Jumat, 15 Juni 2018

Sponsored Links

src: i.ytimg.com

The key is a mechanical or electronic fasteners that are removed by physical objects (such as keys, keycards, fingerprints, RFID cards, security tokens, coins etc.), by providing confidential information (such as a lock code or password), or with a combination of both.


Video Lock (security device)



Histori

Antiquity

The earliest known keys and key devices are found in the ruins of Nineveh, the ancient Assyrian capital. Such keys are then developed into Egyptian wood pin keys, which consist of bolts, fixture doors, and locks. When the key is inserted, the pin inside the fixture is lifted out of the hole drilled in the bolt, allowing it to move. When the key is released, the pins fall into the bolt, preventing movement.

The keys that are preserved are also present from ancient times and remain the most recognizable key and design key in the Western world. The first metal keys appeared between 870 and 900, and were associated with British craftsmen. It is also said that the key was created by Theodorus of Samos in the 6th century BC.

Rich Romans often store their valuables in safe locked boxes in their households, and wear keys as rings on their fingers. The practice has two benefits: saving the key is useful at all times, while indicating that the user is a rich person and important enough to have the money and the jewelry worthy of being secured.

Modern key

With the start of the Industrial Revolution in the late 18th century and as the development of precision engineering and standardization of components, locks and keys were produced with increasing complexity and sophistication.

The lever hand lock, which uses a set of levers to prevent the bolt from moving in the lock, was refined by Robert Barron in 1778. The lock of the double locking lever requires the lever to be lifted to a certain height by cutting the gap in the lever, so lifting the lever too far is as bad as not lifting lever far enough. This key type is still in use today.

The key lever lever was greatly enhanced by Jeremiah Chubb in 1818. The robbery at Portsmouth Dockyard prompted the British Government to announce a competition to produce a key that could be opened only with its own key. Chubb develops a Chubb detector key, which incorporates integral security features that can thwart unauthorized access attempts and will show the key owner if it has been interrupted. Chubb was awarded Ã, Â £ 100 after a trained lock-picker failed to unlock after 3 months.

In 1820, Jeremiah joined his brother, Charles, in starting their own key company, Chubb. Chubb made numerous improvements to his key: his enhanced design in 1824 did not require special key controls to reset keys; in 1847 the key used six levers instead of four; and he then introduced a disk that allows the key to pass but narrowed the field of view, hiding the lever from whoever tried to pick up the key. The Chubb brothers also received a patent for the first burglar safe and began production in 1835.

Barron and Chubb's designs are based on the use of movable levers, but Joseph Bramah, a prolific inventor, developed an alternative method in 1784. The key uses a cylindrical key with the right notches along the surface; this moves the metal slides that block the bolt turns in the right direction, allowing the lock to open. The key lies within the limits of precision manufacturing capabilities at the time and is said to be found by the discoverer to be irreparable. In the same year Bramah started the Bramah Locks company at 124 Piccadilly, and displayed "The Key Challenge" in her shop window from 1790, challenging "... the artist who can create the instrument that will take or unlock this" for a reward of £ 200. The challenge stood for more than 67 years until, at the Great Exhibition of 1851, American locksmith Alfred Charles Hobbs was able to unlock and, following some arguments about the circumstances in which he opened it, was awarded a prize. Hobbs' effort takes about 51 hours, spread over 16 days.

The earliest patent for a double-acting tumbler pin key was given to American physician Abraham O. Stansbury in England in 1805, but the modern version, still in use today, was discovered by American Linus Yale, Sr. in 1848. This key design uses pins of varying length to prevent keys from being opened without the correct keys. In 1861, Linus Yale, Jr. inspired by the original 1840's pin-tumbler keys designed by his father, thus creating and patenting smaller flat keys with jagged edges and pins of varying lengths within the lock itself, the same design of a pin-tumbler key that is still in use until now. The key to modern Yale is essentially a more advanced version of the Egyptian key.

Despite some improvements in the main design since, most of today's keys are still variants of the design created by Bramah, Chubb and Yale. Each key combination is determined by an off-set of two tools such as a small wheel. Wheel position changes on top of each other creates a unique combination for the key.

Maps Lock (security device)



Key type

Lock with physical key

The underwritten key uses a series of obstructions, or environments, to prevent locks being opened unless the correct key is entered. The key has a notch or slot that matches the barrier in the lock, allowing it to spin freely inside the lock. Damaged keys are usually reserved for low security applications because a well-designed skeleton key can successfully unlock various keys that are blocked.

