Fact-checked by Grok 2 weeks ago

Lock

"Lock" is a polysemous term referring to various devices and concepts used to secure, control, or restrict in different contexts. Most commonly, a lock is a , , or electromechanical device used to secure doors, containers, or other enclosures by restricting access to authorized personnel, typically through a that aligns internal components such as pins or tumblers at a shear line to enable operation. The origins of security locks trace back over 4,000 years to , where wooden devices featuring a primitive pin tumbler mechanism—consisting of pegs lifted by a slotted wooden —were used to protect palaces and . Early designs evolved through civilizations like the Romans, who introduced lever tumbler locks with iron components for greater durability, though these remained vulnerable to picking and force. Significant innovations occurred in the 18th and 19th centuries, including Joseph Bramah's unpickable lever lock in 1784 and Linus Yale Jr.'s modern pin tumbler cylinder lock patented in 1861, which improved security and convenience by allowing smaller, mass-producible keys while resisting manipulation. Contemporary mechanical locks are classified into key-operated and combination varieties, with key-operated types including cylindrical (key-in-knob or lever) locksets for interior doors, mortise locksets embedded into door edges for higher security, rim-mounted deadbolts for surface reinforcement, and portable padlocks for chains or hasps. These devices form the foundation of systems worldwide, safeguarding assets in residential, commercial, and military contexts by deterring unauthorized entry through , , or impressioning, though advancements in continue to enhance their . Beyond applications, "lock" also denotes structures in engineering such as canal locks for managing water levels in ; mechanisms in for and data ; techniques in and sports for restraining opponents; and various other specialized uses in , , and , as detailed in subsequent sections.

Mechanical and Security Devices

Physical Locks

A physical lock is a designed to secure an opening, such as a , , or , by obstructing access until released by an authorized means, typically a . These locks rely on physical components to create barriers against unauthorized entry, preventing the movement of a or without proper alignment of internal mechanisms. The core components of a physical lock include the , which houses the ; the or , which extends to secure the lock; the keyhole or keyway, providing for the ; and tumblers, such as pins or levers, that must be manipulated to allow . In , inserting the correct aligns these tumblers, creating a clear —known as the shear line—for the lock's or to rotate or retract. Physical locks encompass several fundamental types based on their tumbler mechanisms, each offering varying levels of security through mechanical obstruction. Warded locks, one of the earliest designs, use fixed metal wards or barriers inside the keyway to block incorrect keys, allowing only a matching notched key to pass and move the bolt. Lever tumbler locks employ a series of pivoting levers that the key lifts to specific heights, aligning a gate in each lever with a notch in the bolt to permit its retraction. Pin tumbler locks, a more advanced variant, feature upper and lower pins within the cylinder; the key pushes these pins to align precisely at the shear line, enabling the cylinder to turn and withdraw the bolt. Materials for physical locks are selected for durability, resistance to tampering, and environmental resilience, with commonly used for its resistance and in components like cylinders and keys. and hardened alloys provide superior strength against physical attacks such as or cutting, often forming the body and in high-security models. The historical evolution of physical locks traces back to around 2000 BCE, where wooden pin tumbler devices used sliding bolts secured by wooden pins lifted by a wooden . During the era (c. 500 BCE onward), metal locks and bronze keys emerged, improving portability and strength. In medieval Europe, from the onward, iron locks became prevalent, featuring more complex warded and early lever mechanisms to counter growing threats from burglars. Basic security ratings for physical locks, such as those established by the (ANSI) in collaboration with the Builders Hardware Manufacturers Association (BHMA), classify residential locks into three grades based on operational durability, strength, and resistance to forced entry. Grade 1 represents the highest standard, enduring over 800,000 cycles of operation and withstanding 300 pounds of force on the bolt, suitable for high-security applications. Grade 2 offers moderate performance with at least 400,000 cycles and 150 pounds of force resistance, commonly used in standard residential settings. Grade 3 provides basic protection with 200,000 cycles and 60 pounds of force resistance, intended for low-risk interior uses.

Key and Cylinder Mechanisms

A lock typically consists of a bow, which serves as the for gripping and turning, and a , the elongated that inserts into the lock to manipulate its internal components. The features precisely cut notches, known as cuts, along its and sometimes grooves or milled patterns on its sides, designed to align the lock's tumblers at specific depths for proper operation. These cuts and grooves interact with the tumblers to allow only when the matches the lock's configuration, preventing unauthorized entry. Lock cylinders, which house the keyway and tumbler mechanisms, vary in design to enhance . Fixed cylinders remain stationary while the internal rotates upon correct insertion, whereas rotating cylinders allow the entire outer to turn in some specialized applications. Double-cylinder locks incorporate keyed mechanisms on both sides of the door, requiring a for from either direction, which adds by preventing access through broken or similar vulnerabilities on one side. This design contrasts with single-cylinder variants that may use a thumbturn on the interior for convenience. The pin tumbler mechanism, a cornerstone of many modern mechanical locks, relies on a series of upper driver pins, lower key pins, and compression springs housed within the cylinder plug and surrounding shell. When the correct key is inserted, its cuts lift the key pins to specific heights, positioning the breaks between key pins and driver pins precisely at the shear line—a plane separating the plug from the shell—allowing the plug to rotate freely and retract the bolt. Springs maintain downward pressure on the driver pins, ensuring that any misalignment keeps at least one pin stack straddling the shear line and blocking rotation. This precise alignment principle, patented in the early , underpins the security of pin tumbler locks by demanding an exact match in pin elevations. Ward mechanisms employ fixed internal obstructions, or , positioned within or along the keyway to impede the of incorrect . These wards, often protruding plates or ridges, require corresponding notches or cut-outs on the to pass unimpeded; mismatched keys catch on the wards and cannot fully engage the . While simpler and less secure than pin tumblers, wards provide basic protection against casual tampering by limiting key insertion depth and . Disc-detainer mechanisms use a stack of rotatable discs, each with slots or gates, stacked along the cylinder axis and biased by springs to misalign with the lock's sidebar or retaining bar. The key's edge cuts rotate these discs to align their true gates—a specific cut-out on each disc—with the sidebar, enabling the cylinder to turn and operate the lock. False gates on the discs add complexity, misleading incorrect keys and increasing resistance to manipulation. This design offers higher security than basic wards due to the multi-axis alignment required. Key duplication for mechanical locks involves using a code cutter or milling machine to replicate the original key's cuts and grooves onto a blank, guided by the existing key or a bitting code. Security enhancements include side milling, where wavy grooves are machined into the blade's flat sides to engage lateral tumblers, and dimples—cone-shaped indentations drilled at varying depths on both broad faces of the blade—to interact with additional pinning systems. These features complicate duplication by requiring specialized equipment and resist impressioning by obscuring pin feedback. Common vulnerabilities in key and cylinder mechanisms include bumping, where a low-cut bump is inserted nearly fully and struck with a to generate that temporarily aligns pins via vibrations, allowing brief . Impressioning exploits subtle marks left on a blank inserted and jiggled within the , gradually refining cuts to match the pins over multiple attempts. Basic countermeasures involve adopting high-security with spool or mushroom-shaped pins that increase friction and resistance to forced alignment, as well as dimpled or side-milled that demand precise multi-dimensional cuts. Additionally, restricted keyways limit blank availability, further deterring unauthorized duplication.

