLE OF CONTENTS A Section D Contents: B Olympus Locks → National Lock Overview............................. 2 D-32 - D-41 C Removacore Locks....................................... 3 Disc Tumbler Cam & D Deadbolt Locks...................................... 4 - 7 Pin Tumbler Cam & EE Deadbolt Locks.......................................8 - 9 Timberline → Interchangeable FF National Lock Accessories................10 - 11 Lock Plug System SlamCAM/SlamStrike...............................12 pages D-16 - D-31 G Keyless Locks......................................13 - 15 Timberline Lock Overview.........................16 H Timberline Lock Cylinder Bodies.......17 - 29 Timberline Lock Plugs I & Accessories.................................... 30 - 31 Olympus Lock overview............................32 J Olympus Padlockable Camlock 33 Double Door KK Olympus Cam/Deadbolt Locks........34 - 35 Latches → Olympus Cam/ page D-45 L Deadbolt Lock Bodies.......................36 - 37 Olympus SFIC Cylinders.......................... 38 MM CompX National Olympus Lock Accessories............... 39 - 41 ← Disc & Pin Tumbler Cam Specialty & Showcase Locks............ 42 - 45 Locks NN Strikes & Catches.............................. 46 - 56 pages D-4 - D-12 OO PP ↓Keyless Locks pages D-13 - D-15 QQ R Magnetic Catches → S pages D-46 - T D-47 U ← Elbow Catches V page D-55 WW XX Y Roller Catches page D-53↑ 800-289-2237 • WWW.WURTHBAERSUPPLY.COM • WÜRTH BAER SUPPLY D - 1 Section D - Cabinet Locks & Latches A NATIONAL LOCK OVERVIEW B A Lock Is A Lock…..Or Is It? C Disc Tumbler, Pin Tumbler & Deadbolt Locks: D Disc Tumbler Cam Locks sometimes referred to as “wafer locks” are inexpensive, low security locks with limited keying capabilities. Master keying for disc tumbler locks is limited to only one level. The disc tumbler lock consists of chambers with only one disc per chamber which raises or lowers as the key E passes through the window that is cut into the disc. -
Catalog: Schlage B Series Commercial Grade Deadbolts Catalog
B Series Commercial grade deadbolts Put your trust in the name you know ® For more than 90 years, Schlage® has been providing innovative Contents security solutions for schools, hospitals, hotels, condominiums and a 4-5 B Series overview host of other commercial buildings. Today, Schlage is at the forefront 6-7 B600/700/800 performance of cutting-edge technology including wireless security, access control features and exploded view systems including readers, credentials and biometrics. With a wide 8 Designs range of products, styles and finishes, Schlage has what you need, no 9 Finishes matter how demanding your project specifications may be. We stand 10-11 Deadbolt functions behind every product we make with the best after-sales service in the 12-13 B500 performance features business. It’s this commitment to design, performance and technology and exploded view that ensures you can stand behind our products too. 14 Designs and finishes 15 Deadbolt functions 16-17 B250 performance features Real security is knowing and exploded view 18 Designs and finishes exactly what you want 19 Deadbolt functions 20 Cylinders and key systems and getting it 21-22 Standard cylinders and Primus® XP high security cylinders When you know exactly what you want, you don’t want to waste time 23 Full size interchangeable core finding out whether it meets your project specifications. That’s why we 23 Small format interchangeable core offer the world’s largest team of hardware specification writers to help 24 Latches and bolts you and your clients turn your vision into reality. And when it comes to 25 Strikes, thumbturns and products, our commercial suiting options, wide variety of lever designs inside plates and rich selection of finishes give you the tools you need to make your 26 Accessories and other parts projects perfect. -
Keyboard Shortcuts for Avid Editors