The pin tumbler key uses a set of pins to prevent locks being opened unless the correct key is entered. The key has a series of grooves on either side of the lock that restrict the type of lock that the key can shift. When the key shifts to a key, the horizontal groove on the blade is parallel to the ward at the entrance that allows or refuses entry to the cylinder. A series of pointed teeth and notches on the blades, called bittings, then allow the pins to move up and down until they are aligned with the sliding line of the inner and outer cylinders, allowing the cylinder or cam to rotate freely and open keys.

The tumbler wafer key is similar to a tumbler pin key and works on the same principle. However, unlike a pin key (where each pin consists of two or more pieces) each wafer is one piece. The wafer tumbler lock is often mistakenly referred to as a tumbler glass key, which uses completely different mechanisms. The wafer locks are relatively cheap to produce and are often used in cars and cabinets.

The disc tumbler lock or Abloy lock consists of a rotating rotary deter disk. They are considered very safe and almost impossible to choose with standard tools.

The lever hand lock uses a set of levers to prevent the bolt from moving inside the lock. In its simplest form, lifting a tumbler above a certain height will allow the bolt to pass through it. Lock levers are usually hidden inside a wooden door or on some older form of padlock, including a fire brigade padlock.

Lock with electronic key

Electronic locks work by using an electric current and are usually connected to an access control system. In addition to the pins and tumblers used in standard locks, the electronic lock connects the bolts or cylinders to the motor inside the door using a section called the actuator. Electronic key types include the following:

Keycard keys operate with flat cards using the same dimensions as credit cards or US and EU driver licenses. To open the door, someone needs to successfully match the signature in keycard .

The key in a typical remote keyless system operates with a smart key radio transmitter. The key usually receives a certain valid code only once, and the smart key transmits a different roll code every time the button is pressed. Generally the car door can be opened with valid code by radio transmission, or with a tumbler pin lock (non-electronic). The ignition switch may require a transponder car key to unlock the tumbler pin and also transmit valid code via radio transmission.

smart keys are electromechanical keys that are instructed to lock and unlock doors from authorized devices using cryptographic keys and wireless protocols. Smart locks have started to be used more commonly in residential areas, often controlled with smartphones. Smart key is used in workspaces and offices to enable keyless office entries.

The sidebar key operates using a fin on a radial lock that moves the sidebar parallel to the cylindrical code bar inside the lock. This is a new key technology of a new type developed by Australian Lock Company. Buttons and code bars are truncated using a computer numerical control computer (CNC).

src: i.ytimg.com


Locksmithing

Locksmiths are traditional trades, and in most countries require apprenticeship settlement. The required level of formal education varies from country to country, from simple training certificates provided by employers, to full diploma from an engineering college. Locksmiths may be commercial (work outside the storefront), move (work outside the vehicle), institutional, or inquiry (forensic locksmith). They may specialize in one skill aspect, such as a key automotive specialist, a key system specialist or a secure technician. Many also act as security consultants, but not all security consultants have the skills and knowledge of the locksmith.

Historically, the locksmith built or improved the entire key, including the constituent parts. The emergence of cheap mass production has made this less common; Most of the keys are fixed through a like-for-like replacement, high security safes and robust boxes are the most common exception. Many locksmiths also work on any existing door hardware, including door closers, hinges, electric strikes, and frame repair, or service electronic locks by generating keys for vehicles equipped with transponders and applying access control systems.

Although the installation and replacement of key remains an important part of locksmithing, modern locksmiths are mainly involved in the installation of high quality lock sets and the design, implementation, and management of key and key control systems. Locksmiths are often necessary to determine the degree of risk to individuals or institutions and then recommend and apply the right combination of tools and policies to create a "layer of security" that exceeds the reasonable advantage of an intruder.

Full disclosure

Full disclosure requires that full details of security vulnerabilities be disclosed to the public, including details of vulnerabilities and how to detect and exploit them. The theory behind full disclosure is that releasing vulnerability information immediately results in better security. Improvements are produced faster because vendors and authors are forced to respond to protect their systems from potential attacks and to protect their own image. Security is enhanced because of the exposure window, the amount of time the vulnerability is open to attack, decreases. The issue of full disclosure was first raised in the controversy of the 19th century about the disclosure of key system weaknesses to the public. According to A.C Hobbs:

Source of the article : Wikipedia

Comments
0 Comments