ratio of word probabilities predicted from brain for butterfly and key

close this window

butterfly

key

top 10 words in brain distribution (in article):
species breed male human female size kill range live common
top 10 words in brain distribution (in article):
blade head cut metal century shape design modern form type
top 10 words in brain distribution (not in article):
animal cat wolf hunt dog wild population bear material lion
top 10 words in brain distribution (not in article):
iron steel handle plant hair tool fruit nail size whip
times more probable under butterfly 30 20 10 6 4 2.5 1.25 1 1.25 2.5 4 6 10 20 30 times more probable under key
(words not in the model)
A butterfly'" is an insect of the order Lepidoptera. Like all Lepidoptera, butterflies are notable for their unusual life cycle with a larval caterpillar stage, an inactive pupal stage, and a spectacular metamorphosis into a familiar and colourful winged adult form. Most species are day-flying so they regularly attract attention. The diverse patterns formed by their brightly coloured wings and their erratic yet graceful flight have made butterfly watching a hobby. Butterflies comprise the "true butterflies" (superfamily Papilionoidea), the "skippers" (superfamily Hesperioidea) and the "moth-butterflies" (superfamily Hedyloidea). Butterflies exhibit polymorphism, mimicry and aposematism. Some migrate over long distances. Some butterflies have evolved symbiotic and parasitic relationships with social insects such as ants. Butterflies are important economically as agents of pollination. In addition, a few species are pests, because they can damage domestic crops and trees in their larval stage. Culturally, butterflies are a popular motif in the visual and literary arts. The four-stage lifecycle. Unlike many insects, butterflies do not experience a nymph period, but instead go through a pupal stage which lies between the larva and the adult stage (the "imago"). Butterflies are termed as holometabolous insects, and go through complete metamorphosis. It is a popular belief that butterflies have very short life spans. However, butterflies in their adult stage can live from a week to nearly a year depending on the species. Many species have long larval life stages while others can remain dormant in their pupal or egg stages and thereby survive winters. Butterflies may have one or more broods per year. The number of generations per year varies from temperate to tropical regions with tropical regions showing a trend towards multivoltinism. Egg. Butterfly eggs consist of a hard-ridged outer layer of shell, called the "chorion". This is lined with a thin coating of wax which prevents the egg from drying out before the larva has had time to fully develop. Each egg contains a number of tiny funnel-shaped openings at one end, called "micropyles"; the purpose of these holes is to allow sperm to enter and fertilize the egg. Butterfly and moth eggs vary greatly in size between species, but they are all either spherical or ovate. Butterfly eggs are fixed to a leaf with a special glue which hardens rapidly. As it hardens it contracts, deforming the shape of the egg. This glue is easily seen surrounding the base of every egg forming a meniscus. The nature of the glue is unknown and is a suitable subject for research. The same glue is produced by a pupa to secure the setae of the cremaster. This glue is so hard that the silk pad, to which the setae are glued, cannot be separated. Eggs are usually laid on plants. Each species of butterfly has its own hostplant range and while some species of butterfly are restricted to just one species of plant, others use a range of plant species, often including members of a common family. The egg stage lasts a few weeks in most butterflies but eggs laid close to winter, especially in temperate regions, go through a "diapause" stage, and the hatching may take place only in spring. Other butterflies may lay their eggs in the spring and have them hatch in the summer. These butterflies are usually northern species (Mourning Cloak, Tortoiseshells) Caterpillars. Butterfly larvae, or caterpillars, consume plant leaves and spend practically all of their time in search of food. Although most caterpillars are herbivorous, a few species such as "Spalgis epius" and "Liphyra brassolis" are entomophagous (insect eating). Some larvae, especially those of the Lycaenidae, form mutual associations with ants. They communicate with the ants using vibrations that are transmitted through the substrate as well as using chemical signals. The ants provide some degree of protection to these larvae and they in turn gather honeydew secretions. Caterpillars mature through a series of stages called instars. Near the end of each instar, the larva undergoes a process called apolysis, in which the cuticle, a mixture of chitin and specialized proteins, is released from the epidermis and the epidermis begins to form a new cuticle beneath. At the end of each instar, the larva moults the old cuticle, and the new cuticle rapidly hardens