Skip to main content Skip to search Skip to main navigation
Quality products since 1997
Worldwide shipping
Purchase on Account for Authorities
Hotline +1 972 588 4362
Loading...

Reading time 120 minutes / Lars Buchwald / 12/05/2025

The Hidden History Behind Every Lock

From Tinkering to Breakthrough: The Forgotten Evolution of Locks

Sometimes it surprises me how little we know about the things that protect us every day. The locks we use seem ordinary. Insert the key, lock or unlock, done. But behind every lock lies a story far more fascinating than anything you might expect in everyday life. People who, centuries ago, tinkered, failed, started again, and in the process laid the foundation for everything we know and use today about locks and keys.

If you look closer, you notice a pattern:

Every invention was an answer to a problem.

Barron’s lever system. Bramah’s attempt to eliminate attacks by making the mechanism more complex. Chubb’s detector, which exposed intruders before they could succeed. Sounds like technology, but in truth these stories tell us about distrust, ingenuity, and the constant race between protection and attack.

And that’s where it gets interesting. Many of these old mechanisms still exist today in modern form. Some weaknesses remain. Others have been solved cleverly. Still others show how creative people become when something absolutely needs to be secure and reliable.

If you want to understand how these historical ideas turned into what we hold in our hands today—or rather, what sits in our doors—then keep reading. The past explains more than you might think. And it shows why our need for security never stops and continually evolves.

1778 – 1805

Between 1778 and 1805, the world changed rapidly. Revolutions, upheavals, and new ideas everywhere. And during this exact period, the “new locks” made a major leap forward. For example, in 1778 Robert Barron set the first impulse with his lever system. In 1784 Joseph Bramah followed, developing a mechanism that was meant to virtually eliminate attacks. In 1805, Abraham Stansbury introduced the double-acting pin tumbler system, another significant step toward modern security. While political power struggles raged outside, these inventors worked on something lasting: the attempt to make security more predictable and, above all, more understandable. Anyone looking for the roots of modern locking technology will find them right here.

Robert Barron (1778)

Name: Lever lock
Category: Lever lock
Inventor: Robert Barron from England.
He registered a patent for it in 1778 under the number GB1200, and it is still used today in many door and safe locks. 

Current locks of this type 

Types that descend from Barron’s lever principle today:
• British lever (mortice) locks
• Safe lever locks — they are direct descendants of the lever principle and are still widely used today.
• Simpler door and box locks 

Lockpicking
• Exploiting large manufacturing tolerances or clearly noticeable lever movement (picking).
• Bypass tools to circumvent the mechanical components (picking).
• Direct physical destruction of the mechanism or mounting (destructive entry). 

Risk/Security
Highest risk: Destructive tools + bypass attacks when poorly installed (fast, reliable, universally effective).
Medium risk: Mechanical manipulation / decoding methods when tolerances are large. 

Insights
The greatest vulnerabilities rarely come from manipulation alone, but mostly from physical destruction and weaknesses in installation or hardware.

Joseph Bramah (1784)

Name: Multi-lever lock
Inventor: Joseph Bramah (April 13, 1748 – December 9, 1814) was an English inventor and engineer. In 1784, he invented the so-called Bramah lock.

Current locks of this type 
Types that today descend from the Bramah lever principle:
• Bramah Locks Ltd. (London) – still produces locks almost identical to the original principle.
• Abus Diskus / Abus Granit Plus / Abloy Protec2
• Motorcycle and high-security padlocks (e.g., Kryptonite, Oxford, Trelock) – use wafer or combined disc/slider systems.

Lockpicking
• Destructive tools & levering attacks
• Bypass/removal due to poor installation
• Targeted drilling/milling if no drill protection is present
• Fine manipulation if manufacturing quality is poor (picking)
• Electronic attacks — if electronics are present

Risk/Security
Highest risk: Destructive attacks (hammer, chisel, angle grinder)
Bypass / circumvention (attacks on hardware/frame)
Medium risk: Targeted drilling / milling / pulling / ripping
Low risk: Fine manipulation / decoding

Insights
Even a simple lock can be very resistant when tolerances, hardening, and installation quality are right. The main danger comes from raw force. Radial wafer and disc locks are extremely precise, but vulnerable to physical attacks if they lack drill or lever protection.

Abraham (Abe) Ogier Stansbury (1805)

Name: Double-acting pin tumbler lock
Inventor: Abraham O. Stansbury received a patent in 1807 for a double-acting pin tumbler lock. The pins had to be aligned correctly from both sides at the same time. This created significantly higher resistance to manipulation compared to earlier single-acting pin systems.

Current locks of this type 
Stansbury is therefore considered a pioneer of modern pin-tumbler systems, even if the form we know today was later perfected by Linus Yale Jr. There are no direct Stansbury locks anymore, but the underlying principle lives on in modern variants: Special forms of double-pin chambers Opposing pins or dual-acting tumblers in more complex profiles High-security cylinders combining multiple levels or directions of pin movement

Lockpicking
• Exploiting large manufacturing tolerances — pins were often not perfectly symmetrical. The two active planes could sometimes be influenced one after the other instead of simultaneously.
• Mechanical feedback (e.g., slight give, blocking, friction) to detect which side was already in position, allowing indirect separation of the planes.
• Wear — over time, small gaps formed, sometimes reducing the double requirement to a practically single-action mechanism.

Risk/Security
Highest risk: Destructive attacks (hammer, chisel, angle grinder) and bypass (attacks on hardware/frame)
Medium risk: Targeted drilling / milling / pulling / tearing
Low risk: Fine manipulation

Insights
The double-acting pin tumbler system was a historical breakthrough, but from today’s perspective it is no longer a high-security mechanism. Its greatest protection at the time came from requiring simultaneous alignment of both pin sides — a concept effective against primitive tools, but clearly limited when confronted with modern testing and manipulation techniques.

1818 – 1857

Between 1818 and 1857, security was reimagined. Industrialization, technical experimentation, and rapidly growing cities — everything became more complex, including the methods used to attack and bypass locks. In this environment, inventors were overflowing with new ideas. Security needed to improve. In 1818, Jeremiah Chubb introduced his detector lock: a mechanism that not only made manipulation more difficult but also revealed and signaled it. A clever step in a time when tools and knowledge were becoming more widely accessible. 

In 1829, Alexandre Fichet followed with the pump lock — radically different, precise, and far ahead of its time. And in 1857, James Sargent set a milestone in the United States with his combination technology, opening the door to a new era of mechanical security. These years mark the moment when locks stopped merely reacting and began actively monitoring and even controlling. A development that clearly shows how closely technology and societal change are intertwined.

Jeremiah Chubb (1818)

Name: Detector lock (multi-lever lock)
Category:
Inventor: Jeremiah Chubb developed a multi-lever lock with an integrated detector mechanism. The special feature: If someone attempted to manipulate the levers, the lock automatically triggered a “detector state.” At that point, the bolt could no longer be moved — even with the correct key — until the owner reset the lock. This not only made manipulation more difficult, it also made attempts visible.

Current locks of this type 
Chubb’s system is a direct predecessor of modern lever locks / multi-lever systems. Even today, high-quality safe locks still rely partly on this basic principle.

Lockpicking
• Exploiting manufacturing tolerances Early Chubb models occasionally had larger mechanical tolerances: individual levers could react slightly differently. With production variances, it was sometimes possible to detect which plate contacted first. This reduced the intended level of security, because the attack no longer required treating the lever stack as a single unified movement.
• Mechanical feedback Despite the detector, some models offered subtle mechanical cues: slight binding microscopic give friction patterns on the lifting plates
• Wear over years of operation

Risk/Security
Highest risk: Destructive attacks with hammer / chisel / heavy striking tools angle grinders / cutting tools breaking open the lock case
Medium risk: Partially destructive attacks such as drilling the lever stacks (if no carbide barriers are present), milling the case or bolt channel, pulling / tearing when installation is unprotected.
Low risk: fine manipulation

Insights
The Chubb detector lock was one of the strongest anti-manipulation mechanisms of its time. Its key advantage was not only that manipulation became more difficult, but that attempts were automatically detected and made visible. Weaknesses arise mainly from destructive or semi-destructive attacks, far less from fine mechanical manipulation. Wear or tolerances may degrade the system over time, but when new, it was an exceptionally robust lock design.

Alexandre Fichet (1829)

Name: Pump lock
Inventor: Alexandre Fichet developed the pump lock in 1829, a mechanism that differed significantly from the pin and lever locks used until then. The key operated axially rather than rotating: it was inserted like a piston (“pump”) and pushed several radially arranged pins into the correct position simultaneously. This linear operating principle made the lock far more difficult to manipulate intuitively and offered exceptionally high protection for its time.

Current locks of this type 
Modern pump cylinders are still used in France, especially in high-end residential and building security. Today’s versions feature multiple rows of pins, hardened materials, anti-drill protection, coded key profiles, and complex evolutions of the original pump mechanism. Some specialized high-security cylinders also use axial systems based on Fichet’s concept, though massively refined technically.

Lockpicking
• Exploiting manufacturing tolerances Early pump locks sometimes showed: • differences in resistance between individual pins • minimal deviations in axial guides • height variations of individual piston elements. • Mechanical feedback Although the mechanism was intended as an “all-or-nothing system,” some models offered noticeable binding points, different spring tensions, and slight detent sensations during pushing. • Wear over years of operation

Risk/Security
Highest risk: Destructive attacks with hammer / chisel / heavy striking tools angle grinders / cutting tools breaking open the lock case
Medium risk: Partially destructive attacks drilling the axial pin chamber (possible in historical models) milling the front plate or housing areas pulling or ripping out when door mounting is weak
Low risk: Fine manipulation axial probing of individual pins detecting spring tension changes, decoding through wear

Insights
Fichet’s pump lock was a radical break from traditional lock concepts and the first to use an axial, simultaneously reacting multi-pin system. This gave it extraordinary resistance to manipulation and made it a long-standing hallmark of French security engineering. Its weaknesses stem mainly from material quality, manufacturing precision, and aging — less from the core principle. Modern pump locks still follow this concept and remain among the most technically demanding high-security solutions for private and commercial applications.

Linus Yale Sr. (1843)

Name: Combination lock
Inventor: Linus Yale Sr. developed one of the first precise forms of the mechanical combination lock in 1843 — a lock that operated without a key. The mechanism relied on rotating wheels that had to be aligned into an exact position. Only when all wheels reached their correct orientation did their gates form a straight line that allowed the locking bolt to retract. For its time, this was revolutionary because it offered:
- keyless operation
- greater variability
- significantly improved protection against brute-force manipulation. Yale’s invention was a precursor to modern safe combination locks and marked the shift from purely mechanical key systems to intelligent locking technology.

Current locks of this type 
High-quality mechanical safe combination locks are still based on Yale’s principle, though in heavily optimized form. Modern versions feature precision-milled wheels, manipulation-resistant gates, anti-fallback notches, hardened axles, and reinforced housings. Most reputable safe manufacturers (S&G, La Gard, Kaba-Mas, etc.) use concepts directly derived from Yale’s system. The Yale combination lock is not a relic — it is one of the most continuously evolved lock systems in the world.

Lockpicking
• Exploiting manufacturing tolerances Combination locks of that era sometimes suffered from:
- uneven spacing between wheels
- slight differences in wheel thickness
- play in axle guides These tolerances could cause individual wheels to provide feedback earlier than others, making the combination theoretically discoverable. • Mechanical feedback Early wheel locks often produced noticeable cues, such as:
- a small “drop” when reaching the gate position
- slight torque variations
- detectable friction differences between wheels and the fence An experienced attacker could use these signals to narrow down the correct numbers step by step. • Wear in operation Over time, typical aging occurred:
- worn gate edges
- rounded contact points
- increased play in the axle mechanism These signs made accurate gate detection much easier than in a new lock.

Risk/Security
Highest risk: Destructive attacks on the safe body prying or breaking open the safe door cutting tools / angle grinders bypass through attacking the door or frame instead of the mechanism
Medium risk: Targeted partially destructive attacks, such as: drilling the axle or wheel stack (only possible on historical models without carbide blocks) milling at the faceplate removing or tearing out the lock area on weak constructions
Low risk: Fine manipulation step-specific dialing and listening feeling for gate positions decoding through wear or tolerances

Insights
Linus Yale Sr. laid the foundation for all modern safe technology with his combination lock. The mechanism replaced keys with a variable number-wheel system that was both more manipulation-resistant and more flexible. Weaknesses in early models were due mainly to manufacturing tolerances and wear — not the concept itself. Modern versions remain some of the most trusted high-security systems worldwide and still use his core design.

