Sie sind auf Seite 1von 29

— April-June 2017 —

4
Lock, Stock and Barrel

8
Pacific Lock Company
Staff
Publisher Marc Goldberg
Editor Greg Mango 15
Associate Editor Don O’Shall Small Format Interchangeable
Art Director Jim Darow Core (SFIC) Service, Part 4
Advertising Sales Jeff Adair
Debbie Schertzing
Accounting Manager Sheila Campo
19
Advertiser's Index
Administrative Assistants
Greer McMurray
LaVerne Schertzing Bonus 2
Single Door Biometric Solutions
National Publishing Co. The Institutional
Locksmith is published by the National
Publishing Company, 1533 Burgundy Parkway,
Streamwood, IL 60107-1861. Postmaster Bonus 6
please send change of address to National LaGard SmartPoint®
Publishing Company, 1533 Burgundy Parkway,
Streamwood, IL 60107-1861.
© 2017 by National Publishing Company.
All rights reserved. Printed in the USA.
Sign Up for The Institutional Member ILA
(630) 837-2044 • Fax (630) 837-1210 Locksmith’s Digital Edition at Institutional
E mail: sales@TheNationalLocksmith.com www.thenationallocksmith.com Locksmiths’
Web: www.TheNationalLocksmith.com Association
An Updated Website If you want your event listed, 6 customized finishes on
and Discounts at Your tell us about it. request.
Fingertips
History buffs will enjoy the A special option is
If it’s been a while Locksmith Downloads page intumescent fire-proof
since you visited www. which contains vintage pages material inserted behind back
thenationallocksmith.com, of The National Locksmith plate for safety. Engraving
now is the time to come back from the ‘30s and ‘40s. copy and color is to order and
and enjoy the changes. While available in 7 languages.
Our site accepts advertising
on the site, click the home
and we thank those advertisers Web: www.deltrexUSA.com, or
page box to receive a 25%
for helping keep the site free. call: 718-401-4006
limited time discount on most
Please patronize them and say
products in our store.
you saw their ad on www.
ICLS Launches Improved
thenationallocksmith.com. For Key Retainer Device
now, go to the site, register,
and enjoy. A new key retainer
device which is intended for
applications where stricter
Jumbo Push Plate Switch guidance and notification is
from DeltrexUSA required, such as at many
The 5.75”x 5.75” J109 colleges, universities, hospitals
switch consists of 2-gang push and government offices, has
The store has easy ways to plate and back plate of ¼” been unveiled by ICLS. With
sign up or renew subscriptions, marine grade aluminum with the KRD-2-KR an employee
join specialty associations, take stainless steel compression can insert their release key
advantage of industry testing spring and steel powder- into the key retainer device
programs, purchase software, coated enclosure box. The allowing approved duties to
or purchase one of the many 6Amps rated momentary be done in a secure area, but
educational books we publish. switch is standard, plus five if duties are more restricted
other types optional. Standard or require added notification
The expanded Industry
finish is clear anodized, with to superiors, the employee
Links page includes over 100
cannot return the retained
vendors. If a vendor isn’t there,
key until a designated person
call your rep.
is contacted to put in a special
The news feed is updated reset key.
regularly with news vetted by
This new function tightens
our staff rather than by some
security by eliminating an
remote news organization.
The Industry Calendar
contains all the information
you need to know and who
to contact about events
throughout North America.

­4 • The Institutional Locksmith & Security


employee’s free reign for
perhaps hours on end with no
accountability to superiors.
Web: www.ICLSglobal.com, or
call: 313 884-9800

Lucky Line Unveils


Designer Lanyards
Crafted from lightweight,
yet strong material, Lucky
Lines Designer Lanyards are
a functional accessory that
many people have come to
enjoy. It’s more commonly
used to carry an ID badge
or key but it makes carrying
items like a USB drive for
students, whistle for coaches

or compass at youth camps


more convenient.
Each lanyard was designed
for those who want to express
their unique style. With Lucky
Line’s reputation of providing
exceptional service and
producing quality products,
they offer everything for your
keys.
Web: www.luckyline.com, or
call: 800-654-6409.

The Key Care Cabinet for


Enhanced Key Control
Access from MedixSafe
A “key” feature that
differentiates the MedixSafe
Key Care Cabinet from low-
end key cabinets is that it
enables more secure access.
Because a single PIN can
April-June 2017 • 5
upgraded and is available
in five designs and three
be easily compromised, finishes. It is offered with
dual, triple or biometric both conventional cylinder
authentication credentials are and BEST-compatible small
required before access to the format interchangeable cores,
Key Care Cabinet is granted. keyed different or keyed
It accommodates over 1,000 into a master key system.
individual users and provides Locks are available in Boston,
an audit trail history of up to Memphis, Miami, Orlando
50,000 events. and Philadelphia designs with
The Key Care Cabinet bright brass, oil rubbed bronze
is accessible via a remote or satin chromium plated
Ethernet network and also has finishes.
a manual key override. This Web: www.pdqlocks.com, or
ensures that the cabinet can call: 800-441-9692
still be accessed via a single key
in the event of an electronic STI
failure. Key tags for the Key The STI Universal Button
Care Cabinet have an extra helps eliminate having to stock
large snap open window and dozens of push buttons and
each tag holds multiple keys. wasting precious time and
A new label can be exchanged money tracking down just the
on Key Care Cabinet without right button for a customer.
removing a key and key tags The UB-1 has everything
face out for easy identification. required to provide just what
The Key Care Cabinet is the customer wants in one
specifically designed to serve convenient package. Use the
the mid-level market, offering switch as is or reconfigure for
an affordable alternative a specific application.
with advanced features not The single-gang button
found in low priced cabinets, has two sets of Form “C”
but without the added cost
of a high end, expensively
priced cabinet. It also offers
a manual, supervised key
override feature.
Web: Medixsafe.com, or call:
855-633-4972