and pigments. Development of butterfly wing patterns begins by the last larval instar. Butterfly caterpillars have three pairs of true legs from the thoracic segments and up to 6 pairs of prolegs arising from the abdominal segments. These prolegs have rings of tiny hooks called crochets that help them grip the substrate. Some caterpillars have the ability to inflate parts of their head to appear snake-like. Many have false eye-spots to enhance this effect. Some caterpillars have special structures called osmeteria which are everted to produce smelly chemicals. These are used in defense. Host plants often have toxic substances in them and caterpillars are able to sequester these substances and retain them into the adult stage. This helps making them unpalatable to birds and other predators. Such unpalatibility is advertised using bright red, orange, black or white warning colours. The toxic chemicals in plants are often evolved specifically to prevent them from being eaten by insects. Insects in turn develop countermeasures or make use of these toxins for their own survival. This "arms race" has led to the coevolution of insects and their host plants. Wing development. Wings or wing pads are not visible on the outside of the larva, but when larvae are dissected, tiny developing "wing disks" can be found on the second and third thoracic segments, in place of the spiracles that are apparent on abdominal segments. Wing disks develop in association with a trachea that runs along the base of the wing, and are surrounded by a thin "peripodial membrane", which is linked to the outer epidermis of the larva by a tiny duct. Wing disks are very small until the last larval instar, when they increase dramatically in size, are invaded by branching tracheae from the wing base that precede the formation of the wing veins, and begin to develop patterns associated with several landmarks of the wing. Near pupation, the wings are forced outside the epidermis under pressure from the hemolymph, and although they are initially quite flexible and fragile, by the time the pupa breaks free of the larval cuticle they have adhered tightly to the outer cuticle of the pupa (in obtect pupae). Within hours, the wings form a cuticle so hard and well-joined to the body that pupae can be picked up and handled without damage to the wings. Pupa. When the larva is fully grown, hormones such as prothoracicotropic hormone (PTTH) are produced. At this point the larva stops feeding and begins "wandering" in the quest of a suitable pupation site, often the underside of a leaf. The larva transforms into a pupa (or chrysalis) by anchoring itself to a substrate and moulting for the last time. The chrysalis is usually incapable of movement, although some species can rapidly move the abdominal segments or produce sounds to scare potential predators. The pupal transformation into a butterfly through metamorphosis has held great appeal to mankind. To transform from the miniature wings visible on the outside of the pupa into large structures usable for flight, the pupal wings undergo rapid mitosis and absorb a great deal of nutrients. If one wing is surgically removed early on, the other three will grow to a larger size. In the pupa, the wing forms a structure that becomes compressed from top to bottom and pleated from proximal to distal ends as it grows, so that it can rapidly be unfolded to its full adult size. Several boundaries seen in the adult color pattern are marked by changes in the expression of particular transcription factors in the early pupa. Adult or imago. The adult, sexually mature, stage of the insect is known as the imago. As Lepidoptera, butterflies have four wings that are covered with tiny scales (see photo). The fore and hindwings are not hooked together, permitting a more graceful flight. An adult butterfly has six legs, but in the nymphalids, the first pair is reduced. After it emerges from its pupal stage, a butterfly cannot fly until the wings are unfolded. A newly-emerged butterfly needs to spend some time inflating its wings with blood and letting them dry, during which time it is extremely vulnerable to predators. Some butterflies' wings may take up to three hours to dry while others take about one hour. Most butterflies and moths will excrete excess dye after hatching. This fluid may be white, red, orange, or in rare cases, blue. External morphology. Butterflies have two antennae, two compound eyes, and a proboscis. Adult butterflies have four wings: a forewing and hindwing on both the left and the right side of the body. The body is divided into three segments: the head, thorax, and the abdomen. They have two antennae, two compound eyes, and a proboscis. Scales. Butterflies are characterized by their scale-covered wings. The coloration of butterfly wings is created by minute scales. These scales are pigmented with melanins that give them blacks and browns, but blues, greens, reds and iridescence are usually created not by pigments but the microstructure of the scales. This structural coloration