Modern Electronic and Smart Locks

Modern electronic and smart locks represent a significant advancement in , transitioning from basic electronic mechanisms to sophisticated systems that leverage connectivity and for enhanced security and user convenience. The evolution began in the late with the introduction of keypad-based electronic locks in the , such as systems that eliminated physical keys while relying on internals for latching. By the , these progressed to card-based and early RFID-enabled entry, paving the way for integration in the 2000s. The 2010s marked the rise of Bluetooth-enabled smart locks, exemplified by the 2018 collaboration between and Yale, which introduced keypad models with auto-unlock and remote access features. Entering the , integration has become standard, with models like the Yale Assure Lock and Smart Lock offering seamless app control, geofencing, and over-the-air updates for residential and commercial use. Key technologies enabling keyless entry in these systems include RFID for proximity cards, (BLE) for short-range smartphone pairing, for tap-to-unlock interactions, and for remote management without additional hubs. These protocols allow users to authenticate via mobile apps, virtual keys, or PIN codes, often existing deadbolts for minimal disruption. Biometric further enhances , with scanners common in mid-range models achieving false acceptance rates (FAR) as low as 0.001% (1 in 100,000 attempts), while high-end and facial recognition systems in premium locks like those from Ultraloq or Eufy boast FAR below 0.0001% (1 in 1 million or better). Facial recognition, powered by algorithms, adapts to lighting variations, and scans provide stable identification even for users wearing glasses, though they require precise positioning to minimize false rejections. Integration with home automation ecosystems is a hallmark of modern smart locks, enabling voice-activated control and automation routines. For instance, Yale and Schlage models connect natively with Amazon Alexa, Google Home, and Apple HomeKit, allowing commands like "unlock the door" via voice assistants or automated triggers based on location or routines. Security is bolstered by robust encryption standards, with many devices employing AES-256 for data transmission over Bluetooth or Wi-Fi, ensuring end-to-end protection equivalent to banking protocols. This symmetric cipher processes 128-bit blocks with 256-bit keys, resisting brute-force attacks with a security strength of 2^256 possibilities. Despite these advances, vulnerabilities persist, including man-in-the-middle (MITM) attacks where hackers intercept or signals to spoof , as demonstrated in relay attacks on BLE-based locks. Battery failure poses another risk, potentially rendering locks inoperable during outages, though mitigations like low-battery alerts via app notifications, extended-life lithium batteries (lasting 6-12 months), and mechanical key overrides address this issue. Firmware updates and two-factor further harden defenses against remote exploits. As of 2025, the smart lock market reflects strong adoption, with global revenue projected at USD 3.38 billion and a CAGR of 19.75% through 2034, driven by residential (over 60% ) growing at 20% annually due to smart home proliferation, while commercial sectors like hotels and offices see 21.2% CAGR from multi-tenant applications.

Waterway and Engineering Structures

Canal Locks

Canal locks are engineering structures designed to enable vessels to navigate between different water levels on rivers and inland waterways, functioning essentially as water elevators. A typical lock consists of an enclosed chamber with watertight gates at each end, where boats or barges enter and the water level is adjusted to match the upstream or downstream elevation. This allows safe passage without the need for vessels to navigate steep inclines or rapids directly. The basic operation begins with the approaching the lock and entering the chamber after the appropriate are opened. For an ascent, the downstream close, and water from the upper level is introduced through sluices or culverts to raise the chamber's level gradually, equalizing it with the upstream water. Once levels match, the upstream open, permitting exit. Descent reverses this process, draining water via the same mechanisms to lower the chamber. The entire cycle relies on for water flow, with and valves controlled manually on smaller canals or hydraulically and electrically on larger ones, ensuring controlled filling or emptying to prevent that could damage . Key components include mitre gates, which are paired doors meeting at an acute angle to form a tight seal against water pressure when closed; these are housed in recesses within the lock walls and operated by levers, winches, or hydraulic systems. Paddles, or wickets, are smaller valves at the base of the gates that regulate initial water flow to avoid sudden surges. Culverts are embedded pipes within the lock walls that distribute water evenly during filling or emptying, often connected to upstream or downstream sources. Auxiliary structures like weirs manage excess water by directing surplus flow away from the chamber, preventing flooding and maintaining stable levels in adjacent pounds. Common types of canal locks include pound locks, the standard design featuring a single rectangular chamber bounded by gates at both ends, suitable for moderate elevation changes. Flash locks, an earlier weir-based variant, operate by temporarily releasing a rush of water over or through a single gate or barrier to lower boats downstream, though they are less efficient for controlled and modern use. Staircase locks consist of multiple consecutive chambers arranged in sequence without intermediate pounds, allowing vessels to ascend or descend steep gradients by passing through a series of connected locks, effectively compressing space while reusing water from prior chambers. Water management in canal locks draws primarily from upstream reservoirs or rivers to fill chambers, with downstream drainage often lost to the river system, though some designs incorporate side ponds to recapture and reuse a portion of the water. Efficiency is enhanced by optimizing gate and valve operations, with a typical cycle for inland canal locks taking 10 to 20 minutes, depending on chamber size and flow rates; larger systems may extend to 1-2 hours for full transits involving multiple vessels. These metrics underscore the locks' role in maintaining steady navigation flows, minimizing delays in commercial barge traffic. Environmental impacts arise mainly from high water consumption, with a single operation in a typical narrow lock using 30,000 to 100,000 gallons drawn from freshwater sources, potentially straining local during droughts. strategies include water-saving basins or auxiliary ponds that collect and pump recycled back into the system, reducing net usage by up to 40% in advanced designs; for instance, cross-filling techniques between chambers reuse drainage from one to fill another. These measures help preserve balance by limiting freshwater into rivers and supporting sustainable operation amid climate variability. A prominent modern example is the , originally constructed in 1914 with three sets of chambers raising ships 85 feet across the . The 2016 expansion introduced Neopanamax locks, featuring larger chambers measuring 427 meters long, 55 meters wide, and up to 18 meters deep over the sills, capable of handling vessels up to 366 meters in length, enabling ships with up to approximately 50% greater cargo capacity than original vessels. These new locks incorporate water-saving basins with pumps to recycle up to 60% of the water per transit, addressing environmental concerns while boosting capacity for global trade. Following prolonged droughts exacerbated by El Niño from 2023 to 2025, the introduced additional measures, including transit auctions and expanded use of auxiliary reservoirs, reducing daily transits to as low as 24 slots in 2024 before partial recovery to 36 by late 2025, while maintaining water recycling targets.

