146:
1898:, Journal of Refugee Studies 21 (4): 4, page 503: "Anyone familiar with Palestinian visibility practices will certainly be aware of the importance of certain central objects within this field. Many refugees still have the keys to their houses in Palestine. Keeping these keys, and showing them to visitors and researchers, is part of a hope for return and a claim to these properties. Given this widespread practice, these keys, with their distinctive old-fashioned look, have also become symbols of refugee commitment to Palestine. At demonstrations in support of Palestinians one can often find people carrying enlarged replicas of these keys—in the process transforming individual objects into collective symbols."
358:, a prolific inventor, developed an alternative method in 1784. His lock used a cylindrical key with precise notches along the surface; these moved the metal slides that impeded the turning of the bolt into an exact alignment, allowing the lock to open. The lock was at the limits of the precision manufacturing capabilities of the time and was said by its inventor to be unpickable. In the same year Bramah started the Bramah Locks company at 124 Piccadilly, and displayed the "Challenge Lock" in the window of his shop from 1790, challenging "...the artist who can make an instrument that will pick or open this lock" for the reward of £200. The challenge stood for over 67 years until, at the
537:
247:
550:
45:
525:
2359:
1050:
991:
1399:
1009:
1933:. "This key symbol for all the refugees in the world. We want to set a Guinness World Record to say that it is the right of these refugees to return back home. Actually this is linked particularly to Palestinian refugees."... Around 4,000 people filled the Katara Amphitheatre to witness the unveiling of the enormous key and enjoy the concert highlighted by the performance of the young Palestinian singer who is the first
1580:
2917:
810:. Locksmiths may be commercial (working out of a storefront), mobile (working out of a vehicle), institutional, or investigational (forensic locksmiths). They may specialize in one aspect of the skill, such as an automotive lock specialist, a master key system specialist or a safe technician. Many also act as security consultants, but not all security consultants have the skills and knowledge of a locksmith.
347:. Chubb made various improvements to his lock: his 1824 improved design did not require a special regulator key to reset the lock; by 1847 his keys used six levers rather than four; and he later introduced a disc that allowed the key to pass but narrowed the field of view, hiding the levers from anybody attempting to pick the lock. The Chubb brothers also received a patent for the first burglar-resisting
163:
732:
2952:
219:
785:
263:
2940:
2928:
275:
920:
302:
1550:
549:
1957:
536:
565:
uses a set of obstructions, or wards, to prevent the lock from opening unless the correct key is inserted. The key has notches or slots that correspond to the obstructions in the lock, allowing it to rotate freely inside the lock. Warded locks are typically reserved for low-security applications as a
214:
Affluent Romans often kept their valuables in secure locked boxes within their households, and wore the keys as rings on their fingers. The practice had two benefits: It kept the key handy at all times, while signaling that the wearer was wealthy and important enough to have money and jewellery worth
385:
was inspired by the original 1840s pin-tumbler lock designed by his father, thus inventing and patenting a smaller flat key with serrated edges as well as pins of varying lengths within the lock itself, the same design of the pin-tumbler lock which still remains in use today. The modern Yale lock is
614:
is similar to the pin tumbler lock and works on a similar principle. However, unlike the pin lock (where each pin consists of two or more pieces) each wafer is a single piece. The wafer tumbler lock is often incorrectly referred to as a disc tumbler lock, which uses an entirely different mechanism.
893:
Modern key cutting replaces the mechanical key following aspect with a process in which the original key is scanned electronically, processed by software, stored, then used to guide a cutting wheel when a key is produced. The capability to store electronic copies of the key's shape allows for key
644:
is a locking mechanism whereby the key utilizes magnets as part of the locking and unlocking mechanism. A magnetic key would use from one to many small magnets oriented so that the North and South poles would equate to a combination to push or pull the lock's internal tumblers thus releasing the
1841:
Michal concedes the fact that
Israelis do the same thing to the memory of the Nakba when saying "it was in 1948, enough talking about the past, let's talk about the future." When the Palestinians come with their keys , she says, "it's the same thing, it's a memory still burning in the hearts of
821:
Although the fitting and replacement of keys remains an important part of locksmithing, modern locksmiths are primarily involved in the installation of high quality lock-sets and the design, implementation, and management of keying and key control systems. Locksmiths are frequently required to
813:
Historically, locksmiths constructed or repaired an entire lock, including its constituent parts. The rise of cheap mass production has made this less common; the vast majority of locks are repaired through like-for-like replacements, high-security safes and strongboxes being the most common
577:
uses a set of pins to prevent the lock from opening unless the correct key is inserted. The key has a series of grooves on either side of the key's blade that limit the type of lock the key can slide into. As the key slides into the lock, the horizontal grooves on the blade align with the
1875:
Keys must always be the symbol of the
Palestinian "Nakba" – the "disaster" – the final, fateful, terrible last turning in the lock of those front doors as 750,000 Arab men, women and children fled or were thrown out of their homes in what was to become the state of Israel in 1947 and
196:, which consisted of a bolt, door fixture or attachment, and key. When the key was inserted, pins within the fixture were lifted out of drilled holes within the bolt, allowing it to move. When the key was removed, the pins fell part-way into the bolt, preventing movement.
120:
for access to the locked area; locks are meant to only allow persons having the correct key to open it and gain access. In more complex mechanical lock/key systems, two different keys, one of which is known as the master key, serve to open the lock. Common metals include
1308:
238:, as these locks were, according to certain sources, designed in such a way a person can still find the keyhole in the dark, although this might not be the case as the ornaments might have been purely aesthetic. In more recent times similar locks have been designed.
1949:
203:
was also present from antiquity and remains the most recognizable lock and key design in the
Western world. The first all-metal locks appeared between the years 870 and 900, and are attributed to English craftsmen. It is also said that the key was invented by
837:
113:, which is left protruding so that torque can be applied by the user. In its simplest implementation, a key operates one lock or set of locks that are keyed alike, a lock/key system where each similarly keyed lock requires the same, unique key.
297:
in 1778. His double acting lever lock required the lever to be lifted to a certain height by having a slot cut in the lever, so lifting the lever too far was as bad as not lifting the lever far enough. This type of lock is still used today.
1305:
1383:
524:
822:
determine the level of risk to an individual or institution and then recommend and implement appropriate combinations of equipment and policies to create a "security layer" that exceeds the reasonable gain of an intruder.