is the result of coherent scattering of light by the photonic crystal nature of the scales. The scales cling somewhat loosely to the wing and come off easily without harming the butterfly. Polymorphism. Many adult butterflies exhibit polymorphism, showing differences in appearance. These variations include geographic variants and seasonal forms. In addition many species have females in multiple forms, often with mimetic forms. Sexual dimorphism in coloration and appearance is widespread in butterflies. In addition many species show sexual dimorphism in the patterns of ultraviolet reflectivity, while otherwise appearing identical to the unaided human eye. Most of the butterflies have a sex-determination system that is represented as ZW with females being the heterogametic sex (ZW) and males homogametic (ZZ). Genetic abnormalities such as gynandromorphy also occur from time to time. In addition many butterflies are infected by "Wolbachia" and infection by the bacteria can lead to the conversion of males into females or the selective killing of males in the egg stage. Mimicry. Batesian and Mullerian mimicry in butterflies is common. Batesian mimics imitate other species to enjoy the protection of an attribute they do not share, aposematism in this case. The Common Mormon of India has female morphs which imitate the unpalatable red-bodied swallowtails, the Common Rose and the Crimson Rose. Mullerian mimicry occurs when aposematic species evolve to resemble each other, presumably to reduce predator sampling rates, the Heliconius butterflies from the Americas being a good example. Wing markings called eyespots are present in some species; these may have an automimicry role for some species. In others, the function may be intraspecies communication, such as mate attraction. In several cases, however, the function of butterfly eyespots is not clear, and may be an evolutionary anomaly related to the relative elasticity of the genes that encode the spots. Seasonal polyphenism. div name="wet-dry forms" Many of the tropical butterflies have distinctive seasonal forms. This phenomenon is termed "seasonal polyphenism" and the seasonal forms of the butterflies are called the dry-season and wet-season forms. How the season affects the genetic expression of patterns is still a subject of research. Experimental modification by ecdysone hormone treatment has demonstrated that it is possible to control the continuum of expression of variation between the wet and dry-season forms. The dry-season forms are usually more cryptic and it has been suggested that the protection offered may be an adaptation. Some also show greater dark colours in the wet-season form which may have thermoregulatory advantages by increasing ability to absorb solar radiation. Habits. Butterflies feed primarily on nectar from flowers. Some also derive nourishment from pollen, tree sap, rotting fruit, dung, and dissolved minerals in wet sand or dirt. Butterflies are important as pollinators for some species of plants although in general they do not carry as much pollen load as the Hymenoptera. They are however capable of moving pollen over greater distances. Within the Lepidoptera, the Hawkmoths and the Noctuidae are dominant as pollinators. As adults, butterflies consume only liquids and these are sucked by means of their proboscis. They feed on nectar from flowers and also sip water from damp patches. This they do for water, for energy from sugars in nectar and for sodium and other minerals which are vital for their reproduction. Several species of butterflies need more sodium than provided by nectar. They are attracted to sodium in salt and they sometimes land on people, attracted by human sweat. Besides damp patches, some butterflies also visit dung, rotting fruit or carcasses to obtain minerals and nutrients. In many species, this Mud-puddling behaviour is restricted to the males and studies have suggested that the nutrients collected are provided as a nuptial gift along with the spermatophore during mating. Butterflies sense the air for scents, wind and nectar using their antennae. The antennae come in various shapes and colours. The hesperids have a pointed angle or hook to the antennae, while most other families show knobbed antennae. The antennae are richly covered with sensillae. A butterfly's sense of taste is coordinated by chemoreceptors on the tarsi, which work only on contact, and are used to determine whether an egg-laying insect's offspring will be able to feed on a leaf before eggs are laid on it. Many butterflies use chemical signals, pheromones, and specialized scent scales (androconia) and other structures (coremata or 'Hair pencils' in the Danaidae) are developed in some species. Vision is well developed in butterflies and most species are sensitive to the ultraviolet spectrum. Many species show sexual dimorphism in the patterns of UV reflective patches. Color vision may be widespread but has been demonstrated in only a few species. Some butterflies have organs of hearing and some species are also known to