Weiser Classic: Difference between revisions
From Lockwiki
Jump to navigationJump to search
m (moved Weiser classic to Weiser Classic: Name = Title Case) |
|
(No difference)
|
Revision as of 16:19, 28 December 2022
Weiser Classic
Weiser Classic | |
Name | Weiser Classic |
---|---|
Manufacturer | Weiser |
Lock Type | Cylinder |
Lock Design | Pin-tumbler |
The Classic is a pin-tumbler lock made by Weiser.
Principles of operation
- See also: Pin-Tumbler (Principles of Operation)
The Classic is a traditional pin-tumbler that uses five pin stacks. To open the lock, all pin stacks must be aligned at the shear line to allow the plug to rotate. There are ten key pin heights and eleven key cut depths with the use of master pins.
Keying Specifications
Cut | Spacing | Depth | Key Pin | Master | Driver |
0 | n/a | .315" | .168" | n/a | .185" |
1 | .237" | .297" | .186" | n/a | .185" |
2 | .393" | .279" | .204" | .036" | .185" |
3 | .549" | .261" | .222" | .054" | .185" |
4 | .705" | .243" | .240" | .072" | .185" |
5 | .861" | .225" | .258" | .090" | .185" |
6 | 1.017" | .207" | .276" | .108" | .185" |
7 | n/a | .189" | .294" | .126" | .185" |
8 | n/a | .171" | .312" | .145" | .185" |
9 | n/a | .153" | .330" | .160" | .185" |
Key Blank | Effective Plug Diameter | Shoulder to First Cut | Root to Root | Depth Increment | Cut Width | MACS |
1054WB, WR3 | .483" | .237" | .156" | .018" | .090" | 6 |
Disassembly instructions
The Classic can be disassembled with standard pin-tumbler disassembly. The design of the
pin-chamber casing facilitates quick disassembly and full rekeying.
- Remove the cam or C-clip.
- Insert the key and turn the plug 45-90 degrees.
- Withdraw the plug from the cylinder. (A plug follower is recommended)
OR
- Remove the chamber casings and take out each pin-stack individually
- Remove the cam or C-clip.
- Withdraw the plug from the cylinder.
Removing cylinders from Weiser knobs
- Pull back on the spindle while rotating the cylinder plug.
- Pull the cylinder from the front of the knob.
Vulnerabilities
The Classic may be vulnerable to one or more of the following:
Gallery
References