555:
Tubular lock: the key pins (red) and driver pins (blue) are pushed towards the front of the lock, preventing the plug (yellow) from rotating. The tubular key has several half-cylinder indentations which align with the
606:
to rotate freely and the lock to open. An additional pin called the master pin is present between the key and driver pins in locks that accept master keys, to allow the plug to rotate at multiple pin elevations.
939:) is a hole or aperture (as in a door or lock) for receiving a key. Lock keyway shapes vary widely with lock manufacturer, and many manufacturers have a number of unique profiles requiring a specifically milled
542:
Wafer tumbler lock: without a key in the lock, the wafers (red) are pushed down by springs. The wafers nestle into a groove in the lower part of the outer cylinder (green) preventing the plug (yellow) from
882:
The original key is moved along a guide in a movement which follows the key's shape, while the blank is moved in the same pattern against a cutting wheel by the mechanical linkage between the vices.
699:
every time the button is pressed. Generally the car door can be opened with either a valid code by radio transmission, or with a (non-electronic) pin tumbler key. The ignition switch may require a
1891:
1917:
286:
in the late 18th century and the concomitant development of precision engineering and component standardization, locks and keys were manufactured with increasing complexity and sophistication.
366:
was able to open the lock and, following some argument about the circumstances under which he had opened it, was awarded the prize. Hobbs' attempt required some 51 hours, spread over 16 days.
633:
uses a set of levers to prevent the bolt from moving in the lock. In its simplest form, lifting the tumbler above a certain height will allow the bolt to slide past. Lever locks are commonly
799:. The level of formal education required varies from country to country, from no qualifications required at all in the UK, to a simple training certificate awarded by an employer, to a full
1620:
842:
841:
838:
843:
1929:
The gigantic key, dedicated to all the refugees around the world, was unveiled in a spectacular show at the Katara
Amphitheatre last night featuring Palestinian Arab Idol winner
1863:
2070:
904:
and as a service of the specialized locksmith, though the correct key blank may not be available. More recently, online services for duplicating keys have become available.
840:
897:
Different key cutting machines are more or less automated, using different milling or grinding equipment, and follow the design of early 20th century key duplicators.
1829:
332:
that could frustrate unauthorized access attempts and would indicate to the lock's owner if it had been interfered with. Chubb was awarded £100 after a trained
1346:
226:
A special type of lock, dating back to the 17th-18th century, although potentially older as similar locks date back to the 14th century, can be found in the
1435:
145:
1888:
1270:
1909:
1652:
2040:
814:
exception. Many locksmiths also work on any existing door hardware, including door closers, hinges, electric strikes, and frame repairs, or service
1327:
981:
2063:
1612:
839:
1365:
389:
Despite some improvement in key design since, the majority of locks today are still variants of the designs invented by Bramah, Chubb and Yale.
373:
was granted to
American physician Abraham O. Stansbury in England in 1805, but the modern version, still in use today, was invented by American
234:. These locks are most likely Gothic locks, that were decorated with foliage, often in a V-shape surrounding the keyhole. They are often called
2273:
1934:
1683:
1483:
1293:
R. De Bruyn, ‘Oude sloten op deurtjes in het Liers begijnhof’, in: 't land van Ryen jaargang 17, aflevering 3–4, 1967, p. 158, article in Dutch
1564:
1823:
1534:
1467:
1393:
1077:
1713:
95:
is a device that is used to operate a lock (to lock or unlock it). A typical key is a small piece of metal consisting of two parts: the
2056:
2943:
530:
Pin tumbler lock: without a key in the lock, the driver pins (blue) are pushed downwards, preventing the plug (yellow) from rotating.
2019:
2005:
1990:
1855:
1760:
1574:
1544:
1518:
1154:
1008:
771:
1238:
1209:
2982:
321:
1191:
1160:
706:
A smart lock is an electromechanics lock that gets instructions to lock and unlock the door from an authorized device using a
2862:
2031:
1185:
753:
77:
718:
spaces and offices to enable keyless office entry. In addition, electronic locks cannot be picked with conventional tools.
246:
990:
2796:
749:
31:
695:
radio transmitter. The lock typically accepts a particular valid code only once, and the smart key transmits a different
2775:
2522:
1856:"'I spoke to Palestinians who still hold the keys to homes they fled decades ago – many are still determined to return'"
2877:
2867:
1081:
340:
1598:
1536:
The
Complete Book of Home, Site, and Office Security: Selecting, Installing, and Troubleshooting Systems and Devices
1343:
2992:
2266:
710:
and wireless protocol. Smart locks have begun to be used more commonly in residential areas, often controlled with
173:
2735:
1791:
856:
599:
294:
889:
by scrubbing it with a metal brush to remove particles of metal which could be dangerously sharp and foul locks.
2619:
2532:
913:
44:
1382:
Abreha, Kaleb G.; Kassa, Woubet; Lartey, Emmanuel K. K.; Mengistae, Taye A.; Zeufack, Albert G. (2021-12-18).
1262:
1642:
669:
to a motor within the door using a part called an actuator. Types of electronic locks include the following:
2977:
2836:
2790:
2720:
2517:
742:
324:
to announce a competition to produce a lock that could be opened only with its own key. Chubb developed the
2897:
2892:
2408:
2179:
2174:
2251:
2987:
2920:
2831:
2664:
2358:
2259:
2210:
1324:
1093:
688:
283:
1785:
1049:
88:), by a combination thereof, or it may only be able to be opened from one side, such as a door chain.
2801:
2755:
2692:
2654:
2553:
2425:
2378:
1675:
1362:
449:
363:
1487:
615:
The wafer lock is relatively inexpensive to produce and is often used in automobiles and cabinetry.
2951:
2750:
2659:
2594:
2502:
2430:
1647:
1459:
1073:
700:
641:
587:
469:
419:
325:
306:
2537:
2497:
707:
630:
611:
459:
290:
205:
661:
system. In addition to the pin and tumbler used in standard locks, electronic locks connect the
2872:
2599:
2492:
2343:
2015:
2001:
1986:
1819:
1766:
1756:
1570:
1540:
1514:
1463:
1389:
1181:
1150:
1120:
1110:
619:
439:
414:
180:
Locks have been in use for over 6000 years, with one early example discovered in the ruins of
2931:
1813:
1705:
2785:
2644:
2512:
2487:
1451:
944:
595:
574:
484:
424:
404:
370:
359:
329:
193:
2882:
2846:
2811:
2780:
2563:
2558:
2323:
2164:
1895:
1369:
1350:
1331:
1312:
1065:
1044:
901:
831:
818:
by making keys for transponder-equipped vehicles and implementing access control systems.