make stridulatory and clicking sounds. Many butterflies, such as the Monarch butterfly, are migratory and capable of long distance flights. They migrate during the day and use the sun to orient themselves. They also perceive polarized light and use it for orientation when the sun is hidden. Many species of butterfly maintain territories and actively chase other species or individuals that may stray into them. Some species will bask or perch on chosen perches. The flight styles of butterflies are often characteristic and some species have courtship flight displays. Basking is an activity which is more common in the cooler hours of the morning. Many species will orient themselves to gather heat from the sun. Some species have evolved dark wingbases to help in gathering more heat and this is especially evident in alpine forms. Flight. Like many other members of the insect world, the lift generated by butterflies is more than what can be accounted for by steady-state, non-transitory aerodynamics. Studies using "Vanessa atalanta" in a windtunnel show that they use a wide variety of aerodynamic mechanisms to generate force. These include wake capture, vortices at the wing edge, rotational mechanisms and Weis-Fogh 'clap-and-fling' mechanisms. The butterflies were also able to change from one mode to another rapidly. (See also Insect flight) Migration. Many butterflies migrate over long distances. Particularly famous migrations being those of the Monarch butterfly from Mexico to North America, a distance of about 4,000 to 4,800 kilometres (2500-3000 miles). Other well known migratory species include the Painted Lady and several of the Danaine butterflies. Spectacular and large scale migrations associated with the Monsoons are seen in peninsular India. Migrations have been studied in more recent times using wing tags and also using stable hydrogen isotopes. Butterflies have been shown to navigate using time compensated sun compasses. They can see polarized light and therefore orient even in cloudy conditions. The polarized light in the region close to the ultraviolet spectrum is suggested to be particularly important. It is suggested that most migratory butterflies are those that belong to semi-arid areas where breeding seasons are short. The life-histories of their host plants also influence the strategies of the butterflies. Defense. Butterflies are threatened in their early stages by parasitoids and in all stages by predators, diseases and environmental factors. They protect themselves by a variety of means. Chemical defenses are widespread and are mostly based on chemicals of plant origin. In many cases the plants themselves evolved these toxic substances as protection against herbivores. Butterflies have evolved mechanisms to sequester these plant toxins and use them instead in their own defense. These defense mechanisms are effective only if they are also well advertised and this has led to the evolution of bright colours in unpalatable butterflies. This signal may be mimicked by other butterflies. These mimetic forms are usually restricted to the females. Cryptic coloration is found in many butterflies. Some like the oakleaf butterfly are remarkable imitations of leaves. As caterpillars, many defend themselves by freezing and appearing like sticks or branches. Some papilionid caterpillars resemble bird dropping in their early instars. Some caterpillars have hairs and bristly structures that provide protection while others are gregarious and form dense aggregations. Some species also form associations with ants and gain their protection (See Myrmecophile). Behavioural defenses include perching and wing positions to avoid being conspicuous. Some female Nymphalid butterflies are known to guard their eggs from parasitoid wasps. A key'" is a device which is used to open a lock. A typical key consist of two parts: the "blade", which slides into the keyway of the lock and distinguishes between different keys, and the "bow", which is left protruding so that torque can be applied by the user. The blade is usually designed to open one specific lock, although master keys are designed to open sets of similar locks. Keys provide an inexpensive, though imperfect, method of authentication for access to properties like buildings and vehicles. As such, keys are an essential feature of modern living in the developed world, aing adorned by key fobs and known as a keychain. House keys. A house key'" is the most common sort of key. There are two main forms. The older form is for lever locks, where a pack of flat levers (typically between two and five) are raised to different heights by the key whereupon the slots or "'gates'" of the levers line up and permit a bolt to move back and forth, opening or closing the lock. The teeth or "'bittings'" of the key have flat tops rather than being pointed. Lever lock keys tend to be bigger and less convenient for carrying, although lever locks tend to be more secure. These are still common in, for example, many European countries. The more recent form is that for