Key Programs for Retail Chain Accounts – a Sales
Transcription
Key Programs for Retail Chain Accounts – a Sales
Key Programs for Retail Chain Accounts – a Sales Perspective By: Rod Oden & Benson Miller (LockNet) The object of this paper is to focus on key systems for the retail chain customer; to define what the customer is looking for; and to describe each system in detail. Along with this paper are important reference documents: 1. Glossary of Terms and Recommended Standard Definitions 2. Catalog of High Security Locks 1.00, Graham Pulford, 1994 3. Best Lock v. Ilco Unican, 1996 4. Exploiting Deficiencies in Pin-Tumbler Locks, Rod Oden 1998 All glossary terms are industry standard. This glossary has been accepted by many manufacturers and is feature on several manufacturers web-sites. The “Catalog of High Security Locks” is authored by Graham Pulford from the University of Melbourne. Best Lock v. Ilco Unican is attached because of its extreme importance relative to high-security key systems. Up until this decision, the manufacturer of locks could rely of design patents to keep there key stock “restricted”. After the decision, the only method to keep key blank manufacturers from producing and selling controlled key blanks was to get the key blank “listed’ with a utility patent. Exploiting Deficiencies in Pin-Tumbler Locks was a hand-out to the SLA (Security Locksmith Association), supporting a 1998 seminar, given to most of the security locksmiths that control key programs in the Southern California area. The management of locks and keys is a subject that is very specialized and technical. Whether it is an architect, general contractor, or customer, advise regarding the details of key programs is usually sought from a qualified locksmith or lock manufacturer. Both sources have an agenda and that usually is the specific hardware they either sell or produce. Even when the favored produce line works for the customer, it usually doesn’t solve 100% of the customers needs. A manufacturer’s representative won’t recommend a competitive product, even when it is a better choice for the customer. The qualified locksmith is a better choice to seek information, but not to a retail chain customer. The retail chain customer needs choices that will meet national criterion that is beyond the scope of a local or regional locksmith. What typically happens is the retail chain customer is bombarded with choices to make, and must do this without the help of an unbiased expert to disseminate from the complexity. This paper attempts to clarify the options, and detail only those types of key systems that are beneficial to the retail chain customer. February 11, 2002 Page 1 Key Programs for Retail Chain Accounts – a Sales Perspective Focus on Retail Chain Customers Different types of customers relate to key programs in very different ways. Governmental or institutional key programs are mandated and follow strict guidelines and regulations. The control of keys and locks is dictated and precise. Locks and keys are viewed as a required layer of security. The function of key program is to limit access and not necessarily lower the cost of doing business. Key programs are to fulfill specific expectations, and not required or expected to achieve more. Programs usually are awarded to the lowest bidders. Correctional customers are similar to governmental types, requiring precise regulations and specifications, but differ when it comes to the type of hardware and keys used. There is a strong focus on the very best in security hardware and exclusive key systems. Although programs are award competitively, there is little effort to lower the cost of doing business. The retail chain customer perceives key programs as a cost of doing business. Key control is carefully implemented based on need and is limited whenever possible. It is simply an expense. What the retail customer wants is a reasonable amount of key control— just the right amount to adequately protect assets and associates. The retail customer is always interested in cutting cost relating to key programs. Why Retail Chain Customers? For the national service provider, this is where the action is at. Institutions and government customers are all about cutting quality to get the contract. Working with retail chain customers is about finesse, innovation, and constant improvement.. Chain-wide key programs are fairly new, and most of these customers do not have an effective program in place. Programs that are in place, are either: not performing to expectations; offering little to further decrease cost; and/or not contributing to the constant innovation required by the customers environment. This type of customer authorizes a director to interface with all vendor activities. Usually the director can revise processes or procedures, and can set policy to improve the program. Working with directors is challenging and also rewarding if the service provider performs. A requirement with this customer is constant improvement with translates to cost savings, or extra value. When the program improves, the director status in the company improves and that translates to a solid profitable working relationship. Improving the customers programs directly empower the service provider, and allows the service provider to pass learned innovations to other customers. It’s all about solid relationships with this type of customer. What Does the Customer Want in a Key Program? February 11, 2002 Page 2 Key Programs for Retail Chain Accounts – a Sales Perspective Every retail chain customer needs a key program, but the customer will probably settle on what is wanted. Look at the customer’s culture to figure out what the customer wants in a key program. Mirror what the customer brings to their customers: 1. Simplicity. 2. Consistency. 3. Convenience. 4. Comfort. 5. Expediency. 6. Quality. 7. Value. 8. Accountability. 9. Warrantees. 10. Customer Service and Support. Applying these values, the customer wants a key program that: is easy to understand; can be uniformly applied at all locations; has one toll-free number that can be reached by a real person at all times, to get any service; is pleasantly administrated; is delivered in a timely manner; is done right the first time out; is improving the process; can verify it is paying for itself; actively follows material and service warranties; offers full customer support. What is important to note it that it isn’t about the next-best high-security whatever—the secret to key programs is a tailored-service that the customer likes. You can represent the best hardware around, but if it is like pulling teeth to get it or deal with it, it won’t be ordered. A Comprehensive Key Program Key programs should be comprehensive and tailored to the customer. Each customer will have different needs and circumstances. Take care in listening to what the customer’s needs and dislikes are. Understand and interpret what is learned, apply it to the customer’s culture. Here are the basic components of all comprehensive key programs: 1. A statement that defines the scope, arrangements, and expectations of the program. 2. An analysis of the customers needs, detailing which keying systems and hardware types will be employed. 3. Documentation of processes and procedures that will facilitate the program. 4. Forms to streamline program services and requests. 5. Masterkey systems, laying out the general strategy of rekey. 6. Key control records, documenting when, how, where, changes occur. 7. A source of keys and locks to support the program. Key Systems within the Program February 11, 2002 Page 3 Key Programs for Retail Chain Accounts – a Sales Perspective There are many different types of key systems that can be used in a key program. The difference between each is can be subtle or misunderstood. Much of the time terminology is misused. Customers are sometimes sold systems where they think they are the only ones with a certain type of key. The term exclusive is really misused. Very few manufacturers will release exclusive type keyways. Here are the different types of key systems that can be acquired: Commercial Level The most common masterkey system is the non-restricted 5 or 6 pin commercial level. It is readily available through locksmiths and hardware stores. Most locksmiths can rekey and masterkey these types of cylinders. Keys can be ordered with or without the DND stamp. Popularity makes it more likely that unauthorized keys can be cut. The cylinders are not removable, requiring a locksmith to perform all services. Six pin systems generate enough combinations for a small campuses, but for aren’t enough for large national programs (some commercial locks can be multiplexed). Companies currently offering commercial level cylinders: ARROW – BEST - CORBIN/RUSSWIN – FALCON – MEDECO - SARGENT – SCHLAGE -YALE Commercial Level – Multiplexed Similar to above. Multiplexed keyway structure shown to is used to expand keying systems which require more than one keyway. Few key-cutting sources honor multiplexing. Hardware stores will cut all sections on the master section, completely destroying the systems integrity. Companies currently offering commercial level multiplexed cylinders: ARROW – BEST - CORBIN/RUSSWIN – FALCON – SARGENT – SCHLAGE - YALE Definition of Multiplexing Multiplexing takes advantage of subtle but calculated differences in the shape or profile of the keyway. Type of cylinders will feature slightly different shaped keyways that keep each set of keyways from entering different sections. There are section masters that are thinner and have keyways that “slip” into each different section. There is usually an “all section” keyway or profile that is very thin and can “slip” into all sections. In this manner, a masterkey system can be repeated for each section. Each time the masterkey system is repeated in another section is offers twice the amount of available change keys. The obvious candidates for multiplexing are large institutions like colleges, universities, hospitals, corporate headquarters. February 11, 2002 Page 4 Key Programs for Retail Chain Accounts – a Sales Perspective Restricted Level In a restricted key system, the manufacturer guarantees to never distribute key blanks to unauthorized individuals. This sounds good, but it doesn’t prevent any of the key blank manufacturers from making thousands of key blanks a day for any restricted system and selling them to any lock shop. Some community key cutters will work with colleges and other institutions where these keys are still being used. In these cases, it is harder to get unauthorized duplicates cut. After Best Lock v. Ilco Unican, the term “restrictive” is almost obsolete. The only real protection with these types of keys is if the key blank manufacturer finds that there isn’t enough demand to “tool-up” to create key blanks. Companies currently offering restricted level cylinders: BEST - CORBIN/RUSSWIN – FALCON – SARGENT – YALE Restricted Level - Multiplexed Refer to the above. Multiplexed keyway structure shown to is used to expand keying systems which require more than one keyway. Hardware stores will carry the “all section” keys only—cutting all sections on this master section. February 11, 2002 Page 5 Key Programs for Retail Chain Accounts – a Sales Perspective Utility Patent Level At utility patent level, key blank manufacturers are prohibited from producing key blanks while the patent is in effect. Design patents do not provide protection to the workings of the key or lock, only to its styling. Utility patents protect the unique functions for which the patent was granted under constitutional law. Patent law prevents anyone except the utility patent holder from manufacturing patented key blanks. This ensures that the end user is the final authority over who holds keys. Explain this to your customer and point out the patent number stamped on the key. Companies currently offering utility level cylinders: ABLOY - ARROW – ASSA - BEST PEAKS - EMHART – FALCON – KABA - MEDECO – SARGENT - SCHLAGE Utility Patent Key Blanks and U.L 437 Pick-Resistant Cylinders For the past twenty-five years the emergence of the high security cylinder has seen a definitive change in product benefit from the pick resistant nature of its design to the controlled duplication of the keys intended to operate that cylinder. Current leaders in the market have emerged as industry