Alfred Charles Hobbs (1851)

Name: Chubb lock
Alfred Charles Hobbs became world-famous at the 1851 Great Exhibition in London when he successfully manipulated the Chubb detector lock — considered “unpickable” for over 30 years. Important to know: Hobbs did not invent a new lock. Instead, he was the first to publicly demonstrate how the complex Chubb mechanism could be bypassed without permanently triggering the detector. His work is considered a milestone because he proved that even the most advanced systems are not unpickable if you understand them deeply. This triggered a new era in security thinking.

Lockpicking
• Exploiting manufacturing tolerances Hobbs noticed that early Chubb locks had:
- slight differences in lever heights
- variations in spring force
- minimal play between the lifting plates and the bolt • Mechanical feedback Despite the detector, the lock provided subtle signals:
- slight movement of individual levers
- binding points just before correct height
- tiny changes in friction These “micro-feedbacks” allowed Hobbs to determine which lever was close to its correct position. By performing extremely controlled movements, he avoided triggering the detector.

Insights
Hobbs proved in 1851 that even the most complex lock systems have weaknesses when manufacturing tolerances, wear, and mechanical feedback converge. His achievement sparked a technological revolution and forced manufacturers worldwide to create more precise, manipulation-resistant designs. The Chubb principle still exists today in modern lever locks — but with much higher security standards that eliminate Hobbs’ historic attack points.

James Sargent (1857)

Name: Changeable combination lock
Inventor: James Sargent developed the first changeable combination lock in 1857. It was a milestone in safe technology because users could change the combination themselves without disassembling the mechanism or replacing the lock. This solved several problems at once:
- stolen or observed combinations could be replaced immediately
- security protocols became more flexible
- safes were far harder to compromise permanently The principle, like Yale’s, used wheel stacks — but with a crucial enhancement: The wheels could be recoded using an internal mechanism. Sargent laid the foundation for all modern professional safe locks.

Current locks of this type 
Modern successors continue to use Sargent’s principle:
- S&G (Sargent & Greenleaf — founded by the inventor)
- LaGard
- Kaba-Mas
- many other safe manufacturers worldwide Changeable mechanical combination locks remain standard in:
- bank safes
- gun safes
- high-security containers
- industrial vaults Today’s versions include:
- manipulation-resistant wheel geometry
- hardened steel components
- anti-drill and anti-mill elements
- precision-manufactured axle systems

Lockpicking
• Exploiting manufacturing tolerances Early Sargent locks sometimes had:
- uneven spacing between wheels
- varying gate depths
- slight play in the axle bushing This allowed a wheel to provide feedback before others were aligned, simplifying combination discovery. • Mechanical feedback Like all early dial locks, Sargent’s models offered:
- a noticeable “drop” when the fence reached the gate
- variations in friction and torque
- brief micro-pauses when passing gate areas • Wear in operation Typical aging effects included:
- worn gates
- rounded edges
- increased play between wheels and axle

Risk/Security
Highest risk: Destructive attacks cutting or breaking the safe body angle grinders, cutting tools, drilling (on the safe body, not the mechanism) attacking door or frame instead of the lock
Medium risk: Targeted partial destruction drilling to the wheel stack or axle (historical models without carbide only) milling or removing material on the front plate tearing out weakly mounted safe areas
Low risk: Fine manipulation listening to the wheel stack detecting gate positions systematic decoding via mechanical feedback exploiting wear or tolerances

Insights
Sargent’s changeable combination lock was one of the most important breakthroughs in safe design. It combined flexibility, manipulation resistance, and practicality in a way that still defines the industry today. Weaknesses historically stemmed from materials, manufacturing precision, and wear — not the core concept. Modern descendants of Sargent’s design remain among the most reliable mechanical security systems worldwide.

Karl Höller (1857)

Name: Pin tumbler lock
Inventor: Karl Höller patented an improved form of the pin tumbler lock in 1857, which differed clearly from earlier, simpler constructions. His mechanism used several stacked pairs of pins (driver and key pins) that needed to be aligned to a precise shear line by a correctly cut key. New in Höller’s design were:
- more precise pin guidance
- improved spring mechanics
- a more compact form factor
- higher repeat accuracy in manufacturing, making it one of the more reliable pin tumbler systems of its time. Höller’s concept was an important transitional step toward later high-precision cylinders — including the later development by Linus Yale Jr. (1861).

Current locks of this type 
Höller’s mechanism is a direct predecessor of modern pin tumbler cylinders. Current successors include:
• round cylinders and profile cylinders worldwide
• modern variants with enhanced security features:
- security pins (spool, mushroom, serrated)
- anti-drill elements
- hardened pins and housing zones
- complex key profiles The Yale cylinder (from 1861 onward) is generally considered a direct evolution of Höller’s principle.

Lockpicking
• Exploiting manufacturing tolerances Höller’s system was also not free from production variance:
- slight pin height differences
- lateral play within pin chambers
- variations in spring tension
- uneven fits between plug and housing These tolerances caused individual pins to provide feedback earlier, enabling selective picking instead of simultaneous lifting. • Mechanical feedback Typical behaviors of early pin systems included:
- binding just before correct height
- small click points while lifting
- torque changes when a pin set correctly A skilled manipulator could detect which pins were already set — making the lock more precise but also mechanically readable.

Risk/Security
Highest risk: Destructive attacks: hammer, chisel, brute force against cylinder or hardware angle grinder or cutting tools bypass attacks on frame/hardware
Medium risk: Targeted partial destruction: drilling pin chambers (easy on historical models without hardened inserts) milling or removing housing material pulling or ripping unprotected cylinders
Low risk: Fine manipulation: selective lifting of individual pins reading torque variations decoding through wear or tolerances

Insights
Karl Höller’s pin tumbler lock was an important milestone in lock engineering. It combined compact design with higher precision and created the foundation for all modern cylinder locks. Its weaknesses — like all systems of the era — stem from tolerances, mechanical feedback, and wear. Even so, Höller’s mechanism was ahead of its time and remains the global standard principle for door lock technology.

1861 – 1878

Between 1861 and 1878, locks were created during a period marked by rapid technological progress. The United States was in the midst of the Civil War, Europe was modernizing its infrastructure, and everywhere people searched for better ways to protect valuables. In 1861, James Sargent introduced his time and combination lock — a mechanism that made security predictable and opened new possibilities for banks. A few years later, in 1865, Linus Yale Jr. refined the pin tumbler lock and set in motion a concept that still sits in millions of doors today. In 1878, Sargent advanced the field once again by introducing improved combination techniques that made manipulation even more difficult. This phase clearly shows how strongly technical development responds to societal pressure. The world demanded reliable systems — and the inventors delivered.

Linus Yale Jr. (1861)

Name: Round cylinder lock with four pin tumblers
Inventor: Linus Yale Jr. developed the round cylinder lock with four pin tumblers in 1861 — a design that later became the foundational model for nearly all modern profile and round cylinders. His construction was based on:
- a cylindrical plug rotating inside a housing,
- four precisely guided pin pairs (key pins and driver pins),
- a specially milled key profile,
- a slim, industrially reproducible form factor.
Yale’s system was smaller, more precise, safer, and more standardized than all previous pin tumbler locks. This made him the “father of the modern cylinder.”

Current locks of this type 
What Yale Jr. invented in 1861 is the primal principle of the modern pin tumbler cylinder. Current representatives include:
- classic profile cylinders in Europe
- round cylinders in the USA, Asia, and many industrial sectors
- security and high-security cylinders from all major manufacturers
- variants with 5, 6, 7 or more pins
- versions with security pins (spool, mushroom, serrated, etc.)
- anti-drill, anti-pull, and anti-snap constructions
 The Yale principle is the global industry standard and the most widespread lock system in the world.

Lockpicking
• Exploiting manufacturing tolerances Even early Yale cylinders had natural production variances:
- minimal height differences between the four pins,
- lateral play between plug and housing,
- differences in spring tension,
- uneven friction inside pin chambers. These tolerances caused the pin pairs to set not simultaneously but sequentially — an effect that fundamentally enables selective manipulation.
• Mechanical feedback The Yale cylinder is famous for providing clear feedback, especially in early designs:
- noticeable “setting” of pins when reaching the shear line,
- slight rotation (plug movement) after each correctly set pin,
- torque changes depending on where friction occurs in the cylinder. This made the mechanism precise but also mechanically readable.
• Wear over time With continued use, the following occurred:
- worn pin chambers,
- weakened springs,
- worn pin tips,
- increased plug play. These signs made the cylinder easier to interpret, as mechanical feedback became more pronounced.

Risk/Security
Highest risk: Destructive attacks:
hammer, chisel, brute force against hardware
angle grinders / cutting tools
attacks on the door frame as bypass

Medium risk: Targeted partial destruction:
drilling the pin chambers in historical cylinders (easily done without hardened inserts)
milling or removing housing material
pulling / ripping out unprotected round cylinders

Low risk: Fine manipulation:
selective pin lifting
reading torque and set points
decoding through wear and mechanical play

Insights
Linus Yale Jr. created the foundation of modern lock engineering with his round cylinder design. His four-pin system was precise, easy to manufacture, reliable, and extremely compact — becoming the mechanical standard still used worldwide today. Its weaknesses lie mainly in manufacturing tolerances, mechanical feedback, and natural wear, not in the concept itself. Modern advancements have largely eliminated these vulnerabilities, while the core principle has remained strong and unchanged.

James Sargent (1873)

Bezeichnung: Zeitschloss
Erfinder: James Sargent entwickelte eines der ersten mechanischen Zeitschlösser, ein Sicherheitssystem, das einen Tresor nur innerhalb eines definierten Zeitfensters öffnen ließ – unabhängig davon, ob Schlüssel, Kombination oder Zugangscode bekannt waren. Der Kern seiner Idee: - ein präziser, federgetriebener Uhrmechanismus, - gekoppelt mit einer Sperreinrichtung, die den Riegel erst freigibt, wenn die voreingestellte Zeit verstrichen ist, - mehrere Zeitschaltwerke (oft 2–3), um Redundanz zu schaffen. Ziel war: Raubüberfälle, Komplizenfälle und erzwungene Öffnungen zu verhindern – selbst dann, wenn ein Räuber den Tresorwärter bedrohte. Sargents Zeitschloss wurde internationaler Standard für Banken, Geldtransporte und Hochsicherheitsbereiche.

Aktuelle Schlösser dieses Typs 
Zeitschlösser sind bis heute Standard bei:
- Banktresoren
- Geldautomaten
- Werttransportfahrzeugen
- Hochsicherheitstresoren
- Cash-Management-Systemen 

Moderne Varianten kombinieren oft: 
- digitale Programmierung,
- redundante Uhrwerke,
- manipulationssichere Gehäuse,
- automatische Sperrprotokolle,
- Eintrittsverzögerung (Time Delay).
Viele Hersteller (z. B. S&G, Kaba-Mas, Lagard) produzieren weiterhin mechanische und elektronische Zeitschlösser, die Sargents Grundprinzip nahezu unverändert aufgreifen.

Lockpicking
Ausnutzung von Fertigungstoleranzen Frühe Zeitschlösser hatten gelegentlich:
- ungleichmäßige Ganggenauigkeit der Uhrwerke
- Toleranzen in den Kupplungsmechanismen
- leichte Variationen der Rückstellfedern
In seltenen Fällen konnte der Mechanismus „stehen bleiben“ oder hörbare Unterschiede produzieren, die Rückschlüsse auf die verbleibende Zeit gaben – allerdings ohne die eigentliche Sperre zu überwinden. Wichtig: Toleranzen halfen nicht beim Manipulieren – sie führten höchstens zu Fehlfunktionen.
• Mechanisches Feedback Ein echtes Zeitschloss gibt praktisch kein nutzbares Feedback:
- kein Drehmoment
- keine Rastpunkte
- keine mechanisch interpretierbaren Rücksignale Die Uhr läuft, egal was der Angreifer tut. Man hört nur das Ticken – und das gibt keinerlei Information über die Sperrposition. Höchstens beim Hineinhören konnten Fachleute damals Unterschiede im Geräuschverhalten feststellen, die auf Wartungszustände oder Defekte hindeuteten – aber nicht auf eine Möglichkeit, das Schloss zu manipulieren.
• Abnutzung im Betrieb Alterung erzeugte typische Effekte:
- Gangungenauigkeit
- stärkeres oder schwächeres Ticken
- erhöhte Reibung in alten Uhrwerken
Diese Effekte machten das Zeitschloss unzuverlässiger, aber nicht angreifbarer. Im Gegenteil: Ein verschlissenes Zeitschloss schloss oft strenger als ein neues.