Ship Locks and Navigation Aids

Ship locks, designed for larger vessels in rivers, harbors, and marine environments, facilitate navigation across significant elevation changes while accommodating ships up to thousands of tons. These structures differ from inland locks by incorporating robust hydraulic systems to handle fluctuations and powerful currents, ensuring safe passage for oceangoing carriers and bulk freighters. Key designs include vertical lift locks, where rise overhead or submerge vertically using winches or hydraulic cylinders, allowing operation against water pressure without obstructing the channel; caisson locks, featuring a sealed floating chamber that elevates vessels in a water-filled box for high lifts; and marine such as sector or miter types, which pivot or fold hydraulically to seal the chamber while managing head differentials up to 100 feet. Navigation aids in ship locks enhance safety during entry, , and , particularly for vessels exceeding 200 meters in . Fenders, typically cylindrical rubber or foam structures mounted on lock walls, absorb impacts and prevent damage during alignment; bollards, heavy cast-iron or mooring points embedded in concrete, secure lines to hold ships steady against currents. systems include high-intensity floodlights illuminating the chamber and approach channels, while employs signal lights—flashing for controlled approach, green for entry permission, and red for halt—to coordinate vessel movements and prevent collisions. These aids integrate with VHF radio protocols for communication between lockmasters and captains. Capacity specifications underscore the scale of modern ship locks, with chambers often exceeding 300 meters in length to handle large displacements. For instance, the locks in , operational since 2008 as a double-way five-step system, accommodate vessels up to 3,000 tons via a ship component, with the full locks supporting cargo ships of 10,000 gross tons in chambers measuring 280 meters long and 34 meters wide. Similarly, the Kiel Canal's large locks in feature usable dimensions of 310 meters by 42 meters, enabling passage for ships with drafts up to 14 meters and handling over 35,000 transits annually. The locks, completed in 1959, measure 233.5 meters by 24.4 meters, lifting vessels carrying up to 30,000 metric tons across a total elevation of 75 meters through 15 interconnected chambers. Operational challenges in ship locks arise primarily from environmental forces, requiring precise management to avoid vessel instability. Tidal influences, with ranges up to 1.5 meters at estuarine sites like Brunsbüttel on the , demand synchronized scheduling to mitigate surge effects and ensure chamber levels align with fluctuating sea heights, often using sector gates for rapid closure under flow. Current management involves controlled filling and emptying via ports and valves, distributing water jets at 90-degree angles to minimize turbulence—discharge rates can reach 21,000 cubic feet per second in high-lift systems—while reverse tainter valves regulate velocity to under 21 feet per second. Emergency protocols prioritize rapid response, including immediate gate closure, VHF distress signaling on channel 16, and prohibitions on anchoring except in crises, with lockmasters authorized to evacuate chambers if structural integrity is compromised. Integration with dams enhances multifunctional utility, linking navigation to flood control and energy production. At facilities like Bonneville Lock and Dam on the , ship locks adjoin spillways with 18 gates capable of discharging 478,000 cubic feet per second to manage floods, while turbines harness the same water flow for 7,482 megawatts of annual hydroelectric output, allowing coordinated operation where lock transits influence levels without disrupting power generation. This synergy supports over 50 million tons of annual cargo while generating equivalent to powering millions of homes.

Historical Development of Water Locks

The earliest precursors to modern water locks appeared in ancient , where flash locks—simple barriers with gates that temporarily released to allow boats to pass over shallow sections—were employed on canals near Nanyang as early as the 1st century BCE. These rudimentary devices facilitated on early canal systems, such as segments of what would become the Grand Canal, by managing levels without fully enclosing vessels. The pound lock, featuring an enclosed chamber with gates at both ends for controlled elevation changes, was first developed in around 984 CE by engineer Qiao Weiyo (Jiao Weiyo) on the Zhedong Canal near Taihu Lake. In the Roman era, similar flash lock principles were adapted for canal systems across , including in , where engineers constructed watergates to regulate flow on navigable waterways like the Fossdyke around AD 120, aiding and transport between natural sources. These ancient innovations relied on basic wooden barriers and manual operation, marking the initial steps toward controlled elevation changes in inland . The was introduced to in the medieval period, building upon foundations with greater efficiency in equalizing water levels. The first such lock in Europe was constructed in 1373 at Vreeswijk in the , at the junction of the Canal and the River Lek, allowing multiple vessels to navigate varying elevations simultaneously. This design, often attributed to engineering ingenuity, incorporated early forms of mechanisms, though mitre gates—angled doors that sealed tightly against water pressure—emerged later in the to improve sealing and durability. The pound lock's adoption spread across the , enhancing trade on rivers like the and by reducing the risks associated with flash locks, such as sudden floods. The Industrial Revolution catalyzed widespread lock development, particularly in Britain during the 1760s to 1830s, as canals proliferated to support coal and goods transport. Engineer James Brindley pioneered innovative lock designs, including the narrow-beam pound locks on the Bridgewater Canal, completed in 1761, which featured watertight clay linings and sequential chambers to minimize water usage across 39 miles of terrain. Brindley's techniques, applied to over 300 miles of canals, standardized multi-lock flights and influenced the British canal boom, with systems like the Staffordshire and Worcestershire Canal incorporating his "Brindley boxes" for efficient water management. These advancements enhanced operational reliability on emerging networks like the Chesapeake and Ohio Canal. By the late 19th and early 20th centuries, engineering shifted toward hydraulic and electric operations, replacing manual labor with powered systems for gate and valve control. Hydraulic mechanisms, using pressurized water or oil, were first widely implemented in the 1880s on canals like the Manchester Ship Canal, allowing faster filling and emptying of chambers. Electric motors followed in the early 1900s, as seen in upgrades to the New York State Barge Canal around 1918, where concrete control houses housed electrical gear to automate lock sequences and reduce maintenance. Concurrently, materials transitioned from wood and iron to reinforced concrete and steel post-1900, providing greater durability against erosion and ice; for example, the U.S. Army Corps of Engineers adopted concrete for lock walls on the Illinois Waterway in the 1920s, extending service life while supporting heavier loads. These innovations laid the groundwork for contemporary waterway efficiency, though core pound lock principles persisted.

