Key retainer

Last updated
Key Retainer for Small Format Interchangeable Cores Key retention device.jpg
Key Retainer for Small Format Interchangeable Cores

A key retainer device (KRD) is a small metal unit that is wall or door mounted, usually designed for the interchangeable core that retains one key (Key A) while the second key (Key B) is used for authorized purposes. When the key in use (Key B) is returned into the key retainer, the key held captive (Key A) is turned and then can be released. Now, the special key, perhaps top master (Key B) is held captive again. The key retainer is a method for providing visual key control.

Contents

Applications

These include janitorial or custodial staff, irregular or temporary users, guests and other authorized users that require access to a certain key but to whom that key is not issued directly. The KRD acts as a "mechanical sign-out sheet", physically controlling access to the key and providing accountability for its eventual return.

Operation

One key (High Level/Special) is retained in a core (at 1/4 turn) until another "release" key is inserted in the other core and rotated 90° (1/4 turn). Then the "retained" key can be removed for use while the "release" key is held (trapped) for visual accountability purposes. This cycle is repeated in reverse when the normally "retained" key is returned and the "release" key is removed "retrieved" by the authorized user.

Padlocks

The term "key retainer" can also refer to a padlock that does not allow the key to be removed when the shackle is in the open position. This prevents accidentally leaving the padlock unlocked, and it also prevents accidentally locking the key inside a locker, shed, etc.

See also

Related Research Articles

Gun safety

Gun safety is the study and practice of using, transporting, storing and disposing of firearms and ammunition, including the training of gun users, the design of weapons, and formal and informal regulation of gun production, distribution, and usage, for the purpose of avoiding unintentional injury, illness, or death. This includes mishaps like accidental discharge, negligent discharge, and firearm malfunctions, as well as secondary risks like hearing loss, lead poisoning from bullets, and pollution from other hazardous materials in propellants and cartridges. There were 47,000 unintentional firearm deaths worldwide in 2013.

Access control Selective restriction of access to a place or other resource, allowing only authorized users

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Combination lock Type of locking device in which a sequence of symbols, usually numbers, is used to open the lock

A combination lock is a type of locking device in which a sequence of symbols, usually numbers, is used to open the lock. The sequence may be entered using a single rotating dial which interacts with several discs or cams, by using a set of several rotating discs with inscribed symbols which directly interact with the locking mechanism, or through an electronic or mechanical keypad. Types range from inexpensive three-digit luggage locks to high-security safes. Unlike ordinary padlocks, combination locks do not use keys.

Lock and key Mechanical or electronic fastening device

A lock is a mechanical or electronic fastening device that is released by a physical object, by supplying secret information, by a combination thereof, or it may only be able to be opened from one side, such as a door chain.

Captive portal Web page displayed to new users of a network

A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement, acceptable use policy, survey completion, or other valid credentials that both the host and user agree to adhere by. Captive portals are used for a broad range of mobile and pedestrian broadband services – including cable and commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers.

Caps Lock Computer key

Caps Lock⇪ Caps Lock is a button on a computer keyboard that causes all letters of bicameral scripts to be generated in capital letters. It is a toggle key: each press reverses the previous action. Some keyboards also implement a light, to give visual feedback about whether it is on or off. Exactly what Caps Lock does depends on the keyboard hardware, the operating system, the device driver, and the keyboard layout. Usually, the effect is limited to letter keys. Letters of non-bicameral scripts and non-letter characters are generated normally.

Latch Mechanical fastener

A latch or catch is a type of mechanical fastener that joins two objects or surfaces while allowing for their regular separation. A latch typically engages another piece of hardware on the other mounting surface. Depending upon the type and design of the latch, this engaged bit of hardware may be known as a keeper or strike.

Lockout–tagout Isolation of dangerous equipment.

Lock out, tag out (LOTO) is a safety procedure used to ensure that dangerous equipment is properly shut off and not able to be started up again prior to the completion of maintenance or repair work. It requires that hazardous energy sources be "isolated and rendered inoperative" before work is started on the equipment in question. The isolated power sources are then locked and a tag is placed on the lock identifying the worker and reason the LOTO is placed on it. The worker then holds the key for the lock, ensuring that only he or she can remove the lock and start the equipment. This prevents accidental startup of equipment while it is in a hazardous state or while a worker is in direct contact with it.

Electronic lock Locking device which operates by means of electric current

An electronic lock is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and to unlock.