Risiko/Sicherheit
Höchstes Risiko: Zerstörende Angriffe: Aufbrechen des Tresorgehäuses Trennwerkzeuge, Brennschneider, Bohrer Angriff auf Rahmen/Beschlag statt auf den Mechanismus → Das Zeitschloss selbst ist extrem robust – der umgebende Tresor ist der realistischere Schwachpunkt.
Mittleres Risiko: Gezielte teilzerstörende Angriffe: Bohren bis zum Zeitschloss (bei alten Modellen theoretisch möglich, aber extrem schwierig) Fräsen des Schlosskastens Herauslösen der Zeitschlossplatte bei schlechter Befestigung
Geringes Risiko: Feinmanipulation: klassisches Manipulieren ist praktisch unmöglich Uhrwerk läuft unabhängig vom Angreifer kein nutzbares Feedback keine Stift- oder Scheibenmechanik

Erkenntnisse
James Sargent schuf mit seinem Zeitschloss ein System, das nicht nur den Zugriff reguliert, sondern ihn im entscheidenden Moment unmöglich macht. Es war kein Anti-Manipulations-Schloss im klassischen Sinne – es war ein Anti-Zugriff-Schloss, das Gewalt über Zeit stellte. Seine Schwachstellen liegen nicht im Konzept, sondern in: Uhrwerkstoleranzen, Wartungsbedarf, und dem Tresorumfeld. Bis heute gilt Sargents Zeitschloss als eine der zuverlässigsten und wirkungsstärksten Erfindungen der physischen Sicherheitstechnik.

Theodor Kromer (1874)

Bezeichnung: Protector-Schloss
Erfinder: Theodor Kromer präsentierte 1874 das Protector-Schloss, ein hochkomplexes Hebelwerk-System, das speziell für Tresore und Sicherheitsbehälter geschaffen wurde. Sein Prinzip basierte auf: mehreren hochpräzisen Hebelzuhaltungen (oft 6–12 Stück), einer aufwendig konstruierten Schlüsselkontur, die jeden Hebel in eine exakt definierte Höhe brachte, einer mehrfach gestuften Gate-Geometrie, die Manipulationsversuche deutlich erschwerte, äußerst engen Fertigungstoleranzen, die die Hebel nur dann freigaben, wenn alle exakt ausgerichtet waren. Kromers Protector war eines der ersten Hebelschlösser, das industriell zuverlässig gefertigt werden konnte und dennoch einen ungewöhnlich hohen Manipulationswiderstand bot. Es wurde schnell zu einem Standard im Tresorbau – insbesondere im deutschsprachigen Raum.

Aktuelle Schlösser dieses Typs 
Aktuelle Vertreter:
- Kromer Protector 3/4 (moderne Versionen, teilweise mit Zusatzsicherungen)
- moderne Hebel-Tresorschlösser mehrerer Hersteller, die auf dem Kromer-Grundlayout basieren
- Varianten mit gehärteten Boxen manipulaitonssicheren Hebelgeometrien und zusätzlichen Sperrelementen.
Der originale 1874er Mechanismus wird heute nicht mehr gebaut, aber seine Konstruktionsphilosophie lebt fort: präzise Hebeltechnik, eng tolerierte Gates, hohe Manipulationsresistenz. Besonders in DACH-Ländern gelten Kromer-Schlösser bis heute als ein Synonym für zuverlässige, robuste Tresortechnik.

Lockpicking
• Ausnutzung von Fertigungstoleranzen Frühe Protector-Modelle hatten trotz hoher Qualität gewisse Streuungen:
- leichte Unterschiede in Hebelhöhen
- mikroskopisches Spiel in der Führung der Hebel
- minimale Varianz in Federhärte oder Gate-Tiefe
Diese Effekte konnten dazu führen, dass einzelne Hebel etwas früher oder definierter Feedback gaben als andere – ein möglicher Ansatzpunkt für geübte Manipulatoren.
• Mechanisches Feedback Trotz des komplexen Hebelsystems konnten einzelne Rückmeldungen wahrnehmbar sein:
- leichtes Einrasten beim Erreichen des Gates
- fein dosierbare Unterschiede im Drehmoment
- kleine Bewegungsänderungen beim Aufliegen der Hebel Gegenüber einfachen Mehrzuhaltungsschlössern war das Feedback sehr subtil, aber ein erfahrener Spezialist konnte einzelne Signale interpretieren, insbesondere bei älteren, nicht perfekt gewarteten Modellen.
• Abnutzung im Betrieb Mit den Jahren traten typische Alterungseffekte auf:
- abgeflachte Hebelkanten
- eingelaufene Gate-Flächen
- weichere Rückzugsfedern leicht erweitertes Spiel im Riegelmechanismus.
Diese Abnutzung erhöhte die mechanische Lesbarkeit des Schlosses und konnte die ursprüngliche Sicherheit graduell senken, vor allem, wenn das Schloss nur selten gewartet wurde.

Risiko/Sicherheit
Höchstes Risiko: Zerstörende Angriffe: Brechwerkzeuge (Hammer, Meißel, Vorschlagwerkzeuge) Winkelschleifer / Trenntechnik Aufbrechen des Tresorkörpers statt des Schlosses Angriff auf Rahmen, Tür oder Bolzen Einschätzung: Das Protector-Schloss selbst ist extrem robust. Die größte reale Schwachstelle bleibt das Tresorumfeld, nicht der Mechanismus.
Mittleres Risiko: Gezielte teilzerstörende Eingriffe: Bohren des Hebelschlosskastens (bei historischen Modellen ohne Hartmetall möglich) Fräsen einzelner Hebelkammertiefen Ziehen oder Herauslösen bei schlechter Tresorkonstruktion Einschätzung: Historische Modelle waren stabil, aber nicht gegen moderne Hartmetallbohrer geschützt. Moderne Protector-Versionen besitzen dagegen massive Anti-Bohr-Elemente.
Geringes Risiko: Feinmanipulation: Tasten einzelner Hebel über leichtes Drehmoment interpretieren minimaler Rastpunkte Decodieren über Hebelverschleiß oder Toleranzen Einschätzung: Das Protector-Schloss gehört historisch zu den am schwersten manipulierbaren Hebelschlössern. Feinmanipulation bleibt daher die schwächste realistische Angriffsform, selbst bei älteren Modellen.

Erkenntnisse
Theodor Kromers Protector-Schloss war eines der präzisesten, manipulationsresistentesten Hebelmechanismen seiner Zeit und gilt bis heute als ein Meilenstein im Tresorbau. Seine Stärken liegen in der engen Toleranzführung, der komplexen Hebelgeometrie und der hohen Fertigungsqualität. Schwachstellen entstehen historisch vor allem durch Abnutzung oder gegen zerstörende Methoden – nicht durch Manipulation. Moderne Varianten des Protector-Systems gehören weiterhin zu den zuverlässigsten Hebelschlössern im professionellen Sicherheitsumfeld.

Joseph Loch (1878)

Bezeichnung: Zahlenschloss
Erfinder: Joseph Loch entwickelte 1878 ein fortschrittliches mechanisches Zahlenschloss, das als eine der stärkeren Weiterentwicklungen der bis dahin bekannten Kombinationsmechanismen gilt. Sein Konzept nutzte: mehrere präzise gelagerte Zahlen- bzw. Kombinationsscheiben, eine robuste, manipulationserschwerte Gate-Geometrie, verbesserte Kopplungsmechanismen zwischen den Scheiben, ein zuverlässiges Freigabesystem für den Riegel. Lochs Ziel war, die Schwächen früher Scheibenzahlenschlösser zu reduzieren, insbesondere die manipulationsanfälligen Rückmeldungen beim Erreichen des Gates. Sein Mechanismus erreichte eine bessere Gleichmäßigkeit der Rückmeldung und galt damals als einer der sichersten Code-Schlösser im Tresorbau.

Aktuelle Schlösser dieses Typs 
Lochs Prinzip wurde zu einem der grundlegenden Mechanismen moderner Tresorzahlen­schlösser. Heute basieren viele Systeme auf seinem Aufbau:
- mechanische Tresor-Kombinationsschlösser (S&G, LaGard, Kaba-Mas)
- Zahlenschlösser an Wertschutzschränken und Waffenschränken
- sichere mechanische Schließwerke für Banktresore
Moderne Nachfolger besitzen:
- präzisionsgefertigte Scheiben
- manipulationsgeschützte Gates
- gehärtete Achsen
- Anti-Bohr-Platten
- verbesserte Kopplungssysteme

Lockpicking
• Ausnutzung von Fertigungstoleranzen Selbst bei Lochs verbesserter Konstruktion gab es Produktionsschwankungen:
- minimale Höhen- oder Tiefenabweichungen an den Gates
- leicht unterschiedliche Abstände zwischen den Scheiben
- geringfügiges Spiel in der Achsführung
- Varianzen in der Kopplungsmechanik
Diese Punkte konnten dazu führen, dass eine Scheibe etwas klareres Feedback lieferte als die anderen – ein möglicher Ansatzpunkt bei gezielter Manipulation.
• Mechanisches Feedback Während Lochs Design das Feedback bereits reduzierte, blieben bei frühen Modellen dennoch spürbare Signale:
- kleines Einfallen des Hebels in das richtige Gate
- verändertes Drehgefühl beim Erreichen der korrekten Position
- minimales „Hängenbleiben“ beim Übergang über den Gate-Schlitz
Für ungeübte Personen war das kaum wahrnehmbar, aber professionelle Manipulatoren konnten diese Rückmeldungen nutzen, um die Kombination einzukreisen.
• Abnutzung im Betrieb Durch häufige Nutzung veränderte sich das mechanische Verhalten:
- abgeschliffene Gate-Kanten
- eingelaufene Kontaktflächen
- weicher werdende Scheibenfederung
- zunehmendes Achsspiel
Diese Abnutzung machte das Schloss mechanisch deutlicher lesbar und senkte die Manipulationsfestigkeit über die Jahre hinweg.

Risiko/Sicherheit
Höchstes Risiko: Zerstörende Angriffe: Öffnen des Tresors durch massive Gewalt (Hammer, Meißel, Vorschlagwerkzeuge) Einsatz von Winkelschleifer, Brennschneider oder Trenntechnik Angriffe auf Rahmen oder Wandung statt auf das Schloss
Mittleres Risiko: Gezielte teilzerstörende Angriffe: Bohren bis zum Scheibenstapel (historisch möglich, wenn keine Hartmetallplatten vorhanden waren) Fräsen der Schlossfront Heraushebeln oder Ausfräsen bei alten Tresorbauarten
Geringes Risiko: Feinmanipulation: Abhören des Gate-Einrastverhaltens Detektieren von Rastpunkten oder Reibungsmustern Decodieren durch Toleranzen oder Abnutzungsanalyse

Erkenntnisse
Joseph Lochs Zahlenschloss war ein wichtiger Schritt in der Entwicklung von manipulationsgeschützten Tresormechanismen. Es reduzierte mechanisches Feedback, verbesserte die Fertigungstoleranzen und erhöhte die Robustheit des Kombinationsmechanismus. Seine Schwächen lagen weniger im Konzept als im Material und der damaligen Fertigungspräzision. Heute bildet Lochs Grundidee einen festen Bestandteil vieler hochwertiger Tresorsysteme weltweit.

1907 – 1934

Between 1907 and 1934, the world changed at breathtaking speed. Electricity became part of everyday life, cars appeared in the streets, and with this new mobility came a growing need for reliable security. In 1907, Samuel Segal introduced the first modern padlock with a protected shackle — an idea that spread quickly because it made simple attacks far more difficult. From the 1920s onward, development accelerated further. Companies like Yale and Sargent used improved manufacturing techniques to build locks that were more precise and more durable. In 1934, another important step followed: new cylinder concepts that could withstand brute force and manipulation much better than earlier designs. These years clearly show how closely technological progress and security needs are connected. The faster everyday life changed, the more important it became to have a lock that remained reliable.

Emil Henriksson (1907)

Name: Disc detainer / disc tumbler lock
Inventor: Emil Henriksson invented the disc detainer (or disc tumbler) lock in 1907 — a completely different functional principle compared to traditional pin or lever locks. His design was based on: several rotatable discs, a specially shaped key (“beard”) that turned each disc to a defined angular position, a gate alignment that had to form a continuous channel across all discs, a blocking element (typically a lever or bolt) that could only retract when this channel was aligned. The major difference: This lock works entirely through rotation, not linear movement. As a result, it provided exceptionally high resistance to all classical manipulation methods of its time. Henriksson’s system is considered the predecessor of modern high-security disc-detainer locks and was later further developed by several manufacturers.