PDQ Upgrades Cylindrical


Locks
PDQ’s SD Series Grade
2 cylindrical lock has been
­ • The Institutional Locksmith & Security
6
contacts which covers almost can become safer, smarter and enclosure for high strength and
all electrical combinations more efficient. durability.
required. The faceplate is Purposely built for Alarm. In addition, the 83 percent
constructed of cast aluminum, com, the RTS-PZA lock Made in America lock is IP56
allowing it to take tough works with an Alarm.com- tested and has high resistance
knocks in stride, and is slightly connected security panel and to humidity, dust and rain.
oversized to cover old plate can be included and operated
installation marks. The UL/ Web: www.
in any Z-Wave network with westinghousesecurity.com
cUL Listed button offers other Z-Wave and Alarm.com
over 300 combinations in certified devices. The RTS-
one package. A universal PZA is a robust, full-bodied
pneumatic button, universal lock in a satin chrome finish
touch free button with that includes a Zamak 5 cast
NoTouch® technology, and
a 2-inch universal Button are
also available.
Web: www.sti-usa.com, or call:
800-888-4784.

Westinghouse Integrates
with Alarm.com
Westinghouse Security’s
RTS lock, including Z-Wave
technology, now integrates
with Alarm.com’s intelligent

home and business systems.


With the availability of this
lock, Alarm.com service
providers can grow their
business in the commercial
sector with an advanced
security, energy, automation
and access solutuion. By
simply connecting lights,
thermostats, and locks to
an Alarm.com-powered
security system, businesses

April-June 2017 • 7
A lot has changed for Pacific from UCLA, what was most the nickname of “PACLOCK.”
Lock Company over the past important to the business was It is a simple and easy name
ten years. Even still, it seems his entrepreneurial spirit and that coincidentally, and delib-
pretty clear that a lot more sense of duty. erately, sounds a lot like “pad-
changes are yet to come. As About three months into lock.”
one of the very few family- Waugh’s tenure a few things Manufacturing in the US
owned and operated business- became clear. The business was significant in several ways.
es that actually manufacture needed to change its name to Take the “90A” product with
padlocks, PACLOCK finds show its new focus on building a 6-pin cylinder. PACLOCK
itself in an unusual (advanta- a better brand of products. At offers ten colors. If you manu-
geous) position. It determines the same time, Master Lock’s factured these overseas, it
its own destiny. severely limits your abil-
Originally started in ity to respond to spikes
1992 as Federal Lock in demand. As an exam-
Company by a group ple, orange typically is
of former American a slow moving color,
Lock executives and and as such, inventory
an overseas factory, levels are kept typically
Federal was poised low. However, when
to take a bite out of October hits, a surge in
the padlock business demand from Hallow-
by offering substitute een may not have been
products at a discount. accounted for.
While the quality of Lacking the inven-
Photo with Congressman Howard P. “Buck”
Federal’s products was
McKeon, during a 2009 factory tour. From left to tory to meet demand,
quite good, legal issues right: Gary Yang, Cong. McKeon, Greg Waugh, PACLOCK would tell
and a lack of demand and Josh Fleagane. its customers the same
for its overseas product story as many other
caused the company to padlock manufacturers would
split into two around 1995. acquisition of American Lock even today, “We can have it
The company limped along was opening the doors for for you in 90 days.” Needless
for the next seven years doing renewed competition in Amer- to say, it’s hard to earn cus-
what it could to offer a good ican’s space. The company tomers like this. So, by produc-
quality product at a very com- also needed to
petitive price. Low prices are begin producing
what drove demand for its as many of its
product. In 2005, the founder’s components in
son-in-law, Greg Waugh, the USA as it
joined the Federal Lock team could.
with a focus on how to build Changing the
the company. While Waugh name to Pacific
holds an electrical engineer- Lock Company
90 Series product line including aluminum, brass,
ing degree from West Point, 5 enabled the
and hardened steel bodies with quick change
years in service, and an MBA company to use
shackles.
­8 • The Institutional Locksmith & Security

08-11.indd 8 3/16/17 10:51 AM


ing the lock bodies in the USA, padlock manufacturers is that padlock manufacturers in the
PACLOCK would have a you need to commit to huge world with the capabilities and
distinct advantage for respond- volumes, long lead times, and willingness to do this.
ing to spikes in demand. Nine up front tooling costs. What Customers were frustrated
weeks becomes three or four start-up inventor can commit with the padlock industry con-
weeks. to these terms? PACLOCK solidating. Most padlock man-
In 2010 PACLOCK bought turned its ability to machine its ufacturers were dropping low
CNC machines and began own lock bodies in small batch- volume products in the hopes
machining all of its solid body es into the ability to machine of pushing their customers
padlock bodies in the USA. lots of start-up customers’ lock to the newer products being
This meant that it would also bodies in small batches. The offered. PACLOCK would
do its heat treating (case hard- company found ways to make routinely receive calls asking
ening), plating, and anodizing CNC setup times as close to for them to produce pad-
in the USA as well. zero as it goes from producing locks accepting Yale, Corbin,
90As to 150- Sargent, and many other
ICs. cylinders. Prior to 2010 there
Today wasn’t much PACLOCK could
PACLOCK do to reduce long lead time.
manufactures Over the past few years, how-
custom OEM ever, all of that has changed for
style padlocks PACLOCK.
for custom-

Raw aluminum being machined into 400A Series


aluminum hockey-puck padlocks.