forerunners in bringing both pick resistance and controlled key duplication to bear as viable and sound solutions to the growing concerns of cylinder and key vulnerability. However, as the cylinders were designed and patented as offering unique pick resistant characteristics, the key control aspects of the system were assumed to be inherent in its design and therefore a byproduct of the main feature of that product. Pick resistant features for patent purposes did little to address the growing demand for controlled key duplication. In most cases, the patent was issued on the cylinder and not the key, leaving it weak and at the mercy of the courts hearing claim that the cylinder patent "infers" protection on the key blank (ref. Best Lock v. Ilco Unican). Once a cylinder is patented, the high security status of that cylinder is only conjectural until it passes the widely recognized and accepted test which qualify it as "listed" under U.L. 437. Most or all of the highly publicized high security cylinders, fall under this category. Some are better than others; however the tests are used to determine if picking or drilling is a practical approach in comprising the cylinder. Once February 11, 2002 Page 6 Key Programs for Retail Chain Accounts – a Sales Perspective listed, Underwriters Laboratories has determined that it is not. The U.L. test, for high security, does not address the duplication of manufacturing rights of the key blank for that cylinder. Companies currently offering utility level cylinders with U.L. 437 listings: ABLOY - ASSA - EMHART – KABA - MEDECO – SARGENT - SCHLAGE Design Patents vs. Utility Patents A design patent has a fourteen year life and is not renewable. As the name implies, design patents protect the part of an object that we recognize as a unique design. I will use a key as a design patent example. The part of the key that you hold between your fingers is known as the bow. Many lock manufacturers have a unique key bow shape, which visually associates them with their keys. That same key bow may also have a trademark logo coined on its face. After fourteen years, an aftermarket keyblank manufacturer could produce that key bow with the familiar bow shape but not with the trademark logo. Although ornamentation does not qualify for utility patent protection, a design patent could be granted for a novel, ornamental shape of a key bow. Because the design patent only applies to the bow, a key could immediately be produced to compromise the associated lock as long as the bow was shaped unlike the patented bow. Utility patent A utility patent has a life of twenty years from the date of application, or seventeen years from the date of granting, whichever is greater. It cannot be renewed. In order to obtain a utility patent, an object must meet three requirements: novelty, utility, and non-obviousness. Novelty - It has to be a new idea. The invention cannot be patented if it has been described in a printed publication anywhere in the world. Utility - It has to be functional and useful. Non-obviousness - It has to be an idea that would not be obvious to a person having ordinary skill in the area of technology related to the invention. For example, a manufacturer of plastic bags could not obtain a patent for a combination trash bag / raincoat. Anybody who has ever been caught in the rain and had access to a plastic bag has used it as a raincoat. It may not be stylish but, unfortunately for our would be inventor, it is obvious and therefore unpatentable. Interchangeable Cores Whether using commercial, restricted, or patented levels, a national type key program should configure cylinders with interchangeable cores. For the retail customer who is especially sensitive to lowering the cost of store rekeys, the interchangeable core allows trained February 11, 2002 Page 7 Key Programs for Retail Chain Accounts – a Sales Perspective personnel to perform quick and expert core changes that would normally be performed by locksmiths. When second sets of cores are maintained by regional representatives, store change-outs can be performed immediately, while the old sets are sent to the service provider for a future setup. Setting up rekeys in this manner will drastically lower the cost of each rekey while guaranteeing that rekey is performed immediately. Seven pin interchangeable cores offer tremendous masterkey possibilities. There are many different types of innovative locking devices that have been “fitted” for interchangeable cores. Interchangeable cores are available in all levels: commercial; restricted; and patented. There are many different types of sections to choose from. Below are some of the common sections that most lock companies offer. Lock companies currently offering interchangeable cores: ARROW - BEST – FALCON – KABA MEDECO - SCHLAGE Resettable Cylinders There is a type of cylinder that should be considered with specialized key programs, these are resettables. Currently there are two manufacturers of resettable cylinders, Security Solutions and Instakey. U-Change Security Solutions manufactures the U-Change cylinder. U-Change cylinders are primarily designed to be retrofitted into hardware that supports mortise or rim cylinders. The company also manufactures a Grade1 cylindrical prep leverset. The bad news is that U-Change cylinders cannot be masterkey. The good news is that anybody with an existing key, a change tool and a new key, can reset the lock to the new key without disassembling or removing the cylinder from the door. Retail customers that don’t mind the trade-off, usually install U-change cylinders on the perimeter and other types of locks on the interiors. U-Change cylinders offer a limited number of usable combinations, because the keys are 5 pin. There is no limit to how many times the key can be changed. The U-Change cylinder can be continually reset. If necessary the old key can be reused. This isn’t necessarily a good thing, but it will reset to any key that can be inserted into it. February 11, 2002 Page 8 Key Programs for Retail Chain Accounts – a Sales Perspective Years ago the shape of the keyway allowed the key to be inserted upside down. When this happened, the cylinder could actually be reset to the flat at the bottom of the key! Since then the keyway has been changed. During resetting all chamber can be changed to a different cut. The cylinder does have to be turned clock-wise by 90 degrees to perform the reset. The U-change process occurs in the cylinder. A patent appears on the key but probably refers to a design patent. Key manufacturers can produce key blanks that have design patents. U-change cylinders are available in a limited multiple sections. Instakey The other resettable is Instakey. Instakey is a process that is done to other types of cylinders and cores. Currently the Instakey process is being done to Corbin/Russwin cylinders, Medeco cylinders, and Falcon interchangeable cores. Unlike, U-change, the Instakey core can be reset from 3 to 11 times before it has to be returned to a dealer to be re-initialized. The procedure to reset the Instakey cylinder or core is very simple. By using a special “step” key, the key is inserted, turned 180 degrees, then removed. The cylinder or core is then rekeyed. It is a one shot event. The old key will not work and the cylinder or core cannot be reset back to it. Each reset is calculated and only one chamber is changed by reset. It you look at the old key it will have all the same cuts but one. That one cut will change by .025”. It doesn’t seem like a lot, but it meets the manufacturers guideline to perform a minimum change. February 11, 2002 Page 9 Key Programs for Retail Chain Accounts – a Sales Perspective Because of the nature of the reset, the cuts of the masterkey in the chambers that the Instakey process works in will always be “0” or “1”. This drastically limits the numbers of possible masterkeys. Instakey can be masterkeyed, but the Instakey process that allows the cylinder/core to be reset, limits the masterkey capability. Instakey cores can be masterkeyed, but mastering is restricted by selecting how many times you can reset the cylinder. Instakey cores cylinders and cores are available in multiplexed sections. Some of these sections provide patented protection, other don’t. Because of the step cut on the bottom, there may be a utility patent on the key blank. Without the cut on the bottom, keys cannot function to reset the cylinder or core but can function as operational keys. The Myth About Keys Stamped “Do Not Duplicate” The first level of key control is to simply stamp the key “do not duplicate” or “unlawful to duplicate”. This does not really increase security except to give pause to a counter person who may question the customer, then probably cut the key once he or she is persuaded. In most cases today “do not duplicate” or “unlawful to duplicate” are marketing gimmicks and have little or no legal support. Unauthorized key duplication remains as the single most violated security policy in today's business. Those seeking to have a key Commercial keys readily available copied usually meet with little or no resistance. In fact, nearly all at a hardware store. keys can and will be duplicated with no questions asked. The stamping of "do not duplicate" presents a challenge to most key cutters instead of a threat. It has been estimated that unauthorized key duplications accounts for as much as 40% of unexplained illegal entries resulting in billions of dollars in losses to businesses each year. Here are some common misconceptions about cutting rights and "restricted keys." Fiction: Keys stamped "do not duplicate" are protected by law. Companies offering "restricted keys" mean that locksmiths or key cutters are not allowed to duplicate them. Keys for all "high security cylinders" are protected from unauthorized duplication. February 11, 2002 Page 10 Key Programs for Retail Chain Accounts – a Sales Perspective Most key cutters will ask questions about your key and will normally comply with any warning or request "not to duplicate" that key. Fact: Many keys are stamped "do not duplicate" as a request to their holder. There is no legal connotation or consequence. Most companies offer "restricted" keys. However, this term refers to that company's distribution policy on the key, and has nothing to do with duplication rights. Most restricted keys are easily duplicated. Best-type key blanks can be bought at hardware store, no questions asked. Only the key blank can be protected from unauthorized manufacturing and then only if the key blank itself is patented. Purchasers of "high security" keys and cylinders should ask to see proof of patent on which the key blank and not the cylinder which it operates. Only professional locksmiths will honor such requests if they are familiar with the manufacturer. Nonprofessional key cutters such as hardware stores, shops, or mall vendors will usually duplicate any key if the blank is available to them. The Future Whatever the reasons, expect to see and hear more, not less, about high security in the months and years ahead. Expect to get more involved. What the retail customer wants today will change and security tightens on a national level. There are many factors to consider. Here then, is a checklist of issues to evaluate when comparing alternative programs for the future: 1) Quality - Inspect the product's construction. Cutaway cylinders are good for this purpose. Would you be proud to sell the product? 2) Security - Is the product a true high security cylinder? Is it both pick and drill resistant? The most common qualifier is the U.L. 437 listing for lock cylinders. 3) Patents - What patents, if any, have been issued to protect the security of the products? What exactly do the patents cover? When do these patents expire? It is generally agreed that keyblank patents are more valuable than cylinder patents. If you have any doubt, ask to receive a copy of the patent(s). 4) Key Control - If your customers are interested in key control, what do you have to sell them? How good is the key control which you have to offer? What assurances can you make about the availability of duplicate keys? February 11, 2002 Page 11 Key Programs for Retail Chain Accounts – a Sales Perspective 5) Product Flexibility - Is the design of the product flexible? How many different cylinders will you need to stock? Can some products be used for more than one application? 