Current locks of this type 
- modern disc-detainer locks used in safes and specialized security applications
- high-precision disc cylinders from certain European manufacturers
- variants with improved disc design, hardened materials, and anti-manipulation profiles
Some niche high-security systems continue to use disc or plate detainer mechanisms because they are:
- resistant to traditional pin manipulation
- highly precise in coding
- difficult to reproduce or decode
Henriksson’s concept has therefore not disappeared — it lives on as a specialist high-security solution.

Lockpicking
• Exploiting manufacturing tolerances Even disc-detainer locks of that era had certain variances:
- slight manufacturing inconsistencies in disc angles
- small amounts of play in disc bushings
- minimally varying gate depths or widths
- differences in key engagement points Such tolerances could result in individual discs providing feedback earlier when a tool or false key approached the correct gate position.
• Mechanical feedback Despite the complex disc mechanics, some feedback could still be detected:
- a perceptible “click” when a disc reached its gate
- slight torque fluctuations
- changes in friction when sliding over a gate The feedback was far more subtle than in pin tumbler locks but still interpretable by trained specialists.
• Wear over time With use, typical wear occurred:
- worn disc seats
- beveled gate edges
- increased lateral play in the rotational axis
- uneven friction from aging materials This wear reduced the original precision and made the mechanism increasingly readable.

Risk/Security
Highest risk: Destructive attacks:
brute-force attacks on the safe door or hardware
angle grinders, chisels, cutting tools
attacking the door frame or housing rather than the mechanism

Medium risk: Targeted partial destruction:
drilling the lock chamber (possible on early models without carbide inserts)
milling individual disc channels
removing the lock case in older safes

Low risk: Fine manipulation:
rotating individual discs with finely controlled torque
feeling for gate positions
decoding through wear or tolerances

Insights
Emil Henriksson’s disc-detainer / disc tumbler lock was a radical break from previous lock technologies and remains one of the most innovative mechanisms of the early 20th century. Through its rotating principle, multi-disc architecture, and tight tolerance guidance, it created a system far more resistant to manipulation than classic pin or lever designs. Its weaknesses lie mainly in manufacturing tolerances, wear, and destructive attacks — not in the principle itself. Modern descendants of Henriksson’s design are still among the most robust safe locks available in specialized high-security applications.

Walter Reinhold Schlage (1909)

Name: Door lock with two buttons for light control
Inventor: Walter Reinhold Schlage – later founder of the globally known brand Schlage – developed in 1909 an unusual and technically innovative door lock with integrated electric light control. The design combined:
- a classic door lock mechanism
- two push buttons on the inside
- an integrated electrical contact mechanism
- the ability to switch the light on and off when entering or leaving a room without needing a separate wall switch.
The idea was ahead of its time: Schlage combined mechanical security with the then-modern electrification of buildings. This lock is considered one of the earliest examples of electromechanical building technology, decades before “smart locks” became a topic.

Current locks of this type 
The exact system Schlage created in 1909 is no longer produced, but its principle lives on in modern form: Current representatives can be found, among others, in: electromechanical door locks, hotel card locks, push-button mortise locks, access solutions with integrated control functions, smart home door locks with light and building control. Schlage as a brand (still a major player in the US market) later produced cylinder locks, lever sets, and electromechanical systems that directly evolved the core principle: a lock that does more than just lock.

Lockpicking
• Exploiting manufacturing tolerances Even Schlage’s early electromechanical locks had natural production variances:
- slightly different switching travel of the contacts
- varying spring force in the push buttons
- minimal variations in the mechanical couplings between latch/bolt and switching mechanism. These tolerances could help cause malfunctions on the electrical side, but not bypass the lock mechanism itself.
• Mechanical feedback The mechanical bolt section was relatively simple and provided:
- noticeable detents when opening
- slight binding or give in the bolt mechanism
- audible noises from the contact switching
For attackers, however, these signals offered no real manipulation advantage, as the core lock mechanism was comparatively simple and robust.
• Wear in operation Over time, typical aging effects appeared:
- worn button springs
- reduced switching precision of the light contacts
- wear in the bolt mechanism
- contact corrosion due to early electrical materials.
This wear impaired the function of the light control, but not the mechanical security of the lock itself. Important: The security effect of a normal door lock was not weakened by the electrical add-on function.

Risk/Security
Highest risk: Destructive attacks: hammer, chisel, brute force against the hardware use of angle grinder / cutting tools attacks on the door frame / surrounding structure as bypass
Medium risk: Targeted partial destruction: drilling the lock case (historically quite easy), milling the bolt pocket or hardware, pulling out weakly mounted lock cases
Low risk: Fine manipulation: probing the bolt mechanism manipulation via small tolerances or wear slight torque changes when moving the bolt

Insights
Walter Reinhold Schlage was one of the first to combine traditional locking technology with electrical auxiliary functions. His door lock with light control was an early form of building system integration – a precursor of what we now call “smart home”. The lock itself provided the mechanical security of its time, while the electrical component increased convenience without creating a relevant security weakness. Schlage’s invention clearly shows how early electromechanics were integrated into everyday applications and how strongly this influenced later generations of locks.

John Junkunc (1910)

Name: Single-dial combination lock
Inventor: John Junkunc developed around 1910 a combination lock with only a single dial which, unlike earlier multi-part or multi-dial concepts, offered a much simpler operation. The core of his design: a central, rotating single dial, a stack of several internal combination wheels behind it, a precise coupling mechanism that controls the internal wheel stack via the single dial, a fence or lever that is only released when all gates are perfectly aligned. The advantage of the system: much simpler operation, faster entry of the combination, and a more compact mechanism without sacrificing the security logic of traditional combination locks. Junkunc’s approach later became especially popular for compact safes, cash boxes, and industrial security containers.

Current locks of this type 
Current representatives include:
- compact combination locks on small safes
- portable safes
- cash and security cases
- some consumer models (e.g., common fire safes)
- simplified safe locks with only one operating dial
Modern systems use:
- precision-machined wheels
- hardened axles
- manipulation-resistant gate geometry
- anti-drill and anti-mill plates
- friction-optimized coupling mechanisms
The single-dial operating logic introduced by Junkunc is today standard in many small mechanical combination locks.

Lockpicking
• Exploiting manufacturing tolerances Junkunc’s systems were also subject to the production limits of their time:
- slightly varying wheel spacing
- uneven axial tolerances
- differences in gate depth and width
- play in the coupling between dial and wheel stack
These tolerances could cause individual wheels to give clearer feedback than others – a factor professional manipulators could exploit.
• Mechanical feedback Like most wheel-based mechanisms, Junkunc’s lock showed:
- a noticeable drop of the fence when reaching the gate
- perceptible friction changes while dialing
- slight “catching” when passing a gate
- changing torque when the wheel pack was differently loaded
The single dial made the system more convenient, but mechanically it could also transmit manipulation signals.
• Wear in operation Over time, typical wear patterns appeared:
- worn gate surfaces
- weakening springs on the fence
- increased axial play of the wheels
- worn contact points between dial and coupling mechanism
This wear made the lock more acoustically and mechanically readable, reducing the manipulation resistance of older models.

Risk/Security
Highest risk: Destructive attacks: forcing open the safe door or deforming the housing angle grinders, cutting torches, heavy striking tools bypass via door frame instead of attacking the lock itself
Medium risk: Targeted partial destruction: drilling to the wheel stack (possible on historical models), milling the faceplate or opening the lock housing, pulling out poorly mounted lock plates.
Low risk: Fine manipulation: listening for the gate drop, feeling friction changes via the dial, decoding through wear or tolerances.

Insights
With his single-dial combination lock, John Junkunc created a system that successfully combined user comfort and security. His mechanism made combination entry more intuitive and enabled more compact lock designs without weakening the underlying safe mechanics. Its weaknesses – as with most wheel locks – lie in tolerances and wear, not in the concept itself. His principle is still used today and forms the basis of many compact mechanical combination locks in both private and industrial applications.

Johann Schweiger (1912)

Name: Pass-through key lock
Inventor: Johann Schweiger patented the so-called pass-through key lock in 1912 — a system in which the key is inserted from one side through the entire lock and directly actuates the tumblers on both sides. What made Schweiger’s design special: the key passes completely through the lock, it acts simultaneously on tumblers or sliders on both sides, the entire locking action is triggered by a linear push movement rather than rotation, the mechanism allows very compact lock bodies with reduced complexity. This system was intended mainly for interior doors, furniture, and light protection applications rather than high-security environments. Its strength lay in easy operation and quick, cost-efficient production.

Current locks of this type 
Modern representatives can be found in:
- furniture and cabinet locks
- simple box locks
- interior doors in nostalgic or retro designs
- simple metal cabinets and lockers
- toolboxes and light suitcase locks
Modern pass-through systems are technically refined but fundamentally still:
- straightforward
- inexpensive to manufacture
- designed for everyday doors or furniture
- not intended for high manipulation resistance
The basic idea of the pass-through mechanism is still in use today – but not in the high-security sector.

Lockpicking
• Exploiting manufacturing tolerances Early pass-through lock models had typical deviations:
- different height positions of the tumblers
- play in the guide paths of the pass-through mechanism
- small variations in slider or tumbler positioning
- uneven spring force
These tolerances could cause individual tumblers to react earlier or more distinctly, creating mechanical readability.
• Mechanical feedback Despite its simple construction, there was noticeable feedback:
- slight binding of sliders before reaching the end position
- a perceptible drop of the tumblers when the correct position was reached
- differing friction points while pushing the key through
A skilled manipulator could use these signals to test the mechanism step by step.
• Wear in operation Regular use led to typical signs of wear:
- worn guide paths
- rounded slider edges
- weakening springs
- increased play in the pass-through channel
This aging made the mechanism much more audible and tangible, making manipulation approaches easier.

Risk/Security
Highest risk: Destructive attacks: brute force (hammer, chisel, breaking the lock case), prying or punching through thin hardware, attacking the door or frame instead of the lock itself.
Medium risk: Targeted partial destruction: drilling in the slider or tumbler area, milling the lock case, pulling out or prying off the lock with weak mounting.
Low risk: Fine manipulation: probing the sliders through the keyway, detecting detent points via tool movement, decoding through wear and tolerances.

Insights
Johann Schweiger’s pass-through key lock was a functional and production-friendly solution for everyday applications. It relied on linear operation instead of rotation and offered a simple design that spread quickly — but without serious security ambitions. Its weaknesses naturally lie in manufacturing tolerances, mechanical feedback, and wear. Today, the system is still used, but mainly in furniture and interior applications, not in high-security contexts.

Samuel Segal (1912)

Name: Jimmy-proof lock
Inventor: Samuel Segal – himself a New York police officer – invented the jimmy-proof lock in 1912, a new type of door lock developed specifically against the standard break-in method of the time: “jimmying”, i.e., prying the door open with crowbars or wedges. His system was based on: two vertically moving locking bolts, a swinging or rotating mechanism that blocks both bolts simultaneously, a strong surface-mounted interior installation that functions independently of the door frame, a design that prevents the door and frame from being pried apart. The jimmy-proof lock was one of the first systems specifically engineered against prying attacks and thus created an entirely new category of door security.

Current locks of this type 
This lock is still used millions of times today. Modern jimmy-proof locks are still common, particularly in the USA and Asia, typically on:
- rental apartments
- wooden doors in older buildings
- multi-family homes
- apartments and brownstones in big cities
The reason: They can be mounted on the interior without weakening the door structure itself. Current models feature: hardened bolts, improved swing bars, anti-drill plates, better mounting systems, modern cylinder interfaces (Euro or rim cylinders). This makes the jimmy-proof lock still a widespread and reliable retrofit solution for door security today.

Lockpicking
• Exploiting manufacturing tolerances Even early jimmy-proof models had certain tolerance issues:
- slightly different vertical positions of the double bolts
- play in the swing-bar mechanism
- inconsistent fit between bolts and strike box
- varying bolt travel distances
If these tolerances were too large, an attacker could in rare cases apply excessive pressure to the door leaf so that the bolt mechanism gave way slightly.
• Mechanical feedback Since the lock is mounted on the inside, manipulable feedback is very limited. Early models could still offer minor indications:
- slight play in the swing mechanism
- noticeable detents in the turning mechanism
- audible contact noises in thinner housings
However, this information is hardly sufficient for real fine manipulation, because the mechanism, unlike pin or wheel locks, does not work sequentially.
• Wear in operation With regular use, typical wear patterns developed:
- worn swing bars
- beveled bolt edges
- slight play in mounting screws
- increased play in the mechanism
This wear could make the lock somewhat more vulnerable to strong prying forces, but not to manipulation attempts.