An interlock is a feature that makes the state of two mechanisms or functions mutually dependent. It may be used to prevent undesired states in a finite-state machine, and may consist of any electrical, electronic, or mechanical devices or systems. In most applications, an interlock is used to help prevent a machine from harming its operator or damaging itself by preventing one element from changing state due to the state of another element, and vice versa. Elevators are equipped with an interlock that prevents the moving elevator from opening its doors, and prevents the stationary elevator from moving. Interlocks may include sophisticated elements such as curtains of infrared beams, photodetectors, a computer containing an interlocking computer program, digital or analogue electronics, or simple switches and locks.

Love lock

A love lock or love padlock is a padlock that significant other pairs lock to a bridge, fence, gate, monument, or similar public fixture to symbolize their love. Typically the sweethearts' names or initials, and perhaps the date, are inscribed on the padlock, and its key is thrown away to symbolize unbreakable love.

Interchangeable core

An interchangeable core or IC is an adaptable locking key cylinder. Unlike a standard key cylinder, which is accessible for combinating only via locking device disassembly, an interchangeable mechanism relies upon a specialized "control" key for insertion and extraction of the essential combinating components. "Small format" interchangeable cores are in a figure-eight shape that is standard among lock manufacturers. "Large format" interchangeable cores are of varying sizes. Interchangeable cores can be extracted from one lock type and then installed into another without requiring the removal or disassembly of any single component. These units are readily adapted for master keying systems and can be set up with spare cores and keys for quick replacement when security is compromised, such as when a key is lost or stolen or when a personnel change takes place. Extracted cores can then be recombinated without urgency and placed back into maintenance storage for future use.

Locker Storage compartment

A locker is a small, usually narrow storage compartment. They are commonly found in dedicated cabinets, very often in large numbers, in various public places such as locker rooms, workplaces, middle and high schools, transport hubs and the like. They vary in size, purpose, construction, and security.

Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: ClevX, Hitachi, Integral Memory, iStorage Limited, Micron, Seagate Technology, Samsung, Toshiba, Viasat UK, Western Digital. The symmetric encryption key is maintained independently from the computer's CPU, thus allowing the complete data store to be encrypted and removing computer memory as a potential attack vector.

Vandal-resistant switch

Vandal-resistant switches are electrical switches designed to be installed in a location and application where they may be subject to abuse and attempts to damage them, as in the case of pedestrian crossing switches. Vandal-resistant switches located on devices that are outdoors must be able to withstand extreme temperatures, dust, rain, snow, and ice. Many vandal-resistant switches are intended to be operated by the general public, and must withstand heavy use and even abuse, such as attempts to damage the switch with metal tools. These switches must also resist dirt and moisture.

Best Lock Corporation Lock manufacturer

Best Lock Corporation was an American publicly traded door hardware and lock manufacturer. Founded in 1925 as Best Universal Lock Company by Frank Ellison Best, the privately held company relocated from Seattle, Washington, to Indianapolis, Indiana, in 1938, where operations expanded and evolved. Product offerings are now marketed under the Best Access brand, which is one of several trademarked corporate divisions in Stanley Black & Decker's Stanley Security group.

Trapped-key interlocking

Trapped-key interlocking utilizes locks and keys for sequential control of equipment and machinery to ensure safe operation. Trapped-key interlocks are widely used to ensure safe access to potentially live or dangerous plant or equipment in an industrial setting.

Key control refers to various methods for making sure that certain keys are only used by authorized people. This is especially important for master key systems with many users. A system of key control includes strategies for keeping track of which keys are carried by which people, as well as strategies to prevent people from giving away copies of the keys to unauthorized users. The former may be as simple as assigning someone the job of keeping an up-to-date list on paper. A more complex system may require signatures and/or a monetary deposit.

A Depot Protection System (DPS) is a system designed to protect staff and equipment by ensuring the safe and controlled movement of rail vehicles into and out of train maintenance depots, a process sometimes known as train movements or shunting. This allows train maintenance operations to be conducted without endangering the safety of staff, and damaging other maintenance equipment in the depot.

iMac Pro All-in-one desktop computer designed and built by Apple Inc.

The iMac Pro is a discontinued all-in-one personal computer and workstation designed, manufactured, and sold by Apple Inc. It was released on December 14, 2017. While it was sold, it was one of four desktop computers in the Macintosh lineup, sitting above the consumer range Mac Mini and iMac, and serving as an all-in-one alternative to the Mac Pro.

References

    "Small Format Interchangeable Cores: Advanced" ©2005 by William M. Lynk; Published by The National Publishing Company, Chicago, Illinois; pp. 212–214.