Preventing unauthorized copies typically falls into one of the following five levels.
None of these levels can protect against a user who loans a key to someone else and then falsely claims that the key was lost.3 Additional methods of key control include mechanical or electronic means. Electronic key control systems use serialized key assignments housed in a centralized database to allow for better tracking of each key made.4
"Key Control - SARGENT". Sargentlock.com. Retrieved 2012-08-13. http://www.sargentlock.com/support/key_control.html ↩
"The Associated Locksmiths of America Technical Standards Policy" (PDF). Aloa.org. Archived from the original (PDF) on 12 May 2008. Retrieved 2013-10-23. https://web.archive.org/web/20080512003545/http://www.aloa.org/pdf/techstd.pdf ↩
"Key Access Control Security, Electronic Key Management Systems, Cabinet Keys". Keytracer.com. Archived from the original on 2012-08-30. Retrieved 2012-08-13. https://web.archive.org/web/20120830013949/http://www.keytracer.com/ElectronicKeyControl ↩
Carter, Ryan (2016). "How Simple Key Control Benefits Retail Store Operations" (PDF). Instakey Security Systems. Retrieved 10 March 2023. https://cdn2.hubspot.net/hubfs/1705073/Insta_Key_July2018/PDF/How_Simple_Key_Control_Benefits_Retail_Store_Operations.pdf ↩