But what Waugh didn’t ers in batches Assortment of hockey-puck padlocks showing
foresee as an added side bonus as small as 100 extensive product variety.
was PACLOCK’s ability to locks. Lead times
service requests for custom for aluminum padlocks is about Most people know
padlocks in small batches. two to three weeks. Because PACLOCK has padlocks that
Inventors constantly call hop- of the time to heat-treat and accept SFIC and KiK cylinders.
ing for help in bringing their plate steel locks, those tend But in the past two years, it
ideas to market. Again, the to take four to five weeks. has released full lines of pad-
typical answer from most PACLOCK is one of the few locks that accept most LFIC

April-June 2017 • 9
Some of the enhancements PACLOCK made to the
Super PL770 Hasp.
“Super” PL770 Hasp.
sunk holes on and took action. As a rolling
cores in existence including one side of the change over the next year or
Medeco M31 and M32, ASSA hasp to fit with ¼-20 tapped so, it will now be including
LFIC, Corbin, Sargent, and holes in PACLOCK’s 2171 both top and bottom security
Schlage Full Size IC. Series hockey-pucks. Mount pins.
And, PACLOCK is not just the puck directly to the hasp; PACLOCK isn’t only looking
talking standard, shackled pad- no more leaving it on your van at the padlock business, it has
locks, but hockey pucks, both bumper as you drive away. been quietly working on devel-
aluminum and hardened steel All of these innovations oping Smartphone, Bluetooth
bodied as well. On top of all of came about because of locking solutions for enterpris-
this, PACLOCK re-invented PACLOCK’s willingness to es. It’s not just talking padlocks
the 770 style hasp to add an listen to its customers and act here, but full on retrofit access
additional hidden securing bolt upon those wishes. While for control across an enterprise.
to the standard three exposed the past six years PACLOCK In 2006, when Waugh con-
carriage bolts on each side. It has had pick and bump resis- vinced his family to change
has also added two counter- tance in their standard brass the name of the company to
cylinders at no extra cost, Pacific Lock, he also convinced
just two months ago Waugh them that “The Future of Pad-
engaged with the locksport locks” should be its mantra and
community. That community its motto. He did not have a
of industry experts agreed lot to go on at that point other
their cylinders were very good than just a hunch. But today,
in terms of pick and bump as Waugh assesses his compa-
resistance, but they felt that ny’s market positioning, he can
the addition of serrated bot- honestly say that PACLOCK is
tom pins would really put poised to truly be the future of
PACLOCK over the top. padlocks.
Again, PACLOCK listened

For more information contact


Pacific Lock Company at:
Phone: (888) 562-5565 or
(661) 294-3707
E-Mail: sales@paclock.com
Web: www.paclock.com

10 • The Institutional Locksmith & Security


SMALL FORMAT
INTERCHANGEABLE
CORE (SFIC) SERVICE
by
Robert
Sieveking

This Shop Talk arti- “shims.” The CLAM™


cle is the continuation system uses a “low melt-
of SFIC service series. ing point” alloy, called
In the first article, you “Woods Metal.” Let’s
were introduced to the take it for a spin, and
SFIC core. In the sec- make a few “shims.”
ond article, we devel- The CLAM™ fixture
oped a keying scheme is a hinged “mold box.”
for a small Grand Mas- The kit comes with four
ter system, discussed a
few optional nuances 1 of these fixtures in two
sizes. This is the small
and introduced some fixture. Molding Com-
master keying rules. pound is supplied, to fill
Key System.” The patents
Simplicity of design, for the the mold box to accept the
having been ruled invalid. Key
system, was the major consid- impression of the object to be
blanks are available from ILCO
eration. The third installment copied in the molding process.
and Jet, in most keyways.
introduced the basic tools, spe- Knead and press the molding
Service of these systems with
cific to SFIC core service. We compound into the cavities of
a proprietary combinator (cus-
cut a few keys and combinated the CLAM™, as you see in
tom code clipper) is an expen-
an IC core. This installment Figure 1. Kneading the “mold-
sive endeavor. These keys can
introduces a method of creat- ing compound” will warm it
be easily made on an HPC
ing “Custom Key Shims” for and make it easier to work. It
1200CM or Framon #2 code
irregular or hard to clamp key will adhere to the fixture cavi-
machine, with the correct jaw
blades. We will make a pair ties.
adaptors. Fabricating custom
of shims for the Best “WB”
“jaw adaptors” or “shims” is Level the molding com-
keyway and a shim for the GM
the topic of this installment of pound with the straight edge
“Z” key blade.
the SFIC Service series. If you spatula, as you see in Figure
Clamping “irregular” key can clamp it, you can cut it. 2. The molding compound is
blades in a standard key vise
Clamping fragile or irregular
has long been a challenge to
the working locksmith. When
shaped parts for machining
is always a challenge. Most 2
the Best™ introduced their
times, a “lead” jaw is made to
PKS (Patented Key System) in
fit the part and position it for
1992, the keyway design was
machining. This is what we
different from anything we had
have done, here.
seen to date. The highly para-
centric design was extremely Lockmasters™ has pro-
difficult to hold in a key dupli- duced a kit, called the
cator or code machine. The “CLAM™, which has all of
blanks are now available and the components conveniently
the PKS “Patented” design has packaged to cast metal keys
been renamed the “Premium and, in this application, custom

