Senin, 09 Juli 2018

Sponsored Links

San Diego Lock and Key Services - LockTech
src: locktechsandiego.com

The key is the device used to operate the lock (such as lock or unlock). A typical key is a small piece of metal consisting of two parts: bit or blade , which glide into the key lock and distinguish between different keys, and the bow , which is left prominent so that the torque can be applied by the user. A key is typically intended to operate one special key or a small number of locks, so each key requires a unique key. Lock serves as a security token for access to a locked area; only people who have the correct key can unlock and gain access. Common metals include brass, plated brass, nickel silver, and steel.

The key provides a cheap, though not perfect, access control method for access to physical properties such as buildings, vehicles and cabinets or cabinets. Thus, the key is an important feature of modern life, and is common throughout the world. It is common for people to carry the set of keys they need for their daily activities around them, often associated with keys, which may be decorated by knick-knacks, usually known as keychains.


Video Key (lock)



Histori

Kuno

The earliest known keys and key devices are found in the ruins of Nineveh, the ancient Assyrian capital. Such keys are then developed into Egyptian wood pin keys, which consist of bolts, fixture doors, and locks. When the key is inserted, the pin inside the fixture is lifted out of the hole drilled in the bolt, allowing it to move. When the key is released, the pins fall into the bolt, preventing movement.

The keys that are preserved are also present from ancient times and remain the most recognizable key and design key in the Western world. The first metal keys appeared between 870 and 900, and were associated with British craftsmen. It is also said that the key was created by Theodore of Samos in the 6th century BC.

Rich Romans often keep their valuables in safe boxes inside their household, and wear keys as rings on their fingers. The practice has two benefits: saving the key is useful at all times, while indicating that the user is a rich person and important enough to have the money and the jewelry worthy of being secured.

Modern

With the start of the Industrial Revolution in the late 18th century and as the development of precision engineering and standardization of components, locks and keys were produced with increasing complexity and sophistication.

The lever hand lock, which uses a set of levers to prevent the bolt from moving in the lock, was refined by Robert Barron in 1778. The lock of the double locking lever requires the lever to be lifted to a certain height by cutting the gap in the lever, so lifting the lever too far is as bad as not lifting lever far enough. This key type is still in use today.

The key lever lever was greatly enhanced by Jeremiah Chubb in 1818. The robbery at Portsmouth Dockyard prompted the British Government to announce a competition to produce a key that could be opened only with its own key. Chubb develops a Chubb detector key, which incorporates integral security features that can thwart unauthorized access attempts and will show the key owner if it has been interrupted. Chubb was awarded Ã, Â £ 100 after a trained lock-picker failed to unlock after 3 months.

In 1820, Jeremiah joined his brother, Charles, in starting their own key company, Chubb. Chubb makes various improvements to the lock; - The design was upgraded in 1824 did not require a special control key to reset the lock, in 1847 the key uses six levers instead of four and he then introduced the discs that allow the key to pass but narrow the field of view, hide the lever from anyone trying to pick up the key. The Chubb brothers also received a patent for the first burglar safe and began production in 1835.

Barron and Chubb's designs are based on the use of movable levers, but Joseph Bramah, a prolific inventor, innovated an alternative method in 1784. The key uses a cylindrical key with the right notches along the surface; this moves a metal slide that bends the bend turns in the right direction, allowing the key to unlock. The key lies on the cutting edge of the precision machine tool's ability at the moment and is considered by the discoverer as unbreakable. In the same year Bramah started the Bramah Locks company at 124 Piccadilly, and displayed "The Key Challenge" in her shop window from 1790, challenging "... the artist who can create the instrument that will take or unlock this" for a reward of £ 200. The challenge stood for more than 67 years until, at the Great Exhibition of 1851, American locksmith Alfred Charles Hobbs was able to unlock and, following some arguments about the circumstances in which he opened it, was awarded a prize. Hobbs' effort takes about 51 hours, spread over 16 days.

