Lock: Difference between revisions
From Lockwiki
Jump to navigationJump to search
mNo edit summary |
(Added "Lock Types) |
||
Line 36: | Line 36: | ||
; [[Warded]] | ; [[Warded]] | ||
: Uses internal wards to obstruct the rotation of incorrect keys. One of the oldest lock designs, but provides minimal security by modern standards. | : Uses internal wards to obstruct the rotation of incorrect keys. One of the oldest lock designs, but provides minimal security by modern standards. | ||
== Lock Types == | |||
; [[Cam_lock|Cam Lock]] | |||
: A lock that uses the cam or [[Actuator|actuator]] as the bolt mechanism. | |||
; [[Cylinder|Cylinder]] | |||
: A lock that uses a rotating cylinder to actuate the locking bolt. | |||
; [[Padlock]] | |||
: A lock that uses a self-recessed bolt or shackle and is not mounted to a door or wall. Many padlocks use a cylinder-based lock design. | |||
== Locking Bolt Mechanisms == | == Locking Bolt Mechanisms == |
Revision as of 15:50, 20 May 2009
Lock
A lock is a device used to restrict access to an area or enclosure. It is the duty of the lock to restrict access until the correct key or combination is used to operate the lock. Most modern locks are a combination of a cylinder and a bolt. There several major types of locks with many high security locks being hybrid designs.
History
Add to me!
Lock Designs
- Combination
- A keyless lock that uses numbers, letters, or symbols for input. A specific combination of input properly aligns internal components so that the lock can be opened. Most commonly associated with safes or combination padlocks. Combination locks range from low to high security.
- Disc-detainer
- Uses flat metal tumblers that interface with a sidebar to prevent rotation of the plug. Separate from wafer designs because discs are usually rotated rather than lifted.
- Electronic
- A lock that is operated via electronic means. Electronic locks may incorporate various digital access control features, such as biometrics. Electronic locks usually provide advanced auditing and key control capabilities, but generally are not any more secure than traditional locks. Many electronic locks are also combination locks.
- Hybrid
- Hybrid locks encompass combinations of all lock designs. Many modern high security locks are hybrid designs.
- Lever
- Uses flat metal tumblers (levers) with a gate. Lever locks range from low to high security. One of the oldest lock types, next to warded.
- Pin-tumbler
- Uses moving pins to prevent rotation of the plug. Pin-tumbler locks range from low to high security. Dimple and axial/tubular locks are simply pin-tumblers with modified designs. Currently the most popular lock design worldwide.
- Wafer
- Uses flat metal tumblers to prevent rotation of the plug. Wafer locks range from low to high security, with the vast majority of wafer locks being low security.
- Warded
- Uses internal wards to obstruct the rotation of incorrect keys. One of the oldest lock designs, but provides minimal security by modern standards.
Lock Types
- Cylinder
- A lock that uses a rotating cylinder to actuate the locking bolt.
- Padlock
- A lock that uses a self-recessed bolt or shackle and is not mounted to a door or wall. Many padlocks use a cylinder-based lock design.
Locking Bolt Mechanisms
Compromise of Locks
Security of locks can be compromised many ways, depending on the type, manufacturer and model, and the installation and maintenance details of a target lock. The practice of compromising locks as a hobby is known as locksport.
- Lockpicking
- Internal components are manipulated to allow the lock to be opened.
- Bypass
- The non-cylinder portions of the lock are attacked, such as the locking bolt or the actuator.
- Impressioning
- A working key is duplicated or internal components are manipulated to provide a working key.
- Decoding
- The proper position of internal components is decoded via examination of the key or manipulation of internal components.
- Destructive Entry
- Destruction of or damage to the lock or surrounding materials, such as a door or wall. Also known as forced entry.
- Robbery/Violence
- The proper key or combination is foricbly obtained from authorized users by threatening or inflicting physical or emotional harm.
- Deception
- The proper key or combination is obtained via theft, impersonation, blackmail, or fraud.