12 • The Institutional Locksmith & Security

12-18.indd 12 3/16/17 10:52 AM


with parting
compound.
The blank has
been pressed
down evenly,
to about half
3 its thickness.
Dust the
molding com-
pound with
parting com-
pound. In the
CLAM™ kit,
you will find a
4 small container
of “talc.” This
will act to pre-
leveled with the sides of the vent the molding compound
fixture. from adhering to itself or the
In Figure 3, we have pressed pattern. Figure 4, shows the
a B106 (ILCO P1115) blank mold, dusted with talc. To cre-
into the bottom pad of mold- ate the cavity in our mold, we
ing compound. We’re going will use a brass key shim. The
to leave the key in the mold, brass shim measures; .220”
when we cast the shim, so x 1.375” and is .045” thick.
we have not dusted the mold Remove the shim from its

April-June 2017 • 13
pound will be
forced out of
the fixture. A
perfect impres-
sion of the key
and shim will
be produced.
Figure 6, shows
the shim and
key blade 7
5 “sandwiched”

attachment chain.
To create a mold of the key
and shim, the brass shim is
placed over the pattern key as
you see in Figure 5. The edges
of the shim and key blank have
been carefully aligned, as you
see in the photo. Dust the shim 6 8
with parting compound, to
prevent the compound from
adhering. in the molding compound.
When the CLAM™ fixture Open the CLAM™ to
reveal the mold. In Figure 7,
9
is closed over the key blade
and shim, the molding com- the Brass Shim is shown still in

the upper mold half.


Carefully remove the Shim,
as you see in Figure 8, to leave
a cavity in the mold, to accept
our casting metal.
Close and clamp the

14 • The Institutional Locksmith & Security


to fill the mold. in the mold, before opening it.
10 Pour the It only takes a few minutes to
solidify and cool, Figure 11.
molten Woods
Metal into the Open the mold, as you
mold, as you
see in Figure
10. When the 12
mold is full, tap
the fixture on
the bench, to
insure full cast-
ing of the shim.
Allow the
CLAM™ fixture, as you see metal to cool
in Figure 9, to accept the hot
Woods Metal. The CLAM™
is clamped together to seal the
upper and lower mold halves.
A second clamp is used to
11
hold the mold fixture upright.
The Metal is heated over a
small flame, from a “tea light.”
The Woods Metal will melt at
about 158° Farenheight. The
pouring ladle is provided in the 13
kit. Melt only enough material

April-June 2017 • 15
16

17

14
Figure 14, shows the com-
pleted shim block for the GM
“Z” key blade.
File the bottom of the shim
block to allow the key to fully
seat in the key vise, as you
see in Figure 15, The shim will
fill and support the key blade
of the key, as you see in Figure when it is clamped, preventing
13. Trim the ends and clean up
15 any “flash” around the edges
the key from flipping out of the
jaws. This is a “soft” material.
of the new shim block. Close Do not “over-tighten” the key
see in Figure 12, to reveal the the CLAM™ and make an vise when clamping the key. It
“raw” casting. The Woods identical shim if you intend to is a perfect fit to the key mill-
Metal will not adhere to the use them for duplication. The ing.
key blade. mold will produce a number of
impressions before it needs to Figure 16, shows the
Carefully pick the casting off
be redone. various configurations of

16 • The Institutional Locksmith & Security


tion. Trim and
18 file the bottoms 19
of the shims, so
the key blade will
“bottom” in the
key vise. Because
of the deep mill-
ing, it may be
necessary to pick
the “W” series key blades. the shims off the
These keyways are intention- key with a pointed tool. When
ally designed to be difficult to clamped, they will grip in the
clamp in a key machine. milling of the key.
Figure 17, shows a pair of Figure 19, shows the shims
key shims, made in the same on a key blade. Slide the shims
manner that we made the back to allow the key to be
shim for the “Z” key. The gauged by the tip stop.
molding and casting procedure
Figure 20, shows the Best™
for these shims is exactly the
“WB” key securely clamped
same as above. This key pro-
in the HPC 1200CM key
file requires a shim above and
machine key vise. Custom
below the blank, to insure a
key shims will be necessary to 20
solid grip on the key.
clamp other key profiles in this
Figure 18, shows how the series. The “WB” shims will This Shop Talk topic illus-
profile shims fit into the key only work on “WB” keys. trated an easy method of
milling of the “WB” key sec- creating custom key shims

April-June 2017 • 17
to clamp irregular key profiles, specifically the
Best™ “W” series keyways. I hope you found
this information helpful. If you have any ques-
tions or comments on the subject of SFIC cylin-
ders, please forward them Shop Talk, care of The
National Locksmith Magazine. Thank you for all
the letters and questions. Next month we’ll cut
a few Best keys and review the tools needed to
service SFIC cylinders.
Shop Talk is where the butter meets the bread.
It’s about sharing those little things we do every
day, which make our jobs a little faster, a little
easier or just a little discovery of fact that solves
a challenge. I know most every locksmith carries
a cell phone. Most cell phones today have built in
cameras. Take a shot of what you discover or cre-
ate that may help a fellow locksmith along the way,
and send it in with a short but detailed explanation
of your findings. It will be time well spent.
This column cannot continue without your sup-
port. Email me at Bob@sievekingprodco.com, or
write to The Institutional Locksmith Magazine,
1533 Burgundy Parkway, Streamwood, IL 60107-
1861.

