Ads
related to: high security tubular cam locks
Search results
Results From The WOW.Com Content Network
A tubular lock and key. A tubular pin tumbler lock, also known as a circle pin tumbler lock, radial lock, or the trademark Ace lock popularized by manufacturer Chicago Lock Company since 1933, is a variety of pin tumbler lock in which a number of pins are arranged in a circular pattern, and the corresponding key is tubular or cylindrical in shape.
The first known example of a tumbler lock was found in the ruins of the Palace of Khorsabad built by king Sargon II (721–705 BC.) in Iraq. [1] Basic principles of the pin tumbler lock may date as far back as 2000 BC in Egypt; the lock consisted of a wooden post affixed to the door and a horizontal bolt that slid into the post.
Higher security lever locks (such as the five-lever) usually have notches cut into the levers. These catch the locking bolt and prevent it from moving if picking is attempted (similar to the security pins in a pin tumbler lock). The Chubb detector lock is a variation of the lever lock which was designed to detect and prevent picking attempts.
A group of researchers presented a paper on defeating Medeco's locks at the 2007 DEF CON conference. Using computing power and mechanical know-how, the group developed a practical means of deploying a "bump pick" attack. At the time, company officials said they were looking to verify the claim, while also announcing a new version of the lock. [2]
A wafer tumbler lock is a type of lock that uses a set of flat wafers to prevent the lock from opening unless the correct key is inserted. This type of lock is similar to the pin tumbler lock and works on a similar principle. However, unlike the pin tumbler lock, where each pin consists of two or more pieces, each wafer in the lock is a single ...
A patent exists for a lock device following the same principle as the bump key from 1926–1928. Marc Tobias, an American security expert, began to talk publicly in the United States about the technique and its potential security threats. In 2006, he released two further white papers regarding the technique and its potential legal ramifications.