Keyboard Shortcuts for Avid Editors (Media Composer, Newscutter, and Symphony) • Audio • Bin • Capturing • Editing • Effect Mode • Playing & Marking • Timeline • Trim Mode • Tools • Other Note: = Command Key Audio Windows Macintosh Description Alt + click Pan slider Option + click Pan slider Snaps to Mid in Audio Mix tool Snaps to 0 dB in Audio EQ and Audio Alt + click Volume slider Option + click Volume slider tools Alt + click Audio Track Option + click Audio Track Selects track for audio scrub Monitor button Monitor button monitoring Alt + click Track Solo button Option + click Track Solo (Automation Gain tool) button (Automation Gain tool) or or Mutes selected track (1 to 8) Alt + number (1 to 8) at top Option + number (1 to 8) at of keyboard top of keyboard Moves selected audio keyframe Alt + drag keyframe Option + drag keyframe horizontally in Timeline Alt + click digital scrub parameters in Composer Option + click digital scrub monitorOption + click digital parameters in Composer Opens Audio Settings dialog box scrub parameters in monitor Composer monitor Bin Windows Macintosh Description Ctrl + N Creates a new bin + N Selects all items in the active bin or the Project Window, Ctrl + A + A if selected Ctrl + W Closes open windows, bins or dialog boxes + W Prints the selected bin in whatever view you have Ctrl + P + P selected (Text, Frame or Script View) Ctrl + D Duplicates selected clip(s), sequence(s), or title(s) + D Creates a Group Clip from selected Master Clips or Sub Shift + Ctrl + G + Shift + G Clips First, select clips or sequences in the bin, then use this Ctrl + I shortcut to open the Console window, which will display + I useful information Hold down these shortcut keys, then click on the Clip Shift + Ctrl + click Shift + Ctrl + click Menu. -
Rekeying Manual Kwikset
Rekeying manual kwikset click here to download In the pages that follow, you will learn how to rekey a. Kwikset entrance lockset, a key-in-lever, a single-piece entrance handleset and a security deadbolt. Visit the ReKey Instructions page for step by step instructions on how to rekey your locks. Rekeying Manual. Tubular Lockset Lockset Disassembly, Rekeying, Assembly . The following pinning system conforms with Kwikset keying system only. SmartKey re-key technology delivers an unparalleled option in home security maintenance. Take an in-depth look at how the Kwikset SmartKey. Kwikset rekeying manual with large color pictures and easy to follow directions. We also sell an assortment of other new and used items at fantastic prices. In this guide, you'll find detailed, easy-to-follow instructions for rekeying any Schlage lock cylinder. Each section—organized by product function— includes a list. ship immediately. Amazon's Choice for "kwikset rekey kit" .. The instructions were so easy to use and I had no problems with any of the locks. A great product . Rotate the new key in the lock 90° counter-clockwise. Once back in the default ( vertical) position the lock will be rekeyed. Kwikset - Rekeying Kit for Kwikset 5 or 6 Pin Cylinder - This rekeying kit comes with everything you need to rekey a Hardware,Installation Instructions. If you have Kwikset locks, it isn't that difficult to do. Rekeying involves removing the lock cylinder from the knob or deadbolt and Kwikset: Rekeying Manual. You can use the. SmartKey tool to rekey your lock so it works with your existing Kwikset key. -
Startup Keyboard Shortcuts Press the Key Or Key Combination Until The
Startup keyboard shortcuts Press the key or key combination until the expected function occurs/appears (for example, hold Option during startup until Startup Manager appears, or Shift until "Safe Boot" appears). Tip: If a startup function doesn't work and you use a third-party keyboard, connect an Apple keyboard and try again. Key or key combination What it does Option Display all bootable volumes (Startup Manager) Shift Perform Safe Boot (start up in Safe Mode) C Start from a bootable disc (DVD, CD) T Start in FireWire target disk mode N Start from NetBoot server X Force Mac OS X startup (if non-Mac OS X startup volumes are present) Command-V Start in Verbose Mode Command-S Start in Single User Mode To use a keyboard shortcut, or key combination, you press a modifier key with a character key. For example, pressing the Command key (the key