You've probably seen one or more of the things that we'll take a look at here in the next couple of discussion items. Turnstiles, for instance, are pretty common in many situations today. We see them a lot in big office buildings where we're trying to control flow to various areas of the building, perhaps elevator banks, things like that. We see them in rapid transit or mass transit systems where we're controlling the flow of people, in large stadiums and venues where we're going, and things like that. We use them effectively along with probably a guard of some kind to effectively account for individuals going through, but also to slow down the flow of people because they only can only go through one at a time. So, something that we will tend to see. We have types of locks. We'll talk about different electronic locks on doors, we have rim locks, mortise locks, locking cylinders, cipher locks, more locks and we can keep track of. A rim lock is just traditionally what you would think of as a deadbolt more often than not. A mortise lock has the handle on the locking mechanism all in one, is usually a system that's put directly into the door sits flush in the locking mechanism, the handle are all built into the same solution. A locking cylinder is a pin tumbler solution where we, fact we have a tube maybe about so big, or something like that. Inside there's a series of tumblers. Little metal strips that are sticking up and have little perforated edges, that when we put a key in, will raise or lower those tumblers in a certain pattern. The tumblers are going to be going up and down like this on almost like a spring mechanism, and when the key is inserted with the right number of ridges and valleys in the right sequence to align the tumblers in the pre-configured configuration or pre-configured solution that equals open, the key can be turned to when the key is turned, the tumblers all effectively move to the open position, and the lock is rotated. This is what a locking cylinder effectively does for us. Pretty standard key lock system we use in many doors today would be a locking cylinder. And then the cipher lock is going to be one of those locks that has the key pad, that you have to punch some sort of pre-configured set of digits, or some sort of combination into in a proper sequence and by doing that, the lock opens if you hit the sequence correctly. This would be a cipher lock in one form or another. We may also have high tech keys with hi-tech locks. Makes sense, we have hi-tech keys. Hi-tech keys include things like intelligent keys and a built in microprocessors in them, you slide the key into the lock or the lock reading mechanism, the microprocessor engages with the computer controlled lock to exchange information. If the information in the processor that's stored in the chip is accurate, then the key will allow the lock to be open. And if it doesn't, then it will turn down the request, in effect, lock out the system. Instant keys allow us to effectively do what's called one turn re-key. The idea here is that we can use a master key with certain locking systems, usually in office buildings, that will allow us to go in, and using the master key effectively if we know the way to turn the key or the right combination to insert the key with and to use whatever the turning mechanism is, half turn on the left, full turn on the right, whatever it may be with the master key, we can effectively re-key that lock. We can change the locking mechanism of the pin and tumbler system, and reach reconfigure it on the fly. By doing that we can go through and re-key an entire office building to maybe 20, 30 minutes if you're a locksmith and know what you're doing. Because instead of having to go and take every lock out of the door, re-program it on our own, we can reprogram it in place using the master key. So, instant keying allows us to re-key in certain situations. Somebody is broken in, we've had a compromise, some sort of an incident somebody is lost their keys, things like that, we will go through and re-key the building in order to safeguard it and secure it, lock out any prior keys that may or may not still be floating around out there, that we would want to make sure can no longer be used, and this is what we would do. Safes are going to allow us to be able to store things securely. A safe is usually a small maybe two, three foot, four foot kind of a big hunk iron with a space in the middle, got a big door on the front with some sort of a lock on it that we can close and secure with the combination, and then it's going to be fireproof typically burglar proof et cetera. So, it's going to be a little bit more geared for private use than something like a vault will be, which is something that's going to be massive, room size that we will see is typically going to be a bank, or somewhere like that to secure things that are much, much bigger than a couple of documents and a small box or something like that that we as an individual may have. But we see safes all the time. We interact with them, and we also see vaults. And vaults are just going to be a very large version of the safe, where we will store lots and lots and lots of stuff. But a safe is a very small version, the vaults very large version of the same concept. We implemented both depending on the nature of the protection that we are looking to achieve. Containers typically a reinforced filing cabinet, will fall into this category. See a picture of it on the screen there. You'll see we'll be able to store in a temporary proprietary or sensitive data inside one of these systems, we'll go in, we usually have a combination lock on the front or some sort of crypto lock on the front. You can see the dial pad there, right here, in the middle of the second drawer, and that's usually going to allow us to secure that system and don't have to know the combination to open it up. And that we can put files and things like that in there. If we don't know what the locking system is or don't understand how to open it, we probably are not going to be able to get into this kind of a secure container. What we think about these systems we have to think about the ways in which we control the keys. Key control is very important for us. We talked about the fact that when we encrypt data, for instance, we have to keep track of the encryption keys and if we don't do that, we may run into a problem. We have to think about the way in which we are going to be able to issue keys, the way we store keys, the way we ascribe, the users of the keys and match the keys to the users and make sure that they are registered together, the way that we will be able to transmit keys, the way that we will be able to manage keys and if they are used incorrectly revoke them. And so this is a very, very large and complicated process we have to engage in. And so key control is probably one of the biggest places we can either create risk in our system if we get it wrong, or one of the places where we can positively impact the overall security of the system because we're going to be able to focus on ensuring that all the risks associated with key management are dealt with, and are properly going to be managed. And so without a key control system, this can get very complicated very quickly.