a pin tumbler cylinder lock. When held upright as if to open a door, a series of grooves on either side of the key (the key's "'profile'") limits the type of lock cylinder the key can slide into. As the key slides into the lock, a series of pointed teeth and notches allow pins to move up and down until those pins are in line with the shear line of the cylinder, allowing that cylinder to rotate freely inside the lock and the lock to open. These predominate in, for example, the United States of America. Car key. A "'car key'" or an "'automobile key'" is a key used to open and or start an automobile, often identified with the logo of the car company at the head. Modern key designs are usually symmetrical, and some use grooves on both sides, rather than a cut edge, to actuate the lock. It has multiple uses for the automobile with which it was sold. A car key can open the doors, as well as start the ignition, open the glove compartment and also open the trunk (boot) of the car. Some cars come with an additional key known as a "'valet key'" that starts the ignition and opens the drivers side door but prevents the valet from gaining access to valuables that are located in the trunk or the glove box. Some valet keys, particularly those to high-performance vehicles, go so far as to restrict the engine's power output to prevent joyriding. Recently, features such as coded immobilizers have been implemented in newer vehicles. More sophisticated systems make ignition dependent on electronic devices, rather than the mechanical keyswitch. Ignition switches locks are combined with security locking of the steering column (in many modern vehicles) or the gear lever (Saab Automobile). In the latter, the switch is between the seats, preventing damage to the driver's knee in the event of a collision. Keyless entry systems, which utilize either a door-mounted keypad or a remote control in place of a car key, are becoming a standard feature on many new cars. Some of them are handsfree. Some keys are high-tech in order to prevent the theft of a car. Mercedes-Benz uses a key that, rather than have a cut metal piece to start the car, uses an encoded infrared beam that communicates with the car's computer. If the codes match, the car can be started. These keys can be expensive to replace, if lost, and can cost up to US$400. Some car manufacturers like Land Rover and Volkswagen use a 'switchblade' key where the key is spring-loaded out of the fob when a button is pressed. This eliminates the need for a separate key fob. This type of key has also been known to be confiscated by airport security officials. Master key. A "'master key'" is intended to open a set of several locks. Usually, there is nothing special about the key itself, but rather the locks into which it will fit. These locks also have keys which are specific to each one (the "'change key'") and cannot open any of the others in the set. Locks which have master keys have a second set of the mechanism used to open them which is identical to all of the others in the set of locks. For example, master keyed pin tumbler locks will have two shear points at each pin position, one for the change key and one for the master key. A far more secure (and more expensive) system has two cylinders in each lock, one for the change key and one for the master key. Larger organizations, with more complex "grandmaster key" systems, may have several masterkey systems where the top level grandmaster key works in all of the locks in the system. A practical attack exists to create a working master key for an entire system given only access to a single master-keyed lock, its associated change key, a supply of appropriate key blanks, and the ability to cut new keys. This is described in Locksmiths may also determine cuts for a replacement master key, when given several different key examples from a given system. Control key. A "'control key'" is a special key used in removable core locking systems. The control key enables a user with very little skill to remove from the cylinder, quickly and easily, a core with a specific combination and replace it with a core with a different combination. In Small Format Interchangeable Cores (SFIC), similar to those developed by Frank Best of the Best Lock Corporation, the key operates a separate shear line, located above the operating key shear line. In Large Format Removable Cores, the key may operate a separate shear line or the key may work like a master key along the operating shear line and also contact a separate locking pin that holds the core in the cylinder. SFIC's are interchangeable from one brand to another, while LFRC's are not. Double-sided key. A "'double-sided key'" is very similar to a house or car key with the exception that it has two sets of teeth, an upper level standard set of teeth and a lower, less defined set of teeth beside it. This makes the double-sided key's profile and its corresponding lock look very similar to a standard key while making the attempt to pick the lock more difficult. As the name implies, this