Risk/Security
Highest risk: Destructive attacks: brute-force breaking of the door itself (not the lock), violent prying on door leaf or frame, use of crowbars, wedges, striking tools, attacks on weak door structures.
Medium risk: Targeted partial destruction: drilling the cylinder (not the lock body), removing or ripping off the faceplate with poor mounting, milling the cylinder interface.
Low risk: Fine manipulation: probing the installed cylinder (only if the cylinder itself is manipulable), decoding the cylinder via wear or tolerances, slight use of play in the swing mechanism.

Insights
Samuel Segal’s jimmy-proof lock was a milestone in practical door security. It directly addressed the most commonly exploited weakness of its time: prying. Instead of focusing on protecting the cylinder or mechanism, the system reinforced the door structure as a whole – a revolutionary concept at the time. Its weaknesses lie: - primarily in the door and frame materials - secondarily in the installed cylinder - hardly in the mechanism itself To this day, the jimmy-proof lock remains one of the most effective retrofit systems against prying attacks on standard doors.

Harry Soref (1924)

Name: Padlock
Inventor: Harry Soref founded the Master Lock Company in 1924 and developed a new type of particularly robust padlock that permanently changed the market. His key contribution was: a laminated lock body made of stacked and riveted steel plates, an extremely strong shackle made of hardened steel, a cost-effective yet resilient manufacturing process, a compact design that was more resistant to many common attacks of the time. Soref wanted to create a padlock that was both affordable and secure — and he succeeded. The laminated padlock became a worldwide standard in industry, transport, and private use.

Current locks of this type 
Soref’s basic concept is a global standard. Current representatives include:
- classic laminated padlocks for industrial and home use
- weather-resistant outdoor variants
- padlocks with pin tumbler or disc detainer mechanisms
- high-security shackles made of boron steel or hardened carbon steel
- combination lock versions based on the laminated body
Master Lock still produces modernized versions of Soref’s original design today. Numerous manufacturers around the world have adopted the principle. Soref’s concept is one of the most enduring designs in lock engineering history.

Lockpicking
• Exploiting manufacturing tolerances Early models sometimes had:
- lateral play in the shackle
- slightly inconsistent lamination quality
- uneven fit of the core mechanism
- tolerances in the pin chambers (for pin cylinder versions)
This could make the mechanism more mechanically readable, especially in aging locks.
• Mechanical feedback Depending on the model (bolt-based or pin cylinder), there was noticeable feedback:
- slight pin “setting” in cylinder variants
- perceptible shackle binding just before opening
- audible feedback from internal bolts
These signals could be used to analyze the mechanism, though mainly in locks with simple cylinders.
• Wear in operation Weather and use led to typical problems:
- rust in the laminations (especially in unplated steel versions)
- worn shackle guides
- pin wear in the cylinder
- corroded springs or bolts
This wear made some padlocks much easier to manipulate, and very old models sometimes even failed under “tapping” or shackle pressure.

Risk/Security
Highest risk: Destructive attacks: bolt cutters / cutting tools angle grinders / cutoff wheels hammer and chisel attacks levering and breaking the shackle
Medium risk: Targeted partial destruction: drilling the cylinder (if there is no anti-drill protection) milling the lock body at thin points pushing or pulling out the shackle where fit is poor prying when poorly mounted
Low risk: Fine manipulation: probing the pin cylinder (if present) decoding simple combination versions exploiting mechanical feedback in worn mechanisms

Insights
In 1924, Harry Soref revolutionized the padlock with a laminated steel body that was robust, inexpensive, and suitable for mass production. His concept remains one of the most widely used standards worldwide and is a prime example of how industrial manufacturability and security can be combined. Traditional weak points lie in the shackle and in simple cylinder designs, not in the robust laminated construction. Modern versions still rely on Soref’s basic idea and remain a fixed component of global security technology.

Sylvester Wöhrle (1924)

Name: Cylinder lock with Hahn profile
Inventor: Sylvester Wöhrle registered in 1924 a new cylinder lock system with a Hahn profile, an advanced mid-profile for its time designed to improve the security and flexibility of cylinder locks. The so-called “Hahn profile” was characterized by: a profile-guided keyway that could not easily be copied, additional lateral guiding contours, a more complex key geometry than common round or flat keys, a cylinder form that made manipulation with simple tools more difficult. Wöhrle wanted to create a system that still relied on classic pin tumblers but added extra mechanical barriers through a distinctive key profile. The Hahn profile was later imitated in various forms and influenced the development of modern profile cylinders.

Current locks of this type 
Modern successors exist in the form of:
- European profile cylinders with individual key profiles
- proprietary brand profiles for master key systems
- security profiles with lateral guides or asymmetric key edges
- historical reproduction, retro, or museum cylinders
Many of today’s profile cylinders follow Wöhrle’s basic idea: a complex key profile as passive manipulation protection. Technically, these systems were later enhanced with security pins, carbide barriers, and multi-function keyways.

Lockpicking
• Exploiting manufacturing tolerances As with many cylinders of the early 1920s, there were typical production variances:
- uneven pin chambers
- varying spring tension
- slight lateral and vertical play of the pins
- inconsistent profile shaping of the Hahn keyway
These tolerances meant that individual pins gave feedback earlier or more clearly, which encouraged manipulation, especially in older or poorly maintained cylinders.
• Mechanical feedback The Hahn profile made it harder to insert tools, but the cylinder itself still provided:
- precise set points at each pin chamber
- slight plug rotation when a pin pair was correctly set
- audible and tactile friction differences in worn models
- noticeable torque changes when individual pins were addressed
Thus, like any pin tumbler system, it remained fundamentally manipulable even though the profile made access more difficult.
• Wear in operation Regular use led to typical wear:
- beveled key pin heads
- worn pin chambers
- aged springs with inconsistent force
- increased plug play due to wear
These changes made the mechanics more readable and manipulation easier, particularly in heavily used cylinders.

Risk/Security
Highest risk: Destructive attacks: breaking or drilling through the door structure angle grinders, striking tools, prying at the hardware attacks on frame or door leaf instead of the cylinder
Medium risk: Targeted partial destruction: drilling the pin chambers (historically easy without hardened inserts), milling or breaking out the cylinder, pulling the cylinder where hardware protection is poor.
Low risk: Fine manipulation: probing the cylinder via torque decoding via set points manipulation through wear or tolerances limited tool access due to the Hahn profile

Insights
Sylvester Wöhrle’s Hahn profile cylinder was an important step between simple round cylinders and modern profile cylinders. He created a system that added an extra barrier through the key profile itself, making manipulation more difficult without changing the core mechanism. As usual, the weaknesses lay in wear, tolerances, and lack of material protection against destructive attacks. As a concept, the Hahn profile is an early precursor of today’s security and brand profiles used in complex master key systems.

Fritz Schori (1934)

Name: Kaba 8 reversible key system
Inventor: Fritz Schori developed the revolutionary Kaba 8 reversible key system in 1934 — one of the first truly high-precision cylinder systems with a double-sided usable key that combined several security innovations. His concept was based on: eight radially arranged pins (instead of linear pin pairs as in Yale locks), a symmetrical reversible key that works regardless of insertion direction, a highly compact cylindrical mechanism with extremely tight tolerances, a key geometry that was much harder to duplicate than classic single-cut keys. Kaba 8 was thus one of the first high-security cylinder systems that could be manufactured reliably on an industrial scale. Schori created a system that for decades was regarded as a benchmark for manipulation-resistant locking technology.

Current locks of this type 
Modern successors include:
- Kaba 20, Kaba quattro, Kaba experT
- further generations with multi-row systems, magnetic code elements, or variable key depths.
Even today: many master key systems worldwide still use the basic Kaba 8 principle, hotels, authorities, and industrial clients rely on successor systems with the same core logic, reversible key cylinders are regarded as a high-security standard. Schori’s Kaba 8 is a direct precursor of almost all modern reversible key systems, and its fundamental principle is still in use.

Lockpicking
• Exploiting manufacturing tolerances Even the Kaba 8 system could show production spreads, though significantly smaller than in older systems:
- minimally different preset pin positions
- slight radial play in individual tunnels
- variations in spring tension
- differences in the rounding of key profile contours
In rare cases, these deviations could give tiny hints as to which pins were already near their correct position.
• Mechanical feedback Kaba 8 was known for providing very little usable feedback. Experienced manipulators could still detect certain signals:
- slight clicking when setting a radial pin
- barely noticeable torque changes
- fine friction points while turning
However, the feedback was clearly weaker than in linear pin tumbler systems, since all pins act radially and the plug is less prone to tilting.
• Wear in operation Over the years, typical wear patterns occurred:
- beveled pin tips
- slightly increased tunnel play
- worn key grooves
- aged springs
This wear made the system more mechanically readable, but still far more resistant to manipulation than classic profile cylinders.

Risk/Security
Highest risk: Destructive attacks: brute force on hardware or cylinder angle grinders / cutting tools prying the door frame instead of attacking the cylinder
Medium risk: Targeted partial destruction: drilling the radial pin chambers (on models without carbide inserts), milling the cylinder, pulling or breaking it off where mounting is insufficiently protected.
Low risk: Fine manipulation: probing the radial pins exploiting minimal torque changes decoding via wear or rare production tolerances

Insights
Fritz Schori’s Kaba 8 system was a milestone in cylinder lock engineering. He combined an innovative reversible key profile with a radial pin layout that made manipulation attacks far more difficult while still allowing high manufacturing precision. Any weaknesses lay, if at all, in minimal tolerances, wear, and destructive methods, not in the principle itself. Kaba 8 became one of the most long-lived and influential high-security cylinder systems in the world and forms the basis for modern reversible key technologies.

1974 – 1999

Between 1974 and 1999, locks were created in an era in which technology became increasingly digital. Electronics entered companies and later private households. And that shift fundamentally changed how security was perceived. In 1974, the first electronic access systems appeared on the market. Still bulky, but a clear indication of where the industry was heading. In the 1980s, manufacturers significantly improved their cylinders: more precise pins, tighter tolerances, better materials. Manipulation became more demanding, brute force less effective. In the 1990s, the next step followed. Magnetic and chip cards emerged, sometimes combined with classic mechanical components. These hybrid systems laid the foundation for everything that now feels completely normal. This period shows clearly how security evolves whenever technology opens new possibilities. Mechanical systems remained important, but they gained a powerful digital partner.

Klaus Abend, Johannes Filthaut (1974)

Name: Dorma Codic locking system
Inventors: Klaus Abend and Johannes Filthaut developed the Dorma Codic locking system in 1974, a highly advanced cylinder concept of its time featuring multi-row coding and a distinctive, technically sophisticated key profile. The system was based on: multiple rows of coded pins (usually 2–3 levels), an asymmetric, deeply guided Codic key profile that made unauthorized tool insertion difficult, a combination of vertical and lateral coding, very tight production tolerances, which allowed far less mechanical feedback than classic profile cylinders. Dorma Codic was one of the first systems to combine professional master-key capability with increased duplication protection and is considered an early example of modern “security and protected key profiles.”

Current locks of this type 
The original Codic system is no longer produced, but its core principles live on. Modern successors from DormaKaba (after the merger) rely on:
- multi-row pin systems,
- asymmetric or multi-dimensional key profiles,
- mechanical copy-protection elements,
- high-precision manufacturing with tight tolerances — all characteristics already present in the Codic system.
These ideas continue today in:
- Kaba experT,
- Kaba quattro,
- DormaKaba Matrix and 8-lever systems, and modern high-security master-key systems.

Lockpicking
• Exploiting manufacturing tolerances
Even though Codic was known for its precision, natural variances still existed:
- slight differences in pin-row heights
- lateral play in the multi-row core
- variations in spring tension
- minor asymmetries in the key profile These tolerances could occasionally cause certain pin stacks to provide slightly earlier feedback — theoretically exploitable by skilled manipulators, though far harder than with standard profile cylinders.

• Mechanical feedback Dorma Codic was known for its reduced feedback transmission. Still, subtle cues existed:
- extremely fine set points when pins reached shear
- minimal torque changes
- friction variations in worn or poorly maintained cylinders The multi-row arrangement stabilized the core, meaning less plug tilt and thus less feedback overall.

• Wear over time With continued use, typical aging appeared:
- beveled key pin heads
- slightly increased play in the multi-row pin bed
- weakening springs
- wear inside the complex key profile This wear made the cylinder somewhat more readable, though it remained more robust than many contemporaries.

Risk/Security
Highest risk: Destructive attacks:
forcing or breaking the door hardware,
angle grinders / cutting tools,
attacking door or frame as bypass rather than the cylinder.

Medium risk: Targeted partial destruction:
drilling the pin rows (historically possible before hardened inserts),
milling the cylinder face,
pulling or breaking the cylinder when mounted without protective hardware.

Low risk: Fine manipulation:
selectively setting multi-row pins,
probing with minimal torque,
decoding through tolerances or wear.