815:
654:
603:
454:
444:
317:
293:, which uses a set of levers to prevent the bolt from moving in the lock, was invented by
267:
38:
1750:
1452:
637:
inside wooden doors or on some older forms of padlocks, including fire brigade padlocks.
211:'The Romans invented metal locks and keys and the system of security provided by wards.'
2955:
1230:
2841:
2816:
2707:
2649:
2313:
2308:
2294:
1930:
1205:
977:
796:
658:
494:
382:
374:
313:
117:
81:
1889:
Refusing
Invisibility: Documentation and Memorialization in Palestinian Refugee Claims
703:
to both open a pin tumbler lock and also transmit a valid code by radio transmission.
680:. In order to open the door, one needs to successfully match the signature within the
381:
of varying lengths to prevent the lock from opening without the correct key. In 1861,
2971:
2760:
2740:
2373:
2333:
2328:
1430:
1385:
Industrialization in Sub-Saharan Africa: Seizing
Opportunities in Global Value Chains
1115:
1105:
965:
666:
591:
429:
355:
231:
126:
84:
or coin), by supplying secret information (such as a number or letter permutation or
1425:
879:
in a machine, with a blank attached to a parallel vise which is mechanically linked.
2806:
2715:
2682:
2674:
2634:
2584:
2568:
2461:
2413:
2393:
2290:
2286:
2230:
2118:
996:
960:
Keys appear in various symbols and coats of arms, the best-known being that of the
894:
shapes to be stored for key cutting by any party that has access to the key image.
886:
860:
792:
696:
673:
634:
567:
474:
464:
399:
333:
162:
134:
69:
1175:
1144:
2902:
2887:
2821:
2730:
2639:
2589:
2482:
2318:
2240:
2235:
2128:
2103:
969:
924:
804:
731:
711:
677:
579:
562:
509:
489:
344:
222:
Drunk man's lock at the bottom (black lock) and a regular modern lock at the top
200:
166:
73:
65:
2765:
2614:
2446:
2220:
2169:
2143:
2098:
2093:
2079:
2035:
1787:
A Dictionary of
Classical Antiquities: Mythology, Religion, Literature and Art
1028:
409:
218:
169:
1818:. Social, Economic and Political Studies of the Middle East and Asia. Brill.
1439:. Vol. 16 (11th ed.). Cambridge University Press. pp. 841–844.
354:
The designs of Barron and Chubb were based on the use of movable levers, but
2745:
2725:
2687:
2609:
2604:
2527:
2466:
2383:
2108:
1054:
940:
784:
715:
692:
662:
504:
434:
227:
97:
61:
1594:
262:
2826:
2697:
2624:
2456:
2418:
2388:
2348:
2338:
2225:
2138:
2113:
1344:
United States patent keyhole guide for locks and method of using the same
1000:
961:
499:
251:
85:
795:
is a traditional trade, and in most countries requires completion of an
274:
17:
2507:
2451:
2403:
2398:
2184:
2159:
1015:
919:
807:
800:
756: in this section. Unsourced material may be challenged and removed.
583:
479:
301:
185:
181:
150:
106:
68:
fastening device that is released by a physical object (such as a key,
49:
1643:"Kisi And KeyMe, two smart phone apps, might make house keys obsolete"
2770:
2215:
2133:
2123:
1306:
Echtpaar schrijft eerste boek sinds twintig jaar over Liers begijnhof
1058:
1032:
657:
works by means of an electric current and is usually connected to an
1815:
980:. But this is by no means the only case. Many examples are given on
2629:
2205:
2200:
1566:
The Geek Atlas: 128 Places Where Science and Technology Come Alive
1089:
1069:
1048:
918:
835:
783:
623:
300:
273:
261:
255:
245:
217:
189:
161:
144:
130:
122:
43:
1315:
nieuwsblad.be, Chris van Rompaey, 17 april 2018, article in Dutch
1770:
1736:
Webster's Third New International Dictionary of English Language
1085:
1068:
is the Palestinian collective symbol of their homes lost in the
973:
876:
348:
2255:
2052:
1454:
High-Security Mechanical Locks : An Encyclopedic Reference
1146:
Design Methodology and Relationships with Science: Introduction
725:
378:
109:
of the lock and distinguishes between different keys, and the
1177:
International Symposium on History of Machines and Mechanisms
1096:
for the world's largest key – 2.7 tonnes and 7.8 × 3 meters.
590:. A series of pointed teeth and notches on the blade, called
2048:
1424:
1027:
Some works of art associate keys with the Greek goddess of
386:
essentially a more developed version of the Egyptian lock.
871:(original) key. The process roughly follows these stages:
602:
of the inner and outer cylinder, allowing the cylinder or
172:
lock, from the 15th–16th centuries, made of iron, in the
1484:"Lock Making: Chubb & Son's Lock & Safe Co Ltd"
1910:"'Largest Key' dedicated to refugees around the world"
570:
can successfully open a wide variety of warded locks.
1149:. Eindhoven: Kluwer Academic Publishers. p. 32.
676:
operates with a flat card of similar dimensions as a
626:
lock is composed of slotted rotating detainer discs.
1180:. New York: Kluwer Academic Publishers. p. 43.
598:
to move up and down until they are in line with the
133:. The act of opening a lock without a key is called
2855:
2706:
2673:
2577:
2546:
2475:
2439:
2366:
2301:
2193:
2152:
2086:
1706:"What qualifications do I need to be a locksmith?"
1486:. Wolverhampton City Council. 2005. Archived from
1143:de Vries, N. Cross and D. P. Grant, M. J. (1992).
855:is the primary method of key duplication. It is a
37:"Car Keys" redirects here. For the 2023 song, see
1937:regional youth ambassador for Palestine refugees.
867:key is ground down to form the same shape as the
1613:"Ditch the keys: it's time to get a smart lock"
312:The lever tumbler lock was greatly improved by
1539:. McGraw-Hill Professional. 2006. p. 11.
2267:
2064:
1734:Gove, Philip Babcock, ed. (1981). "keyhole".