type of key has four sides, making it not only harder to duplicate and the lock harder to pick, but it is also physically more durable. Paracentric key. A "'paracentric key'" is designed to open a paracentric lock. It is distinguishable by the contorted shape of its blade, which protrudes past the centre vertical line of the key barrel. Instead of the wards on the outer face of the lock simply protruding into the shape of the key along the spine, the wards protrude into the shape of the key along the entire width of the key, including along the length of the teeth. Patented by the Yale lock company in 1898, paracentric cylinders are not exceptionally difficult to pick, but require some skill and know-how on the part of the person attempting to pick the lock. Skeleton key=== A "'skeleton key'" (or "'passkey'") is a very simple design of key which usually has a cylindrical shaft (sometimes called a "shank") and a single, minimal flat, rectangular tooth or "bit". Skeleton keys are also usually distinguished by their "bow", or the part one would grasp when inserting the key, which can be either very plain or extremely ornate. A skeleton key is designed to circumvent the wards in warded locks. Warded locks and their keys provide minimal security and only a slight deterrent as any key with a shaft and tooth that has the same or smaller dimensions will open the lock. However, warded keys were designed to only fit a matching lock and the skeleton key would often fit many. Many other objects which can fit into the lock may also be able to open it. Due to its limited usefulness, this type of lock fell out of use after more complicated types became easier to manufacture. In modern usage, the term "skeleton key" is often misapplied to ordinary bit keys and barrel keys, rather than the correct definition: a key, usually with minimal features, which can open all or most of a type of badly designed lock. Bit keys and barrel keys can be newly-minted (and sold by restoration hardware companies) or antiques. They were most popular in the late 1800s, although they continued to be used well into the 20th century and can still be found today in use, albeit in vintage homes and antique furniture. A bit key is distinguished from a barrel key in that a bit key usually has a solid shank, whereas a barrel shafted key can be made either by drilling out the shank from the bit end or by folding metal into a barrel shape when forging the key. Tubular key. A tubular key'" (sometimes referred to as a "barrel key" when describing a vintage or antique model) is one that is designed to open a tubular pin tumbler lock. It has a hollow, cylindrical shaft which is usually much shorter and has a larger diameter than most conventional keys. Antique or vintage-style barrel keys often closely resemble the more traditional "skeleton key" but are a more recent innovation in keymaking. In modern keys of this type, a number of grooves of varying length are built into the outer surface at the end of the shaft. These grooves are parallel to the shaft and allow the pins in the lock to slide to the end of the groove. A small tab on the outer surface of the shaft prevents the pins in the lock from pushing the key out and works with the hollow center to guide the key as it is turned. The modern version of this type of key is harder to duplicate as it is less common and requires a different machine from regular keys. These keys are most often seen in home alarm systems and bicycle locks, in the United States. Zeiss key. A Zeiss key'" (also known as a "'Cruciform key'") is a cross between a house key and a tubular key. It has three sets of teeth at 90 degrees to each other with a flattened fourth side. Though this type of key is easy to duplicate, the extra sets of teeth deter lockpicking attempts. Do Not Duplicate key. A "'Do Not Duplicate key'" (or "'DND key'", for short) is one which has been stamped "do not duplicate" and or "duplication prohibited" or similar by a locksmith or manufacturer as a passive deterrent to prevent a retail key cutting service from duplicating a key without authorization or without contacting the locksmith or manufacturer who originally cut the key. More importantly, this is an access control system for the owner of the key, such as a maintenance person or security guard, to identify keys that should not be freely distributed or used without authorization. Though it is intended to prevent unauthorized key duplication, copying restricted keys remains a common security problem. There is no direct legal implication in the US for someone who copies a key that is stamped "do not duplicate" (unless it is a government owned key), but there are patent restrictions on some key designs (see "restricted keys"). The Associated Locksmiths of America calls DND keys "not effective security", and "deceptive because it provides a false sense of security." United States Code deals with United States Post Office keys, and deals with United States Department of Defense keys. Restricted key. A restricted keyblank'" is a