Type of Key Control used in The Hotel Industry

Different Types of Key Control in the Hotel Industry:

1) Emergency Key 2) Master Key 3) Guest Room Key 4) Electronic Locking System are the main types of keys used in the hotels. One of the most important factors of the hotel guest room is the lock on the door. In past key control systems were limited to basic metal key these were easily lost and were costly to replace.

The Key control systems eventually evolved into systems that were easier to replace called key cards. These plastic keys were filled with small holes at the one end that the door could read when inserted. The drawback to the key card was that they had the room name printed on them this posed a major security risk and thus had to be replaced as well.

Modern hotels today use computer-controlled key control system. A credit card type card is assigned a special code when activated by the front desk. This key is preprogrammed with guest arrival and departure information and will work for the duration of guest stay and for a particular period.



1. Emergency Key:

A key that can open all doors double-locked in hotels, among others:
Guest room door (Guest Room)
Door Office (Office)
Door Warehouse (Store)
This key is usually held by the Management Hotel or GM can use the emergency moment/emergency

2. Guest Room Key:

Key available for use by the guests to open the rooms such as CARD or a special card and some form of regular keys, so-called Key Tag if the child is the key hanger.

3. Master Key:

A key that can be used to open the door on one floor/floor or one section area all single locked. So if the hotel consists of 8 floors/section in the hotel so there will be 8 pieces Master Key.

4. Electronic Locking System:

An electronic lock system (more precisely an electric lock) is a locking device which operates by means of electric current. More often electric locks are connected to a PMS - PROPERTY MANAGEMENT SYSTEM.

The advantages of an electric lock connected to a property management system include key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where the activity is recorded.