18 • The Institutional Locksmith & Security


Architectural Hardware www.select-hinges.com Padlocks
ABH Manufacturing, Inc. Page 2 ABUS USA
Phone: 630-875-9900 Phone: 623-516-9933
www.abhmfg.com Associations and Trade Shows www.abus.com
Page 6 Institutional Locksmiths Assoc. (ILA) Page 18
Capitol Industries National Pacific Lock Co.
Phone: 514-273-0451 www.ilanational.org Phone: 888-562-5565
www.capitolindustriesinc.com Page14 www.paclock.com
Page 3 Page 20

KSP/Killeen Security Products Keys, Key Machines, Tools &


Equipment Wholesale Distributors
Phone:800-577-5397
www.iccore.com GKL Products Commonwealth Lock Co.
Page 18 Phone: 888-446-4337 Phone: 617-876-3301
www.hingedoctor.com www.commonwealthlock.com
Olympus Lock Inc. Page 9
Phone: 800-525-0954 Page 9 and 14
Pasek Corporation
www.olympus-lock.com The Hinge Tweaker
Phone: 617-269-7110
Page 7 Phone: 814-454-0738
www.pasek.com
Power Access Corporation www.hingetweaker.com
Page 9
Phone: 800-344-0088 Page 10
Southern Lock & Supply Co.
www.power-access.biz HPC, A Hudson Lock Company Phone: 800-282-2837
Page 10 Phone: 800-323-3295 www.southernlock.com
ROFU Security International Corp. www.hudsonlock.com Page 15
Phone: 253-922-1828 Page 11
Stone & Berg Wholesale Locksmith
www.rofu.com Kustom Key Inc. Supply Co.
Page 13 Phone: 800-537-5397 Phone: 800-225-7405
SELECT Products Limited www.kustomkey.com www.stoneandberg.com
Phone: 800-423-1174 Page 17 Page 18

This index is provided as a service. Publisher assumes no liability for errors and / or omissions.

— FREE Subscription Order Form — April-June 2017

Fax to…630-837-1210 or mail to…National Publishing • 1533 Burgundy Pkwy. • Streamwood, IL 60107

r YES! Sign me up for my FREE subscription to Which one best describes your job title…
r Locksmith r Physical Plant Manager
The Institutional Locksmith™
(Please allow 4-6 weeks for delivery.) r Locksmith Supervisor r Purchasing Mgr./Associate
r No, not at this time. r Security Manager r Other
My institution can best be described as…
Name (PLEASE PRINT)___________________________________________________________ r College or University r Prison
r Primary or Secondary School r Government
r Security Product Distributor r Manufacutring Facility
Signature_____________________________________________ Date___________________
r Security Products Manufacturer r Hospital
r Other
Address_____________________________________________________________________
Number of Locksmiths employed by my institution…
r1 r2 r3 r4 r5 r More than 5
City_________________________________________________________________________ Our annual hardware/lock budget is (check one)…
r Under $50,000 r $50,000-$100,000
State_____________________ Zip_______________________________________________ r $101,000 - $150,000 r Over $150,000

And while you're at it send me FREE information from the


Phone______________________________________________________________________
advertisers in this issue in the following categories…
r Training Manuals & Materials r Architectural Hardware
eMail_______________________________________________________________________ r Electronic Locking Systems r Padlocks
r Wholsale Distributor r Safes & Safe Equipment
Name of Employing Institution____________________________________________________ r Keys, Key Machines, Tools & Equipment

April-June 2017 •­19


TIL
DIGITAL EDITION
April — June 2017

n Single Door Biometric


Soutions
2

n LaGard SmartPoint®
6

Enjoy these bonus


articles from past
issues
Biometrics Offer Convenient, Affordable Alternative to Traditional Locking Systems

T
he next time someone asks for a lock on credential, (see photo 1). Such technology is be-
a single door, you might want to think out coming ubiquitous in applications large and small.
of the box—and go biometric. Although You find them ever ywhere.
biometrics might seem out of reach finan-
End users ranging from small private schools to
cially, or like space-age overkill, such systems are
restaurants, day spas to sororities are all finding bio-
actually affordable and practical. Not to mention,
metrics to be an effective, affordable and convenient
they are easy to install and convenient for users,
form of access control. Although biometrics might
who do not have to worr y about carr ying a card.
initially cost more than a standard locking system,
With biometric handreaders, your hand is your
they offer many inherent advantages that are worth
considering. That’s why you’re seeing them at banks
and health clubs, among other locales.
Standalone Biometrics Are Easy to Install
Important to door and hardware dealers, biomet-
rics are available in standalone configurations, (see
photo 2). Such devices are not only a biometric, but
also a complete door controller for a single door.
Users are enrolled at the unit and their biometric
template is stored in the unit for subsequent com-
parison. The actual comparison is accomplished
within the unit and a lock output is energized
depending on the outcome.
Input points are available to monitor the door
switch for “door open too long” and “door forced
open” conditions. Outputs are provided to signal a
bell or alarm panel if an alarm condition is detected
by the system. An audit trail, if required, is available
by connecting a printer to the unit. Time restrictions
are programmed through the integrated keypad for
individual users. The number of users is limited by
the available memory and varies from manufacturer
to manufacturer. Such systems are actually easy to
install, implement, maintain, and use.
Biometrics Ensure Accuracy
1. With biometric handreaders, your hand is Of course, the goal of any access control system
your credential.
is to let authorized people, not just their keys or
THE INSTITUTIONAL LOCKSMITH | 2 | April-June 2017 Digital Edition