Insights
The Dorma Codic system by Abend and Filthaut was an important milestone in the development of modern master-key and high-security locking systems. The combination of multi-row pins, a complex key profile, and tight tolerances made it one of the most advanced systems of its time. Its main weaknesses were destructive attacks and the absence of hardened protection in early versions — not the mechanism itself. The core Codic concept remains foundational for many modern high-security cylinders from DormaKaba and other manufacturers.

Tor Sornes (1976)

Name: Punch card lock
Inventor: Tor Sornes invented the first electromechanical punch card lock in 1976, which became the basis for all modern hotel locking technology. The idea was radically new: it was no longer a physical key that coded the lock, but a punch card which, when inserted, activated electrical or mechanical contacts and thus released the door. The system was based on:
- a plastic or paper-based punch card with a defined hole pattern
- a reading mechanism that detected the punching electrically or mechanically
- an electromechanical locking unit that released the bolt
- a quickly changeable code principle (simply change the card = lock recoded).
For the hotel industry this was revolutionary: Lost keys were no longer a major risk, codes could be changed immediately, and guests no longer needed to carry metal keys. Sornes thus laid the foundation for today’s magnetic, chip, and RFID card locks.

Current locks of this type 
Classic punch card locks according to Sornes are hardly produced today, but their successor technologies dominate worldwide:
- magnetic stripe hotel locks
- chip cards / smartcards
- RFID cards
- electronic access control systems with replaceable credential media
- NFC- and smartphone-based systems Many manufacturers (e.g. VingCard, later part of ASSA ABLOY) built directly on Sornes’ principle.

Lockpicking
• Exploiting manufacturing tolerances
Early punch card readers had typical production variances:
- uneven sensor triggering
- varying contact spring tension
- small deviations in the position of the reading pins
- slight misalignments caused by mechanical wear
These tolerances could mean that slightly bent or imprecise punch cards were still read as valid, which encouraged misuse.
• Mechanical feedback Because the card guidance was mechanical, there was some feedback:
- a noticeable “click” when inserting the card
- slight give in individual reading contacts
- audible differences with worn contact pins
Trained individuals could deduce where active reading contacts were located, which theoretically made it easier to copy a working card.
• Wear in operation Due to constant use, especially in hotels, typical wear effects appeared:
- worn contact pins
- reduced spring force
- corroded electrical contacts
- worn card insertion slots
This wear could lead to misinterpretation of the coding, making the lock more vulnerable to imprecise or manipulated cards.

Risk/Security
Highest risk: Destructive attacks:
forcing the door or lock case
prying attacks on the door frame
mechanical force against the card reader

Medium risk: Targeted partial destruction:
drilling or prying open the reader head
short-circuiting or manipulating the electromechanics
removing the card slot cover

Low risk: Fine manipulation:
analyzing the card via mechanical feedback
copying a valid punch card
tolerance-based decoding using test cards.

Insights
In 1976, Tor Sornes revolutionized the access control market with his punch card lock. For the first time, access was controlled not by metal mechanics, but by variably coded information carriers. The system was groundbreaking, even though from today’s perspective it was vulnerable to wear, tolerances, and electromechanical manipulation. Its greatest strength: immediate recodability – a decisive advantage over classic key systems. Sornes’ invention is the historical root of modern hotel and access systems and remains a milestone in lock technology.

Charles Walton (1983)

Name: Electronic RFID lock
Inventor: Charles Walton is regarded as the inventor of the RFID principle for security-related applications. In 1983 he filed a patent that, for the first time, described the contactless identification of a credential (transponder/card) for access control – the birth of the modern RFID lock. His system was based on: a passive or active RFID transponder, a reader that generates an electromagnetic field, a coded response signal that only the authorized transponder sends, an electronic control unit that releases the bolt after successful identification. Walton’s approach was revolutionary because, for the first time, it brought contactless identification into security applications. This laid a central foundation for modern hotel doors, company locks, access control systems, and smart locks.

Current locks of this type 
RFID is now one of the world’s most important access technologies. Direct successors can be found in:
- hotel card locks (MIFARE, LEGIC, HID, etc.)
- corporate and government access points
- parking garages and barriers
- smart-home door locks
- industrial and laboratory access systems
RFID has evolved over several technological generations:
- LF RFID (125 kHz, early systems)
- HF RFID (13.56 MHz, e.g. MIFARE, NFC)
- UHF RFID (industrial access, longer ranges)
- cryptographically secured latest-generation RFID keys
Walton’s principle is now omnipresent and is the basis for almost all modern contactless access systems.

Lockpicking
• Exploiting manufacturing tolerances
Early RFID systems suffered from technical variances: unevenly sensitive antenna coils, varying ranges, slight inaccuracies in evaluating weak transponder signals, tolerance-based misinterpretation of interference signals. These deviations could, in rare cases, cause foreign or roughly copied RFID tags to be accepted, an effect seen in early systems with weak coding.
• Mechanical feedback
Mechanical feedback played only a minor role in RFID locks. There were only:
- audible relay or solenoid clicks
- slight vibration from the bolt motor
- almost no tactile response at the reader itself
For attackers this offered no useful manipulation points, since the security logic was purely electronic.
• Wear in operation Wear appeared mainly in:
- buttons or covers of the reader module
- oxidized contacts in hybrid readers
- aging coils or weakening transponder elements
- bolt mechanisms (in electromechanical setups) Electronic aging could favor misinterpretations, but was rarely exploitable in a targeted way.

Risk/Security
Highest risk: Destructive attacks:
forcing the door frame or lock case
prying tools, chisels, angle grinders
attacks on the door leaf or hardware instead of the electronics

Medium risk: Targeted partial destruction:
drilling or ripping off the reader
short-circuiting the electronics
cutting cables (depending on system)
bypassing the electric bolt by directly accessing the mechanics

Low risk: Fine manipulation / electronic attacks:
copying simple RFID tags (early 125 kHz systems especially vulnerable)
reading unencrypted transponders
replay attacks on very old models
jamming signals to trigger misinterpretation.

Insights
In 1983, Charles Walton created the foundation for a completely new security concept: contactless identification instead of mechanical keys. His RFID lock fundamentally changed access control and enabled flexible, rapidly adjustable authorization systems. Weak points of early models were mainly:
- unencrypted RFID transponders
- electromechanical components that were easy to attack
- destructive attacks on the door environment
Today Walton’s RFID lock is one of the most important predecessors of modern, digital, cryptographically secured access systems – a true milestone in security technology.

Paul E. Szabo (1985)

Name: Kaba Nova
Inventor: Paul E. Szabo developed the Kaba Nova system in 1985, one of the most advanced evolutions of the multi-row reversible key. While earlier Kaba systems such as Kaba 8 or Kaba 20 were based on radial pin arrangements, Nova introduced a complex multi-channel and multi-row coding, combined with increased key copy protection and extremely tight manufacturing tolerances. Core features of the Kaba Nova system: multiple rows of radial pins that are coded simultaneously, a highly complex reversible key profile that is asymmetrical and deeply guided, additional profile barriers that severely restrict the insertion of unauthorized tools, a cylinder core with minimal plug tilt and high precision, optionally integrated mechanical security elements against picking and key duplication. Szabo thus combined mechanical security, copy protection, and master-key capability in a way previously unseen. Kaba Nova became one of the most robust locking systems of the late 1980s and early 1990s.

Current locks of this type 
The original Kaba Nova series is no longer produced in this form. However, the technology lives on in several successors, including:
- Kaba quattro
- Kaba quattro plus
- Kaba experT / experT plus
- Kaba pextra / pextra+
- modern DormaKaba high-security cylinders
All of these systems are based on Szabo’s design philosophy: radially acting pin rows, reversible key principle, complex profile barriers, high manufacturing precision, certifiable master-key system technology. Nova is therefore a direct predecessor of many modern high-security profiles.

Lockpicking
• Exploiting manufacturing tolerances
Even in the Nova system there are natural tolerances, although significantly reduced:
- minimally different positions of individual pin channels
- slight radial or axial play
- varying spring forces in heavily used cylinders
- differences in the microgeometry of the key
These tiny production variances could, in rare cases, provide minimal feedback, but only to extremely skilled specialists.
• Mechanical feedback Nova was deliberately designed to transmit as little feedback as possible. Nevertheless, a theoretically usable residual feedback exists:
- barely perceptible set points of the radial pins
- very slight torque differences when approaching the correct height
- slight friction changes in worn cylinders
Compared to classic pin tumbler systems, the feedback is extremely damped.
• Wear in operation Use leads to typical wear phenomena:
- worn pin tips (minimal, but noticeable)
- increased play in the core after many years
- slightly worn key grooves
- fatigue of springs in the multi-row layout
These factors increase mechanical readability with age, but the level remains clearly above that of many conventional systems.

Risk/Security
Highest risk: Destructive attacks:
breaking out, drilling, or milling the cylinder
angle grinders, striking tools
bypass attacks on door/frame instead of the cylinder

Medium risk: Targeted partial destruction:
drilling individual pin channels (historically possible without carbide inserts)
pulling the cylinder without protective hardware
milling the faceplate
breaking open the keyway

Low risk: Fine manipulation:
setting individual radial pins with minimal torsion pressure
decoding via rare production or wear tolerances
extremely demanding tool-based manipulation.

Insights
Paul E. Szabo’s Kaba Nova was a milestone in modern high-security cylinders. It combined radially acting multi-row systems, an asymmetrical key profile, and extreme precision in a way that massively hindered manipulation. Its weak points, as with all high-quality cylinders, were less in the mechanics themselves and more in:
- destructive attacks
- missing protective hardware
- aging-related wear
Nova became the basis of many later DormaKaba systems and is still regarded as a technically important step in the development of modern reversible key technology.

Klaus Abend, Dieter Wienert, Johannes Filthaut (1987)

Name: Winkhaus electronic lock
Inventor: In 1987, Abend, Wienert, and Filthaut presented a fully fledged electronic locking system for Winkhaus, one of the first solutions to cleanly combine electronic identification, access control, and mechanical locking. The system was based on: an electronically coded key (early transponder or chip technology), an electronic reader in the cylinder, a control electronics unit that checks whether the key is authorized, a mechanical lock that is only released after valid identification. This created one of the first genuine mechatronic cylinders in Europe. Winkhaus was one of the pioneers of the idea of merging mechanical locking technology with electronic access control, long before “smart locks” reached the mass market. The system was particularly relevant for:
- master-key systems with changing authorizations
- companies and public authorities
- large residential complexes
- areas where lost keys needed to be quickly blocked (lost key = immediately disabled)

Current locks of this type 
The 1987 Winkhaus system is considered a direct predecessor of modern mechatronic cylinders. Successors are now in use worldwide:
- Winkhaus blueChip
- Winkhaus X-tra systems
- modern transponder and chip cylinders
- hybrid mechanical-electronic master-key systems
- time-controlled access profiles in companies and authorities
The basic principle “mechanically locked, electronically authorized” is now a standard in modern access control. The electronic Winkhaus lock was one of the most important European steps toward intelligent door systems.

Lockpicking
• Exploiting manufacturing tolerances
As with early electronic systems, certain spreads existed: different sensitivity of contact points or reading coils, minimal variations in key insertion depth, slight deviations in the position of electronic components, different reaction times of the control electronics. These tolerances occasionally led to misreads, but were rarely usable as manipulation vectors.
• Mechanical feedback Because the security-relevant check is electronic, the lock itself provides: hardly any usable mechanical feedback, only audible clicking of the release motor or solenoid, minimal torque changes on release. There were thus few attack points for classic manipulation attempts. Only the downstream, purely mechanical locking element was manipulable at all, and only after successful electronic identification.
• Wear in operation Wear mainly affected: electrical contacts, plug-in channels in the cylinder, key surfaces (with hybrid key types), motor/solenoid locks in intensive use. Aging could cause malfunctions, but only rarely be exploited as an attack method.

Risk/Security
Highest risk: Destructive attacks:
breaking the hardware or door frame
angle grinders, crowbars, chisels
attacking door material instead of the lock

Medium risk: Targeted partial destruction:
drilling or breaking out the electronics module
manipulating the release motor via direct physical access
milling the cylinder if mechanical protection is insufficient

Low risk: Fine manipulation / electronic attacks:
signal analysis (possible with early unencrypted systems)
replay attacks (relevant only for very early prototypes)
exploiting communication errors or interference signals.

Insights
The electronic Winkhaus lock of 1987 was an important milestone in access technology. With the combination of electronic identification and mechanical locking, Abend, Wienert, and Filthaut created one of the first mechatronic cylinder systems in Europe. Its strengths lay in:
- flexible authorization management
- high protection against lost keys
- very low manipulation feedback
Weaknesses appeared mainly:
- under destructive attacks
- in early unprotected electronics modules
- in age-related electronic disturbances
The system forms the basis of many modern access solutions and is one of the key innovations of the 1980s in lock technology.

