- n.the deliberate process of combinating a cylinder (usually in a master key system) to two or more different keys which would not normally be expected to operate it together. See also "controlled cross keying" and "uncontrolled cross keying."
Locksmith dictionary . 2014.
Look at other dictionaries:
controlled cross keying — n. a condition in which two or more different keys of the same level of keying and under the same higher level key(s) operate one cylinder by design; e.g., XAA1 operated by AA2 (but not XAA1 operated by AB1) Note: This condition could… … Locksmith dictionary
uncontrolled cross keying — n. a condition in which two or more different keys under different higher level keys operate one cylinder by design; e.g., XAA1 operated by AB, AB1. Note: This condition severely limits the security of the cylinder and the maximum expansion… … Locksmith dictionary
Phase-shift keying — Passband modulation v · d · e Analog modulation AM · … Wikipedia
mykey chart — n. a matrix depicting user requested cross keying by listing keys along one axis and openings along the other. So named because it is frequently accompanied by the statement My key goes here and here and here … Locksmith dictionary
selective key system — n. a key system in which every key has the capability of being a master key. It is normally used for applications requiring a limited number of keys and extensive cross keying … Locksmith dictionary
Radio repeater — A radio repeater is a combination of a radio receiver and a radio transmitter that receives a weak or low level signal and retransmits it at a higher level or higher power, so that the signal can cover longer distances without degradation. This… … Wikipedia
Quadrature amplitude modulation — (QAM) (Pronounced IPA|kwa:m) is a modulation scheme which conveys data by changing ( modulating ) the amplitude of two carrier waves. These two waves, usually sinusoids, are out of phase with each other by 90° and are thus called quadrature… … Wikipedia
Counter-intelligence — This article is a subset article of intelligence cycle security. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process… … Wikipedia
Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… … Wikipedia
List of electronics topics — Alphabetization has been neglected in some parts of this article (the b section in particular). You can help by editing it. This is a list of communications, computers, electronic circuits, fiberoptics, microelectronics, medical electronics,… … Wikipedia