DIGITAL 2-5.indd 2 3/16/17 10:44 AM


users application will separate the order takers from
credentials, into specific the true solutions providers. A dealer should review
places. Only with the use of the following five items to ensure that the right bio-
a biometric device can this goal metric is being employed.
be achieved. First of all, the device must cause no discomfort
Think about it. A card-based access system will or concern for the user. This may be a subjective
control the access of authorized pieces of plastic, but issue, but it is important to fully explain any con-
not who is in possession of the card. Systems using cerns users may have. If people are afraid to use
PINs (personal identification numbers) require that the device, they most likely will not use it properly
an individual only know a specific number to gain and that may result in them not being granted ac-
entry. But, who actually entered the code cannot cess. Privacy concerns must be addressed satis-
be determined. On the contrary, biometric devices factorily. Typically, the higher the level of security,
verify who a person is by what they are, whether it the more intrusive the biometric can be while still
be their hand, eye, fingerprint or voice. being accepted by the users.
But, convenience is the biggest selling point for Second, the biometric must be easy to use.
biometrics because they can eliminate the need for People like things that are simple and intuitive.
keys or cards. While keys themselves don’t cost How many times have users been frustrated with a
much and dramatic price reductions have lowered card reader that gives no indication of which way to
the capital cost of the cards in recent years, swipe the card? The larger the population, the more
the true benefit of eliminating them is critical this factor becomes. For hundreds of
realized through reduced administrative people, ten extra minutes of training time
efforts. per person can add up quickly making
the enrollment process a nightmare.
For instance, a lost card or key must
be replaced and reissued by someone. Third, the biometric must
Just as there is a price associated with work correctly. This seems
the time spent to complete this seeming- obvious, but how well the bio-
ly simple task, when added together, the metric works will determine
overall administration of a key or card if it stays on the job. In the
system is costly. Hands and eyes are most basic sense, if a biometric is
not lost, stolen or forgotten. They also working properly, it does two things.
don’t wear out or need to be replaced. It keeps bad guys out and lets good
guys in. Yet, no device is perfect.
Choosing the Right Biometric Typically much attention is
The ability to articulate the pros
and cons of each of the biometric 2. Biometrics are available
technologies as they apply to the end in standalone configurations.

THE INSTITUTIONAL LOCKSMITH | 3| April-June 2017 Digital Edition

DIGITAL 2-5.indd 3 3/16/17 10:44 AM


and Co-Founder of The Academy. “We wanted the
building to be secure and to know who was coming
in and at what time.”
At The Academy, children do not wait outside to
be picked up. Parents must come inside the school
and use the biometric reader to enter it. The Hand-
Key unit is also programmed to let teachers in at
special times, including evenings and weekends.
Demonstrating its flexibility at The Academy,
the handreader actually controls two doors at one
location. A keypad is located on the outer door and
connected to the handreader. A user enters her PIN
number and, if found in the handreader, the outer
3. Entering The Academy, parents and staff door is opened. She then must place her hand on the
use biometrics. handreader to be verified to enter the second door
and the building.
given to how well bad guys are repelled, but it is Bar-Lev says the handreader system has made
equally important to insure that the authorized it easier for staff and safer for the children when
users are consistently recognized and allowed parents pick up their children, especially during
access. school hours if a child has an appointment off school
Fourth, a logistical issue that should be consid- grounds. Previously, someone had to monitor the
ered carefully is throughput, the total time it takes for door or a bell would ring in the administration office.
a person to use the device. This is difficult for manu- A school employee would have to stop what they
facturers to specify since it is application dependent. were doing and respond to the bell. Now a parent
Most manufacturers specify the verification time for can just come in and get their child with everyone
the reader, but that is only part of the equation. knowing they are allowed to do so.

When a person uses a biometric reader, they typi- Similarly, two sorority houses at the University of
cally enter an ID number on an integral keypad, swipe Central Florida (UCF) in Orlando have added han-
a card or use proximity. The reader prompts them to dreaders to their entrances to heighten security and
position their hand, finger or eye where the device can add convenience for 200 sorority sister residents and
scan physical details. The elapsed time from presenta- staff. Because they operate outdoors, handreaders
tion to identity verification is the “verification time.” were selected over fingerprint readers.
Most biometric readers verify identity in a second. “Both the Alpha Delta Pi and Kappa Delta sorority
Last, but not least, to be successful, the biometric houses were experiencing problems with unautho-
must allow people to reasonably and easily use the
technology. If the technology is not as simple as turning
a key in a lock, it is going to result in unhappy users.
Simply placing a hand on a reader could not be easier.
Small Systems that Boast Big Security
Just because an application is small doesn’t mean
it can’t take advantage of the additional security and
convenience of biometric technology. For example,
The Academy of Appleton, Wisconsin, a private
school, is using hand geometry technology for
access control, (see photo 3). Parents and the entire
faculty must use a biometric handreader to enter the
school. School officials at The Academy, who consid-
er security a top concern, did not want to bother with
keys or cards or take the chance of a single code
getting compromised.
“We chose hand geometry because it maximized
security while still making it easy to get in the
school,” reports Jody Marriot Bar-Lev, Co-President
4. The HandKey unit.
THE INSTITUTIONAL LOCKSMITH | 4| April-June 2017 Digital Edition

DIGITAL 2-5.indd 4 3/16/17 10:44 AM


rized students from the university coming into the
houses at all times of the day and night,” says Jerry
Ofstedal, Installation Manager for Sonitrol, the
integrator that installed the handreaders. “To elim-
inate the possibility of an unauthorized individual
gaining access without a resident being present, the
handreaders offer redundant access to the sororities.
Each student must enter a PIN code and then pres-
ent her hand in order to gain entry.
“Although the residents knew they could no longer
pass on their electronic keys for friends to gain entry
to the sorority house, they seemed very excited about
the increased security protection that the hand geom-
etry technology provides,” Ofstedal reports.
Banks Ask Customers
to Give Them a Hand 5. Chesterfield County uses an outdoor handreader.

