Archive for access control

Purchase Locks On-Line

Can locks be purchased on-line safely? The answer to this question is yes, however, not every on-line merchant will serve you well. You must answer this question, what are you trying to secure and how valuable is that to you? If you need a padlock to lock up a lawnmower shed then buy that padlock from any on-line merchant.

Purchase Locks On-LineIf you are securing something valuable like your family by buying front door locks, then you should seek out an on-line merchant that specializes in locks and security. At this point you are not buying a commodity lock you are buying a security solution. LsiDepot should be your first choice to Purchase Locks On-Line.

Here are some things that you should look for in an on-line lock merchant:

  • Do they sell only locks and security items?
  • Can you call them and speak to someone knowledgeable in security?
  • Are they authorized by major lock manufacturers?
  • Can they custom build security solutions?
  • Can they sell “High Security” locks?

When you view their web site do you see only locks and other security items. Does their web site give you enough information to make a decision? If not can you easily contact them via email or phone? And if you do contact them by phone can you talk to someone that can help you select the correct lock.

Purchase Locks On-LineAre you able to order “Custom Assembled” locks. Custom assembled means assembled to your specifications, such as keyed alike, keyed different or master keyed. Can you order just the quantity of keys that you need. This is a very important part of key control. You should have just the amount you need and the ability to orders more in the future if needed.

Can you order “High Security” locks. These have patent protection on the lock and key, that helps prevent unauthorized key duplication. They also are built from high quality material to exact tolerances. And they are built to provide strong physical security.

Does this on-line merchant sell quality locks such as; Cobra locks, Abloy locks and Medeco Locks. If they do that is an indication that they are an authorized service center or manufacturer themselves and will be able to provide the proper help and solutions to fit your needs.

As I mentioned earlier in the blog and in many blogs in the past, your decision on where to Purchase Locks On-Line and how much to spend comes down to “What are you trying to protect and how valuable is that or they to you”.

LsiDepot.com

Lock Store

To Purchase Locks On-Line please go to LsiDepot.

What Is A Registered Lock Code?

Before we discuss a Registered Lock Code, lets discuss just what a lock code is. When a lock is assembled locking pins are placed inside. These pins allow the opening and closing of the lock with the key. There must be a way to transfer the locking pins to cuts on the key. This is called the lock code, sometimes known as a Key Code/

Registered Lock Code Cobra Patented Locks

Cobra-7 Key

A registered lock code is assigned and registered to a user or company. Only authorized users can order cut keys to a registered lock code. These types of codes are usually used on high security locks as an effort to control access. Our Company will maintain these codes in a custom designed computer database. This database will help to avoid repeated lock codes so once assigned they will never be duplicated or assigned to another user.

These types of codes are usually “Blind”. This means that by looking at the registered lock code you will not be able to convert it to a key cut. A lock code chart is needed to convert the code to a key cut that will match the locking pins in the lock and operate it.

With many non-registered codes, it is very easy to convert the code to a cut. For many, the code is the cut. This lowers the overall security of the lock as it gives no key control. Key Control is the ability to know how many keys were cut for a lock code and who ordered those keys on what date. Key control and registered lock codes go together.

Registered Lock Code from Medeco

Medeco M3 Key

High security locks are usually found at authorized service centers, such as Locking Systems International. They are more expensive than big box store locks, so you first must decide what you are protecting and how much is that worth to you. After making that decision, you will know where to make a purchase.

When you purchase a high security lock, registered lock codes are assigned to you. By keeping these codes you will be able to order additional keys later. The number of registered codes you get depends on if you order locks keyed alike, keyed different or master keyed. For example, if you order 10 locks keyed alike you will get one registered lock code. If you order 10 locks keyed different you will receive 10 registered lock codes.

I hope this isn’t too confusing. The biggest take away here is that high security locks and registered lock codes go together.

Locking Systems International has developed a custom database program that we use to keep track of your lock codes and the users authorized to order additional keys to that code.

Gas Pump Security – What is Skimming ?

If you drive a vehicle your credit or debit card is at risk from Skimming. What can you do and what are the gas pump operators and manufacturers doing to prevent and stop skimming? Skimming is where the bad guys will put a device on the gas pump that will intercept your card number. I will go into where these skimmers are placed. Let’s start with what can you do to help Stop Skimmingprevent your card number from being stolen.