Computing and Information Technology

Synchronization Locks in Programming

Synchronization locks, also known as mutexes (short for mutual exclusion), are fundamental primitives in concurrent programming designed to ensure that only one thread can access a shared resource at a time, thereby preventing race conditions where multiple threads modify data simultaneously and lead to inconsistent states. A mutex operates by allowing a thread to acquire the lock before entering a critical section of code; if the lock is already held by another thread, the requesting thread blocks until the lock is released. Semaphores extend this concept to control access by multiple threads, functioning as counters that permit a specified number of threads to proceed (e.g., a binary semaphore acts like a mutex for exactly one thread). Spinlocks, another variant, achieve mutual exclusion through busy-waiting, where a thread repeatedly checks the lock's availability in a loop rather than blocking, making them suitable for short critical sections to avoid the overhead of thread suspension. In programming languages, synchronization locks are implemented through language-specific constructs that abstract underlying operating system primitives. In , the synchronized keyword provides intrinsic locking on objects, where each object serves as its own ; a acquires the object's lock upon entering a synchronized or , ensuring exclusive access, and releases it upon exit, even if an exception occurs. This mechanism supports reentrant locking, allowing the same to reacquire the lock without . Similarly, Python's threading.Lock() implements a basic mutex via the acquire() and release() methods, which can be used in a with statement for automatic management, preventing multiple s from executing protected code sections concurrently. These implementations rely on the host operating system's scheduling to handle blocking and waking. Deadlocks, where threads indefinitely wait for each other to release locks, pose a significant challenge in lock-based synchronization, but prevention strategies mitigate this risk. The , developed by in the late , avoids deadlocks by simulating requests to ensure the system remains in a "safe state" where processes can complete without deadlock; it checks if granting a request allows a sequence of processes to finish by allocating remaining resources. Another approach, resource ordering, imposes a total ordering on all resources (e.g., assigning unique numbers) and requires threads to acquire locks in strictly increasing order, eliminating the possibility of circular waits that cause deadlocks. These techniques trade some performance for reliability in multi-threaded applications. The performance of locks incurs overhead primarily from context switches when block and are rescheduled, typically costing 1-10 microseconds per switch on modern hardware, depending on the CPU architecture and system load. This latency arises from saving and restoring states, including registers and page tables, making frequent locking expensive in high-contention scenarios; spinlocks reduce this by avoiding switches for brief waits but consume CPU cycles. To illustrate lock usage, consider the classic producer-consumer problem, where add items to a shared and consumers remove them, risking overflow or underflow without . A uses a mutex to protect access and variables (built on locks) to signal availability: the producer the mutex, adds an item if space exists (waiting on a "not full" otherwise), then notifies consumers before releasing; consumers similarly the mutex, remove items if available (waiting on "not empty"), and notify producers. This ensures thread-safe bounded operation without . The evolution of synchronization locks began in the 1960s with IBM's OS/360, an early operating system supporting multiprogramming on System/360 mainframes, which laid groundwork for concurrent though lacking formal primitives. Formal semaphores emerged in 1968 through Dijkstra's work on the THE multiprogramming system, providing a robust mechanism for and exclusion that influenced subsequent OS designs. Mutexes and spinlocks developed in the 1970s and 1980s within Unix and systems, emphasizing efficiency for embedded and desktop computing. By the 2020s, in environments, fine-grained locking has become prevalent to handle massive parallelism in distributed applications, such as and serverless architectures, where locks are applied to small data structures to minimize contention and improve scalability across virtualized resources.

Database and File Locking

In database systems, locking mechanisms are essential for maintaining and consistency during concurrent transactions by controlling access to shared resources. These locks prevent conflicts such as dirty reads, non-repeatable reads, and phantom reads, ensuring that transactions execute as if they were sequential despite parallelism. Database locks are broadly classified into shared locks, also known as read locks, which allow multiple transactions to read the same data item simultaneously but prohibit any writes, and exclusive locks, or write locks, which grant a single transaction sole access to modify the data item while blocking both reads and other writes from concurrent transactions. This distinction ensures that readers do not interfere with writers and vice versa, promoting concurrency without compromising atomicity. A foundational protocol for managing these locks is the two-phase locking (2PL) scheme, which divides transaction execution into a growing phase where locks are acquired as needed and a shrinking phase where locks are released after no new acquisitions occur, guaranteeing serializability if all transactions adhere to it. Lock refers to the at which locks are applied, balancing concurrency and overhead; finer like row-level locks allows more parallel access but increases management costs, while coarser levels such as table-level locks simplify administration at the expense of throughput. In SQL Server, the default is row-level, with automatic to page-level or table-level when exceeding thresholds like 5,000 row locks to mitigate usage. Similarly, MySQL's storage engine supports row-level locking for high concurrency in OLTP workloads, supplemented by intention locks at the table level to indicate pending finer-grained locks without blocking unrelated operations. In file systems, particularly environments, locks are typically advisory, meaning they rely on voluntary cooperation among processes and are not enforced by the unless explicitly checked, as exemplified by the flock() which applies shared or exclusive advisory locks on entire open files to coordinate access in multi-process applications. Mandatory locking, though less common and disabled by default in most Unix variants, enforces restrictions kernel-wide on files marked with specific permissions (e.g., setgid without execute), preventing unauthorized access even from uncooperative processes, but it is rarely used due to risks like denial-of-service vulnerabilities. Concurrency control in databases employs two primary models: pessimistic locking, which acquires locks early to prevent conflicts assuming high contention, and optimistic locking, which allows unrestricted access during execution and validates changes at commit time via versioning or timestamps, aborting transactions only if conflicts arise. These models align with ANSI SQL isolation levels, such as READ COMMITTED, the default in many systems, which uses short-term shared locks for reads to prevent dirty reads while permitting non-repeatable reads within a transaction. Deadlocks, where transactions cyclically wait for each other's locks, are detected using wait-for graphs, directed graphs where nodes represent transactions and edges indicate dependencies; cycles in the graph signal deadlocks, prompting resolution by aborting one victim transaction based on criteria like least work done. Timeout mechanisms complement this by preemptively rolling back transactions exceeding predefined wait durations, reducing detection overhead in low-contention scenarios. A prominent is Oracle Database's implementation of multi-version concurrency control (MVCC), which maintains multiple versions of data rows timestamped with system change numbers, allowing readers to access consistent snapshots without acquiring shared locks on writes, thereby significantly reducing lock contention and enabling higher throughput in read-heavy workloads compared to pure locking approaches.