Also in Florida, Eastern Financial Florida Credit


“We needed a positive identifier for people carry-
Union is but one of many financial institutions
ing out critical county functions at off-hour times,”
using biometric technology to limit access to safe
explains Dennis Lacey, Chesterfield County security
deposit boxes.
coordinator who spent 20 years with the Secret Ser-
“We wanted to streamline our ser vices and in- vice and 17 years with the Department of Defense.
crease security for our safe deposit box areas,” ex-
According to Lacey, the county’s existing access
plains Mark Holmes, Vice President of Marketing
control system for the five-story main administration
for Eastern Financial Florida Credit Union. “The
building, linked to a three-story and two-story wing
HandKey units provide easy, safe access to the
and police administration building, is comprised of
safe deposit boxes, (see photo 4). Now, members
mechanical keys and the handreader.
can let themselves in without waiting for someone
to assist them.” “It’s too expensive and time-consuming to replace
missing keys,” Lacey emphasizes. “We often have
HandKeys are currently placed in front of the
to search for people who leave our employment to
door to the safe deposit area at credit union branch-
get our keys back since the key represents a part of
es. Only one member at a time is allowed in the safe
their career. We’re looking at adding more handread-
deposit vault.
ers to other doors of this building as well as other
Eastern Financial officials considered other buildings. We’ve actually had comments from the
security measures, including alternative biometric highest levels of county administration to do so.”
technologies, but ultimately opted for hand geom-
Chesterfield County, like many installations,
etry. Members present their hand and a personal
wanted secure exterior doors. These types of instal-
identification number (PIN) for access.
lations can be very demanding of biometric technolo-
“We contemplated swipe cards, but people lose gies. “We can have some pretty nasty weather along
cards and very often put their PIN on the card, even the James River,” Lacey notes. “We get into the teens
though they are warned not to do so,” reports Alex during the winter and get both snow and ice. In the
Pinsky, Vice President of Corporate Services for the summers, we can experience strong downpours.”
credit union. “Biometrics also can’t be comprised, The choice of hand geometry readers reflects the
but we felt that iris or retinal scans were too invasive. ability of this technology to maintain its performance
Hand geometry was comparatively simple and it indoors and out.
wasn’t intimidating to our members.”
From banks to spas to golf clubs, spas and restau-
Feedback has also been favorable from members rants, more and more the convenience of biometrics
of all ages, Pinsky adds. is being used to get people into facilities. Look for
Handy for the Outdoors, Too one on your next visit to SeaWorld, Busch Gardens,
and other venues. They’re become the entrance pass
In Virginia, Chesterfield County officials have for season ticket holders.
implemented a handreader to provide off-hours
access at the county’s main administration building,
(see photo 5).

THE INSTITUTIONAL LOCKSMITH | 5| April-June 2017 Digital Edition

DIGITAL 2-5.indd 5 3/16/17 10:44 AM


M
any commercial environments require access to a safe by multiple
users. Typically we are talking about restaurants, gas stations,
convenience stores, grocer y stores, jewelr y stores etc., the list
is endless. Access to the safe is typically by use of a key, combination, or
Personal Identification Number, “PIN,” or combination of the two.
There are risks inherent to these options. Keys are easily lost, stolen, or
duplicated, and a combination or PIN can be forgotten, lost, or given to others.
Often times there is no audit trail, so a record of these access events is non-exis-
tent.
Access control based on biometrics eliminates all of these problems. It also
makes it possible to establish a user’s identity based on “who they are” rather
than by a key they possess or a combination they remember.
The LA GARD SmartPoint® Biometric Recognition Locking System, cap-
tures the unique features of a human fingerprint to allow or deny safe access,
(see photo 1). Here it is shown controlling two locks for a dual door applica-
tion or as a redundant vault door application. The authorized person must be
physically present for access to be granted, ensuring positive identity and the
accuracy of the audit.
There are several parts to the entire system and I will touch briefly on each.
However, before I get to them, let me tell you about an organization for bio-
metric standards called the National Biometrics Security Project “NBSP.”
The NBSP is a non-profit organization and was established after the 9/11
incident with support of the US Congress. Their mission is to help govern-
ment and private sector organizations, protect the civil infrastructure by
deterring attacks through the timely deployment of biometric technologies
for identity assurance. They do
this by supporting government
and private sector efforts to
standardize, test, acquire, and
deploy biometric technology.
Their testing program is
exclusively focused on biomet-
rics. They are designed to meet
stringent requirements in the

1. Introducing the SmartPoint® Biometric


Recognition safe lock system from LA GARD.