keyway and blank for which a manufacturer has set up a restricted level of sales and distribution. Restricted keys are often protected by patent, which prohibits other manufacturers from making unauthorized productions of the key blank. In many jurisdictions, customers must provide proof of ID before a locksmith will duplicate a key using a restricted blank. These days, many restricted keys have special in-laid features, such as magnets, different types of metal, or even small computer chips to prevent duplication. Keycard. A "'keycard'", while not actually considered a key, is a plastic card which stores a digital signature that is used with electronic access control locks. It is normally a flat, rectangular piece of plastic and may also serve as an ID card. There are several popular type of keycards in use and include the mechanical holecard, bar code, magnetic stripe, smart card (embedded with a read write electronic microchip), and RFID proximity cards. The keycard is used by presenting it to a card reader; swiping or inserting of mag stripe cards, or in the case of RFID cards, merely being brought into close proximity to a sensor. Bar code technology is not a secure form of a key, as the bar code can be copied in a photocopier and often read by the optical reader. Magnetic stripe keycards are becoming increasingly easy to copy, but have the security advantage that one may change the stored key in a magnetic swipe card in case the current key may be compromised. This immediate change of the "key" information can be applied to other media, but this media probably offers the least expensive option, and the most convenient to users and managers of systems that use this media. Example: If you own a car with this system, you can change your keys anytime you want. You can buy new media anywhere a gift card is sold. At least at this point in time, you could buy a gift card for a penny, then use that as the media for the keys to your car. If the system uses digital environmental data samples to create the "key" string, every car can have a set of keys that no one else has. If a card is stolen, or copied without authorization, the card can be remade, and the car security system can be synchronized with the new card, and no longer activationally responsive to the copy of the old card. This approach can empower the system controller (owner individual or centralized administration of a business). Computerized authentication systems, such as key cards, raise privacy concerns, since they enable computer surveillance of each entry. Currently RFID cards and key fobs are becoming more and more popular due to its ease of use. Many modern households have installed digital locks that make use of key cards, in combination with biometric fingerprint and keypad PIN options. The first keycard was the mechanical holecard type patented by Tor Sørnes, a concept he later developed into the magnetic stripe card key. History of locks and keys. Wooden locks and keys were in use as early as 4,000 years ago in Egypt. It is also said that key was invented by Theodore of Samos in the 6th century BC. In the United States, keys have been seen as a symbol of power since colonial times. When William Penn arrived in Delaware 1682, a very elaborate ceremony was carried out where he was given the key to the defense works. Flat metal keys proliferated in the early 20th century, following the introduction of mechanical key duplicators, which allow easy duplication of such keys. Key duplication. "'Key cutting (after cutting, the metalworking term for "shaping by removing material") is the primary method of key duplication: a flat key is fitted into a vise grip in a machine, with a blank attached to a parallel vise grip, and the original key is moved along a guide, while the blank is moved against a wheel, which cuts it. After cutting, the new key is deburred: scrubbed with a metal brush to remove burrs, small pieces of metal remaining on the key, which, were they not removed, would be dangerously sharp and, further, foul locks. Different key cutting machines are more or less automated, using different milling or grinding equipment, and follow the design of early 20th century key duplicators. Key duplication is available in many retail hardware stores and of course as a service of the specialized locksmith, though the correct key blank may not be available. Certain keys are designed to be difficult to copy, for access control, such as Medeco, while others are simply stamped Do Not Duplicate to advise that access control is requested, but in the US, this disclaimer has no legal weight. History of key duplication. A machine permitting rapid duplication of flat metal keys, which contributed to the proliferation of their use during the 20th century, may have been first invented in the United States in 1917 (image to the left): Keys in Heraldry. Keys appear in various symbols and coats of arms, the most well-known being that of the Vatican- derived from the story of Saint Peter, the first Pope, being given the Keys of Heaven.