6) Simplicity - Simple function often indicates reliability. Evaluate the operation of the cylinder. Ask other locksmiths who may use the product. Are they aware of any special problems? 7) Product Assortment - Does the manufacturer offer a wide range of products to retrofit most types of hardware? Are there any common applications that you will be unable to retrofit with this product? 8) Keyway Restriction - Does the program offer a keyway that is restricted to your company? If so, how extensive is the restriction? What other locksmiths, distributors, end-users, etc. will use that keyway? Where are they located? 9) Key Machines - Is a special machine required to cut the keys? If so, what is the cost of this equipment? Can it be used for another purpose? 10) Initial Investment - What is the total initial investment required to become a dealer? How much of this investment is in saleable merchandise, instead of special machines, fixtures, etc.? 11) Annual Investment - Is there any minimum annual purchase volume requirement? If so, are you confident of reaching this level each year? 12) Serviceability - How easy is the product to service? How long will it take to rekey a cylinder or to cut a duplicate key? Can it be done easily in the field, or must you bring it back to the shop? 13) Marketing Assistance - Is the manufacturer able to provide product literature, artwork for advertisements, or co-operative advertising programs? 14) Technical Training - How much technical training will be required for you and your staff? Will it be easy to train new employees? Does the manufacturer offer hands-on certification classes, of other instructional aids such as service manuals, videotapes, etc.? 15) Availability - Are you confident that the product will be available when you need it? Is it in stock at your distributor? Do you know if the manufacturer's lead times are reasonable? 16) Masterkeying - How extensive are the product's masterkeying capabilities? Is the product difficult to masterkey? Will the factory assist the locksmith in the design of systems? 17) Marketability - Think of your customers. Will they want to buy this product? Does it suggest security? Is it easy to use? 18) Price - Is the product competitively priced with other similar brands? Compare list prices, and take into account all items, including pin kits, key blanks, etc. February 11, 2002 Page 12 Glossary of Terms Types of Locks Auxiliary Lock: A lock having a latch bolt or a dead bolt operated by a key or a thumbturn or both. This lock is often used in addition to another lock, which may or may be key operated but which has a latch bolt operated by knobs or levers. Bored Deadlatch: (Also called tubular or cylindrical deadlatch) A lock fitting round bored openings in the face and edge of a door and having a dead latch operated by a key or thumbturn or both. Bored Deadlock: (Also called tubular or cylindrical deadlock) A lock fitting round bored openings in the face and edge of a door having a deal bolt operated by a key or thumbturn or both. Bored Lock: (Also called cylindrical or tubular) These are locks or latches fitting round bored openings in the face and edge of a door. If they are key operated, the cylinder is contained in the knob and so occasionally one hears them referred to as "key-in-the-knob-locks." This is imprecise as other types of locks also have cylinders contained in the knobs. The round hold in the face of the door is usually 2 1/8 inches and the hole in the edge of the door is 7/8 inch to 1 inch. When the lock is installed, the face hole contains the lock body and the edge hold contains the latch bolt. Double Cylinder Deadbolt: Any type of auxiliary lock requiring a key to project or retract the deadbolt (lock or unlock) from either side. Interconnected Lock: (Also known by a number of different trade names) A lock having a separate latch and dead bolt mechanically interconnected and installed in round bored openings in the face and edge of a door. It is best known for providing dead bolt security with the life safety feature of simultaneous retraction. When the dead bolt is projected, a single turn of the inside knob retracts both the dead bolt and the latch bolt. This simultaneous retraction function is also available with some functions of mortise locks. February 11, 2002 Page 1 Glossary of Terms Mortise Dead Lock: An auxiliary lock having a deadbolt and otherwise the same as a mortise dead latch. Mortise Dead Latch: An auxiliary lock fitting a cavity prepared in the edge of the door and having a dead latch operated by a key or thumbturn or both. The key or thumbturn engages the lock through holes prepared in the faces of the door. Mortise Lock: A lock fitting a rectangular shaped cavity in the edge of a door. A round hold in the face of the door receives a spindle to which knobs or levers are attached. If key operated, a second round hold above the first receives the cylinder(s) and thumbturn. Some functions use two cylinders which is not a violation of the codes because the inside cylinder locks and unlocks the outside knob and the inside knob always operates. Some functions use two cylinders which sometimes is a violation of codes because the inside key projects a deal bolt or locks the inside knob which can only be unlocked by key. (This example of key operation on the inside applies equally to other types of locks and is mentioned under mortise locks only because it originated with them). Lock Components Backset: The distance from the edge of the door to the centerline of the cylinder at the centerline of the door thickness. Bolts: Auxiliary Dead Latch: A plunger which, when actuated, automatically locks a projected latch bolt against return by end pressure. Dead Bolt: A lock component having an end which protrudes form or is withdrawn into, the lock front by action of the lock mechanism. When the door is closed and the dead bolt thrown, it extends into a hold provided in the strike, locking the door and will not retract with end pressure. February 11, 2002 Page 2 Glossary of Terms Latch Bolt: A lock component having a beveled end which projects from the lock front in an extended position, but may be forced back into the lock case by end pressure or drawn back by action of the lock mechanism. When the door is closed, the latch bold projects into a hold provided in the strike, holding the door in a closed position. Deadlocking Latch Bolt: A spring-actuated latch bold with a beveled end and incorporating a plunger which, when depressed, automatically locks the projected latch bolt against return by end pressure. Also called dead latch. Cam: In this publication, a component fastened to the back of a mortise cylinder plug or mortise cylinder thumbturn. When rotated, it engages the lock mechanism and either locks or unlocks the door. Case: The housing of a lock. Cylinder: The cylindrical subassembly of a lock containing a cylinder plug with keyway and a cylinder body with tumbler mechanism. Cylinder Body: The portion of a cylinder that surrounds the plug and contains the tumbler mechanism. Cylinder Plug: A tubular portion of the cylinder which rotates within the cylinder body when the correct key is inserted into it and turned. Cylinder Guard: That portion that surrounds the otherwise exposed portion of a cylinder to protect the cylinder from wrenching, cutting, pulling or prying. Cylinder Housing: The portion of a lock that surrounds and retains the cylinder body. It can be a knob, part of the lock case or other anchoring means. February 11, 2002 Page 3 Glossary of Terms Lock Front: A plate fastened to the edge of a door through which the bolts pass. Recessed Cylinder: A cylinder where the cylinder head is flush with, or recessed below, the outside surface of the trim to protect the cylinder from wrenching, cutting, pulling. or prying. Strike: A plate fastened to the door frame into which the bolts project. Armored Strike: A strike reinforced in such a way as to strengthen the frame to which it is applied. Strike Box: A housing used in back of a strike to enclose the bolt or bolt openings. Tailpiece: A bar projecting from the back of a rim or bored lock cylinder engaging the lock mechanism and when rotated by the key or thumbturn either locks of unlocks the lock. Thumbturn: The component that projects or retracts a dead bolt or latch bolt by grasping with the thumb and fingers and turning. Sometimes called a turnpiece or turn. Specialty Locks Three Point Lock: A lock having three bolts. A variety of this type of lock has one bolt projecting into the header, another into the sill, and the third into an adjacent door or jamb. The use of this type of lock on a pair of doors eliminates the need for flush bolts. When the lock is unlocked, both leaves of the pair of door are active. When the lock is locked, both leaves are secured. Visual indicators showing a locked or unlocked condition are required to be used in connection with these locks under some codes. Electric or Electronically Operated Lock: Any type of lock operated by electric or electronic means. Frequently used on stair doors where reentry is not desired for security reasons. Since stair doors are fire door assemblies, the only type of lock permitted is one having an active latch bolt and the door remains latched whether locked or unlocked. It must also be fail safe (unlocked on loss of power). When used in this manner the locks must be unlockable from a remote position which is usually in the fire control station in the building. February 11, 2002 Page 4 Glossary of Terms Specialty Locks (cont.) Electric Strike: An electrical device operated from a remote position, allowing a locked door to be opened by push or pull. Signals to a central panel con indicate locked, unlocked and door open conditions. Can be fail safe or fail secure upon loss of power. These units are not for use on fire doors where the fail safe mode (unlocked on loss of power) is desired because the door ceases to become positively latched upon loss of power. Exit Alarm: A device indicating either audibly or silently the unauthorized opening of a door. Exit Lock: A rim lock operated by a push bar extending part way or almost all the way across the width of a door and used for emergency egress. A sign reading "Emergency Exit Only Alarm Will Sound" or with similar language is generally used in connection with such locks. Exit Device: (Also called panic device, panic hardware, panic bolt and crash bar.) A type of lock having an inside release bar. When depressed, the release bar (called crossbar, push pad, etc.) retracts the latch bolt, thus permitting the door to be opened. Most codes require that the activating portion of the release mechanism extend not less than half way across the door. A dogging device allows the release bar to be locked down so that the latch bolt remains retracted and the door can be used as a "push-pull" door. They may or may not be key operated from the outside. These devices have been investigated for panic and are listed by a nationally recognized independent testing laboratory and are also under in-plant follow-up inspection service. They may not be used on fire doors. Fire Exit Hardware: These are exit devices which have also been labeled for use on fire doors. Dogging devices are not permitted on fire exit hardware as fire doors must have an active latch. When inspecting exit devices on fire doors, look for both labels, one for panic and one indicating the device is fire exit hardware. The label on the fire door itself should also indicate that it is a fire door suitable for use with fire exit hardware. February 11, 2002 Page 5 Glossary of Terms Door Controls Automatic Closing: A code term involving the permitted practice of holding a fire door in the open position providing the door closed upon detection. Generally the detection must be from the presence of visible or invisible particles of combustion. Fusible links are not usually considered acceptable because of slower response time. Any listed closer can be used in combination with an electro magnetic holder and a photo electric or ionization type smoke detector. Labeled or listed spring hinges could be used as well as hydraulic door closers. Some special applications of swinging, sliding and rolling fire doors primarily in industrial applications are permitted to be sued with fusible links, weights