The earliest patent for a double-acting tumbler pin key was given to American physician Abraham O. Stansbury in England in 1805, but the modern version, still in use today, was discovered by American Linus Yale, Sr. in 1848. This key design uses pins of varying length to prevent keys from being opened without the correct keys. In 1861, Linus Yale, Jr. inspired by the original 1840's pin-tumbler keys designed by his father, thus creating and patenting smaller flat keys with jagged edges and pins of varying lengths within the lock itself, the same design of a pin-tumbler key that is still in use until now. The modern Yale key is essentially the more advanced Egyptian key version.

Despite some improvements in the main design since, most of today's keys are still variants of the design created by Bramah, Chubb and Yale.

Maps Key (lock)



Type

General

Pin tumbler

Lock tumbler lock pins are commonly found in homes. When held upright, as if to open the door, a series of grooves on both sides of the key (the key key ) limit the key types that the key can shift. When the key shifts to a key, the groove on the key bar is parallel to the ward at the entrance that allows or refuses entry to the cylinder. Then a series of pointed teeth and notches on a knife called bittings allow pins or wafers to move up and down until they are parallel to the sliding line of the inner cylinder and outside, allowing the cylinder or cam to rotate freely within the lock, which unlocks.

Lever

The lever key consists of a set of 'levers' (usually between two and eight) that are raised to different heights by lock when reversed. After all the levers have been moved to the correct height, the locking bolts are free to slide in and secure the door. The teeth or bittings of the key have a flat rather than pointed tip. Lock lever locks tend to be larger and less comfortable to carry, although lever locks are considered more difficult to choose and are therefore recommended by most insurance companies.

Lock levers are more commonly found in Argentina, the UK, and parts of Scandinavia.

Tubular

Tubular locks (sometimes referred to as keys ace , radial or barrel ) are keys designed to unlock tubular tumbler pins. It has a hollow, cylindrical shaft that is usually much shorter and has a diameter larger than most conventional keys. Tubular locks are usually found on vending machines, washing machines, bicycle locks, and laptop security cables.

The modern version of this key type is more difficult to duplicate because it is less common and requires a machine different from a regular key. These keys usually come in four- and eight-pin models. Tubular locks were discovered in 1934 by the Chicago Lock company in Chicago, IL under the ACE brand.

Maison

The Maison key system is a key system that allows locks to open with a number of unique individual keys. Maison key systems are often found in public area apartment buildings, such as the main entrance or laundry room where individual occupants can use their own apartment keys to access this area. Unlike the primary key system, where each individual key has one individual operating key and one common master key, the Maison lock is designed to be operated by every key in the system.

Due to the lack of security in the Maison key system, some jurisdictions prohibit the use of Maison key systems in apartments and condominium complexes. In such locations, access is typically facilitated by a high-security, lock-controlled system or use of an electronic access control system such as a card reader.

Car

Car keys or car keys are keys used to open and/or start cars. Modern key designs are usually symmetrical, and some use grooves on both sides, not cut edges, to move keys. It has many uses for cars being sold. The car keys can open the door, and start the ignition, open the drawer and open the trunk (baggage) car. Some cars come with an additional key known as the valet key which initiates the ignition key and opens the driver's side door, but prevents the maid from gaining access to valuables located in the trunk or glove box. Some valet locks, especially for high-performance vehicles, go as far as to limit the power output of the engine to prevent joyriding. More recently, features like coded immobilizers have been implemented in newer vehicles. More sophisticated systems make ignition dependent on electronic devices, not mechanical buttons. A number of these systems, such as KeeLoq and Megamos Crypto have proven to be weak and susceptible to cryptanalytic attacks.

The ignition switch or ignition is coupled with the security locking of the steering column (in many modern vehicles) or the gear lever (as in the Saab Automobile vehicle). At the last, the switch is between the seats, preventing damage to the driver's knee in the event of a collision.