Cryptographic Locks and Security Protocols

Cryptographic locks refer to digital mechanisms in cryptography that secure data by controlling access through mathematical functions and protocols, analogous to physical locks but operating on information rather than tangible objects. These locks employ algorithms to ensure confidentiality, integrity, and authenticity, preventing unauthorized access or tampering. , a foundational concept, uses pairs of keys—a public key for encryption or verification and a private key for decryption or signing—to enable without prior . The algorithm, introduced in , exemplifies this by allowing digital signatures where the sender signs a message hash with their private key, verifiable by anyone using the public key, thus "locking" the message's origin and integrity. Security protocols build on these concepts to establish secure channels. The SSL/TLS handshake protocol utilizes asymmetric cryptography during session establishment: the client and server exchange public keys, often via certificates, to negotiate a shared symmetric key for efficient data , ensuring the session is "locked" against eavesdroppers. In blockchain systems, proof-of-work serves as a consensus lock, where participants compete to solve computational puzzles using hash functions like SHA-256 to validate transactions and append blocks, securing the against alterations by requiring immense computational effort to rewrite history. Advanced cryptographic locks include zero-knowledge proofs, which allow one party to prove possession of a secret (the "key") without revealing it, verifying the lock's state while preserving privacy. Formally introduced in , these proofs ensure completeness, soundness, and zero-knowledge properties, enabling applications like password authentication without exposing credentials. However, cryptographic locks are vulnerable to side-channel attacks, which exploit physical implementations rather than mathematical weaknesses; for instance, timing attacks measure computation duration to infer private keys in algorithms like or Diffie-Hellman. As of November 2025, the rise of necessitates quantum-resistant locks, with NIST standardizing multiple approaches including -based, hash-based, and code-based to withstand attacks from quantum algorithms like Shor's. These include ML-KEM (from CRYSTALS-Kyber) for key encapsulation (FIPS 203), ML-DSA (from CRYSTALS-Dilithium) for digital signatures (FIPS 204), and SLH-DSA (from SPHINCS+) for hash-based digital signatures (FIPS 205), all finalized in August 2024; additionally, in March 2025, NIST selected HQC, a code-based , for standardization as a to ML-KEM, with a draft standard expected in 2026. These rely on diverse hardness assumptions, such as problems in high-dimensional spaces for ML-KEM and ML-DSA, to secure future systems. NIST's September 2025 draft white paper provides migration mappings to the Cybersecurity Framework to guide organizational transitions.

Sports and Physical Techniques

Joint Locks in Martial Arts

Joint locks in martial arts are submission techniques that apply and to hyperextend or compress specific , such as the , , or ankle, to immobilize or force an opponent to submit by exploiting the joint's limited . These techniques rely on biomechanical principles of , where the practitioner's body weight and positioning create rotational around the targeted , often amplified by isolating the limb to prevent counter-movement. For instance, is applied perpendicular to the joint's axis to maximize discomfort and risk of injury without requiring excessive strength, allowing smaller practitioners to control larger opponents effectively. The origins of joint locks trace back to Japanese , developed during the 17th-century as part of training for unarmed combat against armored foes, emphasizing joint manipulations alongside throws and pins to neutralize threats efficiently. These methods were codified in various (schools) of jujutsu, focusing on (strikes) to set up locks for control or disarmament. (BJJ) adapted these techniques in the early through , a jujutsu and expert who taught the , shifting emphasis toward ground-based applications and refining joint locks for prolonged grappling scenarios in and sport. Common types of joint locks include armbars, such as juji-gatame, which targets the by extending the arm across the practitioner's hips; wrist locks like kote-gaeshi, involving a rotational twist of the wrist to hyperpronate the forearm and stress the radiocarpal joint; and leg locks such as the heel hook, which applies twisting torque to the knee and ankle via control of the foot's rotation. These techniques vary by art— often employs standing wrist locks for quick takedowns, while BJJ favors ground-based armbars and leg locks for positional dominance. Execution of a basic arm lock, exemplified by juji-gatame, follows a structured sequence: first, isolate the opponent's arm by securing the with one hand and the with the other while bridging the hips to break ; second, swing the leg over the head to trap the arm between the thighs, aligning the perpendicular to the body; third, extend the legs and squeeze the knees to apply pressure, hyperextending the to 90-180° beyond its natural flexion limit, often finishing by pulling the head downward for added . Proper ensures the presses against the chest while the is controlled, maximizing on the 's ligaments without slipping. Risks associated with joint locks include ligament tears, such as damage to the in the during armbars, and nerve compression leading to temporary or permanent neuropathy, particularly in the radial or nerves from manipulations. In competitions, injury incidence from submissions like joint locks is approximately 9.2 per 1000 athlete-exposures, with 78% being orthopedic injuries including sprains and tears; in , joint-locking techniques account for about 17% of injuries among adolescents. Nerve damage remains rare, comprising less than 0.5% of overall , but can result in if locks are applied with excessive force. Training progressions for locks begin with isolated drills to build , such as exercises where the recipient offers minimal to practice grip, alignment, and pressure application on non-resisting limbs. Intermediate stages incorporate flow drills, transitioning between locks like to armbar, to develop fluidity and timing. Advanced training advances to controlled sparring (), where partners simulate defensive reactions at 50-75% intensity, gradually increasing to full live rolling to test applications under fatigue and opposition, always prioritizing tap-out signals to prevent .

Wrestling and Grappling Locks

In wrestling and grappling sports, full-body locking holds are fundamental techniques employed to control, pin, or submit an opponent on the ground, emphasizing body weight distribution and mechanical leverage to immobilize the target. These holds differ from joint-specific manipulations by focusing on overarching positional dominance, often integrating the entire torso and limbs to restrict movement and force compliance. Common examples include the full nelson, half nelson, and guillotine choke, each designed to exploit leverage points for sustained control. The full involves the attacker positioning behind the opponent, threading both arms under the armpits, and clasping hands behind the to arch the backward, applying pressure via to limit head and arm mobility. Similarly, the half uses one arm under the opponent's armpit locked to the , often combined with the attacker's pressing downward for pinning or transitioning to other controls. The , applicable from various positions such as or , encircles the opponent's with the arm while securing the head, compressing the carotid arteries to induce submission through blood flow restriction rather than direct joint stress. These holds prioritize over , allowing smaller grapplers to neutralize larger opponents effectively. Freestyle wrestling, an discipline, emphasizes takedowns and pins using locks like nelsons for positional control, but prohibits submissions such as chokes to prioritize athletic over taps. In contrast, permits a broader array of submissions, including chokes and full-body locks, blending pinning with forced yields to simulate more combative scenarios. This distinction highlights freestyle's focus on scoring through and reversals, while rewards decisive immobilizations. Under rules for , a pin—or fall—is registered when both of the opponent's shoulders are held in simultaneous with the for a sufficient duration to allow the to confirm both shoulders in simultaneous with the and declare , effectively ending the . The historical roots of these locking techniques trace to pankration, an unarmed introduced to the around 648 BCE, which combined wrestling holds with striking for comprehensive ground control and influenced modern (MMA) integrations. In contemporary MMA, such holds bridge pankration's legacy with hybrid applications, adapting traditional pins and chokes for regulated bouts. Defensive counters to these locks include bridging, an explosive upward hip thrust using leg drive to unbalance the attacker and create space, often followed by shrimping—a lateral hip that shifts the body away to recover or scramble to a neutral position. These techniques rely on timing and core engagement to disrupt the hold's without direct confrontation. In competitive settings, chokes have proven effective in UFC bouts, accounting for approximately 18% of all submission victories due to their versatility from standing or grounded positions. Professional wrestling promotions like showcase full nelsons as signature moves, such as Bobby Lashley's "Hurt Lock," which has secured numerous in-ring dominations through sustained application. These examples underscore the holds' enduring impact in both athletic and entertainment contexts.