and pulleys. Later product introductions are more sophisticated and provide more flexibility for building operation. These are hydraulic door closers incorporating hold open mechanisms allowing the door to be hold open in many degrees of opening positions. The most recent product introduction along these lines is the socalled "swing free" unit. Instead of using a hold open mechanism, the energy of the closer is negated and the door is allowed to be operated as if it were not equipped with a closer. Upon detection of visible or invisible particles of combustion, the closing mechanism engages and the closer causes the door to return to the closed and latched position. These automatic closing arrangements are fail safe in that upon failure, the door closes. All are listed by a nationally recognized independent testing laboratory and are under an in-plant follow-up inspection service. Self-Closing: Again, code language indicating that whenever opened, a door returns to the closed position. Accomplished with any labeled or listed closing device or spring hinge. The term "closures" often used in reference to these various products is not an industry term. February 11, 2002 Page 6 Glossary of Terms Typical Master Key System Charts Level Two System: A system that features a master key that has one or more change (level one) keys subordinate to it. Level Three System: A system that features a master key that has one or more sub-master keys (subordinate to the master) and each of those sub-master (level two) keys has one or more change (level one) keys subordinate to it. Level Four System: A system that features a master key that has one or more sub-master (level three) keys (subordinate to the master). Each sub-master has one or more lesser power sub-master (level two) keys and each of those sub-master (level two) keys has one or more change (level one) keys subordinate to it. February 11, 2002 Page 7 Recommended Standard Definitions Bicentric Cylinder: A cylinder having two independent plugs, sometimes with different keyways. Both plugs are operable from the same face of the cylinder. It is designed for use in extensive master key systems or for security applications requiring two different keys. Bitting: 1. The number(s) represent the depths of the key cut(s). 2. The actual cut or combination of a key. Bitting List: A listing of the key combinations used within a system. Bow: The portion of the key used as a grip or handle. Broach: 1. Noun: A tool used to cut the keyway into the cylinder plug. 2. Verb: To cut the keyway into a cylinder plug with a broach. Cam: A flat actuator attached to the rear of a cylinder and operated by the key. Chamber: A cavity in a cylinder plug or shell which houses the tumbler. Changekey: A key operating only one cylinder or one group of keyed alike cylinders in a keying system. Combination: The group of numbers representing the bitting of a key or the tumblers in a lock or cylinder. Construction Core: An interchangeable or removeable core designed for use during the construction phase of a building. The cores are normally keyed alike and, upon completion of construction, they are to be replaced by the permanent system's cores. Construction Key: A key to operate designated cylinders for a temporary period during construction. Construction Master Key: A key normally used for a temporary period during building construction. It may be rendered permanently inoperative without disassembling the cylinder. Construction Master Keyed: A cylinder arranged to be operated temporarily by a construction masterkey. Control Key: A key to remove or install an interchangeable or removable core. February 11, 2002 Page 1 Recommended Standard Definitions Controlled Cross Keying: A condition where two or more different change keys, under the same higher level master key, operate one cylinder by design, e.g. XAA1 operated by AA2. Cross Keying: Combining a cylinder to two or more different change keys of the same master key. See also "controlled cross keying" and "uncontrolled cross keying" Cylinder: A complete operating unit, usually consisting of a plug, shell, tumblers, springs, plug retainer, a cam or tailpiece or other actuating device, and all other necessary operating parts. Display Key: A special change key in a hotel master key system allowing access to one designated guest room, even if the lock is in the shut out mode. It may also act as a shut out key for that room. Name comes from the traveling salesman who wanted to shut out all other keys to protect his "displays" from theft. Drill Resistance: Arranging a cylinder plug and housing to resist drilling. Engineers Key: A designated master key used by maintenance personnel to operate selected locks under different master keys in a system using three or more levels of keying. Sometimes called Maintenance Key. File Key: A key attached to permanent tag in a dual tag key control system. Grand Master Key: The key operating two or more separate groups of cylinders, each operated by a different master key. Grand Master Key System: A key system having three levels of keying. Grand Master Keyed: A cylinder which is keyed into a grand master key system. Great Grand Master Key: A key operating two or more separate groups of cylinders, each operated by a different grand master key. Great Grand Master Key System: A key system having four levels of keying. Great Great Grand Master Keyed: A cylinder having keyed into a great grand master key system. Great Great: A key operating two or more separate groups of cylinders, each operated by different great grand master keys. Seldom used because of limited number of change keys available. February 11, 2002 Page 2 Recommended Standard Definitions Great Great Grand Master Key System: A key system having five or more levels of keying. High Security Cylinder: A cylinder offering a greater degree of resistance to picking, impressioning, key duplication or other forms of surreptitious entry. High Security Key: A key for a high security cylinder. Housekeepers Key: A designated master key in a key operating selected resident, linen rooms, and other housekeeping areas (usually several MK's or a GMK). Indicator: A device providing visual evidence that a deadbolt is extended or a lock is in the shut out mode. Interchangeable Corecylinder: A cylinder containing both the upper pin chamber and plug in an integral unit removable by a special control key and interchangeable with other cores in the system. Key: A properly milled device used to operate a corresponding cylinder. Key Blank: Material manufactured to the size and configuration allowing its entry into the keyway of a specific looking device. A key blank has not yet been cut. Key Control: 1. Any method or procedure limiting unauthorized acquisition of a key or controlling distribution of authorized keys, keys, or both. 2. A systematic organization of keys and key records. Key Interchange: An undesirable condition, where a key unintentionally operates a cylinder or lock. Key Records: Records including some or all of the following: bitting list, key system schematic, end user, number of keys or cylinders issued, names of persons to whom keys were issued, hardware or keying schedule. Key Section: The cross sectional configuration of a key blade as viewed from the tip toward the bow. Key Storage Cabinet: Cabinet used to store keys. Key Symbol: A designation used for a key combination in the standard key coding system, e.g. A, AA, AA1, etc. February 11, 2002 Page 3 Recommended Standard Definitions Key System Schematic: A visual chart depicting the key system. Keyed: 1. Combinated 2. Having provision for operating by key. Keyedcommon: See "Malson Key System" Keyed Alike: Two or more cylinders having the same combinations. Keyed Different: Two or more cylinders, each combinated differently from the others. Keying: Any specification for how a cylinder is, or group of cylinders are, combinated. Keying Chart: See "Bitting List" Keying Diagram: See "Key System Schematic" Keying Schedule: A detailed specification of the keying system listing how all cylinders are to be keyed and the quantities, markings, and shipping instructions of all keys or cylinders to be provided. Keyway: Broachings in cylinder plug. Levels Of Keying: The divisions of a key system into hierarchies of access. Maison Key System: From the French, meaning "house" key system. A key system with one or more cylinders operated by other designated keys in the system; e.g. main entrances of apartment buildings operated by all individual apartment entrance keys (see Crosskeying). Master Key: 1. A key operating all the master keyed locks or cylinders in a group, each lock or cylinder usually operated by its own change key. 2. To combine a group of locks or cylinders so that each is operated by its own change key as well as by a master key. Master Key System: A key arrangement having two or more levels of keying. February 11, 2002 Page 4 Recommended Standard Definitions Master Keyed: A cylinder or group of cylinders combinated so that all may be operated by their own change key and a master key. Master Keying: See "Master Key" #2 Multiple Keyway: Plugs with a different keyway broaching or key section with higher level keys milled to operate more than one keyway. Multi-Section Key Blank: A key entering more than one key broaching in a multiple keyway system. Paracentric: 1. A keyway with one or more longitudinal ribs on each side projecting toward the vertical center line of the keyway. 2. A keyway blank made to enter such a keyway is a paracentric key. Pick: Manipulating the tumblers of the lock so as to operate the cylinder without an authorized key. Plug: The part of a cylinder containing the keyway and with tumbler chambers usually corresponding to those in the cylinder body. Proprietary System: A system with a keyway or key section assigned exclusively to one or more end users by the lock manufacturer. It may also be protected by law from duplication. Removable Core/Cylinder: A cylinder which can be removed from a lock by a key or tool and installed in another lock of the same type. Restricted: A keyway and corresponding key blank whose sale or distribution is limited by the lock manufacturer in order to reduce unauthorized key duplication. Sectional Key Blank: See "Multisection Key Blank" Sectional Keyway System: See "Multiple Keyway System" Shear Line: The location in the cylinder where the tumblers will line up when the proper key is inserted and permit the plug to be actuated. February 11, 2002 Page 5 Recommended Standard Definitions Shut Out Key: A key making a lock inoperative to all other keys in the system except the emergency master key, display key, and some types of shut out keys. Usually used in hotel keying systems. Side Bar: A secondary locking device in a cylinder. When looked, it extends along the plug beyond its circumference. It must enter gates in the tumblers in order to clear the shell and allow the plug to rotate. Single Tag Key Control System: A key storage cabinet with control system incorporating one tag for each hook. SKD: Symbol for "singlekeyed". Normally followed by a numerical designation in the standard key coding system, e.g. SKD1, SKD2, etc. it indicated that a cylinder is not operated by any other key, but is part of the keying system. SJB Master Keying: Another level of keying used by some manufacturers between level 1 change keys and level 2 master keys. Use of submaster keying is not recommended. "To Be Operated By": Identifying a cylinder to be operated by one or more keys. Never use phrase "to pass" or "subject to". "To Operate": Identifying a key or keys to operate cylinders. Never use phrase "to pass" or "subject to". Uncontrolled Crosskeying: A condition in which two or more different keys under different higher level keys operate one cylinder by design; e.g. XAA1, operated by AB, AB1. Note: This condition severely limits the security of the cylinder and the maximum expansion of the system, and often leads to key/interchange. Visual Key Control: The marking of keys/or cylinders with standard key symbols. February 11, 2002 Page 6 Catalogue of High Security Locks v1.00 Catalogue of High Security Locks v1.00 Author: Graham Pulford Date: 27 April 1994 gwp@mullian.ee.mu.oz.au Department of Electrical and Electronic Engineering, University of Melbourne, Australia. Notes and disclaimer: The author is a lock