A keyless entry system, which uses a door-mounted keypad or remote control instead of a car key, has become a standard feature of most new cars. Some of them are hands-free.

Some high-tech automotive keys are billed as theft prevention tool. Mercedes-Benz uses a lock that, instead of having a scrap metal cut to start the car, uses encoded infrared light that communicates with the car's computer. If the codes fit, the car can start. These keys can be expensive to replace if lost and can cost up to US $ 400.

Switchblade keys are basically the same as other car keys, except in appearance. The switchblade lock is designed to fold inside the fob when not in use. The switchblade keys have become very popular recently due to their smart concise look. This type of key is also commonly referred to as Flip Keys . Since switchblade keys are only developed for new car models, they are usually equipped with programmed transponder chips.

History

The car had a previous door lock, but the first ignition key also operated a starter mechanism introduced by Chrysler in 1949. Popular Mechanics, in April 1949, wrote:

Among the main interest innovations for the driver is a combination of ignition and a starter switch that removes the starter button. The car starts by turning the ignition key slightly beyond the 'ignition' position. When released, the key automatically returns to 'ignition on'. In addition to the driver's comfort, this starter makes it impossible for the children to move the remaining car in the tooth by pressing the starter button.

In the 1950s, early versions of the jack-like "jacket key" were made by the Signa-Craft company from New York with various US car prototypes of the "Dream Cars" like Pontiac Strato-Streak and Cadillac El Camino featured on them.. It's now popular among collectors.

Signa-Craft and other manufacturers such as Curtis, Taylor Locks, and Mr. Key also produced keys for various brands and models of the 1950s-1970s known as " Crest Button ". This is an automotive key that features enamel rendering from the car manufacturer's logo on the 14k arc and gold plated. During the early 1960s, this particular key became so popular that oil companies such as Mobil, Texaco, and Union 76 began issuing their own versions as promotional items for their customers. Today, these early automotive keys are highly sought after by collectors.

Meanwhile, companies such as Hurd and Briggs and Stratton make OEM locks blank with car maker logos on them. This is known as " Empty Logo ". This empty key is the same as the original key issued by the automaker and allows the enthusiast to maintain his key stock appearance. Picky car show judges will often lower the vehicle because they do not have the correct OEM key with the original key written on them. Unfortunately, many of these original blank logos are no longer being produced and are only available from a decrease in NOS inventory from internet venues like eBay.

Internal cutting

The internal cut (also known as the "side" or "laser cut") key has a rectangular knife with a wavy groove cutting the center of the blade face, at a constant depth.

Usually the key has the same bumpy groove on the back of the blade, making it symmetrical so that it works in whatever way is inserted. These keys should be cut by the special locking machine made for them.

Transponder

Transponder keys can also be called "chip locks". The transponder key is an automotive ignition key with a built-in signal transmitter circuit.

When the key is rotated in an ignition cylinder, the car's computer transmits radio signals to the transponder circuit. Circuit has no battery; it is energized by the radio signal itself. Circuits usually have computer chips that are programmed to respond by sending coded signals back to the car's computer. If the circuit is not responding or if the code is incorrect, the machine will not start. Many cars are crippling if the wrong keys are used by intruders. The Chip lock successfully protects the car from theft in two ways: forcing the ignition cylinder will not start the car, and the key is difficult to duplicate. This is why the key chips are popular in modern cars and help reduce car theft.

Many people who have transponder keys, such as those that are part of the Ford Motor Company's SecuriLock system, are unaware of the fact because the circuit is hidden inside the key plastic head. On the other hand, General Motors produced what was known as the VATS (Vehicle Anti-Theft System) key during the 1990s, which is often mistakenly believed to be a transponder but actually uses a simple resistor, seen in the eye of the key. If the electrical resistance of the resistor is wrong, or the key is a normal key without a resistor, the electrical system circuit of the car will not allow the engine to start.