THE INSTITUTIONAL LOCKSMITH | 6| April-June 2017 Digital Edition

DIGITAL 6-9.indd 6 3/16/17 10:42 AM


Performance testing results in a general list of bio-
metric products qualified to meet criteria expected
for homeland security applications. This will reduce
the risk and complexity of biometric product pur-
chase decisions.
The first biometrics standards were adopted in
2002. There are now 33 standards in place and more
coming. Now let’s look at the biometric reader for
the LA GARD SmartPoint® Biometric Recognition
Locking System from Kaba Mas.
The biometric reader features a patented Light
2. Here is a good look at the finger print reader. Emitting Sensing (LES) technology that it uses to
read the finger print image. The chemistry of your
objective test and evaluation of commercially avail- human finger combined with a small electrical field
able biometric products. They also test technology causes the reader material to fluoresce with a perfect
not yet in the production stage. fingerprint image. The unique method of image
capture by LES, effectively overcomes issues of dry,
Within their testing program, a variety of tests wet, and slick fingers that can defeat other finger in-
are performed on a pass/fail basis. These include put technologies. In addition, “Live Finger” detection
the assessment of: eliminates spoofing by gummy or silicon replicas.
• A product's ability to meet basic performance
requirements, common to all biometric technol-
ogies, for service in civil infrastructure security
applications (Class I).
• The determination of the ability of a product or
technology to comply with standards approved
for biometrics (Class II).
• The response to specific client needs for special-
ized tests in any aspect of biometric use (Class III).

3. The logic module houses its own processor as


well as a display and keypad.

THE INSTITUTIONAL LOCKSMITH | 7| April-June 2017 Digital Edition

DIGITAL 6-9.indd 7 3/16/17 10:42 AM


4. The physical lock is the
same as used with other LA
GARD products since 2005.
5. Here are the internal workings of the SmartPoint® lock.

7. On the bottom
part of the
circuit board
you can see the
battery.

6. The lock with the circuit board connected.

The Teflon coated, cur ved surface of the finger


print reader will capture a high quality image at
650 DPI, (see photo 2). LES has been tested to
more than 1.5 million touches and has proven
immune to electro-static discharge, nicotine, and
other elements that negatively impact some scan-
ning technologies.
SmartPoint® has passed the Class 1 require-
ments set forth by NBSP. To be more specific, inside the logic module. Having individual proces-
they put the unit on a building and had the nor- sors allows the logic module to control up to five
mal population use it for 15,000 entries and then different locks.
rated four parameters as pass or fail, (acceptable The logic module has several functions, (see photo
for Government application). The four param- 3). The most obvious is the display and keypad, used
eters were, False Acceptance, False Rejection, to view and enter information. It also has the finger
Failure to Enroll, and Speed. Now let’s look at the print reader attached to its right side.
rest of the system.
All of the time lock information is stored in the
The logic module and the actual lock, both have logic module as well as finger print information.
internal processors. Some information is stored (No finger print information is stored at all, only an
inside the lock while other information is stored algorithmic template containing points of recognition
THE INSTITUTIONAL LOCKSMITH | 8| April-June 2017 Digital Edition

DIGITAL 6-9.indd 8 3/16/17 10:42 AM


on the print.) The only thing you need to remember • Logic module can scroll the last 1000 system
is that the number of users will be decreased if more events (locks & users).
than one finger print is required per user. • Multiple Users - up to 98 access users can
The third part of the system is the actual lock, (see be enrolled in the SmartPoint® system. Two
photo 4). The lock is the same as used by all other additional “master” administrators control
LA GARD locks since about 2005, (see photo 5). The system configuration.
only difference in the lock is the electronic circuit • Time Delay - optionally programmed. 1-99 min-
board, (see photo 6). The circuit board is responsible ute time delay deters potential intruders.
for holding up to 4000 events as well as the locks
identity. The bottom of the circuit board has a bat- • Wrong Try Penalty - five minute opening delay
tery used to preserve memory, (see photo 7). after four invalid attempts.
This looks like a tough lock that is very durable • Time Lock - Optionally programmed. Safe can
as well as versatile. The one keypad is able to control be locked down for specified periods and open-
both the primary lock as well as each internal lock ing windows can be set.
used to secure individual compartments. Remember,
this keypad can control up to five different locks. Here Specifications
is a list of the features as well as lock specifications.
• Environment - Temperature - 32ºF to 120ºF (0ºC
to 49ºC) Humidity - 86ºF (30ºC) at 85% relative
System Features humidity for 24 hours
• There are three levels of user identification: • Verification Time - Less than 1 second, typical
• Fingerprint only • Maximum # Access Users: 98
• Fingerprint and PIN code • 98 users/1 fingerprint per user
• PIN code only • 49 users/2 fingerprints per user
• Audit Trail - each lock within the system records • Power - Recommended 9v DC, AC power adapt-
and stores the last 4000 operations. er, regulated, 9V battery for emergencies only.
• Communication - 38.4k baud.
• Memory - Non-volatile. Information contained in
lock (including logs and set-up) will not be lost in
the event of power loss.
The software used with the SmartPoint® Biomet-
ric Recognition system is called “SmartPoint®.” It is
responsible for programming the lock as well as the
logic module. The lock and logic module can be pro-
grammed before installation, or during installation if
a computer is available.
With biometrics, you create a non-refutable identi-
fication and can hold each user accountable through
extensive audit capabilities. This is the ultimate in
employee identification. This is a very powerful
system that can solve a lot of potential problems. If
you are ever in need of a safe lock that eliminates the
need for a key, combination, or PIN that can be lost,
stolen, forgotten, duplicated, or disseminated, maybe
you should give Kaba Mas a call before finalizing
your biometrics decision, the SmartPoint® may be
just the answer.

THE INSTITUTIONAL LOCKSMITH | 9| April-June 2017 Digital Edition

Das könnte Ihnen auch gefallen