enthusiast, not a qualified locksmith, so some of the terminology may be incorrect. Furthermore, the author makes no claim as to the accuracy of the information presented in this document. This catalogue is meant only as a sample of some of the world's more interesting and unusual locks. The material reflects the author's taste and experience in locks and is not intended to favour one country's locks above those of another. A list of car locks, magnetic locks, combination locks and electronic locks, together with some mystery locks has been included at the end of the document. However, no operational descriptions have been provided for these locks. Please feel free to comment on these if you know how they work, so that they may be included in future versions of the catalogue. Where several locks brands are considered to be equivalent, these are listed together. Related locks are cross-referenced. A large number of safe locks (typically Italian double-bitted lever locks) have been omitted. Some of the information for this list was obtained from the 1993 Silca (TM) 101 and 201 key catalogues, and from various manufacturers' brochures. A large part was obtained through inspection of the locks themselves. Books used in the preparation of this list: C. A. Roper, The Complete Book of Locks and Locksmithing, TAB Books, PA, 1983. R. L. Robinson, Complete Course in Professional Locksmithing, Nelson-Hall, Chicago, 1983. Each lock category is arranged according to: brand; country;Silca catalogue ref. number; lock; key & keyway type; and picking difficulty. This is followed, in most cases, by a description of the mechanism, mode of operation, security features and other comments relevant to lock(s) in question. The following country codes have been adopted: A- Austria AUS- Australia D- Germany E- Spain UK- Great Britain H- Hungary IL- Ireland J- Japan RC- China SW- Sweden February 11, 2002 BRFHKNLUS- Brasil France Hong Kong Netherlands USA CHFIIP- Switzerland Finland Italy Portugal Page 7 Catalogue of High Security Locks v1.00 Picking difficulty (author's estimate only) is graded on a scale of 1 - 5 according to the table below. 1 2 3 4 5 relatively easy quite hard hard / special tools required very hard forget it! Alpha (J) 5 + 6-pin, horizontal keyway (3) Used on vending machines. The keyway is horizontal and rectangular with 6 pins on the upper face and 5 profile pins. Keyway warding and small size make this lock hard to pick. (See DOM IX.) American (US) wafer-tumbler, double-sided key (2) Used in cylinder locks and padlocks. The keyway has a central ward and the key is continuously milled on both top and bottom edges, such that the bitting width is constant along the length of the blade. The wafers are adjacent, unlike in ordinary wafer locks, and all have the same size cut which may vary in offset. The wafers require no spring since they are held in place by the key. In some circumstances, the wafers may be sprung on the side by an S-shaped wire. There are typically 12 wafers. American also make high quality pin-tumbler locks that use spool drivers and spooled lower pins to increase the difficulty in picking. (See Bricard Locks.) ASSA Twin 6000 (SW) 6-pin + side-bar, dealer perm key (5) The ASSA lock has 6 conventional pins with spool drivers actuated by the top bittings of key. A second set of bittings lower down on the left hand side of the split-level key raises the 5 side-bar pins to engage the side-bar. Side-bar pins are internally sprung. Each side-bar pin has several grooves around its girth, only one of which is the correct depth for the side-bar blade. The cylinder may have hardened pins inserted around keyway and side-bar to resist drilling. The side bittings on the key are known as a "dealer perm" and are used on other dual-action locks such as Schlage Primus, Vachette 2000 and Winkhaus so that the distributor cuts the profile bittings (to a given permutation) using a special cutting machine, leaving the top part of the blade blank. The blade can then be cut using a conventional cutting machine. Abloy (FI) AY1 10-disc side-bar, D-profile key (4-5) The key is half-round in cross section with angled bittings along its length. Six bitting angles are possible from 0 (no cut) to 90 degrees, with a 90 degree cut leaving a quarter circle of key profile. The keyway may have wards requiring the key to be milled out to a different profile to restrict access. The cylinder has up to 11 discs with separators housed in a shell which has a slot for the side-bar. Discs have a D-shaped hole stamped in the centre and a stop lug on the rim to limit rotation within the shell to 90 degrees. Each disc also has a side-bar notch in its rim. When all discs have been correctly aligned by the a quarter turn of the key, pressure exerted by a bevel in the cylinder wall will force the side-bar into the groove formed by the discs. The shell is then free to turn, releasing the locking balls in a padlock or turning a connecting rod in a cylinder lock. February 11, 2002 Page 8 Catalogue of High Security Locks v1.00 Mastering is achieved by cutting more than one notch in one or more of the discs. Shallow notches are usually included to jam the side-bar and inhibit picking. Pick manoeuvring is made difficult by the geometry of the keyway and the relative positions of the discs when rotated. The number 1 (front) disc may not have a stop lug, preventing tension from being applied naively to the first disc, in any case, it is only feasible to apply tension to a disc corresponding to a 0 degree cut (i.e. no cut), since it will stop in the correct position. Of course, it is not known a priori which discs are which, although discs 9 and 10 (in a 10-disc lock) are often of the latter type. In addition, fixed (non-rotating) discs can be used, so that the key blank must have warding cuts in order for it to turn. It is possible however to defeat the lock using a reader or jig (similar to a technique used to decode keys for Chubb locks). A reader for an Abloy lock can be made using a coaxial rod fashioned to fit the keyway. The inner part of the rod tensions the core, while the outer part is free-sliding and can be rotated to test each of the discs in turn. In this way, the combination of the lock may be decoded and a key cut. Of course, if the discs have false notches, then this will only narrow down the number of possible keys which need to be cut and tried. This lock gets my vote for the most ingenious design in that it contains relatively few moving parts yet is very hard to pick or drill. (See Abus Plus.) Abus Plus (D) AB32 disc side-bar, symmetric key (4) Chubb SMI (AUS) A close relative of the Abloy but with a rectangular keyway and a symmetric key that may be inserted either way round. These locks have typically 10 discs which, when rotated to the correct angles, allow the side-bar to drop into the channel formed by the notches and the core to rotate in the cylinder. Because the key is cut from both sides, it tends to be prone to shearing off in the lock, e.g. when not inserted to the correct depth, although this is less of a problem with Abus. ACE (US) 7-pin-tumbler, tubular (2-3) GEM (US) CH9T These locks have 7 or 8 push-in pins arranged around a central plug. The plug (or spindle) passes through the barrel and has a threaded end to which a locking cam is attached. The plug and barrel assembly is mounted inside the lock shell and the barrel secured with a retaining pin. The retaining pin should be hardened to protect against drilling. The key is hollow and cylindrical, usually with a bitting that engages a slot in the plug to provide turning force and to keep the pins depressed as the key is rotated. There are 7 pin sizes ranging from 0.020" to 0.110" in increments of 0.015". Some ACE locks have a ball bearing imbedded in the plug to guard against attack by drill or hole-saw. Since all the pins are exposed, these locks are not hard to pick with a tubular lock pick that can maintain the pins at the correct depth once they are picked. The plug will relock at fractions of a turn if the pins are allowed to spring back up. There also exists an ACE variant that has a 5-pin conventional, at key extending through the tubular part of the key. I've only seen these in U.S. airport lockers. BiLock (AUS) 12-pin double side-bar, U-profile key (3-4) The 2-bladed key is formed by folding a at plate, cut along two opposite edges, to form a "U". There is no warding in the keyway, so that the pins are easily accessible when a two-pronged tensioner is used. Each blade has 6 bittings with four possible cuts. Thus there are nominally 16 million differs. The lock is a twin side-bar type with spring-loaded lower pins (no drivers). The pins are machined with a hole in the side facing the side-bar, and a vertical channel to constrain rotation within the chamber. Each pin may February 11, 2002 Page 9 Catalogue of High Security Locks v1.00 have one hole or several holes (for mastering), with false-depth holes to jam the side-bar and render picking difficult. The plug has hardened inserts to resist drilling. Bramah (UK) radial wafer pump, end-bitted tubular (3) Supra-C (Aus) 6-wafer pump, internally milled tubular key (3) Bramah is the original "tubular" lock and the model for many other radial and pump-type locks. It was devised by Joseph Bramah in 1784. A set of 5 or more wafers arranged around the circular plug prevents rotation. A bit on the key stem locates the key in the keyway and provides turning tension. The correct key depresses each wafer to the required depth at which it clears fixed notches cut in the front and back plates of the cylinder barrel. The first reported picking of a Bramah lock was by A. C. Hobbs at the 1851 Great Exhibition. The Supra-C is often used in keysafes and has a cylindrical key with internally milled bittings that depress the wafers. These locks are often made or cast with soft metals and are easily drilled. Bricard (F) XBD1 7-disc tumbler, 3-sided key (4) The key has a "T" profile with 7-8 bittings along each of the 3 sides. The neck of the key has a smaller diameter than the blades. The plug consists of a stack of 7 preformed circular plastic inserts inside a fixed brass barrel. Each insert houses a disc wafer that is ball-driven by the key. The assembly of barrel and plug is mounted inside a fixed shell that is plated to resist drilling. The keyway is such that the key blades are obscured by the shell when the key is turned, and this makes picking/tensioning difficult. Each wafer disc can have any one of 3 possible orientations, corresponding to the key blade which will displace it. There are several different sizes of cut. Mastering is accomplished by using extra bitting cuts, with 7 being the minimum and 21 the maximum number in total. The wafers may have "V" notches, similar to the anti-picking notches in conventional wafer-tumbler locks, which catch the bevelled edge of the barrel if incorrectly aligned, thwarting a picking attempt. Bricard Bloctout (F) BD100 14-wafer tumbler, 2-bladed key (3) Essentially a wafer-tumbler lock with closely-spaced, free-sliding wafers. The key consists of two blades pressed together, the bittings are staggered and have constant width. The wafers are arranged in 7 pairs and have a constant height cut on one inside face and a larger cut on the other which bypasses one blade of the key. In each pair, one wafer is straddled by the left and one by the right side of the key blade. The last few wafers are sprung so that they stay put when the key is removed, the other wafers being loose in their chambers. Picking is difficult since there is less tactile feedback than in a lock with sprung wafers. (See American.) Central (F) 7-pin pump, 8-fin key (4) FTH (F) JPM 505 (F) 5JM1 5-pin pump, 6-fin key (4) Pollux (F) 5PX1 These locks all have pump-type keys with a cylindrical central stem and several radial pins. Bittings are milled into the end of the pins, and these depress the pump pins to the appropriate depth. One fin has a larger width/diameter than the others and this is what provides turning tension and locates the key in the keyway. The pump pins are constrained to slide in a channel under spring action. The pins are slotted around their circumference in such a way that, when correctly depressed, the slot aligns with a blocking plate fixed in the body of the lock. When all slots are so aligned, the plug can rotate. False