with a symbol) and the "c" key at the same time copies whatever is currently selected (text, graphics, and so forth) into the Clipboard. This is also known as the Command-C key combination (or keyboard shortcut). A modifier key is a part of many key combinations. A modifier key alters the way other keystrokes or mouse clicks are interpreted by Mac OS X. Modifier keys include: Command, Control, Option, Shift, Caps Lock, and the fn key (if your keyboard has a fn key). Here are the modifier key symbols you can see in Mac OS X menus: (Command key) - On some Apple keyboards, this key also has an Apple logo ( ) (Control key) (Option key) - "Alt" may also appear on this key (Shift key) (Caps Lock) - Toggles Caps Lock on or off fn (Function key) Startup keyboard shortcuts Press the key or key combination until the expected function occurs/appears (for example, hold Option during startup until Startup Manager appears, or Shift until "Safe Boot" appears). -
September/October 2010 Issu E 24 – $14.00 TILJ Janfeb10:TILJ 1/20/10 12:38 PM Page 2
The I nde pe nd en t September/October 2010 L Issue 24 – $14.00 o c k s m i t h h h J J J o o o u u u r r r n n n a a a l l l TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 2 PETERSON DOES IT AGAIN! Introducing the PCT-7: Peterson Carbide Coring Tool Peterson’s new set of vending lock penetration tools make quick work of vending type lock openings including VAN lock, ABA DUO, ABLOY, BATON, 380 Tubular, 360 Tubular and 340 Tubular. The adaptor guides to a preset cutting dept insuring success every time! www.ThinkPeterson.com Standard Price: $224.95 585-264-1199 585-586-2425 (fax) Special Offer: ONLY $179.95 10am-6pm Eastern Time (Special pricing ends April 1, 2010) WE will open them — But YOU have to put them back together! TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 3 TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 3 NOTE FROM THE EDITOR'S DESK Greetings from the editor’s desk!!! Note From The Editor’s Desk There is a lot of news in this issue. First I would like to give a great vote of thanks for the efforts of Mike Pecorella as he substituted for Don DennisNote after Don’s From sudden health The issues. (Don Editor’s still struggles at times,Desk but I happily notice continued improvement in him). Season’s greetings from the Editor’s desk! I hope all of our readers had a safe and enjoyable Mike Season’sstepped up greetingsto the plateholiday. -
Key Control Policy
Virginia Polytechnic Institute and State University Access Control: Key Control Policy No. 5620 1.0 Purpose This is a statement of policy regarding access control of buildings and property owned or Policy Effective Date: occupied by Virginia Tech. This policy will serve as the framework by which keys to 6/16/1993 university buildings will be issued, monitored, and maintained. The Key Control Office within the Facilities Department and the Virginia Tech Police Department shall implement Last Revision Date: and oversee the procedures set forth herein. 1/3/2017 The Key Control Office and Virginia Tech Police Department shall work closely with the Policy Owner: campus community to ensure that all university access needs are met. The dual Chris Kiwus responsibility of the two organizations will ensure checks and balances to a critical, high- risk university program. Key issuance and control for Housing and Residence Life is Policy Author: (Contact governed by the Hokie Handbook (www.hokiehandbook.vt.edu). Person) Jon Clark Teglas The issuing of keys, maintenance of physical security devices, and other arrangements concerning security for leased properties other than those at the Virginia Tech Corporate Affected Parties: Research Center are covered by the specific lease agreement for the property in question. Faculty 1.1 Objectives Staff 1. To achieve maximum physical security with minimum logistics. 1.0 Purpose 2. To establish control of the campus keying system including key duplication and 2.0 Policy distribution. 3.0 Procedures 4.0 Definitions 3. To establish a recorded chain of accountability for all keys issued. 5.0 References 4.