1. Organisational key protection


Security card

The owner of a security card is entitled to place a repeat order for the keys with the master key system number or cylinder number listed on the security card:

  • using an order form on which the security card is printed
  • by post
  • EVVA Sicherungskarte

2. Legal key protection


Trademark protection (unlimited protection duration)

The trademark (e.g. letters, words, numbers or graphic images) is the identification for a product of a company. The protection duration is generally limited to 10 years, but can always be increased by an additional 10 years.
A protected marking of the manufacturer is stamped/attached on the key and/or key cylinder, but this must not necessarily correspond with the official trademark.
For cylinder manufacturers there is also the possibility to add a trademark to the key/core profile.   

Utility model protection (protection duration 10 years)

The utility model is also known as a "petty patent". It is used to protect a technical discovery. However, unlike a patent, the discovery does not necessarily have to represent a significant inventive step. The aim is to gain quick registration and instant protection from imitations (length of procedure is 4-8 months).  

Patent protection (protection duration 20 years)      

The patent gives its owner the exclusive right to manufacture the protected object and bring it into circulation. The duration of the patent starts on the day the application is filed/priority date.  

The patent protection fundamentally differs from that for a utility model, as testing is carried out for the significance of the inventive step of a patent over a period of 18 months. After the 18-month period, there is then a 4-month period for opposition proceedings. In non-EU countries, this testing can take up to 12 years (!). If there is no opposition, the patent is granted. 

3. Technical key protection


The key must have technical provisions which prevent

  • copying of the key      
  • tampering with the key       
  • reading of the key        

or make the above processes as difficult as possible.   

Copying of the key

In its technical specifications, the key must be designed so that copying the key using conventional tools and facilities is extremely difficult and is only possible at great economic expense. Blank keys of a manufacturer or a blank key producer must not be available on the market!  

Tampering with the key

The various locking features on the key must be made so that it is not possible to produce a superior key from one that is inferior in the locking hierarchy.        

Reading of the key

The external appearance of the key (indentations, drill cavities, ...) must not indicate the hierarchy of the key. In the case of pin systems in particular, the observation of a number of individual keys or group keys can make it possible to derive the coding of the master key.

4. Technological key protection


The key must have technological provisions which prevent

  • copying of the key
  • tampering with the key
  • reading of the key

using current state-of-the-art technology.

Only the manufacturer knows the production and manufacturing technique needed to produce a copy of a key.

Due to today's widespread availability of information on purely mechanical locking systems (pin systems, drill cavity systems, disc systems, etc.) there must be two different technologies on the key which must be connected simultaneously.