More

Two sides

The two-sided lock is very similar to a house or car key with the exception that it has two sets of teeth, a set of high-level standard teeth and a set of lower and less obvious teeth next to it. This makes the two-sided button profile and the corresponding key look very similar to the standard key while making the effort to select a key more difficult.

Paracentric

Paracentric keys are designed to unlock paracentric keys. This can be distinguished by the shape-shifting blades, which jut past the central vertical line of the key barrel. Instead of the ward on the outer face of the key only protruding into the key shape along the spine, the ward protrudes into the key shape along the entire width of the lock, including along the teeth.

Another way to describe the paracentric key is that the cylinder is not in a straight line, but may vary to the right or to the left, so the key must not only have the correct pin height for the cylinder, the pins are also extended to the left or right of the central lock.

Abloy

The Abloy key is cut from a metal half-cylinder. Cutting is made at different angles, so when the key is rotated in the key it rotates each disc with a different amount.

Almost all homes in Finland use Abloy keys, although they are also widely used in various localities around the world. This key is considered very safe and almost impossible to choose.

Dimple

The key dimple has a rectangular blade with various cone shapes that are formed into the blades in various depths. Usually the key has 2 rows of pins that match 2 rows of dimples. Usually the key has the same dimple pattern on the back of the blade, making it symmetrical so it works no matter where it is inserted.

Kaba and Dom are manufacturing dimpled locks. These keys are relatively easy to not only choose, but also create impressions.

Skeleton

The "skeleton" (also known as "passkey") is the primary key type in which the jagged edge has been inserted down so that it can unlock many keys. This term comes from the fact that the key has been reduced to important parts. In a broader sense, the term can be used synonymously with the master key to refer to keys, keycards, or other devices capable of opening various keys.

In US English usage, "skeleton" is also used to define a standard lever lock key.

Cruciform Button

The Cruciform key has three sets of teeth at 90 degrees with each other with a flattened fourth edge. Although these key types are easy to duplicate, additional dental sets prevent locking attempts.

Magnetic

A magnetic lock key is a locking mechanism in which a key uses magnets as part of a locking and unlock mechanism.

A magnetic lock will be used from one small magnet to the many oriented so that the North and South poles will be the same as the combination to push or pull the internal tumbler lock so that it releases the key. It is a completely passive system that does not require electricity or electronics to enable or disable mechanisms. Using multiple magnets on different polarities/orientations and different strengths can allow thousands of different combinations per key.

Digital

Key Card

The key card is a rectangular plastic card with the same dimension as a credit card or SIM that holds physical or digital signatures acceptable to the door mechanism before releasing the key.

There are several popular types of key cards used including mechanical holecards, bar codes, magnetic strips, embedded Wiegand wire cards, smart cards (embedded with electronic read/write microphones), and RFID proximity cards.

Key cards are often used in hotels as an alternative to mechanical keys. New smart key technology is gradually integrating and bringing keycard technology to smartphones.

Smart

Smart keys are electronic access and authorization systems that are generally available as an option or standard in some cars. However, with the rapid development of mobile and intelligent technologies, home and office locks are increasingly integrated into smartphones, where they act as virtual keys and permissions for users.

How to Buy a Carabiner that Won't Snag | WeighMyRack Blog
src: blog.weighmyrack.com


System

Individually locked system (KD)

With an individual key system, each cylinder can be opened with its unique key.

Type the same (KA)

This system allows a number of cylinders to be operated by the same key. It is perfect for residential and commercial applications such as front and rear doors.

General key entry/Maison keying (CES)

This system is widely used in apartments, offices and hotels. Each apartment (for example) has its own key that will not open the door to another apartment, but will open the public entrance and communal service area. This is often combined with a master-keyed system in which the key is kept by the landlord.