188:. Locks such as this were developed into the
8:
2012:Complete Course in Professional Locksmithing
1983:The Complete Book of Locks and Locksmithing.
1301:
1299:
900:Key duplication is available in many retail
1755:. New York: Dodge Publishing. p. 291.
1511:The Complete Book of Locks and Locksmithing
1072:, when more than half of the population of
2274:
2260:
2252:
2071:
2057:
2049:
1569:. O'Reilly Media, Inc. 2009. p. 445.
1289:
1287:
1084:. Since 2016, a Palestinian restaurant in
847:Video showing the process of cutting a key
1597:. Massachusetts Institute of Technology.
1509:Roper, C.A. & Phillips, Bill (2001).
1418:
1416:
772:Learn how and when to remove this message
336:failed to break the lock after 3 months.
27:Mechanical or electronic fastening device
972:, in Roman Catholic tradition the first
859:named after the metalworking process of
369:The earliest patent for a double-acting
1372:wired.com, Charlie Sorrel, 5 April 2010
1132:
986:
520:
149:Bronze lock in a form of scorpion from
1935:United Nations Relief and Works Agency
1908:The Peninsula Newspaper (2016-05-16).
1014:A key pictured in the coat of arms of
1623:from the original on 16 December 2014
1325:Dictionary, Lexicon of locks and keys
339:In 1820, Jeremiah joined his brother
7:
2939:
2927:
1738:. Merriam-Webster Inc. p. 1239.
1257:
1255:
1138:
1136:
754:adding citations to reliable sources
343:in starting their own lock company,
1749:Fox-Davies, Arthur Charles (1909).
1686:from the original on 3 January 2016
1363:V-Lock Helps Drunks Get Home to Bed
1353:patentimages, Eugene Toussant, 1990
1655:from the original on 11 March 2015
1080:and were subsequently refused the
875:The original key is fitted into a
25:
1998:All About Locks and Locksmithing.
1078:expelled or fled violence in 1948
586:allowing or denying entry to the
2950:
2938:
2926:
2916:
2915:
2357:
1601:from the original on 2013-05-29.
1583:from the original on 2016-05-01.
1553:from the original on 2016-11-21.
1423:Chatwood, Arthur Brunel (1911).
1194:from the original on 2016-10-24.
1163:from the original on 2016-10-24.
1007:
989:
730:
548:
535:
523:
362:of 1851, the American locksmith
1960:from the original on 2023-05-01
1920:from the original on 2023-05-01
1866:from the original on 2023-05-01
1832:from the original on 2023-11-10
1812:Meital, Y.; Rayman, P. (2017).
1716:from the original on 2019-05-23
1674:Kurutz, Steven (11 June 2014).
1402:from the original on 2023-11-10
1273:from the original on 2012-12-09
1269:. Slate Magazine. 15 May 2012.
1241:from the original on 2021-12-24
1212:from the original on 2010-04-20
741:needs additional citations for
377:in 1848. This lock design used
2863:Glossary of locksmithing terms
1950:"The Largest Key in The World"
1595:"Inventor of the Week Archive"
885:After cutting, the new key is
351:and began production in 1835.
1:
2797:Perimeter intrusion detection
1773:– via Internet Archive.
1710:Master Locksmiths Association
964:: derived from the phrase in
32:Lock and key (disambiguation)
2776:Miniature snap-action switch
2523:Time-delay combination locks
2010:Robinson, Robert L. (1973).
1752:A Complete Guide to Heraldry
923:A traditional keyhole for a
2878:John M. Mossman Lock Museum
2868:Electromagnetic door holder
1854:Fisk, Robert (2018-06-28).
1450:Pulford, Graham W. (2007).
1388:. World Bank Publications.
3009:
1513:. McGraw-Hill Publishing.
1174:Ceccarelli, Marco (2004).
1042:
911:
829:
714:. Smart locks are used in
266:Chinese lock and key from
174:Metropolitan Museum of Art
36:
29:
2911:
2736:Closed-circuit television
2355:
330:integral security feature
184:, the capital of ancient
2620:Kensington Security Slot
2533:Tubular pin tumbler lock
1981:Phillips, Bill. (2005).
1792:Swan Sonnenschein and Co
914:Keyhole (disambiguation)
328:, which incorporated an
105:, which slides into the
2983:Locks (security device)
2837:Vandal-resistant switch
2791:Passive infrared sensor
2721:Alarm monitoring center
2518:Rotary combination lock
2367:Components and hardware
1784:Oskar Seyffert (1901).
1436:Encyclopædia Britannica
1235:Encyclopedia Britannica
316:in 1818. A burglary in
250:Tibetan Lock and key –
208:in the 6th century BC.
2893:Lock Museum of America
2409:Bored cylindrical lock
1887:Feldman, llana. 2008.
1061:
928:
848:
789:
687:The lock in a typical
309:
282:With the onset of the
279:
271:
259:
223:
177:
154:
153:, India, 10th century.
53:
2921:Category:Locksmithing
2832:Ultrasonic transducer
1954:Ard Canaan Restaurant
1094:Guinness World Record
1053:Palestinian key at a
1052:
943:to engage the lock's
922:
846:
787:
689:remote keyless system
304:
284:Industrial Revolution
277:
265:
249:
221:
165:
148:
47:
2802:Photoelectric sensor
2756:Glass break detector
2655:Real-estate lock box
2554:Electromagnetic lock
2426:Single-point locking
2379:Interchangeable core
2302:Fundamental concepts
1651:. 26 November 2013.
1619:. 26 November 2013.
1458:. Elsevier. p.
912:For other uses, see
750:improve this article
649:With electronic keys
450:Electromagnetic lock
364:Alfred Charles Hobbs
270:, early 20th century
230:of the Belgian city
116:The key serves as a
30:For other uses, see
2898:Musée de la Serrure
2751:Fingerprint scanner
2660:Steering-wheel lock
2595:Chubb detector lock
2503:Magnetic keyed lock
2431:Three-point locking
1914:The Peninsula Qatar
1648:The Huffington Post
1334:historicallocks.com
1231:"Key | lock device"
1074:Mandatory Palestine
857:subtractive process
701:transponder car key
642:magnetic keyed lock
470:Magnetic keyed lock
420:Chubb detector lock
326:Chubb detector lock
318:Portsmouth Dockyard
307:Chubb detector lock
2538:Wafer tumbler lock
2498:Lever tumbler lock
2034:by Raine Borg and
1996:Alth, Max (1972).