  1. The most important thing you can do is Do Not Use Debit Cards. Once your debit card number is stolen the bad guys can empty your bank accounts. The banks say you are protected, but until they investigate you have no money in your bank account.
  2. Before using a gas pump look at it, do you see anything attached to it that looks like it doesn’t belong there?
  3. Are all the pump access doors securely locked?
  4. Does the store attendant have clear line of sight to the pumps?
  5. Are there surveillance cameras pointed at the pumps?

If you feel uncomfortable at a gas station or you find one of the above items, then leave and find another station, they are on every corner.

stop skimmingThe gas pump operators are stepping up to try and prevent skimming by working with a specialty security company to come up with devices that stop this practice. The major point of attack are the card readers, this is where the skimming devices are placed. Below are some of the steps that gas pump operators are taking:

  1. Replacing the gas pump locks with stronger and more secure locks, some operators are going with high security cam locks and padlocks.
  2. Installing a specially designed box that encases the card reader to prevent access to it. This card reader security box is locked with a special lock that has patented protection on the lock and keys.
  3. Installing a special cover, secured by security screws over the gas pump control board.
  4. Installing a special security box around the pulser, this device is what counts the gallons of gas dispensed.
  5. The card reader manufacturers are also increasing the security of the reader itself.

Many gas stations are requiring that you input the zip code that matches the credit card. When credit cards with a chip imbedded becomes mainstream many credit and debit card problems will go away.

For additional information visit us at LsiDepot.com.

Key Codes — Are Yours Secure?

What are Key Codes?  They are the numbers that come with the lock that you just purchased.  They contain information that identify the pinning sequence in the lock and in turn provides the information necessary to cut a key.  For example, suppose you take your house key into a big box store to get more keys made.  The store clerk will identify the type of key you have (the lock manufacturer), then he will either duplicate the key or use the number stamped on the key to make new ones.

Key Codes Cobra Patented Locks

Cobra-7 Key

Now, if you read the above paragraph again you will notice that you are never asked for your identification, meaning anyone can take your key and have another one made.  In other words, there is no accountability and hence no key control.

With high security locks, the key code is registered to you and that information is put into a database program that tracks your codes.  The key code is usually blind, this means that by looking at the code you cannot get information on how the lock is pinned or how to cut a duplicate key.  The blind code is matched with a pinning code which has all the information. Locking Systems provides High Security Locks and Key Codes.

Key Codes:

  • Used to identify the pinning sequence of the lock
  • Used to cut duplicate keys
  • High security locks require identification before keys are cut
  • High security lock codes are registered to the end user
  • Blind codes do not give away the pinning and cutting information
  • High security codes are maintained in a secure database

Key Codes Tamper-Proof Key RingsConvenience vs Security:

The locks that you buy at hardware stores or big box stores offer convenience in a mid-security level, this might be OK for most people. However, always ask yourself what are you trying to protect or lock and if that is valuable is it worth a little inconvenience.

You can’t buy high security locks at hardware stores or big box stores.  They are purchased at specialized locksmiths or manufacturer approved service centers.  These places will sell you the hardware and then register the lock code to you.  They will also provide you with the secure lock code and a way for you to use it if necessary.  They will also secure that code into a database where it will not be assigned to anyone else.

So, are your lock codes secure, do you even know where those code are?  Maybe it’s time to look at your locks, count your keys and decide if it’s time to get a higher security lock.

Need Help Call Us: 800.657.LOCK(5625) or www.lsidepot.com.

Tamper Proof Key Rings

What is “Key Control”?  The answer seems simple; you have control of your keys. But how do you do this and why is it important?  You should be able to account for of all your keys; for example, how many house keys do you have and who has them?  You could ask the same question about office keys and car keys. Key control becomes even more important if you have many keys that you must give to employees to service customers or equipment. This is where Tamper Proof Key Rings are used

Lockable Key RingsLet’s look at house keys. Whether the house is new or old, ask yourself two questions. How many keys were cut and who has them; a past house cleaning service, pest service or contractor that was working inside your home. If you answer “I don’t know”, the solution to your problem is easily resolved; replace the locks or re-key them. Both methods will provide the same results. You will know how many keys were cut and who has them. This will give you control of your keys and your security.

Over the years we accumulate keys for many applications, along with spare keys. If you own a business your spare keys, office keys and equipment keys are a very serious and potentially expensive problem.  Below are two methods of securing keys:

Tamper-Proof Key RingsTamper-Proof Key Rings:

Tamper Proof Key Rings have a permanent seal that cannot be opened once it is sealed with special sealing tools. These key rings have a unique serial number for tracking; and once crimped, there is a smooth surface to move keys around the ring. Tamper Proof Key Rings are available in solid or flexible rings and come in different lengths.