Volker Ziegler (1988)

Name: CES alpha electronic locking system
Inventor: In 1988, Volker Ziegler developed CES alpha for CES, one of the first fully fledged electronic locking systems in cylinder format. It was one of the earliest systems to combine electronic identification and mechanical locking in the compact form factor of a profile cylinder – a genuine innovation of the 1980s. The system was based on: an electronically coded key (early chip or transponder technology), an electronic reading module directly in the cylinder, an intelligent control unit that checks authorization, a mechanical bolt core that is only released after valid identification, the ability to block lost keys via software without replacing the cylinder. CES alpha was thus one of the first digitally managed locking systems, long before electronic access control became standard in buildings.

Current locks of this type 
CES alpha is no longer produced in its original form, but the principle lives on fully in modern CES systems. Current successors:
- CES OMEGA FLEX
- CES OMEGA ACTIVE
- CES eCLIQ / electronic CLIQ systems (cooperation)
- mechatronic and fully electronic cylinders with online and offline management
The core elements – electronic key, electronic authentication, mechanical locking – come directly from the alpha idea of 1988. CES alpha is now regarded as a forerunner of modern mechatronic and electronic locking technology in Europe.

Lockpicking
• Exploiting manufacturing tolerances
As with early electronic cylinders, certain production spreads existed: varying sensitivity of reading contacts, different identification range, deviating positioning of electronic components, slight mechanical tolerances in the combined electronics/mechanics area. These tolerances sometimes led to misreads or poor recognition, but offered hardly any usable manipulation window.
• Mechanical feedback Because CES alpha works primarily electronically, mechanical feedback is minimal: audible clicking of the release element, slight torque change when the core is released, no usable sequential feedback like in mechanical cylinders. For manipulators there was hardly anything to “feel”; the security logic was entirely in the electronics. • Wear in operation Wear affected both electronics and mechanics: contact wear between key and reading unit (for hybrid keys), aging electronic components, fatigue of the electromechanical release module, wear of the mechanical core. Aging components could cause malfunctions, but were rarely exploitable as an attack vector.

Risk/Security
Highest risk: Destructive attacks:
breaking out or drilling the hardware
angle grinders, chisels, crowbars
attacking door or frame instead of the cylinder

Medium risk: Targeted partial destruction:
physically drilling the electronics/mechanics unit
tearing off the electronic front modules
milling the cylinder without protective hardware
directly manipulating the release mechanics via force

Low risk: Fine manipulation / electronic attacks:
reading unencrypted chips (relevant for early prototypes)
replay attacks with weak authentication protocols
disrupting the electronics with targeted field manipulation.

Insights
The electronic CES alpha system was a visionary step in lock technology in 1988. Volker Ziegler created one of the first electronic profile cylinders in Europe, combining identification, access management, and mechanics in a form factor that is still standard today. Its strengths: immediate blocking of lost keys, flexible authorization management, high resistance to classic picking methods. Its weaknesses: vulnerable electronics modules under destructive attack, limited protection against brute force, early chip technology without modern cryptography. CES alpha is one of the most important milestones on the road to today’s mechatronic high-end cylinders.

Mijodrag Makivic (1992)

Name: EMZY electronic motor cylinder by EVVA
Inventor: In 1992, Mijodrag Makivic developed the EMZY for EVVA, one of the first fully motorized locking cylinders that not only combined mechanics and electronics, but actively powered the entire locking process. The EMZY was not just an electronic variant of a mechanical system, but a completely new approach: an integrated electric motor that turns the plug independently, an electronic identification unit (e.g. transponder, chip, or higher-level access control system), a sensor package that checks key status, position, and rotation, automatic locking and unlocking controlled by electronics, optional logging and integration into building management systems. The EMZY is considered one of the milestones of mechatronics: it shifted responsibility for the locking process from the user to the system – a decisive step toward today’s automated access solutions.

Current locks of this type 
The EMZY itself and its successors are still in use. Modernized variants exist as: - EVVA EMZY generations - electronic motor cylinders in master-key systems - motor-controlled panic and access systems - integrated solutions in modern building management architectures Other manufacturers later adopted similar approaches, but EVVA remains one of the reference companies in this category.

Lockpicking
• Exploiting manufacturing tolerances Even early EMZY models had tolerances in:
- motor mounting
- sensor positioning
- locking paths
- force transmission between motor shaft and plug
In the worst case, these tolerances could lead to misinterpretation (e.g. “door closed” with the door slightly open), but they had hardly any manipulation value, since the motor and electronics strictly controlled the locking process.
• Mechanical feedback Because the EMZY is not operated in a classic mechanical way, virtually all pick feedback disappears. Only minimal feedback exists:
- a slight motor noise
- a change in torque when the plug is moved automatically
For manipulation attacks these signals are irrelevant; without electronic release the cylinder remains mechanically locked.
• Wear in operation The EMZY shows typical electromechanical aging:
- motor wear
- wear in the gear stages
- aging sensors or electronic contacts
- wear on the mechanical coupling
With increasing age, malfunctions may occur – for example, the motor stalls or misinterprets key states. This is hardly relevant for manipulation.

Risk/Security
Highest risk: Destructive attacks:
attacking the hardware or door frame
breaking out the cylinder
angle grinders, crowbars, striking tools
drilling the mechanical lock unit

Medium risk: Targeted partial destruction:
drilling motor/electronic components
milling the cylinder front
removing the electronic module by force
accessing the mechanical coupling after destroying the hardware

Low risk: Fine manipulation / electronic attacks:
pick or decoder attacks are practically irrelevant, since the plug cannot be moved without release
electronic attacks (e.g. protocol analysis) were theoretically possible on early EMZY models, but extremely difficult
interference signals could cause malfunctions, but rarely openings.

Insights
In 1992, Mijodrag Makivic created with the EMZY one of the first fully motorized locking cylinders – a system that uses the key purely as an identifier and leaves the actual locking process to the electronics. Its strengths: high resistance to manipulation, flexible integration into access control, automatic locking, integrated mechatronics. Its weaknesses: destructive attacks on door and hardware, material attacks on motor and cylinder body, electronic aging over long-term use. The EMZY remains an important milestone in motorized access technology and influences almost all modern smart-lock architectures.

Günter Uhlmann (1996)

Name: Electronic cylinder with transponder
Inventor: In 1996, Günter Uhlmann developed an electronic locking cylinder with an integrated transponder reader that combined mechanical and electronic locking technology in a compact, mass-market form. While earlier systems often required external readers, motors, or add-on modules, Uhlmann integrated:
- a transponder reader directly in the cylinder head
- electronics that check and authorize the transponder
 - an electromechanical release unit that only decouples the core after successful identification
 - a classic mechanical core, so doors can be operated with a key in the usual way – but only after electronic release.
This created a true mechatronic cylinder whose form, size, and installation largely correspond to a standard profile cylinder. The transponder-based approach was particularly attractive for:
- residential complexes
- companies
- master-key systems with dynamic authorization management
- users wanting electronic administration without complex infrastructure

Current locks of this type 
The basic principle of Uhlmann’s development is widespread today and forms the basis of many modern mechatronic systems. Successors and further developments:
- CES OMEGA ACTIVE / ACTIVE 2
- EVVA AirKey and AirKey hybrid systems
- Winkhaus blueChip
- DormaKaba mechatronic cylinders
- eCLIQ / electronic CLIQ systems
- numerous modern transponder cylinders
The principle “transponder authorizes, mechanics lock” is still one of the dominant concepts in the electronic locking market.

Lockpicking
• Exploiting manufacturing tolerances
As in early mechatronic cylinders, tolerance variations existed: differences in transponder sensor range, minimal deviations in antenna position, slight variations in the coupling between electronics and mechanical core, tolerances within the mechanical pin mechanism (if used). These spreads could occasionally cause misreads, but rarely provided real manipulation leverage.
• Mechanical feedback Due to the electronic release, without a valid transponder there is: no rotational feedback, no set point, no mechanical attack path. After successful release, the cylinder behaves like a normal mechanical core, but manipulation would then be irrelevant anyway.
• Wear in operation Dual electronic + mechanical technology means dual wear: aging transponder contacts or antenna components, aging electronics, mechanical wear in the cylinder core, wear of the coupling mechanism. The crucial point: wear increases the risk of malfunctions, not of manipulation.

Risk/Security
Highest risk: Destructive attacks:
breaking hardware or door frame
angle grinder, crowbar, brute force
pulling or tearing off the entire cylinder body

Medium risk: Targeted partial destruction:
drilling the electronic modules
milling the cylinder
attacking the mechanical coupling after removing the cylinder head
short-circuiting or mechanically destroying the release unit

Low risk: Fine manipulation / electronic attacks:
transponder cloning (possible with older, unencrypted models)
replay attacks with simple protocols
signal disruption (e.g. shielding)
mechanical fine manipulation is useless as long as release is missing.

Insights
Günter Uhlmann’s electronic transponder cylinder from 1996 was a crucial step toward modern mechatronic cylinders. For the first time it compactly combined:
- electronic identification
- mechanical locking
- modular master-key capability
Its weaknesses lay less in the mechanics or electronics themselves and more in: destructive attacks on door/hardware, early unencrypted transponder technologies, and aging of electronic components. The basic principle lives on today in almost all modern access systems and forms the basis for many market-leading electronic cylinders.

Ludger Voss and Herbert Meyerle (1997)

Name: SimonsVoss System 3060 electronic cylinder
Inventor: In 1997, Ludger Voss and Herbert Meyerle developed the SimonsVoss System 3060, one of the first fully digital, battery-powered locking systems in the format of a profile cylinder. The innovation was so strong because the lock: worked completely wirelessly, integrated the power supply via a battery in the knob, used an RFID or transponder key as the identification medium, released an electromechanical coupling after successful authorization, could be seamlessly integrated into digital access control systems. System 3060 was thus one of the first locking systems that could realistically be managed both offline and online – without cables, without motor cylinder, without external power supply. Its key features: digital authorization management, immediate blocking of lost keys, full logging (depending on model), very compact form factor, modular expandability for large master-key systems. The system quickly became the standard in the commercial and government sectors.

Current locks of this type 
The SimonsVoss System 3060 is still one of the most successful digital locking systems worldwide. Current or modernized successors:
- SimonsVoss 3060 (various generations)
- SimonsVoss AX system
- digital SmartHandles
- integrated online and radio gateways
- access software “LDB / WaveNet / SmartIntego”
The functional principle – wireless, battery-powered, electronic cylinder – is now a global standard based on the 3060 architecture.

Lockpicking
• Exploiting manufacturing tolerances
As with System 3060, there are typical production spreads: slightly varying range of the RFID antenna, tolerances in the position of the coupling mechanism, differences in spring and magnet mechanics in the knob, varying detection sensitivity in older transponders. These tolerances mainly cause misreads (e.g. key not recognized) – not security-relevant openings.
• Mechanical feedback Since the cylinder remains mechanically blocked without electronic release, there is virtually no pick feedback: no set points, no plug play, no opening signal through torsion. The mechanics only work after electronic release, which makes classic manipulation practically irrelevant.
• Wear in operation Wear mainly affects: battery contacts and electronics, the electromagnetic coupling, the mechanics of the knob control, the transponder key system in older variants. With wear, the likelihood of malfunctions increases rather than the chance of manipulation.

Risk/Security
Highest risk: Destructive attacks:
breaking hardware or door frame
mechanical force on the knob
angle grinder/chisel/striking tools
breaking out or fully pulling the cylinder

Medium risk: Targeted partial destruction:
drilling or destroying the knob electronics
milling the cylinder when there is no protective hardware
physical access to the coupling unit after hardware destruction
interrupting power supply by damaging the knob

Low risk: Fine manipulation / electronic attacks:
copying old, unencrypted transponder generations (mainly theoretical, practically rare)
replay attacks on very early models
interference signals to influence the reader (mostly ineffective)
classic picking methods completely irrelevant.

Insights
The SimonsVoss System 3060 was one of the most important developments in modern access control in 1997. Voss and Meyerle created a locking system that was:
- completely wireless
- battery powered
- digitally managed
- extremely resistant to manipulation
- mechanically more reliable than many predecessors
Weaknesses do not lie in the technology itself, but in:
- destructive attacks
- inadequate door or hardware security
- aging electronic components
System 3060 is still considered a milestone and forms the technical basis for both modern digital cylinder systems and smart-building architectures worldwide.