Training and Safety in Locking Techniques

Training in locking techniques, such as those used in grappling sports like (BJJ) and wrestling, emphasizes structured progressions to build proficiency while minimizing injury risk. Practitioners typically begin with shadow drilling, a solo practice method where individuals simulate movements without a partner to focus on form, timing, and . This approach allows for high-repetition execution in a controlled environment, refining techniques like joint manipulations before introducing resistance. As confidence grows, training advances to partner resistance drills, where a partner provides graduated opposition to mimic real scenarios, enhancing adaptability and control. Progressive intensity follows, incrementally increasing force and speed to simulate competition demands, ensuring techniques are applied safely under varying loads. This three-part model—drilling, controlled resistance, and full intensity—prepares athletes for live application while reducing the likelihood of overuse injuries. Safety protocols form the cornerstone of locking , prioritizing communication and to prevent harm. Tap-out signals, such as verbal cues or physical taps on the opponent or mat, serve as immediate indicators of discomfort or risk, requiring instant release of any hold to avoid injury or . Protective gear, including mouthguards to shield against and knee pads for joint support, is recommended during sessions involving ground work and submissions. screening is essential prior to , particularly for those with pre-existing conditions, involving consultations with healthcare professionals to assess and identify contraindications like joint instability. These measures, enforced through and instructor oversight, foster a culture of mutual respect and vigilance. Injuries remain a concern in grappling sports, with strains and sprains representing approximately 32% of reported cases in competitions, often affecting knees, elbows, and shoulders due to the in locking maneuvers. Other common issues include injuries at 39% prevalence among practitioners, stemming from repetitive submissions or escapes. techniques focus on restoring function through evidence-based methods like the protocol—rest, ice, compression, and elevation—to manage acute swelling and pain initially. Advanced rehab incorporates mobilizations to improve , soft-tissue work to alleviate muscle tension, and progressive strengthening exercises to rebuild stability, enabling safe return to training within weeks to months depending on severity. Effective in locking techniques relies on iterative loops and technological aids to refine execution. Coaches provide corrections during drills, creating cycles of demonstration, , and adjustment that accelerate skill acquisition by addressing errors promptly. Video analysis enhances this process by allowing athletes to review footage of their techniques, identifying subtle flaws in or pressure application that verbal might miss, leading to measurable improvements in precision. These methods, integrated into regular sessions, promote deliberate and long-term mastery. Legal aspects of training and competition underscore the importance of , which participants explicitly acknowledge through waivers and rule adherence to assume inherent risks in contact sports. In amateur settings, governed by organizations like (UWW) for wrestling and the (IBJJF) for , rules prohibit certain strikes (e.g., elbows) and mandate protective equipment like , with no financial compensation allowed to maintain amateur status. Professional grappling, under rules from athletic commissions and organizations like the (UFC), permits advanced techniques but requires stricter medical oversight and licensing, balancing with regulated safety to differentiate from unregulated amateur bouts. Violations, such as ignoring taps, can lead to disqualification or under assumption-of-risk doctrines. As of 2025, () simulations emerge as a key trend in lock training, offering immersive environments for practicing submissions and defenses without physical contact, potentially reducing live injuries in preliminary studies on combat sports. platforms replicate scenarios, allowing users to hone reactions and decision-making in , , and wrestling analogs, with evidence showing enhanced performance metrics like faster response times. This technology complements traditional methods, making training more accessible and scalable for injury-prone athletes.

Arts, Entertainment, and Culture

Lock in Music and Dance

Locking dance, also known as Campbellocking, emerged in the early 1970s in Los Angeles, California, pioneered by Don "Campbellock" Campbell. Campbell developed the style while attending Los Angeles Trade-Technical College, where he accidentally created the signature "lock" move by freezing mid-dance during an attempt to perform the Funky Chicken, incorporating sharp wrist locks and pointed gestures that emphasized exaggerated, theatrical poses. This improvisational funk dance form quickly gained traction through Campbell's performances on the television show Soul Train, where his crew, the Campbellockers, showcased the style's rhythmic freezes and dynamic isolations. Central techniques in locking include the alpha, a commanding extension with a freeze; points, mimicking a patriotic with sharp wrist snaps and holds; and locks, which involve layering movements around the body like enclosing a form, often combined with pops—sudden muscle contractions—and extended freezes to accentuate the beat. These elements rely on precise synchronization with music, typically funk tracks at 90-120 beats per minute (), allowing dancers to hit accents on the while maintaining a , bouncy inspired by artists like , whose energetic performances and songs such as "" (around 120 ) provided foundational rhythms. The style evolved from the Campbellockers and the influential group —formed by Campbell and choreographer in 1973—into a global phenomenon, spreading through television exposure and crews in the 1970s and 1980s. By the 1990s and , locking influenced related elements like (with its isolations) and breaking (through shared battle formats), while international adoption led to competitions such as Juste Debout, an annual Paris-based event featuring locking divisions since the early that highlights crew battles and individual showcases. In the 2020s, variations have adapted locking to at festivals, blending traditional locks with and EDM beats (often 120-130 ) for high-energy performances at events like those organized by or urban gatherings. Campbell, a key figure in the style's development, died in April 2020.

Fictional and Media Representations

In fictional media, locks often serve as characters or anthropomorphic entities, embodying mischief and chaos. A prominent example is Lock, one of the trio in the 1993 stop-motion film , directed by . Voiced by , Lock is depicted as the impulsive leader of Oogie's henchmen, a red-haired boy in a costume who aids in kidnapping , highlighting themes of youthful rebellion and Halloween folklore. Locks frequently function as plot devices in heist narratives, building suspense through intricate breaching techniques. In the 2001 film Ocean's Eleven, directed by Steven Soderbergh, the ensemble cast employs sophisticated lock-picking and safecracking methods during their casino robbery, such as the use of specialized tools to bypass high-security vaults. Similarly, in the television series Breaking Bad (2008–2013), locks heighten tension in episodes like Season 1's "...And the Bag's in the River," where Walter White uses a bicycle U-lock to restrain and ultimately kill a captive, symbolizing his moral entrapment and escalating violence. In video games, locks appear as interactive puzzles that challenge players' problem-solving skills. The Legend of Zelda series, starting with the 1986 original, integrates lock-based mechanics in dungeons, such as the Wind Temple in Tears of the Kingdom (2023), where players must locate and unlock five padlocks using environmental tools like fire to melt ice barriers, emphasizing exploration and ingenuity. Symbolically, locks represent confinement and elusive access to truth in literature. In Franz Kafka's 1925 novel , doors and locks evoke the protagonist Josef K.'s futile struggle against an opaque bureaucracy, with locked chambers and guarded entrances underscoring themes of and inescapable judgment. This motif evolves in media tropes, from physical master keys granting universal entry in classic spy thrillers like Ian Fleming's novels (1953 onward), to digital hacks breaching virtual locks in cyberpunk works such as William Gibson's (1984) and the 1995 anime , where neural interfaces override encrypted systems, reflecting anxieties over technological vulnerability.

