Time Constraints Traditional key duplication