1894:2023-04-11 at the
1680:The New York Times
1490:on 10 January 2016
1368:2020-04-07 at the
1349:2020-04-07 at the
1330:2023-05-27 at the
1311:2022-11-07 at the
1062:
929:
849:
790:
631:lever tumbler lock
612:wafer tumbler lock
517:With physical keys
460:Lever tumbler lock
322:British Government
310:
291:lever tumbler lock
280:
272:
260:
224:
206:Theodorus of Samos
178:
155:
54:
2993:Physical security
2965:
2964:
2873:Exit control lock
2600:Child safety lock
2493:Disc tumbler lock
2344:Physical security
2249:
2248:
2044:Popular Mechanics
1825:978-90-04-35580-4
1617:Popular Mechanics
1469:978-0-7506-8437-8
1395:978-1-4648-1721-2
1121:Physical security
1111:Exit control lock
1057:demonstration in
844:
782:
781:
774:
708:cryptographic key
620:disc tumbler lock
440:Disc tumbler lock
415:Child safety lock
158:Premodern history
48:A typical modern
16:(Redirected from
3000:
2954:
2942:
2941:
2930:
2929:
2919:
2918:
2786:Occupancy sensor
2645:Power door locks
2578:Other lock types
2547:Electronic locks
2513:Combination lock
2488:Pin tumbler lock
2476:Mechanical locks
2361:
2276:
2269:
2262:
2253:
2073:
2066:
2059:
2050:
2032:Historical locks
1969:
1968:
1966:
1965:
1946:
1940:
1939:
1926:
1925:
1905:
1899:
1885:
1879:
1878:
1872:
1871:
1851:
1845:
1844:
1838:
1837:
1809:
1803:
1802:
1800:
1799:
1781:
1775:
1774:
1746:
1740:
1739:
1731:
1725:
1724:
1722:
1721:
1702:
1696:
1695:
1693:
1691:
1676:"Losing The Key"
1671:
1665:
1664:
1662:
1660:
1639:
1633:
1632:
1630:
1628:
1609:
1603:
1602:
1591:
1585:
1584:
1561:
1555:
1554:
1531:
1525:
1524:
1506:
1500:
1499:
1497:
1495:
1480:
1474:
1473:
1457:
1447:
1441:
1440:
1428:
1420:
1411:
1410:
1408:
1407:
1379:
1373:
1360:
1354:
1341:
1335:
1322:
1316:
1303:
1294:
1291:
1282:
1281:
1279:
1278:
1259:
1250:
1249:
1247:
1246:
1227:
1221:
1220:
1218:
1217:
1202:
1196:
1195:
1171:
1165:
1164:
1140:
1011:
993:
845:
816:electronic locks
777:
770:
766:
763:
757:
734:
726:
691:operates with a
575:pin tumbler lock
552:
539:
527:
485:Pin tumbler lock
425:Combination lock
371:pin tumbler lock
360:Great Exhibition
236:drunk man's lock
125:, plated brass,
21:
3008:
3007:
3003:
3002:
3001:
2999:
2998:
2997:
2968:
2967:
2966:
2961:
2907:
2883:Key to the City
2851:
2847:Window security
2812:Pressure switch
2781:Motion detector
2708:Security alarms
2702:
2669:
2573:
2564:Electric strike
2559:Electronic lock
2542:
2471:
2435:
2362:
2353:
2324:Key duplication
2297:
2295:security alarms
2280:
2250:
2245:
2189:
2165:Pattern welding
2148:
2082:
2077:
2028:
1978:
1976:Further reading
1973:
1972:
1963:
1961:
1948:
1947:
1943:
1923:
1921:
1907:
1906:
1902:
1896:Wayback Machine
1886:
1882:
1869:
1867:
1860:The Independent
1853:
1852:
1848:
1835:
1833:
1826:
1811:
1810:
1806:
1797:
1795:
1783:
1782:
1778:
1763:
1748:
1747:
1743:
1733:
1732:
1728:
1719:
1717:
1704:
1703:
1699:
1689:
1687:
1673:
1672:
1668:
1658:
1656:
1641:
1640:
1636:
1626:
1624:
1611:
1610:
1606:
1593:
1592:
1588:
1577:
1563:
1562:
1558:
1547:
1533:
1532:
1528:
1521:
1508:
1507:
1503:
1493:
1491:
1482:
1481:
1477:
1470:
1449:
1448:
1444:
1422:
1421:
1414:
1405:
1403:
1396:
1381:
1380:
1376:
1370:Wayback Machine
1361:
1357:
1351:Wayback Machine
1342:
1338:
1332:Wayback Machine
1323:
1319:
1313:Wayback Machine
1304:
1297:
1292:
1285:
1276:
1274:
1261:
1260:
1253:
1244:
1242:
1229:
1228:
1224:
1215:
1213:
1204:
1203:
1199:
1188:
1173:
1172:
1168:
1157:
1142:
1141:
1134:
1129:
1102:
1082:right to return
1066:Palestinian key
1047:
1045:Palestinian key
1041:
1039:Palestinian key
1025:
1018:
1012:
1003:
994:
968:which promises
958:
953:
917:
910:
902:hardware stores
863:, where a flat
836:
834:
832:Key duplication
828:
826:Key duplication
788:Locksmith, 1451
778:
767:
761:
758:
747:
735:
724:
655:electronic lock
651:
557:
553:
544:
540:
531:
528:
519:
514:
455:Electronic lock
445:Electric strike
395:
268:Yunnan Province
244:
176:(New York City)
160:
143:
42:
39:Car Keys (Ayla)
35:
28:
23:
22:
15:
12:
11:
5:
3006:
3004:
2996:
2995:
2990:
2985:
2980:
2978:Door furniture
2970:
2969:
2963:
2962:
2960:
2959:
2947:
2935:
2923:
2912:
2909:
2908:
2906:
2905:
2900:
2895:
2890:
2885:
2880:
2875:
2870:
2865:
2859:
2857:
2853:
2852:
2850:
2849:
2844:
2842:Water detector
2839:
2834:
2829:
2824:
2819:
2817:Proximity card
2814:
2809:
2804:
2799:
2794:
2788:
2783:
2778:
2773:
2768:
2763:
2758:
2753:
2748:
2743:
2738:
2733:
2728:
2723:
2718:
2712:
2710:
2704:
2703:
2701:
2700:
2695:
2690:
2685:
2679:
2677:
2671:
2670:
2668:
2667:
2662:
2657:
2652:
2650:Protector lock
2647:
2642:
2637:
2632:
2627:
2622:
2617:
2612:
2607:
2602:
2597:
2592:
2587:
2581:
2579:
2575:
2574:
2572:
2571:
2566:
2561:
2556:
2550:
2548:
2544:
2543:
2541:
2540:
2535:
2530:
2525:
2520:
2515:
2510:
2505:
2500:
2495:
2490:
2485:
2479:
2477:
2473:
2472:
2470:
2469:
2464:
2459:
2454:
2449:
2443:
2441:
2437:
2436:
2434:
2433:
2428:
2423:
2422:
2421:
2416:
2411:
2401:
2396:
2391:
2386:
2381:
2376:
2370:
2368:
2364:
2363:
2356:
2354:
2352:
2351:
2346:
2341:
2336:
2331:
2326:
2321:
2316:
2314:Authentication
2311:
2309:Access control
2305:
2303:
2299:
2298:
2281:
2279:
2278:
2271:
2264:
2256:
2247:
2246:
2244:
2243:
2238:
2233:
2228:
2223:
2218:
2213:
2208:
2203:
2197:
2195:
2191:
2190:
2188:
2187:
2182:
2177:
2172:
2167:
2162:
2156:
2154:
2150:
2149:
2147:
2146:
2141:
2136:
2131:
2126:
2121:
2116:
2111:
2106:
2101:
2096:
2090:
2088:
2084:
2083:
2078:
2076:
2075:
2068:
2061:
2053:
2047:
2046:
2038:
2027:
2026:External links
2024:
2023:
2022:
2008:
1994:
1977:
1974:
1971:
1970:
1956:. 2016-12-08.
