Download PDF version Contact company

DHF has announced the launch of its Best Practice Guide entitled: How to obtain Key Copy Protection: security and protection advice regarding copying of keys which offers information on minimising the risk of a security breach by preventing the unauthorised copying of keys. 

To copy a key, it is necessary to obtain a suitable key “blank” onto which the individual key code can be copied. Many generic key blanks are readily available to UK locksmiths and key cutters, making obtaining key copies convenient, but a risk to security. 

Preventing unauthorised copying of keys

An effective way of achieving this is where the lock manufacturer restricts the availability of suitable key blanksFor some installations, that risk is unacceptable, and there is a need to prevent the unauthorised copying of keys. An effective way of achieving this is where the lock manufacturer restricts the availability of suitable key blanks. This, of course, is only possible if the lock manufacturer can prevent anyone else supplying the blanks without his or her permission.

The objective of DHF’s Best Practice Guide is to clarify this complicated area of law to enable claims about security and protection against unauthorised copying to be appropriately evaluated.

Using patented lock and key mechanism

There is a definite misunderstanding in the marketplace about the most effective way to provide protection for a key,” explains DHF’s CEO, Bob Perry. “It is important to understand that this level of key control cannot be offered through key copyright, or design registration and, in fact, the most effective way manufacturers can restrict the availability of key blanks is by using a lock and key mechanism that is patented (cylinder and lock together).

DHF’s new Best Practice Guide offers concise and comprehensive direction on how to achieve key copy protection,” concludes Bob. “Ultimately, it is the manufacturer who must have control and the ability to restrict the distribution of key blanks to ensure that the possibility of a security breach is properly managed.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?