ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Order Restricted Key Products

Updated on May 24, 2014
Medeco restricted key authorization card, number partially masked.   No card, no key.
Medeco restricted key authorization card, number partially masked. No card, no key. | Source

What are Restricted Key Products?

Factory restricted key products may include keys, key blanks, lock cylinders and/or interchangeable cores. The process of ordering factory restricted key products is slightly different for every manufacturer, but there are certain common elements.

The driving principal behind all restricted key products is to limit the ability to get keys and locks to authorized individuals. Toward this goal, authorized individuals are either issued a credential (such as an identification card) or their signatures are kept on record at the factory. Restricted key systems that use an identification card are more common to residential customers but are also widely used in commercial applications.

Restricted key systems that use an identification card may require that the identification card be brought to an authorized dealer who may use the information on the card as permission to buy the restricted products on the customer’s behalf if the system is factory controlled; or the dealer may stock the restricted products and be able to sell them over the counter when the appropriate credential is presented.

Geographically Controlled Restricted Key Products

Manufacturers designate specific restricted key products for the exclusive use of a specific dealer in a certain geographical area. Often there will be a “buy-in” involved for the dealer – that is, the dealer must by a certain dollar amount worth of product in order to be eligible for exclusive rights to a given set of products within their territory. That means the dealer must, at least initially, have the products in stock.

Dealers often use these geographically restricted key products to guarantee customer loyalty, since the customer cannot get these products anywhere else except from that dealer. This ability to control the customer is a powerful incentive to the dealer to protect the restriction of the product. The customer’s security is enhanced because the dealer is economically motivated.

Life is unpredictable, however, and more than one restricted key system client has been left high and dry, unable to get parts or keys for their system because their dealer left the business for one reason or another. If the restricted key system is for an individual person there is not really much of a choice because factories do not sell to individuals except through a dealer; however if the key system belongs to a business or institution it may be controlled at the factory level. To order products for a factory controlled restricted key system, a customer can go to any dealer who is willing to handle the order.

Ordering Factory Controlled Restricted Key Products

Some manufacturers have specific order forms for restricted key products but others require an end user Letter Of Authorization (LOA). Factories require their LOA’s to contain specific information and they provide examples to help the end user assemble all the necessary information. Delays in order fulfillment occur when the end user leaves out important information because the letter must pass through a few hands before the factory even sees it.

Below is a simple flow chart of the chain of communication involved in a typical factory restricted key order:

The Restricted Key Product Ordering Process.
The Restricted Key Product Ordering Process. | Source
Schlage Everest "D Family" Restricted Key, facility code number partially masked.
Schlage Everest "D Family" Restricted Key, facility code number partially masked. | Source

As shown in the flow chart above, the factory typically does not communicate directly with the end user, but only with the authorized dealer (in this case the local locksmith, Joe). Often the end user will call the locksmith with incomplete information, for example,

“Can you help us get five copies of our key number EA56N4?”

This number, EA45N4, may mean something to the factory that created the key but it does not even tell Joe the Locksmith what factory to call. Joe asks questions and finds out the name of the manufacturer (in this case, “Big Lock Company;” we’ll call it “Big Lock” for short) and calls Big Lock’s Key Systems Department and asks how to order key number EA45N4. The Big Lock Key Systems representative replies that he needs an LOA on the end user’s letterhead requesting key number EA45N4; giving permission to Joe the Locksmith to order the key on their behalf; indicating to what address Big Lock should ship the key; and signed by the person of record whose signature is on file at Big Lock’s Key Systems Department.

In the illustration above right is shown an Everest D Family restricted key. The number circled in red is the facility code number. Notice that the keyway also appears on the key, stamped on the shoulder of the key blank (just under the bow, at the beginning of the blade). The keyway is D145.

How Restricted Key Product Orders Are Delayed

In the example above Big Lock has specified five essential parameters for the LOA. If the end user complies with only four out of the five, Big Lock will reject it. This is where delays often occur.

For example, Joe the Locksmith relays the parameters to the end user. In three days the end user writes the letter and faxes it to Joe the Locksmith on Friday. Joe scans it and emails it to Big Lock the same day, but because it’s Friday it sits idle at Big Lock until Monday. On Monday it enters the queue of key orders. With luck the Key Systems Department reviews it on Wednesday, however they find the letterhead given does not name or address that Big Lock has on file for this key system. The Key Systems Department notifies Big Lock Customer Service, but it is late in the day and Customer Service does not email Joe the Locksmith until Thursday. Joe does not see the email until Friday morning. He calls the end user, but the person at the end user took Friday off and does not get the message until Monday. The first week has come and gone and the second week is already underway.

Since this is not the only restricted key order being processed by Big Lock, the customer must wait their turn. Big Lock is not responsible for delays caused by incomplete information provided by the end user or dealer and will not rush an order because of it. In the end it might be six or seven weeks before what should have been a simple order for a key is finally shipped from the Big Lock factory.

How To Prevent Delays in the Restricted Key Product Order Process

Preventing your restricted key product order from unnecessary delays is actually easy.

  1. Research: find out what documentation is required by the manufacturer. Have your dealer verify what documentation is required with the manufacturer.
  2. Provide complete documentation. Don’t leave anything out. Do not submit the order until you have all the information requested by the manufacturer.
  3. Send the information to your dealer in the manner required by the manufacturer. For example, some manufacturers require a "live signature". That means a signature in ink - not a fax or a scanned copy. In that case the LOA must be sent via courier - Postal Service, Fedex, UPS, etc.; if it is sent by fax or email it will be rejected by the factory.
  4. Verify that your dealer received the information and ask for a ship date. If your dealer does not provide a ship date, call back daily until you get one. This will force your dealer to call the factory, thereby verifying that the factory in fact has your order.

Making the effort to follow these four simple steps exactly will prevent unnecessary delays in processing your restricted key product order.

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)