Cultural Symbols and Idioms Involving Locks

Locks have long served as powerful metaphors in language and culture, representing security, confinement, and unbreakable bonds. The English "," originating in the early , refers to the three primary components of a —the firing (), the (), and the tube (barrel)—and came to mean the entirety of something without exception. Similarly, the phrase "," attested as early as the , denotes something or someone kept in secure confinement, evoking the image of or strict safeguarding to prevent escape or access. In medieval European symbolism, padlocks embodied themes of and , often depicted in artistic representations as devices enforcing and silence, such as a over a woman's to signify restraint in speech. Though historical chastity belts featuring padlocks were largely mythical inventions of later centuries rather than practical medieval artifacts, the persisted as a cultural of and hidden truths. In contrast, modern romance has embraced heart-shaped locks as tokens of , particularly through the global practice of "love locks," where couples attach personalized padlocks—frequently heart-shaped—to bridges or railings and discard the to symbolize an unbreakable commitment. Folklore across cultures further illustrates locks as instruments of binding and protection. In , the god is punished by being bound to rocks in a with the entrails of his son, transformed into unbreakable iron chains by the gods, a restraint that holds until ; etymologically, Loki's name derives from a root meaning "to lock" or "close," reinforcing the theme of inescapable confinement. In Chinese tradition, "longevity locks" are ornate amulets, often given to infants and worn as necklaces, inscribed with auspicious symbols to invoke protection from misfortune, , and , drawing on ancient beliefs that the lock's form wards off evil spirits and secures a fortunate life path. Cross-culturally, locks appear in proverbs and rituals emphasizing resilience and defense against harm. African oral traditions include the Algerian proverb "The key that unlocks is also the key that locks," highlighting the dual nature of security and restriction, while broader sayings like the Kenyan "Sticks in a bundle are unbreakable" metaphorically evoke lock-like indestructibility through unity. In Hindu practices, though specific temple padlocks are less documented symbolically, ornate door fastenings on sacred sites often represent barriers against malevolent forces, aligning with broader apotropaic traditions. In contemporary digital culture, the locked padlock emoji (🔒), introduced in 6.0 in October 2010, has become ubiquitous in online communication to denote , , or restricted access, such as protecting or signaling confidential messages. From a psychological perspective, early 20th-century Freudian interpreted locks in dreams as symbols of repression, where they represent barriers erected by the to contain unacceptable unconscious impulses, such as sexual desires, akin to how keys and locks evoke phallic imagery and the "locking away" of forbidden thoughts to maintain psychic equilibrium.

People and Places

Notable People Named or Surnamed Lock or Locke

(1929–1993) was an English left-arm spin bowler who played 49 Test matches for , taking 174 wickets, and was a key figure in Surrey's seven consecutive titles from 1952 to 1958 alongside off-spinner . Born in Limpsfield, , Lock's aggressive style and close-fielding prowess made him a formidable presence, though his career was impacted by controversies over his bowling action. Sean Lock (1963–2021) was an English stand-up comedian and actor renowned for his deadpan surreal humor, serving as a team captain on the 8 Out of 10 Cats from 2005 until his death. Born in , , he began performing in the early 1990s after working in construction, winning the British Comedy Award for Best Live Stand-Up in 2000 and creating the sitcom . Sondra Locke (1944–2018) was an American actress and director best known for her Academy Award-nominated debut in The Heart Is a Lonely Hunter (1968) and her collaborations with Clint Eastwood in films like The Outlaw Josey Wales (1976) and Sudden Impact (1983). Born Sandra Louise Anderson in Shelbyville, Tennessee, she transitioned to directing with Ratboy (1986) and later settled a palimony suit against Eastwood in 1996, authoring the memoir The Good, the Bad, and the Very Ugly in 1997. Alain LeRoy Locke (1885–1954) was an American philosopher, writer, and educator who served as the intellectual architect of the , promoting , literature, and culture through his anthology (1925). The first African American Rhodes Scholar, Locke earned a from Harvard in 1918 and taught at , influencing figures like and with his pluralist philosophy on race and aesthetics. Gary Locke (b. 1950) is an American politician and diplomat who became the first Chinese American governor of Washington state, serving from 1997 to 2005, and later held roles as U.S. Secretary of Commerce (2009–2011) and Ambassador to China (2011–2014). Born in Seattle to Chinese immigrant parents, Locke focused on education reform and trade during his governorship, and as ambassador, he advanced U.S.-China economic dialogues amid tensions over intellectual property and human rights. Edwin A. Locke (b. 1938) is an American and professor emeritus at the University of Maryland, best known for co-developing goal-setting theory, which posits that specific, challenging goals enhance performance and motivation in organizational settings. His seminal 1968 paper "Toward a Theory of Task Motivation and Incentives" has been cited over 10,000 times, influencing management practices worldwide and earning him recognition as a pioneer in industrial-organizational . Charles Lock Eastlake (1793–1865) was a painter, art historian, and the first director of the in from 1855, where he expanded its collection by acquiring over 150 works, including masterpieces by and Correggio. Trained at the Royal Academy, Eastlake's writings, such as Materials for a History of (1847), advanced connoisseurship and restoration techniques, while his landscapes and portraits reflected influences. James Lock (fl. 1676) founded Lock & Co. Hatters in , establishing what became the world's oldest hat shop in 1676 at No. 6 , initially as an apprentice to hatter Charles Davis before taking over the business. The firm gained royal patronage, supplying bespoke headwear to figures like and members of the , and remains family-owned after over 340 years. Lock Martin (1916–1959), born Joseph Lockard Martin Jr., was an American actor notable for portraying the robot Gort in the science fiction film The Day the Earth Stood Still (1951), leveraging his 7-foot-7-inch stature due to gigantism. A former doorman at Grauman's Chinese Theatre, Martin's limited screen roles included appearances in The Greatest Show on Earth (1952), but his iconic portrayal of Gort cemented his place in film history.

Geographical Locations Named Lock

The name "Lock" in geographical contexts often originates from "loca," referring to an enclosure, a secured area, or a fold for animals, which could extend to inlets, farms, or bounded landscapes. This topographic etymology reflects early Anglo-Saxon naming practices for features that implied containment or protection, influencing place names across English-speaking regions. One prominent settlement is Lock, a in the heart of South Australia's , serving as a rural hub for the surrounding agricultural community focused on production and farming. Named after Lock, a local landholder during in 1917, it stands as the only Australian town renamed in honor of a fallen voluntary soldier, proclaimed in 1918. The town features heritage sites like the Lock Heritage Museum, which documents local war sacrifices and farming history, and supports through nearby parks such as Bascombe Well, known for its ruins and seasonal wildflowers. In the , Lock Haven is a city in , founded in 1833 by land speculator Jeremiah Church on the site of the former Fort Reed and established as the county seat in 1844. Located at approximately 41°08′N 77°27′W along the , it historically developed as a lumbering center and transportation hub tied to the Canal system. A natural feature with a similar naming convention is in , a 2,400-acre formed by on the Gunpowder Falls, with the primary completed in 1911 to supply potable water to amid growing urban demand and droughts. Though spelled "Loch" as a Scottish variant meaning lake, its role in regional water management underscores the adaptive use of enclosure-related terms for reservoirs and inlets. In , the Camden Locks area along the represents a notable , originally developed in the early as a with stables to support freight traffic, including goods like from nearby distilleries. The locks themselves, comprising Hampstead Road, Hawley, and locks built between 1818 and 1820, facilitated on the and evolved into a vibrant with markets, eateries, and cultural attractions drawing modern . This transformation highlights the enduring significance of lock-named sites in urban heritage and recreation, distinct from but akin to Scottish "loch" variants that boost in lake .