1941:
1931:Mohammed Assaf
1900:
1880:
1846:
1824:
1804:
1790:(6 ed.).
1776:
1761:
1741:
1726:
1697:
1666:
1634:
1604:
1586:
1575:
1556:
1545:
1526:
1519:
1501:
1475:
1468:
1442:
1431:Chisholm, Hugh
1412:
1394:
1374:
1355:
1336:
1317:
1295:
1283:
1251:
1222:
1197:
1186:
1166:
1155:
1131:
1130:
1128:
1125:
1124:
1123:
1118:
1113:
1108:
1101:
1098:
1043:Main article:
1040:
1037:
1024:
1021:
1020:
1019:
1013:
1006:
1004:
995:
988:
978:Keys of Heaven
957:
954:
952:
949:
909:
906:
891:
890:
883:
880:
830:Main article:
827:
824:
797:apprenticeship
780:
779:
738:
736:
729:
723:
720:
659:access control
650:
647:
566:well-designed
559:
558:
554:
547:
545:
541:
534:
532:
529:
522:
518:
515:
513:
512:
507:
502:
497:
495:Protector lock
492:
487:
482:
477:
472:
467:
462:
457:
452:
447:
442:
437:
432:
427:
422:
417:
412:
407:
402:
396:
394:
391:
383:Linus Yale Jr.
375:Linus Yale Sr.
314:Jeremiah Chubb
243:
240:
159:
156:
142:
139:
118:security token
82:security token
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
3005:
2994:
2991:
2989:
2986:
2984:
2981:
2979:
2976:
2975:
2973:
2958:
2957:
2953:
2948:
2946:
2945:
2936:
2934:
2933:
2924:
2922:
2914:
2913:
2910:
2904:
2901:
2899:
2896:
2894:
2891:
2889:
2886:
2884:
2881:
2879:
2876:
2874:
2871:
2869:
2866:
2864:
2861:
2860:
2858:
2856:Miscellaneous
2854:
2848:
2845:
2843:
2840:
2838:
2835:
2833:
2830:
2828:
2825:
2823:
2820:
2818:
2815:
2813:
2810:
2808:
2805:
2803:
2800:
2798:
2795:
2792:
2789:
2787:
2784:
2782:
2779:
2777:
2774:
2772:
2769:
2767:
2764:
2762:
2761:Heat detector
2759:
2757:
2754:
2752:
2749:
2747:
2744:
2742:
2741:Door security
2739:
2737:
2734:
2732:
2729:
2727:
2724:
2722:
2719:
2717:
2714:
2713:
2711:
2709:
2705:
2699:
2696:
2694:
2691:
2689:
2686:
2684:
2681:
2680:
2678:
2676:
2672:
2666:
2663:
2661:
2658:
2656:
2653:
2651:
2648:
2646:
2643:
2641:
2638:
2636:
2633:
2631:
2628:
2626:
2623:
2621:
2618:
2616:
2613:
2611:
2608:
2606:
2603:
2601:
2598:
2596:
2593:
2591:
2588:
2586:
2583:
2582:
2580:
2576:
2570:
2567:
2565:
2562:
2560:
2557:
2555:
2552:
2551:
2549:
2545:
2539:
2536:
2534:
2531:
2529:
2526:
2524:
2521:
2519:
2516:
2514:
2511:
2509:
2506:
2504:
2501:
2499:
2496:
2494:
2491:
2489:
2486:
2484:
2481:
2480:
2478:
2474:
2468:
2465:
2463:
2460:
2458:
2455:
2453:
2450:
2448:
2445:
2444:
2442:
2438:
2432:
2429:
2427:
2424:
2420:
2417:
2415:
2412:
2410:
2407:
2406:
2405:
2402:
2400:
2397:
2395:
2392:
2390:
2387:
2385:
2382:
2380:
2377:
2375:
2372:
2371:
2369:
2365:
2360:
2350:
2347:
2345:
2342:
2340:
2337:
2335:
2334:Master keying
2332:
2330:
2329:Key relevance
2327:
2325:
2322:
2320:
2317:
2315:
2312:
2310:
2307:
2306:
2304:
2300:
2296:
2292:
2288:
2284:
2277:
2272:
2270:
2265:
2263:
2258:
2257:
2254:
2242:
2239:
2237:
2234:
2232:
2229:
2227:
2224:
2222:
2219:
2217:
2214:
2212:
2209:
2207:
2204:
2202:
2199:
2198:
2196:
2192:
2186:
2183:
2181:
2178:
2176:
2173:
2171:
2168:
2166:
2163:
2161:
2158:
2157:
2155:
2151:
2145:
2142:
2140:
2137:
2135:
2132:
2130:
2127:
2125:
2122:
2120:
2117:
2115:
2112:
2110:
2107:
2105:
2102:
2100:
2097:
2095:
2092:
2091:
2089:
2085:
2081:
2074:
2069:
2067:
2062:
2060:
2055:
2054:
2051:
2045:
2042:
2041:Picking Locks
2039:
2037:
2033:
2030:
2029:
2025:
2021:
2020:0-911012-15-X
2017:
2014:Nelson-Hall.