depth slots February 11, 2002 Page 10 Catalogue of High Security Locks v1.00 are provided to hinder picking. As in Bricard locks etc., the keyway is such that the the larger fin or bit is obscured by the shell of the lock when the key is turned, making tensioning by external means difficult. So, unlike common tubular locks (GEM, etc), the pins do not remain accessible as the core of the lock rotates. Presumably some picking tool exists for this kind of lock, but the presence of incorrect notches in the pins would make picking considerably harder. Central locks have an armoured collar that surrounds the cylinder and prevents it from being sawed off. (See Bramah.) Chubb (UK) CHC 5-lever, single-bitted (3-4) The original lever lock, traceable to inventions by Barron and Chubb (late 18th century) seeking to make the warded-key lock more secure. Key bittings raise the 5 (or more) levers or detainers to the correct height and drive the bolt stump through the gate. Gates and stump have mating "V" grooves to hinder picking. A "curtain" or rotating sleeve restricts access to the interior of the lock and makes tensioning/picking difficult. Mastering is accomplished by widening the lever gatings, at the expense of some security. Hardened steel plates resist drilling of the casing. The bolt has hardened roller inserts to prevent sawing. The lock can be picked (or rather decoded) using a special jig or it may be impressioned. Picking with standard lever picks is difficult when notched gatings are present. May also feature a "detector" lever which jams all the levers when over-raised. There is an interesting episode in the history of the lever lock, concerning a convict reputed to be the best lock picker in England. The UK crown had offered a reward to anyone who could design an unpickable lock. In 1818, J. Chubb designed the detector lever lock. The convict was given a full set of picking tools and offered a free pardon should he succeed. He finally gave up in desperation after three months and served out his jail term. Chubb AVA (UK) ACH 10-lever, double-bitted (4-5) The AVA lock comprises a cylindrical shell (c.f. Abloy) which is slotted down two sides and housed in the cylinder body. The levers are roughly circular with two rectangular protrusions, and hole in the centre for the keyway. Levers are stacked 10 high in the shell and can slide transversally. The shell is sprung from below, pressing the levers up and against the body of the lock, and retained by a cover with a concealed C clip. The levers are not sprung. The key has a cylindrical stem with a narrow double bit that extends most of the length of the stem. The keyway cover is fixed, creating a ward that traps the key as it is turned. This makes it difficult to tension the levers in the case of picking. Bittings have a constant width from one side to the other but vary in offset. The respective bittings displace the levers either to the left or right as the key is turned. When all 10 levers have been fully retracted into the shell, it is free to rotate, thus releasing the locking balls (in a padlock) or driving a cam (in a latch). Each lever has notches that will jam against the sides of the slots in the shell if not correctly retracted. Code (?) 6-pin pump, ribbed key(2) Code padlocks and cylinder locks have a rectangular keyway with 3 channels milled on each long side. Pump pins are arranged in the channels and depressed by the corresponding slats on the key. When each pump pin is aligned at the correct depth, they clear the locking ring and allow the plug to turn in the cylinder. Unlike radially symmetric pump pin locks, the Code lock has no fixed covering on the keyway so that the pins are always exposed. This renders the lock more susceptible to picking. (See Couillet, Vachette.) February 11, 2002 Page 11 Catalogue of High Security Locks v1.00 Codem (F) 5-pin-tumbler, H-profile key (2) The codem lock cylinder is a standard size euro-profile cylinder with an H-shaped keyway. There are 5 conventional pin-tumblers in one line along one side of the H. Keyway access is restricted as compared with standard pin-tumbler locks. The key is symmetric and can be inserted either way round. Corbin Emhart (US) CB20 6 pin-tumbler, at key with angled bittings (5) An ingenious pin-tumbler lock using 6 specially constructed, rotating-interlocking upper and lower pins. The driver pins are cut to form a "T" at the bottom which mates snugly with a T-shaped gap in the top of the lower pin. The active end of the lower pins are V-shaped with the axis of the "V" aligned at one of number of possible angles with respect to the "T" cut at the top. The base of the T-shaped cut in the lower pins must be raised to the shear line and also rotated to the correct angle by the angled bittings in the key so that they can disengage from the driver pins. Since the top of the T-section protrudes past the shear line, grooves must be milled in the circumference of the plug to allow clearance for the pins. In addition, the bottom edge of the key must have crenellations so that it will not be obstructed by the driver pins as it turns through 180 degrees. The plug also contains hardened rods and a drill-resistant crescent to hamper drilling of the cylinder. For further details refer to chapter 9 of Roper. Couillet (F) CU401 6 lever pump, end-bitted at key (3) Vachette VAC 45 (F) 6 lever pump These locks are mainly found in padlocks and use a at, end-bitted key to depress levers located at the bottom of a rectangular keyway. All 6 levers must be depressed simultaneously the correct amount in order to open the shackle. No turning is required. (See Code Locks.) Deny (F) 5DY1 warded 3 lever, symmetric double-bitted (2-3) The Deny lever lock is a very unusual lock. The core of the lock is fixed and is constructed with a stack of pressed steel laminations. The laminations are cut away in places to leave room for 3 levers mounted on rods. Other laminations form the intricate internal warding of the cylinder. The key is symmetric and double-bitted, with as many as a dozen cuts in each side. The only active parts of the key are those that contact a lever inside the core. These bits must be sufficiently long to actuate the levers, which occurs in a particular sequence due to the positioning of the rods around the core. The rods pass through the back part of the core to a chamber whose entry is blocked by a movable cover. The cover is held fast by two interlocking latches fixed to the rods, with the last rod arranged to rotate the cover once the latches have been displaced by turning the key through 90 degrees. With the cover rotated by a first 90 degree turn of the key, the key is in a position to slide through the gate and into the chamber. The stem of the key must then be long enough to enable the bit to engage a locking cam at the rear of the cylinder, which is slotted so that the key will turn it once introduced. The difficulty in opening a lock such as this is in locating the active parts, i.e., the levers, and operating them in sequence to access the gate. The lock may be defeated by impressioning, and a fair portion of the warding is visible in the keyway. DOM IX (D) DM22 10 pin-tumbler, horizontal keyway (4-5) Spider (IL) SPR1 Tesa (E) TE4 Yard-Yardeni (IL) YD3R February 11, 2002 Page 12 Catalogue of High Security Locks v1.00 The DOM IX lock is recognisable by its horizontal keyway. There are two rows of five pins which protrude vertically into the keyway. The two rows of pins are staggered. The plug and barrel can contain up to 5 hardened roller inserts and a ball to protect against drilling. Often the active end of the lower pins is cut away on both sides, leaving only a thin wedge which is operated by indentations in the key blade. The lower pins come in 5 different lengths, so that the number of key differs is nominally 9.7*10^6, not counting profiling options. Driver pins are tear-drop in cross section (so they cannot rotate in the pin chambers) and come in several styles including hardened pin cores, spool drivers and even special stacked-spool drivers of multi-disc construction that can skew at several different shear lines and block the plug. DOM IX-10 cylinders have up to 10 profile control pins in addition to the 10 pin-tumbler pairs. These are arranged as 5 vertical and 5 lateral control pins. Lateral control pins act on one edge of the key blade and the key must have corresponding dimple cuts to allow the pins room to retract and clear the shear line as the plug is turned. Vertical control pins act in the center of the underside of the key. The key is symmetric and 3 of its 4 sides are active simultaneously when it is inserted. In addition the keyway has many variations in the warding to control keyway access. The profile pins do not increase the lock's resistance to picking, they are an adjunct to the fixed keyway warding. The DOM IX-5 cylinder uses a single row of 5 pin-tumblers plus up to 10 vertical/lateral profile control pins. In the space formerly occupied by the second row of pin-tumblers bittings, there is a longitudinal channel in the key with a hole bored through the blade between the 4th and 5th pin positions. A steel ball is mounted in this hole and is free to move a limited distance either side of the key blade. The plug contains a fixed pin or ward (the ball-de ection pin) which slots into the corresponding channel of the key as it is inserted. Behind this fixed pin is a movable blocking pin that must be raised to enable plug rotation. The keyway in the vicinity of the blocking pin is enlarged slightly to form a ball-de ection chamber. The ball in the key blade is able to manoeuvre under the first fixed pin (and into the ball-de ection chamber) and reposition itself in the channel so as to raise the blocking pin. The mode of operation is similar to what happens when a feeler pick is used to raise a single pin. Clearly a fixed-blade key cannot change its width to mimic this effect. DOM even makes a split-bladed key for safety deposit boxes, requiring both halves of the key to be inserted to open the lock. All said, this is a very nice lock design. EVVA GPI (A) EV9 5 pin-tumbler, security keyway (3-4) ASSA (SW) ASS4 7-pin Best (US) BES1 6-pin (removable core) Cisa (I) CS17 5-pin DOM S (D) DM65-00 6-pin Russwin (US) RW11 6-pin Sargent (US) SAR3 6-pin Teka (SW) TK3 6-pin Tok-Winkhaus (D) TO18 5-pin Vachette (F) VAC48 5-pin Wilka (D) WK50R 5-pin Yale (D,UK,US,I) 5 - 7-pin Zeiss Ikon (D) ZE11 6-pin Although these are essentially conventional pin-tumbler locks (based on the Yale lock of the mid 1800s), they incorporate some serious security features. These include very severe keyway warding that makes the insertion of normal lockpicks very difficult; hardened inserts in plug and cylinder body, mushroom drivers; and up to 7 pins. Access control is achieved using high precision multiple side wards. The DOM S 5-pin profile cylinder, for example, uses torpedo-shaped (tapered) anti-picking lower pins as well as stacked-disc spool drivers. These drivers consist of a casing pin that houses 4 independent discs. February 11, 2002 Page 13 Catalogue of High Security Locks v1.00 Each of these can jam across the shear line in the same way as an ordinary spool driver. There are a total of 1024 profile variations on the keyway, allowing a very high level of mastering and access control. Ezcurra (E) 5EZ1 lever, double-bitted (3-4) Elzett (H) 7308E Kromer (D) 10-lever, double-bitted Mottura (I) MT MultiFort (F) 6-lever, double locking Nova Acytra (Arg) 6-lever, double locking Key bittings have constant width measured across both bits. Lock has 4 or more alternating sprung lever plates each with a gate at a certain height. In locks that may be opened from either side of door, the centre bitting operates the bolt. The lock has 4 or more alternating levers with the center bitting operating the bolt. Fac (E) FAC1R 5 + 5 pin-tumbler, single sided (3) Like two standard pin-tumbler locks set end to end. The key is single-sided and has space for 10 bittings. Fichet "sans souci" (F) 6FT12 10-lever, two bit key (4-5) The first time I saw a key for one of these locks, I thought it was a joke. The key has two separate bittings, each like a conventional 5-lever (Chubb) key, which have a combined length of about 4cm. You're doing well if you can fit the key in your pocket. The bittings are mirror images, so that the key may