Master locked (MK)

The master key operates a set of several keys. Usually, there is nothing special about the key itself, but the key that will match. These master-locked keys are configured to operate with two, or more, different keys: one specific for each key (the change button ), which can not operate one of the others on the set, and master key, which operates all locks on the set. The key that has the primary key has a second set of mechanisms used to operate it identical to the others in the lock set. For example, the key lock tumbler lock key often has two sliding points at each pin position, one for the change button and one for the master key. A much safer (and more expensive) system has two cylinders in each key, one for the change button and another for the master key.

A common misconception is that a locked lock is safer than a single key, but that does not happen. The fact that some space pins have two sliding points allows for more choices while selecting and also allows more buttons to operate. For example, a standard 6 pin cylinder, designed to operate with only one key, can operate up to 2 ^ 6 = 64 keys if there are two sliding points in each space.

Larger organizations, with more complex systems, may have multiple key-level keys, where the top-level key works across all keys in the system. To visualize this, it can be regarded as a hierarchy chart, or tree.

Practical attacks exist to create a master key that works for the entire system provided only access to a single master-keyed key, related change keys, the corresponding empty key supply, and the ability to bypass new keys. This is described in a 2002 paper by Matt Blaze cryptographer, but for systems with multiple levels of master keys it may be necessary to gather information from keys in different "subsystems" to infer the master key.

Locksmiths can also specify deductions for replacement master keys, when given several examples of different keys from the given system.

Control button

The control lock is a special key that is used in a removable core locking system. Lock controls allow users, who have little skills, to remove from the core, with certain combinations, and replace them with cores that have different combinations. In the form of Small Interchangeable Cores locks (SFIC), similar to those developed by Frank Best of the Best Lock Corporation, the key operates a separate sliding line located above the operating sliding line. In Large Format Removable Cores (LFRC), the key may operate a separate sliding line or lock can work like a master key along the operating sliding line and also contact a separate locking pin that holds the core in the cylinder. SFIC is transferable from one residential brand to another, while LFRC does not.

Lock and key stock photo. Image of unlock, secure, souvenir - 34488908
src: thumbs.dreamstime.com


Duplication

Key cutting (after cutting, the term metalworking to "form by removing the material") is the key method of key duplication: a flat key is attached to the vise in the machine, with blanks attached to the parallel paint, and the original key is moved along the guide while the empty one is moved to the wheel, which cut it. After cutting, a new lock is fixed: rubbed with a metal brush to remove burrs, small pieces of metal left on the lock, which, if not removed, will become very dangerous and, furthermore, rotten keys.

Different key cutting machines are more or less automatic, using different milling or milling equipment, and follow the design of key duplicators beginning of the 20th century.

Key duplication is available in many retail hardware stores and as a dedicated locksmith service, even though the correct key is not available. Recently, an online service for key duplication is available.

Certain keys are designed to be hard copied, for key controls, such as Medeco; while others are just marked Do Not Duplicate to indicate that the key control is requested, but in the US, this denial has no legal weight.

Instead of using pattern grinders to remove metal, keys can also be duplicated with a puncher machine. The key to be duplicated is measured for the depth of each notch with the meter and then placed into the device with a numerical slider. The slider is adjusted to fit the corresponding measured depth and the lever is pressed, which cuts across the notches at once. As the lever is raised, the key automatically progresses to the next index position and the slider is adjusted appropriately to the next measured depth. This cycle continues until the key is complete.

Duplicate keys with this process are more labor and require better trained personnel. However, keys made in this way have net margins and notch depths not subject to induction changes encountered when very obsolete keys are duplicated using pattern grinders. Locks can also be created this way without being native as long as the depth of each notch and the type of empty key is known. This is very useful for institutions with a large number of keys that they do not want to keep archive copies of.

