Key Control Central

Airport enhances its access control systems, protects assets

Airports have many security requirements and challenges, and part of the challenge arises because of the mix of people on-site, including airport staff, airline staff, contractor and vendor staff and travelers. One component of managing security in such settings is to strengthen the role of access control so that all parties remain in their authorized areas, assets are protected and security staff can focus on operational matters.

For many airports, strengthening access control means implementing a key control and management system to ensure that all keys, including those to sensitive areas, are properly secured and accounted for. When installed throughout the airport complex, the automated key control systems enable controlled access to keys and provide valuable forensic capabilities such as automated tracking, alarm and reporting functions.

Key Control Increases Security

Automated key control and management systems offer an increased level of security for an airport by preventing unauthorized key access and reducing the incidence of lost or misplaced keys. Tamperproof cabinets are used to hold keys to sensitive or sterile airport areas, including ramps, operational spaces and other Security Identification Display Area (SIDA) spaces restricted from the general public. Authorized users with permission to enter these restricted areas unescorted can access keys which they have been pre-programmed to use by entering their PIN code and swiping a pre-issued badge. If the criteria entered matches the information stored in the system data base, the key cabinet will unlock and the necessary key can be removed or returned.

Following are more specific ways key control and management systems are designed to improve airport operational security.

Actionable information. Operational security and efficiency is further improved because all key access activity is automatically recorded including user, date and time of key access/return. Scheduled reports of which keys are in or out and who has/had them keeps airport security management informed. Administrators can request programmed reports to trace key movements by time, date and user code. If an incident occurs, during the follow-up investigation, management can query the system for specific details such as a listing of all transactions between certain times. Or, immediately following an incident, a report can be generated showing which keys are signed out and who last accessed them. Real-time audit reports can also track keys in use, overdue or lost keys, the location of a stored key (i.e. which key cabinet in the system) and any inconsistent key usage.

When time is of the essence, the up-to-date and reliable information provided by a key control and management system’s reporting can provide a strong evidence trail allowing airport staff to enforce established procedures regarding secure areas.

System integrity. Key control and management systems may incorporate additional security features to help maintain the integrity of the system and provide enhanced security. For example, when an authorized user accesses a key, a numeric code can appear on the display and that code must be entered at secure doors when using the key. As an added safety measure, alarms can be triggered for certain predetermined circumstances such as the use of force to gain access or remove a key, invalid user codes, a door left open for more than 10 seconds after use, power failure, a key missing or not returned on time, or a key returned by the wrong user.

Locking devices can be attached to the keys to prevent users from swapping out the real key for another. These can be color-coded for organizational purposes. For example, this can help airport management organize keys for sensitive or sterile areas. The colorcoding system also means that individual keys need not be labeled as to their purpose. If a key is lost, not only does the system flag this missing key, but it also eliminates any immediate identity issues.

Integrated/Networked Systems Improve Operational Efficiency, Convenience

Today’s sophisticated key management systems bear little resemblance to manual processes in the past. Now, these systems are designed with an open architecture platform to enable network connectivity to access control and other systems provided by a range of integration partners for multiple levels of security and control.

Operational efficiency. Optimizing the key management and access control technology within a facility through system integration pays impressive rewards in improved security and system efficiency. The technology can usually be integrated with the existing physical security system without costly upgrades or overhauls. For example, asset control systems featuring alarm and relay inputs/outputs can be integrated with existing video surveillance systems for additional security. Ethernet and USB capability help to ensure system compatibility and integration. Systems can also integrate with the airport’s existing identification cards.

Integration with access control allows system administrators to regulate the area of movement within the building for staff with keys. An authorized airport employee who has taken a specific, high-value key can be denied egress from the facility via an access-controlled door until the key is returned. The parameters can be applied to users, keys, groups of keys, time constraints, and reservations. Or, when high security keys are involved, specific management can be alerted via email if that particular key has not been returned on time.

Operational convenience. Compatibility with other security systems and network access offers an added richness and usability to airport security management. Integration with existing databases can also save time and money, by using a common front-end database to synchronize programming. Transactions such as adding or deleting users are easier and provide more efficient administrative control.

Adding or deleting contractors and other nonpermanent airport staff is just as easy, and the information is automatically distributed to all key cabinets within the system.

Mobile capability. Mobile applications are quickly becoming a preferred platform for airport security managers accessing key control data and even to perform transactions. The result is improved safety and integrity of the airport.

