tailored high-tech.
How to evaluate the strategies of defense! councils MATEX SECURITY 335314926 dr.Leonardo
Cylinder locks
How does a cylinder
Below we will try to familiarize themselves with the settlers, and the names that make up a cylinder, trying to understand the principles of operation, thus in a better position suitable to judge.
The cylinder is coupled to the interchangeable parts that can operate the lock bolt.
may appear with different shapes: cylindrical or oval shaped.
It is composed of a fixed body or stator, inside which is housed a rotor core or longitudinally on the milling of the profile that runs the key.
in the nucleus and in the body of the cylinder (stator), drill holes are aligned with each other, in which house the pin or pins of the core and controperni with soft body of the cylinder, which, once put in correspondence, may flow from the core to the cylinder body and vice versa in every insertion of a key. At
opposite to where the key is introduced, the core engages, through a coupling element, a cam or pawl which is the core element that rotates along with key and drag the deadbolt lock and determine its release.
The key is composed: the body where it is practiced in the milling of the profile corresponding to that of the nucleus, the teeth, which will determine the encryption or combination, the catch of the bottom stroke of the key and the handle.
How
If we introduce gradually the key in the nucleus, we can see that the pins are raised to various heights along the trend of the teeth that make encryption, until, having reached the end of stroke stop, the key is in position.
Now, since the teeth have a depth of the key differences between them, to achieve alignment of the pins along the circumference of the core and then allow the rotation, it is necessary that the length of each pin is adjusted to the depth of the teeth of .
Requirements for a cylinder to be considered safe
In this chapter we are going to list and then analyze those basic requirements that help to make safety a cylinder.
h
1) degree of tolerance among its elements,
2) The type of material it is made,
3) Measures drill
4) Measures tear
5) Measures anti-handling,
6) Number of combinations of key
7) Duplicate key check
degree of tolerance among its elements
Low values \u200b\u200bof tolerance are essential for characterization of a cylinder of safety, both for its perfect functioning over time, both to counter any attempts to openings without the use of the key.
type of material it is made
Often I ask to feel the demand for cylinders made of steel, of course, because they give greater assurance of resistance to break. In Actually, most of the cylinders are made of brass, even those considered high-security, which apparently we can look at steel as their color, they are actually made of brass or nickel plated. Due to the complex and fine workmanship that these elements require a cylinder, use a material like steel, much less workable brass, lead to a disproportionate increase in construction costs. At cylinders
higher quality it has come to use the alpaka a special brass alloy that has the advantage of having greater wear resistance, a factor very important in a cylinder where often a large number of introductions and removing the key would change the values \u200b\u200bof tolerance.
TIPS drill.
groped for one of those used to force a cylinder is to drill and that is why we must place it in devices to neutralize the attempt.
to point out,
Previously we have pointed out,
As in
Previously we have pointed out, tear
Measures
Another method used to force a cylinder and pulled it out.
Such action may be tempted to remove the cylinder to force the lock screw cutting into the restraint, is groped to break the same into two parts using the area of \u200b\u200bthe pawl which, as you can see, is an area at risk.
The first case is solved creating a cam rotated a few degrees so that a key out, it protrudes just enough to leave the structure of the cylinder would prevent it from sliding out, a task which may become possible only by introducing the appropriate key and turning to retract the latch. See fig.7
In the second case it is necessary that the cam and the nuclei are not, as in many cases, simply juxtaposed, but they have design features which concatenino to each other in order to counter the decline implemented in a possible attempt to break.
Measures anti-handling
As we have stated, the most different (or is it just the case to say the most fantastic) manipulation techniques, are based principally through the values \u200b\u200bof tolerance, which are inevitably present in all mechanical systems.
The ability of a manipulator is to have good sensitivity and dexterity and train enough to be able to use those values.
We might compare the manipulator to a pianist and tolerance to a piece of music to perform, a fast track and complex to require years of practice and pianist application to run it correctly, while a song made very few notes and intervals between them may be executed by any strummer. Locks with low values \u200b\u200bof tolerance are complex as music, but often this complexity is not enough to discourage pianists using perseverance and dedication can achieve such levels that they can perform, and that's that then need to add to the inherent difficulty of the song also other measures make enforcement almost impossible for even the most accomplished of pianists.
To do this, we could imagine to remove many of the keys of the piano their natural return, forcing the pianist, and hold each time one of those keys, having to raise in the requirement of having to re-press it again. Under these conditions it becomes evident that only virtuosos could successfully run our songs, already difficult for themselves.
The example of the pianist should be helpful for us to guess on which those concepts are based on manipulation techniques and strategies to counter these techniques to arrive at a course without their detailed disclosure, and to understand that wanting to recognize this as to the extreme that no lock is unbreakable, at least it is for work of a true virtuoso of manipulation, accepting this, perhaps recognizing the sporting merits.
number of combinations of key
As explained in the chapter describing the cylinder, we had way to ascertain that the various pins with their different lengths to determine the encryption key, which can be compared to an ATM PIN, or a combination of a combination safe.
said that it is clear that in a cylinder, the greater the possibility of attributing different heights for each pin, and the more pins, the higher the number of encryptions (or combinations) can be obtained. Because the height of a pin to be valid, a key is inserted, the pawl will rotate only stayed with the pin height corresponding to the wrench and bolts with high or immediately above or immediately below the height matching, even exerting rotational force.
From a security point of view, have a high number of encryptions (or combinations) can be obtained, is of vital importance against possible attempts of manipulation.
The low number of combinations of a cylinder, it dramatically reduces security.
double check on the key
The now inevitable rhythms of everyday life, often lead us to the need for third parties to manage our day, whether they are employees at work, or domestic helpers, caretakers, neighbors home, crafts etc.. which, for many different reasons, we are forced to entrust the keys to doors that provide access to places that often we or should we guard jealously.
Quest'inevitabile situation c'espone the risk of uncontrolled duplication of our keys, perpetrated both by the employees themselves (those unreliable, from which we could defend ourselves but also) is, and especially in bad faith by people who are focused on Our employees work without their knowledge.
To guard against these risks, you need to use cylinders with key protected duplication. These keys, which although apparently often have a traditional look, consist of patented devices that can make them difficult to reproduce, thus inhibiting replication if not performed in specialized centers and under exclusive presentation of a 'special card. The card will ensure that the applicant is allowed to duplicate and must be jealously guarded by the key owner. See fig. 8
As we got to know the encryption key is comparable to the number of the combination of a safe, secret number or to an ATM, but as the numbers on the controllers of safes and ATMs can celarli storing the number codes of the keys, matching the height of the tooth profile of the key itself, are readable by anyone who is able to do so. This fact makes it possible to duplicate the key by maleintenzionati trained, even without being in possession but simply watch. Again, the cylinder having a protected key will not allow the duplication of the key because, not having the card will not be available even blanks protected (key blanks by a code) which match the codes surreptitiously read.
0 comments:
Post a Comment