be used from either side of the lock. I imagine that the lock consists of two 5-lever locks, set one behind the other, that are opened simultaneously by the two key bittings. I'm not sure if the two parts of the lock are independent. By the way "sans souci" is French for "no worries". Fichet (F) 5FT1 6-lever, double-bitted (3-4) The lock has 6 or more crescent-shaped (horse shoe) levers mounted on a rotor that form a system of interlocking cams. The levers are sprung at one end and arranged in two stacks. Each lever can pivot about its midpoint and interlocks with the lever that opposes it. The key is double-bitted, non-symmetric and has constant width bittings. The end of the key bit actuates the bolt. Underlifting a lever causes it to block against one of two stumps in the lock housing. Over-lifting causes the horse-shoe arms of the opposing levers to jam, preventing the key from turning further. The correct key withdraws all the levers, such that they clear the two stumps and allow the plug assembly to turn. Fichet (F) FT500 10-wafer twin side-bar, H-profile key (4-5) The plug has 2 rows of 5 alternately sprung discs that counter-rotate when they are ball-driven by the key. Notches in the discs when aligned permit retraction of the twin side-bars and rotation of plug within cylinder. Anti-drill balls may be installed at vertex of the keyway and on the side-bar ends. False-depth notches on the wafers hamper picking. If you want a look at one of these, try the local French Embassy. Unfortunately, these interesting locks seem to be obsolete now, like many locks that do not conform to the popular euro-profile dimensions, or are otherwise not easily adapted. (See Fichet Surfinor.) February 11, 2002 Page 14 Catalogue of High Security Locks v1.00 Fichet Surfinor (F) FT4 7-wafer side-bar, M-profile key (4) Similar principle of operation to the Fichet FT500. The key is double-sided and has an M-shaped profile. Viewing the key with the "M" lying on its left side, viz. E, there are 4 cuts on the lower edge and 3 cuts on the top edge. The plug holds 7 wafers, each with a large centre cut-out that can move in a vertical plane and are alternately sprung (4 from below and 3 from above). Along the left hand edge of the plug there are two channels. Each of these contains a long strip, of which one is fixed and the other movable. The movable strip is sprung out from the plug. Two saddle pieces are arranged on the ends of the strips, and a side-bar rod is balanced in the central notch of each saddle. The left edge of each wafer is notched, and when all 7 notches are correctly aligned by the key, the movable strip retracts into the channel as the side-bar is forced from its groove in the side of the barrel. Some of the wafers may have false-depth notches to inhibit picking. Fichet-Bauche (F) radial pin-tumbler, 8-fin key (3) A radial pin-tumbler lock with 8 pins arranged in two rings of four pins. The keyway has the shape of an 8-pointed star, and the key has 8 corresponding pins arranged on a circular stem that tapers to a point at the end. One key fin is wider than the others and this is used to locate the key correctly in the lock. Each channel of the keyway contains a ball-driven radial pin-tumbler pair that must be depressed the correct amount to allow the plug to rotate. The plug and barrel are covered by a fixed shell that only allows the key to be inserted and retracted in one position. This also increases the difficulty of tensioning the plug during picking. Fichet 5000 (F) 10 lever pump, end-bitted (5) Fichet-Bauche (F) 6 lever pump, end-bitted (4-5) ISEO (I) 5IE5 lever pump, end-bitted/E-profile keyway (4-5) Mottura (I) MT2 lever pump, end-bitted/ at key (4-5) The Fichet 5000 is the successor to the Fichet FT500 and may be found adorning the doors of expensive Paris apartments. The key stem is butt-joined onto the bit which has 10 lever cuts on each side. The plug is protected by a fixed cover which conceals the bit when the key is turned. The Fichet-Bauche 6-lever pump lock is sometimes used in safes. The key is bit is butt-joined to the stem, but is slightly off centre, so the key may only be inserted one way. The end of the key has 6 cuts at a 45 degree angle to varying depths. The lock mechanism is mounted inside a domed housing, with a long barrel that extends to the front of the lock and forms a protective cover over for the keyway. The key bit depresses a set of parallel bars that extend down the barrel to the rear of the lock. Each bar operates a rocker arm whose other end is semi-circular and contains a notch. When all the notches are aligned, the bolt stump moves under spring action into the groove in the rockers. The bolt will then clear the housing and allows the plug assembly to turn. As in Fichet FT500 locks, the locking dog that drives the cam is in a retracted position until the key is inserted. There may be false depth notches in the rockers which jam the bolt stump. Mottura (MT2), Fichet (FT7), ISEO (5IE5), YALE (5YA1), Autori, Megablock etc. all have end-bitted keys and are similar to Fichet-Bauche except that the bitting cuts are perpendicular to the blade rather than at an angle. (See J. J. Muel.) Head (RC) HEA1R 5-pin + 4 profile pin, at key (2) As well as the usual row of 5 pin-tumblers at the top of the keyway, an additional 4 profile pins project into the keyway from the right hand side. The key is single sided with bittings in the top of the blade and February 11, 2002 Page 15 Catalogue of High Security Locks v1.00 dimples in one side that address the profile pins. Despite the presence of side pins, the lock is not difficult to pick due to the poor quality of construction. Helason (A) 5HS2 4-sided pin-tumbler, round key (4) YBU (J) 10-pin radial, tubular (3) Prefer (I) PF10TP The Helason cylinder lock has 4 rows of 4 pins (16 in total) arranged symmetrically in a cylindrical keyway. The keyway has a shallow notch to guide a locating fin in the key. The key itself is round and has 4 rows of at-bottomed V-cuts in the stem. Each ring of four pins is at the same depth and fills the small keyway, so there is little room for a lockpick. The YBU lock is used on security shutters and has a symmetric key that can be inserted from either side of the lock. There are 5 rows of 2 pins arranged radially around the keyway. The key is tubular with dimples cut in 5 rows of 4 (only 10 of which are active when opening the lock). A small recess in the end of the key accepts a stud protruding into the keyway that is used to turn the plug. Ingersoll (UK) ING1 10-lever, double-sided (4-5) Ingersoll "impregnable" locks have a W-shaped keyway anked by what appear to be ordinary wafer tumblers. The key is double-sided with non-symmetric cuts that are staggered from top to bottom. The wafers drive semi-circular levers arranged around the plug. Each of the ten wafers must be raised so that the levers are ush with the plug, allowing it to turn. The rotation of the plug is heavily damped, so that very little vibration feeds back to the picker while tensioning the lock. Ingersoll padlocks are extremely large and rugged, with a suitably thick, ball-locking shackle. A local locksmith once told me that an expert lock picker took 3 hours to pick one of these during a professional demonstration. Kaba Quattro (CH) KA1 22 pin-tumblers in 4 rows, dimple key (3-4) Kaba Gemini (CH) KA5 14 pin-tumblers in 3 rows, dimple key (3-4) Keso 2000 (CH) KE1 Efco Kaba (AUS) KA1 Lips (NL) LP11 Sargent (US) KE4 JPM 2002 2x5 pin-tumbler Showa X-Key 2x5 pin-tumbler (3) Vachette Radial Si (F) VAC91 (3-4) The Kaba series of locks are pin-tumbler locks with between 2 and 4 rows of pins protruding about half a key width into the keyway. Concentrating on the Kaba Quattro, this has 4 rows of pins arranged in an "X" around the top part of the keyway. Vachette Radial is similar, but the rows of pins are clustered around the top right hand side of the keyway, spanning an angle of about 130 degrees, and the pins are smaller in diameter. The key is reversible, so that it can be inserted either way round to operate the lock, and is covered with small depressions called "dimples". Counting anti-clockwise from the bottom right row, there are 5, 6, 5, 6 pins per row, totalling 22. Lower pins come in 5 different lengths (from 0.126" to 0.182" in increments of 0.014") and are anged at the top end so that they cannot fall into the keyway. The pins are extremely short and made of stainless steel. Since the overall diameter of the barrel is comparable to the standard profile cylinder, there's not much room for drivers and springs. For this reason, the drivers are hollow caps with an internal spring. Some of the lower pins may be spooled to render the already delicate job of picking more difficult. February 11, 2002 Page 16 Catalogue of High Security Locks v1.00 The pins, drivers and springs are inserted into the core and then covered by a thin metal retaining sleeve. Kaba Gemini has three rows of pins: one at the top of the keyway and two opposing rows further down. The Japanese X-lock has only two opposing rows of 5 pins. The keyway is basically rectangular, with perhaps a couple of shallow side wards. Mastering is accomplished by replacing some of the lower pins by blank tumblers that are at the shear line and so do not need to be lifted (in fact they do not extend into the keyway at all). This compromises slightly the security of the lock by reducing the number of active pins. These locks can be picked using special tools, but very light tension is required so that pins do not bind at the wrong height. Once picked, care must be taken not to allow some of the driver pins to spring into the keyway when the plug is turned through 180 degrees. Laperche (F) 5LH1 5 wafer pump, round-stem key (4) Progres Fontaine (F) 5PE5 5 wafer pump (4) Vigie Picard (F) 5VP3 5 wafer pump (4) These locks are all loosely based on the Bramah lock. The key bittings are milled into the end of the key stem, with adjacent cuts overlapping somewhat, such that at least some part of the stem is left to actuate the wafers. Turning tension is provided by a bit or fin in the key. The pump pins or wafers are constrained to slide in a channel and must be depressed to the appropriate depths to allow the plug to rotate. As in Bricard, Chubb AVA locks etc., the keyway is such that the bit is obscured by the shell of the lock when the key is turned, making tensioning by external means difficult. Vigie Picard locks have additional wards formed by two balls that jut into the keyway from either side. These also keep the key and pump wafers at the correct depth as the plug is turned. LCA (US) 8 torsion-tumbler, at key (2) LCA (Lock Corporation of America) locks use a double-sided at key to operate 8 torsion-tumblers. The tumblers are unconventional in that they are housed in a cylindrical shell and have a semi- circular edge which acts as a spring as it compresses against the shell. The wafers resemble Schlage wafer-tumblers in shape, except that they are not sprung. The wafers have a protrusion which normally blocks the rotation of the plug. The correct key retracts all 8 wafers into the plug which is then free to turn. LCA also make conventional at-key lever locks, as commonly used in lockers. Lockwood V7 (Aus) 7-pin cylinder, alternately sloped bittings (2-3) Like its name, the V7 has a 7 pin-tumbler cylinder. Pins are arranged on alternate sides of a "V" along the top of the keyway. The key has 4 bittings on a 30 degree slope to the right and 3 on the reverse slope to the left. Warding makes keyway access to picks difficult as well as the negotiating of the "V" groove. Medeco Biaxial (US) 6 - 7 pin-tumbler + side-bar, angled bittings (4-5) Medeco (US) 4-pin side-bar, angled bittings (4-5) Medeco locks come in two basic avours. The bi-axial, which uses 6-7 upper and lower pins and a sidebar, and a smaller-bodied version using only 4 lower pins and a side-bar. Both versions have a UL rating. Externally, Medeco cylinders look like ordinary pin-tumbler cylinders, except for the V-shaped bottoms on the lower pins. Both types are high security locks, utilizing hardened inserts (ball, crescents and rollers) to resist drilling. The 6-pin Medeco uses slotted lower pins, spooled drivers, optional mastering pins, and a 6-bar side-bar. The pins must simultaneously be raised to the shear line and rotated (to one of three or more