Advanced communication capabilities enable key control systems to be monitored and administered remotely from PDAs or smartphones as well as from the desktop. Apps for automated key control systems enable users to maintain control of keys no matter their location.

At any time, an authorized user can see real time transactions and information about keys that are in use and any keys that are overdue, as well as where and when alarms may have been triggered or overall system status. For investigative purposes, for example, managers can even review key usage to determine who may have last accessed a key for a vehicle that was found to be damaged.

Notifications and events are automatically sent to authorized airport personnel for real-time awareness and management, and allowing them complete control of the system. They can cancel an alarm and even, if necessary, remotely disable user privileges. These features, along with many others, provide the mobile user with a greater level of convenience and control when it comes to key control management in an airport environment.

Outside the Terminal

Improvements that strengthen an airport’s access control should not stop at the terminal. Remotely located buildings such as fire stations, administrative facilities, control towers and even hangars can pose a challenge for management in terms of keeping the buildings secured and safe from break-ins, vandalism and other unwanted access.

Since these locations are not connected to the main terminals, providing access can also create a challenge when it is necessary for maintenance crews and other workers to have access to certain or all areas within these buildings.

Common concerns. Will employees remember to return the keys? Will the facility be properly locked upon exit? Will accurate time logs be kept? Automated key control and management systems installed at the remote facilities can help eliminate these issues. More efficient than requiring employees to pick up and return keys to/from a central office, on-site networked key control systems with tracking capability offer an easy-to-use alternative. Illuminated key slots to locate keys, random return capability and user prompt screens with tailored messages all help make systems easier and more efficient for even the occasional users.

Key control systems can be programmed remotely to meet the requirements of airport and government regulations as well as setting time and date parameters for each user, which can also help to ensure the deterrence and detection of unwarranted access to controlled areas within the facility. Using PIN codes or biometric authentication, remotely located systems make it easier for authorized users to access keys when needed and for security management to be more assured about the building’s security.

Accountability beyond security. In a real-life example, United Airlines Jet Rebuild and Test Facility in San Francisco keeps track of valuable tools using a key control and management solution. At the facility where United brings its jets for rebuilding, each mechanic is provided with the specific tools and test equipment needed for the job at hand.

The items, some of which have values up to $20,000 each, are kept in locking toolboxes and the toolboxes are kept in assigned areas relating to the project. The shop uses the integrated key control system to store the keys for the toolboxes and to enable complete control of who has access to individual keys and when that access is authorized.

The system can be accessed through an IP network from anywhere in the building and this online control enables airline management to administer the system and know from their own desktop computer who has any key. An audit trail tracks data regarding who removed any key, when it was taken and when it was returned.

Activity reports provide complete information on which keys come and go, at what time and on what day. The information provides insight into usage trends that could help the facility better understand the operation and any opportunities for improvement, such as a need for additional equipment or improved alternative scheduling.

Planning for the Future

Changes to the Aviation and Transportation Security Act, airport expansion, policy changes and system upgrades are just some of the circumstances that can affect an existing or planned implementation of a key control and management system. Several options and design variations are available to customize a solution and help protect the airport’s investment as needs grow and change.

Lockers. It’s not just bottles of perfume or electronic cigarettes that are confiscated at TSA airport checkpoints. Guns, knives and other banned weapons are also found and must be held in a secure lock-up. Today’s key control and asset management systems provide the answer with integrated locker systems.

Vital documents, cash, employee badging/access control cards, data drives and even small electronic gear can also be controlled and secured using asset management lockers. The locker systems are identical in function to key control systems; users can access items only from the lockers/modules for which they have been pre-authorized and any activity such as removing or returning items or opening lockers/modules is automatically recorded, creating an audit trail.

Custom solutions. From single key cabinets to those used for securing hundreds of keys, solutions for airport key security, key control and key management can be tailored to a variety of needs. Smart, tamper-proof designs help keep space requirements small, and systems can be optionally accessed with pass codes, access cards or biometrics.

Hundreds of key control and management systems are already installed and in use at airports around the world, providing tangible benefits and supporting airport management in the achievement of safety and operational goals. As described above, in some of these installations, further enhancing integration with related systems could provide further improvements and benefits. In either case, for both new airport installs or enhancements, administrators can be confident that they are not only improving their local security posture but also thereby improving the safety of the entire global air transport system.

This article originally appeared in the September 2015 issue of Security Today.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity


New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3