2013:
2009:
2007:
2006:0-8015-0151-2
2003:
1999:
1995:
1992:
1991:0-07-144829-2
1988:
1985:McGraw-Hill.
1984:
1980:
1979:
1975:
1959:
1955:
1951:
1945:
1942:
1938:
1936:
1932:
1919:
1915:
1911:
1904:
1901:
1897:
1893:
1890:
1884:
1881:
1877:
1865:
1861:
1857:
1850:
1847:
1843:
1831:
1827:
1821:
1817:
1816:
1808:
1805:
1794:. p. 271
1793:
1789:
1788:
1780:
1777:
1772:
1768:
1764:
1762:0-517-26643-1
1758:
1754:
1753:
1745:
1742:
1737:
1730:
1727:
1715:
1711:
1707:
1701:
1698:
1685:
1681:
1677:
1670:
1667:
1654:
1650:
1649:
1644:
1638:
1635:
1622:
1618:
1614:
1608:
1605:
1600:
1596:
1590:
1587:
1582:
1578:
1576:9780596555627
1572:
1568:
1567:
1560:
1557:
1552:
1548:
1546:9780071467445
1542:
1538:
1537:
1530:
1527:
1522:
1520:0-07-137494-9
1516:
1512:
1505:
1502:
1489:
1485:
1479:
1476:
1471:
1465:
1461:
1456:
1455:
1446:
1443:
1438:
1437:
1432:
1427:
1419:
1417:
1413:
1401:
1397:
1391:
1387:
1386:
1378:
1375:
1371:
1367:
1364:
1359:
1356:
1352:
1348:
1345:
1340:
1337:
1333:
1329:
1326:
1321:
1318:
1314:
1310:
1307:
1302:
1300:
1296:
1290:
1288:
1284:
1272:
1268:
1264:
1258:
1256:
1252:
1240:
1236:
1232:
1226:
1223:
1211:
1207:
1201:
1198:
1193:
1189:
1183:
1179:
1178:
1170:
1167:
1162:
1158:
1156:9780792321910
1152:
1148:
1147:
1139:
1137:
1133:
1126:
1122:
1119:
1117:
1116:Key relevance
1114:
1112:
1109:
1107:
1106:Door security
1104:
1103:
1099:
1097:
1095:
1091:
1087:
1083:
1079:
1075:
1071:
1067:
1060:
1056:
1051:
1046:
1038:
1036:
1034:
1030:
1022:
1017:
1010:
1005:
1002:
998:
992:
987:
985:
983:
979:
975:
971:
967:
966:Matthew 16:19
963:
955:
950:
948:
946:
942:
938:
934:
926:
921:
915:
907:
905:
903:
898:
895:
888:
884:
881:
878:
874:
873:
872:
870:
866:
862:
858:
854:
833:
825:
823:
819:
817:
811:
809:
806:
802:
798:
794:
786:
776:
773:
765:
755:
751:
745:
744:
739:This section
737:
733:
728:
727:
721:
719:
717:
713:
709:
704:
702:
698:
694:
690:
685:
683:
679:
675:
670:
668:
664:
660:
656:
648:
646:
643:
638:
636:
632:
627:
625:
621:
616:
613:
608:
605:
601:
597:
594:, then allow
593:
589:
585:
581:
576:
571:
569:
564:
551:
546:
538:
533:
526:
521:
516:
511:
508:
506:
503:
501:
498:
496:
493:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
446:
443:
441:
438:
436:
433:
431:
430:Cylinder lock
428:
426:
423:
421:
418:
416:
413:
411:
408:
406:
403:
401:
398:
397:
393:Types of lock
392:
390:
387:
384:
380:
376:
372:
367:
365:
361:
357:
356:Joseph Bramah
352:
350:
346:
342:
337:
335:
331:
327:
323:
320:prompted the
319:
315:
308:
305:Diagram of a
303:
299:
296:
295:Robert Barron
292:
287:
285:
276:
269:
264:
258:. India. 2004
257:
253:
248:
241:
239:
237:
233:
229:
220:
216:
212:
209:
207:
202:
197:
195:
191:
187:
183:
175:
171:
168:
164:
157:
152:
147:
140:
138:
136:
132:
128:
127:nickel silver
124:
119:
114:
112:
108:
104:
100:
99:
94:
89:
87:
83:
79:
75:
71:
67:
63:
59:
51:
46:
40:
33:
19:
2988:Locksmithing
2949:
2937:
2925:
2807:Piezo switch
2716:Alarm device
2683:Lock bumping
2675:Lock picking
2635:Luggage lock
2585:Bicycle lock
2569:Keycard lock
2462:Skeleton key
2414:Mortise lock
2394:Key retainer
2291:lock picking
2287:locksmithing
2282:
2231:Steam hammer
2043:
2011:
1997:
1982:
1962:. Retrieved
1953:
1944:
1928:
1922:. Retrieved
1913:
1903:
1883:
1874:
1868:. Retrieved
1859:
1849:
1840:
1834:. Retrieved
1814:
1807:
1796:. Retrieved
1786:
1779:
1751:
1744:
1735:
1729:
1718:. Retrieved
1709:
1700:
1688:. Retrieved
1679:
1669:
1657:. Retrieved
1646:
1637:
1625:. Retrieved
1616:
1607:
1589:
1565:
1559:
1535:
1529:
1510:
1504:
1492:. Retrieved
1488:the original
1478:
1453:
1445:
1434:
1426:"Lock"
1404:. Retrieved
1384:
1377:
1358:
1339:
1320:
1275:. Retrieved
1266:
1243:. Retrieved
1234:
1225:
1214:. Retrieved
1208:. Locks.ru.