angles) in order to engage the side-bar. Lower pins have a fin which limits the range of rotation within the pin February 11, 2002 Page 17 Catalogue of High Security Locks v1.00 chamber. The slots in the lower pins are sometimes visible in the keyway, allowing limited reading of the lock. For further details refer to chapter 8 of Roper. The 4-pin Medeco is like the larger 6-pin version without the driver pins. Instead, pins are sprung directly from within the plug, which has a retaining clip covering the pin chambers. Pins are limited in their angle of rotation, and have one or more holes machined radially into the side. For each pin, the hole in the pin must be raised and rotated the correct amount to align with the corresponding side-bar extrusion (or fence). Once all pins are correctly lifted and oriented, the side-bar is forced into the plug (against spring action) as the key is turned. The principle of operation is similar to that of the BiLock. False depth holes in the pins, or grooved pins, cause the side-bar posts to stick, effectively locking up the mechanism and rendering picking extremely difficult. Miwa (J) MIW1 10 wafer-tumbler, at double-sided (1-2) Schlage (US) SH1 wafer-tumbler, at double-sided (1) Schlage wafer locks have 8 semicircular wafers arranged linearly in a tubular shell in the barrel of the lock. The wafers protrude above or below the rim of the shell and must be simultaneously retracted by the double-sided key (which is at apart from a central gutter) in order for the plug to turn. Miwalocks can house up to 10 wafer-tumblers and are precisely machined. Some wafers have a reduced width end that hampers picking since it will not contact the barrel at the same time as the other wafers when tension is applied. J. J. Muel (F) M1 1-7 lever pump, end-bitted (4-5) Vak "Genius" (F) M7-1 10-lever pump, end-bitted key + chip (5) The Muel "incrochetable" (French for "unpickable") lock has a rectangular keyway concealing a row of between 6 and 10 pump-type levers. These are placed like teeth across the width of the keyway. Each lever is at at the rear end with a deep notch to accommodate the bolt stump. The levers are pivoted seesaw style across the square plug, with a their smoothly curved, active end and sprung from below. The key is end bitted with cuts at a 45 degree angle to the blade to pick up the curved end of the levers. The key blade is not reduced at the neck (unlike Fichet-Bauche end-bitted keys). Key cuts can be on either side, to suit the orientation of the levers, which are reversible. Additionally, a pitted cut in the key accepts a single scoop-type lever which would be over-raised by a normal angled bitting. The cut for the scoop lever requires a special machine to cut it, and thus keys are supplied by the dealer with this cut already in place (i.e., a dealer perm). The end bittings of the key raise the levers as the key is inserted. A side bit on the key limits the insertion depth, at which point the levers should be in the desired configuration. Further force pushes the plug assembly toward the bolt stump, against a very strong spring. The side bit in the key keeps the plug pushed in while it is turned. Small jags on either side of the notch (like those in a Chubb lock) will trap a mating V-notch in the bolt stump if the levers are not correctly aligned. The amount of force required to keep the plug at the depth where it meets the bolt stump, together with the anti-pick notches, makes picking this lock very hard. The French claim it is unpickable. The VAK "Genius" is a 10-lever pump Muel cylinder with a microchip in the key stem. A set of pads on the key make an electrical connection when the key is inserted, and the information burnt into the chip is then read electronically by lock (like the smart cards used in public telephones). In my opinion, this one is a complete overkill, as the mechanical part of the lock is essentially redundant. (See Fichet-Bauche.) Mul-T-Lock (IL) MTK1 10 pin-tumbler (concentric), horizontal keyway (4-5) The Mul-T-Lock, like the DOM IX, has a horizontal keyway. There is a single vertical row of what look like five fat pins located close to the right hand edge of the keyway. These are actually concentric (or coaxial) February 11, 2002 Page 18 Catalogue of High Security Locks v1.00 pin pairs which function totally independently, bringing the pin tally to 10. The key is symmetric and can be used both ways round. There may be longitudinal wards anking the pins on each side, making it hard to manipulate the pins. Each pin pair consists of an inner pin with its own (mushroom) driver and spring operating inside a hollow outer pin. The outer driver is capped at the top to house the inner pin spring and may also be spooled. The spooled drivers make the lock extremely hard to pick, as keyway access is already limited. As is the norm in high security locks, the front of the plug and cylinder contain hardened steel rollers to defeat direct drilling. The key is especially hard to duplicate since some of the inner pins may have to be raised above the level needed by the outer pins. This creates a bump in the centre of the main at-bottomed cut for the outer pin that requires a special machine to cut the key. The lock is susceptible to front shimming if the lip of the plug is ground down. Rivers (UK) 6 pin-tumbler, extended-stem (2-3) Wally (I) KK1 9-pin, extended-stem (3-4) Rivers locks usually have a dummy key-in-knob at the front which is free to turn. The key is unusually long and must be inserted past the handle part to reach the pins at the rear of the lock. There are typically 6 pins in the cylinder, which is geared to retract heavy bolts set in channels at the back of the door. When the correct key is inserted, it links the handle to the plug and enables the bolts to be withdrawn by turning the handle. The active part of the lock can be reached with sufficiently long picks and tensioner. Schlage Primus (US) 6-pin + side-bar, dealer perm key (4-5) A standard schlage 6-pin cylinder supplemented by a row of 5 profile pins on one side of the key blade. The indentations in the side of the key are grooved to depress and rotate the pins to allow side-bar posts to slot in. The vertical pins must of course be at the shear line at the same time as the side-bar is retracted. A description of a Schlage Primus cylinder was posted in article 2686 (Date: 19 Nov 1993 17:24:03 EST) of alt.locksmithing by "Hobbit" (email:hobbit@babyoil.ftp.com). Sea (CH) SEB1 bar-tumbler, 4 track key (3-4) Hasler (D) Bell (US) 2-track key (3-4) Vachette (F) VAC41 1-track key (3) Sea locks contains 6 or more alternating bar-tumblers (like a wafer-tumbler cut lengthways in two) arranged on both left and right sides of the keyway. The bars are sprung either from above or below and have a peg that protrudes to about 1/3 of the width of the keyway. The key is a 4-track type with two milled grooves in each side of the blade. The grooves diverge at the end of the track so as to pick up the pegs as the key is inserted. The pegs are lowered or raised by the track and all must be aligned with the rim of the plug to allow it to rotate. Bell locks have two tracks, and Vachette (VAC41) a single track. Both of these operate in the same way as the Sea lock. The bars do not actually need to be sprung, as they are constrained by the track in the key. A special pick is required for these locks. Tok-Winkhaus (D) TO11 5 + 5-pin, dealer perm (3-4) Vachette 2000 (F) RO41 5 + 5-pin, dealer perm (3) Winkhaus and Vachette locks look deceptively like conventional pin-tumbler cylinders. However, in addition to the severe warding on the keyway, there are 5 cleverly concealed profile control pins (dealer February 11, 2002 Page 19 Catalogue of High Security Locks v1.00 perm). In Vachette locks, there are 2 conrol pins on the lower left and 3 on the lower right side of the keyway, distributed between the 2nd and 5th pin-tumblers (counting from front to back). The profile pins are ball driven and are of a smaller diameter than the main pin-tumblers. The bore for each profile pin is drilled parallel to the conventional pins, but off the main axis of the plug, so that it cuts through the warding into one side of the keyway. A control rod with tapered ends rests atop the ball, and is raised when the profile ball is displaced by the profile notches in the key. The rods must be raised slightly (in varying degrees) to bring the driver pins to the shear line. The off-axis driver pins are cylindrical with at ends, unlike DOM IX pins which have a curved surface that matches the curvature of the plug. Since the control rods are not centrally located in the plug, only rods on one side will be active depending on the direction of opening (the other rods will slide under the drivers as the plug is turned, as long as they are not over-raised) - this is a slight aid in picking the lock. Despite this, it is a difficult job picking the profile pins to allow the top pins to be picked -there is very little room to maneuver. Zeiss Ikon (D) XZ1A 16 pin-tumbler, cruciform key (1-2) Moreaux (F) XM1 Papaiz (BR) XPZ1 Tuff (HK) XTF3 Moreaux and Zeiss Ikon locks have a cruciform keyway in which there are between 3 and 4 rows of pins (up to 4 pins per row). One of the channels is usually wider than the others and this locates the thicker part of the key blade. The key is bitted on 3 or 4 sides as appropriate. With ordinary pins, these locks are not difficult to pick, although a double-sided tension wrench may be needed. Sometimes these locks are used in safes, in which case the lock is set a long way back and the key has an extended stem. Zenith (F) 7-pin tubular, pronged key (2-3) Izis Arnov 5-pin tubular, pronged key (2) Basically a glorified ACE/GEM tubular lock. The pins, which are push-type, are flush with the front of the barrel and are depressed by prongs on the key. The turning force is provided by the key prongs themselves, making it hard to tension the lock. In Izis Arnov locks, a hole in the plug, at the centre of the circle formed by the pins, accepts the stem of the key which also has a locating fin to do the tensioning. Zenith Cavith (F) 5-pin pump + 3 pin-tumbler (4) See description for Central locks. The only extra is the presence of 3 standard radial pin-tumblers in the groove occupied by the locating fin of the key. The key has bittings on one fin to fit the side pins while the other pins are cut to depress the pump pins to the correct depths. The radial pins seem to be an unnecessary add-on to an already well-designed lock. Magnetic/Electronic/Combination Locks Anker (F) magnetic Card-Key Cor Key (US) Cyphalok DKS (AUS) 12 magnets per side Elzett (magnetic) + profile ball EVVA MCS (A) 4-magnet + control pins (at 3 angles) GEC Guestkey (UK) 8 binary bittings/side Lockwood Digital Maglock February 11, 2002 Page 20 Catalogue of High Security Locks v1.00 Marlock+(US) Miwa (J) + profile ball 2x4 magnet Monoblok (F) + profile ball NT magnetic cylinder lock (8 per side) Omnicard (card lock) Schlage Magnetic entrance set Simplex+ Vendpass card lock Ving card+ A description of these locks has appeared in Hobbit's directory on ftp.com /hobbit/ amage/mine/hotel.lox Car Locks Toyota (Lexus, Landcruiser) (c.f. Bell, Sea) Ford EB (AUS) FO21P (c.f. Abus. Abloy, Chubb SMI) Ford Tibbe (D) FO19P Giobert S.A.F.E. (I) GT2 GM Holden VN Commodore (AUS) GM9 HUF YMOS (D) OPEL YM27 inverted 2-sided 10-wafer Mercedes 2 track (D) HUF YMOS (D) HU39P symmetric bilateral wafer Mercedes 4 track BMW (D) Renault 20TS, Errebi (F), Vachette VAC64S, Neiman NE33S (c.f. Helason) double-sided round-stem key Porsche HUF symmetric bilateral wafer 45 degree Neiman (D, F, J, UK, US) NE55 hole in blade, NE20 warded Unknown Alke (I) ALK1 (looks like red phone key - lever + pin) DUO (3-sided wafer) O. Novox (F) ON1, Decayeux, DAD (F) DD1 precut, square (not tapered) end MSV (P) MSV1, SOFER (P) SOF1 - centre ward, double blade Perino (I) PN1, IMSI (PG) GEM + 5 (US) 7-pin tubular with embedded 5-pin at key Monarch shutter (grooved wafer) (like American) MCM, Mondragon MC3 Takigen (J) Yale (UK) YA101 (mail box) Other Locks Pay Phone Locks Post Office Box Safety Deposit Box Locks Safes c 1994 by Graham W. Pulford Please distribute this document without modification. Send any comments, corrections, and suggestions for improvements to: Graham Pulford gwp@mullian.ee.mu.oz.au February 11, 2002 Page 21