master key


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms, Wikipedia.

master key

A key that will operate a number of different locks, each of which is different.
References in periodicals archive ?
Third, the base station may desire to update the master key periodically for better security level.
In the preprocessing phase, find enough maxterms to recover the master key and precalculate this system of equations by using Gaussian elimination.
A master key facility is available for Tailwind customers who wish suitably qualified personnel to operate all the locks in a suite with one key.
Salonen's keychaindump uses pattern recognition techniques to scan the memory space of "securityd" — the process that handles keychain operations in Mac OS X — and locate the keychain master key.
SELF-DISCIPLINE IS THE MASTER KEY TO EFFECTIVENESS IN SALES AND ANY OTHER ENDEAVOR YOU MAY CHOOSE.
Study has been made and the result shows, among the AES candidates, Rijndael key schedule fall into a category in which knowledge of a round subkey yields bits of other round subkeys or the master key after some simple arithmetic operations or function inversions [8].
First-line supervisors, you arc the master key in this equation.
They include Michaela's husband John McAreavey, 27, as he was the first person to discover his wife's body, and the Legends bellboy, Rajiv Bhujun, 27, who accompanied John to the room and opened it for him with a master key. Bhujun has said he came into the room when he heard John's cries.
Godrey Herbarium, Florida State U.) includes a glossary of common botanical names, illustrations of major morphological features, master key to major groups of woody plants, and family and species keys to the most important field identification features, but no photographs or further reading.
The safe's master key is held by the fire department for easy access during an emergency.
Senior police officers in Mauritius told the Daily Mirror yesterday suspect Dassen Narainen admitted he took an electronic master key from an office at the luxury Legends hotel before handing it to the gang who strangled the onetime Rose of Tralee contestant.
AETs provide hackers with a master key to access any vulnerable system including enterprise resource planning (ERP) and customer relationship management (CRM) software solutions by bypassing network security systems.

Full browser ?