A machine that allows rapid duplication of flat metal keys, which contributed to the proliferation of its use during the 20th century, was probably first discovered in the United States in 1917 (pictured on the left):

The key to be duplicated is placed in a single vise and an empty key to be cut with a suitable clamp under the cutter disc. The carriage cart then to that position by using a shoulder-lateral feedback clutch of both patterns and the empty buttons only touch the guide disc and the respective cutters. The lateral feedback clip at the top of the machine is then thrown, and the vertical feed rod is released into action and power applied through a combination of hand crank power wheels to the right of the machine, until the cutter has passed through the entire length in the empty space. Duplicate key patterns are obtained in about one minute.

In recent years, multiple key-cutting machines have entered the market, allowing the cutting of both mortice and cylinder locks on one machine. These machines are mainly manufactured in the Far East and save the key cutter a large sum of money compared to using two separate special machines.

Do not duplicate the key

The key "do not duplicate" (or DND key, in short) is one that has been labeled "not duplicated", "duplicate prohibited" or similar by a locksmith or manufacturer as a passive obstacle to prevent retail key deduction service from duplicating keys without authorization or without contact the locksmith or the manufacturer who originally cut the key. More importantly, this is a key control system for key owners, such as maintenance people or security guards, to identify keys that should not be distributed or used freely without authorization. While it is intended to prevent unauthorized key duplicates, copying DND keys remains a common security issue.

US. restrictions

There are no direct legal sanctions in the US for someone who copied a stamped key not duplicated (unless it is a owned key), but there are patent restrictions on some major designs (see "unlimited keys"). The Associated Locksmiths of America, ALOA, calls the DND key "not effective security", and "cheats because it gives the wrong security." United States Code 18 USC Sec. 1704 deals with key United States Post Office, and 18 USC Sec. 1386 deals with United States Department of Defense keys.

Lock is limited

The restricted keyblank has a key flow in which the manufacturer has established a limited level of sales and distribution. Unlimited keys are often protected by patents, which prohibit other manufacturers from making unauthorized production of empty keys. In many cases, the customer must provide proof of ID before the locksmill will bypass the additional key using a limited blank. Some companies, such as Medeco High Security Locks, have a main road that is restricted to having locks that are truncated at the factory only. This is done to ensure the highest security. These days, many of the limited keys have special features specifically laid out, such as magnets, various metals, or even small computer chips to prevent duplication.

Another way to restrict a key is the profile trademark of the key. For example, the key profile can read the manufacturer's name. The advantage of a trademark is that legal protection for a trademark may take longer than legal protection for a patent. However, usually not all profile features are required to generate a working key. By deleting some unnecessary features, unlimited profiles can be unloaded, allowing unlimited production and distribution of unlimited keys.

Key and Lock stock photo. Image of still, safeguard, white - 5738192
src: thumbs.dreamstime.com


Heraldry

The keys appear in various symbols and symbols, the most famous being that the Holy See - derived from the phrase in Matthew 16:19 which promises St. Peter, in the Roman Catholic tradition, the first pope, the Key of Heaven. But this is not the only case. Many examples are given to Commons.

File:Standard-lock-key.jpg - Wikimedia Commons
src: upload.wikimedia.org


Palestinian symbol

Among Palestinians, the key is widely used as a symbol of the Nakba warning (the 1948 Palestinian war in which Israel was created and hundreds of thousands of Palestinians becoming refugees). This use stems from the fact that many Palestinians who became refugees in 1948 have locked their homes while away, expecting to return soon, and take keys with them. Such keys are preserved as a family heritage in many families of Palestinian refugees - though the house where the keys are often no longer exists. On Palestinian posters and signs carried in demonstrations, a key is used to indicate the demand for the Palestinian Right of Return.

Key Lock Box | MAKO Spearguns
src: cdn3.volusion.com


See also

  • Lock (cryptography)
  • Passphrase
  • Password
  • Personal identification number
  • Personal blocking code

Lock - Shared by Lakiesha | Szzljy
src: szzljy.com


References


How to Buy a Carabiner that Won't Snag | WeighMyRack Blog
src: blog.weighmyrack.com


External links

  • Crop the main video

Source of the article : Wikipedia

Comments
0 Comments