Lockable Key Rings:

Lockable Key Rings with the Medeco High Security Lock Cylinder secures the keys on the key ring.  Only the person with the proper key can open the Lockable Key Rings, thereby securing all the keys on the ring.  The rings can be solid or flexible and come in different lengths.

Lockable Key Rings - Tamper Proof Key RingsThese two methods provide the same solution; they both control your keys.  Let’s take a look at a real world problem for a business. In the vending business many keys are given to a service person to stock the vending machines. If those keys are not on a secure ring the service person can remove a key and come back after hours to remove money from the machine. With a secure key ring the key cannot be removed, the key rings are returned at the end of the day with all the keys attached. This is a perfect example of controlling your keys.

Do you know where all your keys are?

Contact us at 800.657.5625(LOCK) or LsiDepot.com.

Bluetooth Locks—Electronic Door Locks

It was bound to happen; after all, we use Bluetooth to gain access and start our cars, play our music, use our computers and many other things.  Now, we can use Bluetooth to open the front door to our homes among other things. The age of Bluetooth Locks has arrived.

Electronic SFIC Bluetooth LocksSo, how do they work?  First, you must start off with a good grade mechanical lock.  This means a door locks made out of strong materials with features that will defeat attacks on the lock itself.  Some Bluetooth locks have a key override; this means that you get a regular key to open the lock in case of electronic failure.  The lock cylinder should have a high security cylinder that provides key control as well as physical security.

Features of a Bluetooth Door Lock:

  • Lock has Bluetooth electronics built in
  • Programmed by Android or iPhone
  • Bluetooth key fobs come with the lock
  • Pairs with the cell phone and/or key fob
  • Mechanical key override
  • Battery operated door lock

Bluetooth Locks - ProgrammingAfter installing the control app on your phone, you then pair with the lock.  Once that is successful, you can program your door lock and your backup key fobs.  Now when you walk up to you front door and get within 4-6 feet, the lock will either open or activate waiting for you to touch it (depending on the manufacturer).  There is usually an LED light on the lock that will give visual feedback.  The lock latch will be open and closed with a motor or solenoid.

Software features and functions:

  • Program individual key fobs for different people
  • Delete key fobs
  • Keep an audit history of openings and closings by time and date (great for keeping tabs on children)
  • Program key fobs to only open at certain times
  • Locks can be rekeyed without the need of a locksmith
  • Operates on the new Bluetooth standard 4.0

One manufacturer has a patent pending technology that can determine if you are standing inside or outside your home.  This is an important feature so that if you are inside and someone rings your door bell the lock will not open because it senses that you are inside the home.

If the Bluetooth locks have a key override; remember that it is both a convenience and a liability.  You should make sure that this lock cylinder is a secure one.

It appears that the old mechanical door locks have finally reached the 21st Century, providing state of the art security.

For additional please contact us at Locking Systems International.

Key Codes — Are Yours Secure?

What are Key Codes? They are the numbers that come with the lock that you just purchased. They contain information that identify the pinning sequence in the lock and in turn provides the information necessary to cut a key. For example, suppose you take your house key into a big box store to get more keys made. The store clerk will identify the type of key you have (the lock manufacturer), then he will either duplicate the key or use the number stamped on the key to make new ones.

Key Codes - High Security

Now, if you read the above paragraph again you will notice that you are never asked for your identification, meaning anyone can take your key and have another one made. In other words, there is no accountability and hence no Key Control.

With high security locks, the key code is registered to you and that information is put into a database program that tracks your codes. The key code is usually blind, this means that by looking at the code you cannot get information on how the lock is pinned or how to cut a duplicate key. The blind code is matched with a pinning code which has all the information.

Key Codes:

  • Used to identify the pinning sequence of the lock
  • Used to cut duplicate keys
  • High security locks require identification before keys are cut
  • High security lock codes are registered to the end user
  • Blind codes do not give away the pinning and cutting information
  • High security codes are maintained in a secure database

Key Codes - Control

Convenience vs Security:

The locks that you buy at hardware stores or big box stores offer convenience in a mid-security level, this might be OK for most people. However, always ask yourself what are you trying to protect or lock and if that is valuable is it worth a little inconvenience.

You can’t buy high security locks at hardware stores or big box stores. They are purchased at Locking Systems International, an approved service center. We will sell you the hardware and then register the lock code to you. We will also provide you with the secure lock code and a way for you to use it if necessary. We will also secure that code into a database where it will not be assigned to anyone else.

