High-Security Mechanical Locks : an Encyclopedic Reference/Graham W

High-Security Mechanical Locks : an Encyclopedic Reference/Graham W

High-Security Mechanical Locks: An Encyclopedic Reference This page intentionally left blank High-Security Mechanical Locks: An Encyclopedic Reference Graham W. Pulford AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Butterworth-Heinemann is an imprint of Elsevier Elsevier Academic Press 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA 525 B Street, Suite 1900, San Diego, California 92101-4495, USA 84 Theobald’s Road, London WC1X 8RR, UK This book is printed on acid-free paper. Copyright c 2007, Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, E-mail: [email protected]. You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Library of Congress Cataloging-in-Publication Data Pulford Graham W. High-security mechanical locks : an encyclopedic reference/Graham W. Pulford. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-7506-8437-8 (alk. paper) ISBN-10: 0-7506-8437-2 (alk. paper) 1. Locks and keys–Encyclopedias. TS520.P854 2007 683.32–dc22 2007004202 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library ISBN 13: 978-0-7506-8437-8 ISBN 10: 0-7506-8437-2 For all information on all Elsevier Academic Press publications visit our Web site at www.books.elsevier.com Printed in the United States of America 07080910111210987654321 To Jill, Arthur, Lehene, HweeYing and Chlo¨e This page intentionally left blank Contents Acknowledgments xi Preface xiii 1 Introduction 1 1.1 Prologue........................................... 1 1.2 SecurityVersusObscurity............................... 5 1.3 Innovation in the Lock Industry .......................... 8 1.4 AdministrativeMatters ................................ 22 2 Pin-Tumbler Locks 31 2.1 Introduction........................................ 31 2.2 Inline............................................. 64 2.3 InlinewithPassiveProfilePins........................... 79 2.4 InlineHorizontalKeyway............................... 86 2.5 TwinInline......................................... 91 2.6 InlinewithActiveProfilePins ........................... 99 2.7 Cruciform.......................................... 111 2.8 MultipleInline....................................... 115 2.9 Tubular ............................................ 138 viii CONTENTS 2.10ConcentricPin....................................... 153 2.11RotatingPin........................................ 160 2.12PinMatrix......................................... 163 2.13Key-Changeable...................................... 168 3 Wafer Locks 173 3.1 Introduction........................................ 173 3.2 Conventional........................................ 186 3.3 Contoured.......................................... 190 3.4 Three-sided......................................... 194 3.5 InlinePushType..................................... 196 3.6 BellLocks.......................................... 199 3.7 Axial ............................................. 205 3.8 Key-Changeable...................................... 217 4 Side-Bar Locks 223 4.1 Introduction........................................ 223 4.2 DiscSide-bar........................................ 234 4.3 LeverSide-bar....................................... 252 4.4 Driverless-Pin Side-bar ................................. 264 4.5 WaferSide-bar....................................... 279 4.6 Dual-actionSide-bar .................................. 287 5 Lever Locks 313 5.1 Introduction........................................ 313 5.2 Conventional........................................ 349 5.3 Double-Throw....................................... 375 CONTENTS ix 5.4 Axial ............................................. 379 5.5 Radial............................................. 387 5.6 Cylindrical......................................... 394 5.7 Geared............................................ 409 5.8 Trap-Door.......................................... 414 5.9 Twin.............................................. 416 5.10Variable........................................... 420 5.11Dual-Control........................................ 430 6 Magnetic Locks 435 6.1 Introduction........................................ 435 6.2 MiwaMagnetic...................................... 448 6.3 Anker............................................. 450 6.4 MagLok ........................................... 454 6.5 MiracleMagnetic..................................... 457 6.6 EVVAMCS......................................... 459 6.7 SchlageCorKey...................................... 463 7 Car Locks 469 7.1 Introduction........................................ 469 7.2 Double-Sided........................................ 476 7.3 HoldenCommodore................................... 478 7.4 FordTibbe......................................... 479 7.5 FordChubb......................................... 482 7.6 GeneralMotors...................................... 484 7.7 MercedesTwo-Track.................................. 487 x CONTENTS 7.8 BMWTwo-Track..................................... 489 7.9 MercedesFour-Track.................................. 491 7.10Mitsubishi.......................................... 493 7.11Porsche............................................ 495 7.12AlphaRomeo ....................................... 497 7.13Volvo............................................. 499 7.14 Citro¨enSimplex...................................... 501 8 Conclusion 505 Bibliography 511 Figure and Table Credits 521 Appendices 525 AppendixA1:PermutationsandCombinations................... 525 AppendixA2:LockPermutationsandFractals.................... 530 AppendixB:TranslationsofLockVocabulary.................... 535 AppendixC:TerminologyandAbbreviations..................... 546 AppendixD:LockPatents.................................. 548 AppendixE:BriefHistoryoftheBramahLock................... 558 AppendixF:KeyCodeComputations.......................... 561 AppendixG:SecurityGradingsforCylinderLocks................. 573 Index 575 Acknowledgments Following the release in 1994 of the “Catalogue of High Security Locks v1.00” [101], the author has received correspondence from many people who have offered their views and feedback on material that has helped to improve the content, coverage, and accuracy of the information in this book. Many of these people, being contrib- utors to the alt.locksmithing newsgroup and other online forums, are known to the author only by their electronic mail addresses. For the sake of discreetness I cannot identify these people here, but my thanks go out to them nonetheless. Their helpful remarkswerearegularremindertometocontinueworkingonthisproject. In Australia, I had the good fortune to meet Norm Axford of Acorn Locksmiths and the Master Locksmiths Association (Australia), whose willingness to support this book was a great source of encouragement to me. I am particularly grateful to Ian McColl of Stockade Locksmiths, who greatly contributed to the completeness and coverage of the book and also assisted with the early stages of proofreading. I would also like to thank Rodney Loschiavo who generously shared with me his knowledge acquired during many years in the trade. I am grateful for the endorsement of Mark Wilson from the Sydney Institute of Technical and Further Education, who granted me access to the Ultimo workshop. Geoff Birkett of Olympic Keiler Security gave generously of his time to help ensure the accuracy of the material presented on several high-security locks. Meilin Yum’s willing assistance in typing part of the manuscript is gratefully acknowledged. In addition, I am fortunate to have had international collaborators. In this connec- tion I would like to express my gratitude to Nathan Schlossman, Oliver Diederich- sen, Tetsuya Ozawa, Han Fey, Paul Prescott, Tony Beck, and Alex Carter. I owe a special debt of gratitude to my friend and colleague, Jean-Marie Machefert, for many stimulating discussions and for imbuing me with some of his knowledge of the subtleties of the art, particularly in respect of French high-security locks. In the United Kingdom Michael Fincher, Richard Hopkins, and Jon Millington all pro- vided valuable assistance with the proofreading of the manuscript. I am indebted to Michael Fincher for allowing me to photograph some of his lock collection; his in-depth knowledge, especially of German locks, spared me the embarrassment of committing some major historical errors. It would be remiss of me not to extend my sincere thanks to the editorial and production team at Elsevier for transforming the manuscript into a book. xii ACKNOWLEDGMENTS A number of organizations are also deserving of mention for their assistance either with the supply of samples or in the provision of product information or services. In this context, the following businesses and companies are acknowledged: West Philadelphia Locksmith Co. (Philadelphia, U.S.A.), Lockmart (Toronto, Canada), Serrurerie Rapid-Securit (Paris, France), Quincaillerie d’Alembert (Paris,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    613 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us