Kwikset (1998)

Name: Remote access lock system
Inventor: Kwikset, a U.S. manufacturer of door locks and security products. In 1998, Kwikset launched one of the first remote access lock systems – an early predecessor of modern smart locks. In contrast to classic mechanical or mechatronic cylinders, Kwikset relied for the first time on remote control and radio signals to lock or unlock doors. The system was based on: a wireless remote that sends an authorized signal by radio, an electric motor in the lock that moves the bolt, a control board that verifies the radio signal and releases the motor, an emergency mechanical function that could still be operated with a key. This design was a milestone because, for the first time, private homes were equipped with technical remote opening – long before smart-home solutions became widespread. Kwikset combined convenience (remote opening) with basic mechanical security.

Current locks of this type 
Kwikset’s early remote access systems are considered direct predecessors of modern smart locks. Successors and further developments:
- Kwikset SmartCode series
- Kwikset Kevo (Bluetooth)
- Kwikset Halo (Wi-Fi)
- Z-Wave and ZigBee-compatible models
- modern motor locks with app and cloud integration
The 1998 remote access system was an important step toward today’s networked access solutions.

Lockpicking
• Exploiting manufacturing tolerances
Early radio-controlled locks had typical tolerances: different radio sensitivity, varying shielding effectiveness, inaccuracies in motor positioning, slight production deviations in the bolt mechanism. These deviations more often caused functional issues than opportunities for manipulation – they were rarely critical for security.
• Mechanical feedback Because the bolt is moved electrically, classical manipulation signals are barely present: no useful plug play, no set feedback like in pin systems, only an audible motor sound when opening. Attackers could not derive coded information from this. Without an electronic signal, the lock remained mechanically blocked.
• Wear in operation Typical wear points: motor bearings, gear shafts, battery and electronic contacts, radio receiver module. With increasing age, malfunctions occurred more frequently, but the mechanics did not become easier to manipulate.

Risk/Security
Highest risk: Destructive attacks:
forcing the door or frame
angle grinders, crowbars, chisels
breaking open or tearing out the motor block

Medium risk: Targeted partial destruction:
opening the housing and manipulating the electronics
short-circuiting the motor control
milling the bolt area
battery manipulation to disrupt the system

Low risk: Fine manipulation / radio attacks:
replay attacks (possible on early, unencrypted radio systems)
cloning simple radio remotes
minor interference signal attacks
classic picking attempts on the mechanical emergency cylinder (depending on model).

Insights
In 1998, Kwikset laid the foundation for modern smart-lock technology with its remote access lock system. For the first time, the locking process was controlled wirelessly, while a mechanical emergency opening remained available. Strengths:
- high user convenience
- early form of wireless access control
- combination of electronics + mechanics
Weaknesses:
- early radio protocols partly unencrypted
- vulnerable to material attacks on motor/mechanics
- strongly dependent on electronic condition
Despite these limitations, Kwikset’s system was a technological pioneer and paved the way for the networked access solutions that are now widespread worldwide.

Winkhaus (1999)

Name: Winkhaus BlueChip locking system
Inventor: Winkhaus introduced the BlueChip system in 1999 – an electronic locking system based on contactless transponder technology that was compact enough to be integrated into a standard profile cylinder. BlueChip was one of the first mass-market electronic locking systems that could be operated completely offline, wirelessly, and without a motor cylinder. The system was based on:
- a contactless transponder that transmits its identity by radio
- an antenna and evaluation unit integrated in the cylinder
- an electromechanical coupling that is only released by a valid transponder
- a classic mechanical cylinder core that is operated normally after release
The special feature: BlueChip combined the flexibility of electronic authorizations with the reliability of mechanical cylinders and was significantly more robust than many earlier systems.
It was suitable for:
- small and large master-key systems
- residential complexes
- corporate and administrative buildings
- area access with changing authorizations

Current locks of this type 
BlueChip was a cornerstone for many modern Winkhaus systems and is still in use in various evolved forms. Successors / modern product lines:
- Winkhaus BlueSmart
- Winkhaus BlueCompact
- further developed transponder cylinders in profile design
- hybrid offline/online locking systems via gateway integration
The “BlueChip principle” – transponder authorizes, coupling releases – remains one of the central access concepts at Winkhaus today.

Lockpicking
• Exploiting manufacturing tolerances
In the BlueChip system, small tolerance-related variations existed: transponder range, antenna coil position, small clearances in the electromechanical coupling, different reaction times of the electronics. These spreads rarely led to security-relevant effects – more often to recognition issues or delayed releases.
• Mechanical feedback BlueChip completely blocked the cylinder core until a valid transponder was detected. This meant: no set points, no plug-tilt play, no classic pick feedback. Mechanical manipulation was therefore practically ineffective.
• Wear in operation BlueChip showed typical dual-wear effects of electronic/mechanical hybrid cylinders: aging of contacts or coils, worn coupling mechanics, wear of the mechanical core, battery wear in related system components (depending on version). Wear increased susceptibility to faults rather than manipulability.

Risk/Security
Highest risk: Destructive attacks:
forcing the door
attacks on hardware or frame
breaking out or pulling the cylinder
use of angle grinder, chisel, or heavy tools

Medium risk: Targeted partial destruction:
drilling the electronics front (possible in early models)
removing the reader module
milling the cylinder front without protective hardware
forced access to the coupling after mechanical destruction

Low risk: Fine manipulation / electronic attacks:
transponder cloning (theoretically possible on very early, simply coded BlueChip versions)
replay attacks on early protocols
interference attacks
classic mechanical manipulation practically impossible.

Insights
In 1999, Winkhaus BlueChip was one of the first truly practical electronic locking systems in profile cylinder format. It combined elegance, simplicity, and reliability and offered high resistance to manipulation alongside flexible management structures.
Its strengths:
- contactless transponder technology
- robust electromechanical coupling
- immediate blocking of lost transponders
- strong resistance to manipulation
Its weaknesses: as with all cylinders: attacks on door/hardware, early electronic systems partly without strong cryptography, material attacks still possible. BlueChip is one of the defining systems of modern electronic access control and was key for today’s Winkhaus product line.

From 1999 onwards

From 1999 onwards, development accelerated noticeably. Mechanics remained important, but electronics increasingly took the upper hand. Radio technology, transponders, digital locking systems – many of these were initially found only in specialised areas, but today they are often standard. 

What has become particularly clear in this period is that the greatest progress did not take place in the classic door cylinder, but in the automotive sector. Cars used to be opened using brute force. Today we talk about rolling codes, encrypted signals and attack scenarios that sound more like IT security than lock opening. The leap is enormous, and I believe it will become even greater. For the coming years, I see three clear lines.

First: mechanics will remain, but it will increasingly be pushed into the background.
Second: vehicles will continue to drive innovation, because this is where the economic pressure is highest.
Third: attacks will become more digital, so the defensive mechanisms will also have to come increasingly from IT. 

The industry is at a point where a lock is no longer just a lock, but a system. And this is exactly where it becomes exciting – because we are only at the beginning.

About the Author

Lars Buchwald has been an integral part of the Multipick team since 2006, where he dedicates his passion and expertise to marketing and graphics. As a trained graphic designer and copywriter, he brings a wealth of experience and creativity to his work, which enables him to convey the messages of the ingenious tools in an appealing and convincing way. With a keen sense for the needs of the target group, he steers Multipick's marketing fortunes. His commitment is characterized by a high degree of sensitivity and the right richer at the right time. 

As a native of Bonn, Lars not only has close ties to the region, but has also firmly integrated his passion for marketing spear tools into his professional work. His attachment to the city is reflected in his work and gives his marketing campaigns an authentic, Bonn touch.

Related Articles
Home burglary scene – hooded intruder with crowbar opening cabinet

The royal class of locks
There are locks that make even experienced lockpickers smile at first — and then fall completely silent.

The Art of Opening
Over the past hundred years, the art of opening has evolved from simple wire bending to high-tech lock picks.

Plagiarism and Its Dangers
Cheap lockpicking tools, counterfeits and their dangers — for people and their wallets

Multipick was established here in Bonn in 1997 and has had its headquarters and production facilities here on the Rhine ever since. 

 Why should we leave here? Anyone who has been here before will agree that it is a very beautiful place and that the people are ‘typically Rhineland’, open-minded and friendly. From an early stage, we began to occupy ourselves with a wide variety of entry tools. We tried out lock snappers and core extractors such as the Bell and gathered a wealth of experience with a wide variety of tools. Whether it was a lock pick set or special tools for fire brigades and locksmiths, in the end the door or window had to be opened. In line with the motto, you got the problem and we got the solution.

Many tools, irrespective of hobby or professional, are dispatched from our warehouse to destinations throughout the world. 

Opening tool kits for caretakers and locksmiths, pick sets and lock picking accessories for Locksport enthusiasts and Hobbs hooks for specialists to unlock locked safes. There are thousands of different ways to deploy our specialised tools. Our TFG latch plates and key turners allow a closed door to be reopened. QA Pro 2 and our V-Pro core pulling screws can be used to open a locked door. We also offer milling burrs and drill bits for those situations where there really is no other way. Many useful aids such as MICA opening cards, wedges, door latch spatulas, door handle catches and spiral openers, which are all useful tools to help you get the job done. But even if things get a bit complicated, you are in good hands with us. Products such as the Kronos and Artemis electric picks are our top highlights. Anyone who likes to open dimple locks or disc locks will be delighted with the ARES system. For opening windows, we offer you a range of top products from Kipp-Blitz. Favoured by emergency services such as the fire brigade, THW (Federal Agency for Technical Relief) and police. Many of our tools are manufactured in-house. This gives us the liberty to manufacture quickly and in a customer-orientated manner. No lengthy supply chains and subcontractor dependencies. This has a number of advantages both for you and, of course, for our environment. One big advantage is that you get everything from a single source, enabling us to offer you consistent quality. This is also our promise to you, all from a single source, Made in Germany, Made in Bonn - promised.

FAQ – everything you need to know.

1. How does a new tool idea emerge at Multipick?

New products often start with everyday observations — from real operations, the community, or our internal tests. Whenever we notice that a problem keeps appearing again and again — lack of stability, insufficient sensitivity, or ergonomic flaws — it sparks the first impulse for a new design. What begins as tinkering only becomes a real project once it’s clear: the tool must deliver a measurable advantage in actual use.

2. Why do development processes sometimes take so long?

Because prototypes often look perfect in the lab but behave very differently under real stress. Materials deform, grip geometry doesn’t match the hand, tolerances need fine-tuning. That’s why we test in several cycles before a tool goes into series production. Speed is good — but a tool that fails in the field is not an option.

3. How important is feedback from professionals and the lockpicking community?

Very important. Many breakthroughs happen because users honestly tell us what works and what doesn’t. Firefighters, locksmiths, authorities, and experienced pickers reveal weaknesses that no lab could ever detect. This hands-on knowledge shapes the form, materials, and functional principles of our tools.

4. How does Multipick turn a prototype into a market-ready product?

Only when a prototype passes all load tests, provides sensitivity, and performs reliably in real-world use does it move into precision engineering. There, material grades are defined, production methods optimized, and tolerances specified. The goal: a tool that is consistently precise and durable — not just a “lucky prototype.”

5. Why does Multipick place so much value on Made in Germany?

Because it gives us maximum control over quality, production depth, and durability. Short supply chains, close coordination with manufacturing, and access to highly precise production technology allow us to build tools that remain reliably consistent for many years. For professionals and emergency responders, that level of reliability is essential.

6. What distinguishes a good pick or opening tool from an outstanding one?

Often it’s the details: how precisely a handle transmits feedback, whether a material flexes under bending pressure, how cleanly edges are finished, and how naturally the tool sits in the hand. An outstanding tool feels right from the first moment — and still does after hundreds of uses.

7. Are innovations at Multipick driven more by technology or by real-world problems?

Both. Some developments begin because new manufacturing technologies open doors that were previously closed. Others start with a simple line from the field: “There has to be a better way.” The best products combine technical potential with real, practical benefit.

8. Why do many ideas fail despite promising beginnings?

Because not every innovation works under real conditions. Some materials behave differently than expected, other designs offer too little control or feedback. But a failed attempt is never a loss — it often becomes the crucial step toward the solution that finally works.

9. How can you tell if a new tool is truly a breakthrough?

When it solves an existing problem permanently and improves handling at the same time. A true breakthrough becomes obvious when professionals don’t want to put it down — and when it performs better under load than anything before it. Popularity alone isn’t enough; reliability is the benchmark.

10. What philosophy drives technical development at Multipick?

We build tools for people who need to work quickly and precisely in critical situations. Tinkering isn’t enough — every detail has to serve a purpose. Our goal: fine-mechanical precision, maximum sensitivity, and robust constructions that remain reliable even under stress.