So, are your lock codes secure, do you even know where those code are? Maybe it’s time to look at your locks, count your keys and decide if it’s time to get a higher security lock.

For additional information contact us at Locking Systems International or our store LsiDepot.

Lockable Key Rings Provides Key Control

Lockable Key Rings secure your keys on either a flexible or solid ring.  The ring is locked by a standard type cam lock in an aluminum housing.  The main reason that you use this type of device is Key Control.  I have discussed key control in past blogs; without some type of key control you do not have a secure lock.  Key control is the most important part of a locking system; however, it is often the most overlooked.

Lockable Key Rings-Provides Key ControlKeys are put on the lockable key ring and it is locked preventing removal of the keys unless the lock is opened.  To remove the keys, the key ring lock needs to be opened by authorized personnel with the proper key.  All the keys are held together and cannot be taken off the key ring.  This provides key control as someone can’t “lose” one key.  If the cable is cut that would indicate possible compromise of any locks that those keys open.

The rings come in either flexible stainless steel cable available in 4 different sizes: 6,8,12 and 18 inch or solid stainless cable in 5 different sizes: 1.5,2.5,3,4 and 5 inch.  The lock body is made of aluminum that is covered with a protective polyurethane boot available in 15 different colors.  There is also of choice of locks.

Features of Lockable Key Rings:

  • Available in 4 sizes of flexible stainless steel or 5 sizes of solid stainless steel rings
  • 15 different colors of protective boots
  • Choice of locks
  • Aluminum lock body

Lockable Key RingsThere are a number of locks available to lock the key ring.  The choice of the lock will be dependent on what the keys are securing and the value.  The locks available are from medium security to high security.  They can be keyed alike, keyed different or master keyed.  It is advisable to key these locks all different or in some cases master keyed.

Type of Locks Available:

  • Cobra 7 (patented protection)
  • CobraMatic 7 (8-change lock)
  • Medeco high security lock
  • Abloy high security lock (environmental protection)

So, where would lockable key rings be used?  Anywhere keys must be controlled.  I will list a few examples of where these are used today.

Possible uses for tamper evident key rings:

  • Vending and laundry routes
  • Military facilities and government agencies
  • Prisons, armored cars and security services
  • Casinos, hospitals and universities

As you can see from the above list, they can be used anywhere that needs a tamper evident key control system to restrict access and prevent unauthorized key removal.

To find out more go to LsiDepot.com or call 800.657.5625.

Key Control

What is “Key Control”? The answer seems simple; you have control of your keys. But how do you do this and why is it important? You should be able to account for of all your keys; for example, how many house keys do you have and who has them? You could ask the same question about office keys and car keys. Key control becomes even more important if you have many keys that you must give to employees to service customers or equipment.

Medeco Key Control

Let’s look at house keys. Whether the house is new or old, ask yourself two questions. How many keys were cut and who has them; a past house cleaning service, pest service or contractor that was working inside your home. If you answer “I don’t know”, the solution to your problem is easily resolved; replace the locks or re-key them. Both methods will provide the same results. You will know how many keys were cut and who has them. This will give you control of your keys and your security, also know as Key Control.

Over the years we accumulate keys for many applications, along with spare keys. If you own a business your spare keys, office keys and equipment keys are a very serious and potentially expensive problem. Below are two methods of securing keys:

Tamper-Proof Key Rings--Pernament Key Control

Tamper-Proof Key Rings

Tamper-Proof Key Rings:

Tamper Proof Key Rings have a permanent seal that cannot be opened once it is sealed with special sealing tools. These key rings have a unique serial number for tracking; and once crimped, there is a smooth surface to move keys around the ring. Tamper Proof Key Rings are available in solid or flexible rings and come in different lengths.

Lockable Key Rings:

Lockable Key Rings-Lockable Key Control

Lockable Key Rings

Lockable Key Rings with the Medeco High Security Lock Cylinder secures the keys on the key ring. Only the person with the proper key can open the Lockable Key Rings, thereby securing all the keys on the ring. The rings can be solid or flexible and come in different lengths.

These two methods provide the same solution; they both control your keys. Let’s take a look at a real world problem for a business. In the vending business many keys are given to a service person to stock the vending machines. If those keys are not on a secure ring the service person can remove a key and come back after hours to remove money from the machine. With a secure key ring the key cannot be removed, the key rings are returned at the end of the day with all the keys attached. This is a perfect example of controlling your keys.

Do you know where all your keys are?   For additional Information regarding Key Control and Key Rings go to LsiDepot.com.