1200:
1176:
1169:
1145:
1092:, holds the
1063:
1026:
997:Coat of arms
959:
936:
932:
930:
899:
896:
892:
868:
864:
852:
851:Traditional
850:
820:
812:
793:Locksmithing
791:
768:
759:
748:Please help
743:verification
740:
722:Locksmithing
705:
697:rolling code
686:
681:
674:keycard lock
671:
652:
639:
628:
617:
609:
572:
568:skeleton key
560:
475:Mortise lock
465:Luggage lock
410:Chamber lock
400:Bicycle lock
388:
368:
353:
338:
311:
288:
281:
242:Modern locks
235:
225:
213:
210:
198:
179:
135:lock picking
115:
110:
102:
96:
92:
90:
57:
55:
52:and its keys
2903:Puzzle lock
2888:Lock Museum
2822:Reed switch
2731:Card reader
2640:Night latch
2590:Bramah lock
2483:Warded lock
2319:Key control
2241:Trip hammer
2236:Swage block
2221:Hardy tools
2129:Silversmith
2124:Pewtersmith
2104:Coppersmith
1494:16 November
970:Saint Peter
925:warded lock
853:key cutting
805:engineering
712:smartphones
678:credit card
563:warded lock
510:Warded lock
490:Police lock
334:lock-picker
278:Key anatomy
201:warded lock
74:fingerprint
2972:Categories
2766:Key switch
2615:Door chain
2447:Berlin key
2170:Planishing
2144:Whitesmith
2099:Bladesmith
2094:Blacksmith
2036:ASSA ABLOY
1964:2023-04-06
1924:2023-04-06
1870:2023-04-06
1836:2023-04-06
1798:2022-01-01
1720:2019-05-23
1406:2022-05-18
1277:2012-12-09
1245:2020-01-13
1216:2010-06-10
1187:1402022034
1127:References
1029:witchcraft
762:April 2017
600:shear line
215:securing.
66:electronic
62:mechanical
2746:Dual loop
2726:Car alarm
2688:Locksport
2610:Dead bolt
2605:Crash bar
2528:Time lock
2467:Smart key
2384:Key blank
2153:Processes
2119:Locksmith
2109:Goldsmith
2000:Penguin.
1263:"History"
1206:"History"
1055:Nakba Day
1031:known as
951:Symbolism
941:key blank
716:coworking
693:smart key
543:rotating.
505:Time lock
435:Dead bolt
228:Beguinage
2827:Tripwire
2698:Snap gun
2693:Slim Jim
2665:The Club
2625:Knox Box
2457:Keychain
2419:Rim lock
2389:Key code
2349:Rekeying
2339:Password
2226:Pritchel
2139:Tinsmith
2114:Gunsmith
2080:Smithing
1958:Archived
1918:Archived
1892:Archived
1864:Archived
1842:families
1830:Archived
1771:09023803
1714:Archived
1684:Archived
1653:Archived
1621:Archived
1599:Archived
1581:Archived
1551:Archived
1400:Archived
1366:Archived
1347:Archived
1328:Archived
1309:Archived
1271:Archived
1239:Archived
1210:Archived
1192:Archived
1161:Archived
1100:See also
1001:Holy See
962:Holy See
956:Heraldry
945:tumblers
887:deburred
869:template
803:from an
667:cylinder
635:recessed
592:bittings
588:cylinder
500:Rim lock
405:Cam lock
252:Dhankhar
194:pin lock
190:Egyptian
167:Medieval
86:password
18:Key Card
2508:Padlock
2452:Car key
2404:Lockset
2399:Lockrod
2374:Bitting
2185:Swaging
2180:Sinking
2175:Raising
2160:Forging
1627:15 June
1433:(ed.).
1023:Artwork
1016:Siuntio
999:of the
982:Commons
933:keyhole
908:Keyhole
861:cutting
808:college
801:diploma
682:keycard
582:in the
480:Padlock
341:Charles
254:Gompa,
192:wooden
186:Assyria
182:Nineveh
151:Nalanda
141:History
70:keycard
50:padlock
2771:Keypad
2293:, and
2216:Hammer
2211:Fuller
2134:Tinker
2087:Smiths
2018:
2004:
1989:
1822:
1769:
1759:
1690:9 June
1659:9 June
1573:
1543:
1517:
1466:
1392:
1184:
1153:
1059:Berlin
1033:Hecate
976:, the
937:keyway
645:lock.
584:keyway
170:Gothic
129:, and
107:keyway
80:card,
2944:Locks
2793:(PIR)
2630:Latch
2283:Locks
2206:Forge
2201:Anvil
2194:Tools
1876:1948.
1429:. In
1267:Slate
1090:Qatar
1070:Nakba
865:blank
624:Abloy
580:wards
556:pins.
345:Chubb
256:Spiti
131:steel
123:brass
103:blade
60:is a
2956:Book
2932:Keys
2440:Keys
2016:ISBN
2002:ISBN
1987:ISBN
1820:ISBN
1767:LCCN
1757:ISBN
1692:2015
1661:2015
1629:2016
1571:ISBN
1541:ISBN
1515:ISBN
1496:2006
1464:ISBN
1390:ISBN
1182:ISBN
1151:ISBN
1086:Doha
1076:was
1064:The
974:pope
935:(or
877:vise
663:bolt
629:The
618:The
596:pins
573:The
379:pins
349:safe
289:The
232:Lier
199:The
78:RFID
58:lock
1460:317
752:by
665:or
653:An
622:or
604:cam
111:bow
101:or
98:bit
93:key
64:or
2974::
2289:,
2285:,
1952:.
1927:.
1916:.
1912:.
1873:.
1862:.
1858:.
1839:.
1828:.
1765:.
1712:.
1708:.
1682:.
1678:.
1645:.
1615:.
1579:.
1549:.
1462:.
1415:^
1398:.
1298:^
1286:^
1265:.
1254:^
1237:.
1233:.
1190:.
1159:.
1135:^
1088:,
1035:.
984:.
947:.
931:A
684:.
672:A
640:A
610:A
561:A
137:.
91:A
76:,
72:,
56:A
2275:e
2268:t
2261:v
2072:e
2065:t
2058:v
1993:.
1967:.
1801:.
1723:.
1694:.
1663:.
1631:.
1523:.
1498:.
1472:.
1409:.
1280:.
1248:.
1219:.
927:.
916:.
775:)
769:(
764:)
760:(
746:.
41:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.