Other Specialized Uses

Locks in Horology and Mechanics

In horology, locks play a crucial role in regulating the precise release of energy within timepieces, most notably through the , an early mechanical locking mechanism developed in the late . This device, consisting of a crown wheel with teeth that alternately lock and release a verge pallet, controlled the swing of a foliot or later a , marking the first practical application of mechanical in European tower clocks and early portable timekeepers. By intermittently halting the , the verge escapement ensured consistent timekeeping, though its high friction limited accuracy to about 15 minutes per day. Beyond timepieces, mechanical locks like the pawl-and-ratchet system enable unidirectional motion in gears, preventing reverse rotation while allowing forward progress in applications such as winches, feed , and conveyor systems. The ratchet wheel's angled teeth engage with a spring-loaded pawl, which slides over during forward motion but locks firmly against backward force, providing reliable one-way control in industrial machinery and tools. This simple yet robust design has been foundational in since the , ensuring safety and efficiency in operations requiring incremental advancement. Key components in watch movements include , which act as temporary locks to hold the escape wheel stationary between impulses, and clicks, pawl-like elements that secure the winding ratchet wheel against unwinding. In the Swiss escapement, dominant since the 19th century and used in over 95% of mechanical watches today, the lever serves a detent function by locking the escape wheel via pallets while wheel oscillates freely, delivering precise impulses for time regulation. Clicks, often beak-shaped and spring-tensioned, integrate into the barrel assembly to maintain tension during winding, preventing slippage. Historically, advanced these mechanisms in the late 1700s through innovations like his 1787 improvement of the , which enhanced locking reliability and reduced friction for better chronometric performance in pocket watches. Breguet's natural escapement, developed around 1789, further refined detent-like interactions by using dual impulse levers to minimize recoil, influencing high-precision horology for marine chronometers. In modern , anti-backdrive locks have emerged in during the 2020s to counteract external loads that could reverse motor-driven joints, particularly in collaborative and surgical systems. These often employ non-back-drivable , such as line-contact designs that maintain ratios without slippage, ensuring positional during power-off states or under . For instance, a 2024 non-back-drivable using line-contact wedges enhances manipulation in prosthetic joints, preventing unintended motion. Proper maintenance of these locks is essential, with lubrication critical to averting jamming from friction-induced wear in pivots, pallets, and pawls. In horological movements, synthetic oils applied sparingly to contact points reduce resistance and preserve isochronism, requiring servicing every 3-5 years to avoid gumming or seizing. Similarly, in mechanical gears, periodic application of low-viscosity lubricants prevents detent lockup, extending operational life in precision devices.

Locks in Biology and Anatomy

In and , "locks" refer to specialized structures or mechanisms that provide , , or precise , often analogous to mechanical interlocks but evolved through for functional purposes. These include ligamentous stabilizers in joints, molecular interactions in enzymes, and attachment features in organisms, all contributing to structural integrity and physiological efficiency. The () in the human exemplifies an anatomical lock, acting as a key stabilizer that prevents excessive forward translation of the relative to the and restricts hyperextension of the . This fibrous band, composed of , tightens during knee extension to maintain alignment, reducing the risk of instability during dynamic movements like walking or pivoting. Damage to the , such as tears from , compromises this locking function, leading to joint laxity and increased susceptibility to secondary injuries. At the molecular level, enzyme-substrate interactions often operate via the induced fit model, where the enzyme's undergoes a conformational change to "lock" onto the substrate, ensuring specificity and catalytic efficiency. Proposed by Daniel E. Koshland in 1958, this model refines the earlier lock-and-key hypothesis by emphasizing flexibility: the enzyme adjusts its shape upon substrate binding, forming a precise, complementary interface that excludes non-substrates and facilitates the reaction. This mechanism is fundamental to metabolic processes, as seen in enzymes like , where glucose binding induces a that positions catalytic residues optimally. Evolutionary adaptations have produced lock-like structures for attachment, such as the interlocking shell plates in , which enhance durability in harsh marine environments. In species like Semibalanus balanoides, the six wall plates feature overlapping alae and toothed margins that interlock via teeth-and-sockets systems, allowing controlled expansion during growth while maintaining a sealed, protective enclosure against predators and . This design evolved convergently in cirripedes, providing rigid yet adaptable support for the sessile lifestyle, with the base cemented permanently to substrates via proteinaceous adhesives. In plants, tendril coiling serves as a biological lock for climbing support, enabling vining species to grasp and secure themselves to hosts. Tendrils, modified leaves or stems in plants like or (Cucumis sativus), exhibit : upon tactile contact with a support, differential growth on opposite sides triggers rapid coiling, wrapping tightly around the object to form a spring-like that shortens and pulls the plant upward. This locking mechanism generates contractile forces up to several newtons, ensuring anchorage against wind and gravity while allowing reversible attachment in some cases. Medically, the term "" describes the hallmark symptom of , a condition where bacterial toxins induce sustained muscle stiffening, originating from descriptions in the . Caused by spores entering wounds, the blocks inhibitory neurotransmitters, leading to involuntary contractions that lock the jaw () and progress to generalized spasms; early accounts date to , but bacterial etiology was confirmed in 1884 by Arthur Nicolaier through animal experiments. By the late 1800s, researchers like Shibasaburo Kitasato isolated the toxin, paving the way for therapies that reduced mortality from near 100% to under 10% in treated cases. Recent research in 2025 leverages lock-and-key specificity principles in -Cas systems for precise gene editing, mimicking enzymatic to target DNA sequences with high fidelity. Advances include refined variants and tools that enhance on-target accuracy while minimizing off-target cuts, as demonstrated in clinical trials for genetic disorders like , where guide RNAs act as "keys" to unlock and repair specific loci. These applications, building on the induced fit-like recognition of , enable seamless insertions and disease modeling, with new tools reported in early 2025 improving immunological response assessments in multi-gene contexts.

References

  1. [1]
    [PDF] Student Guide Course: Lock and Key Systems - CDSE
    Lock and key systems are mechanical, electronic, or electromechanical devices used on doors or containers to restrict access to the area or property enclosed.
  2. [2]
    [PDF] Introduction to Locks and Keys
    The oldest known lock in existence was found in the ruins of a 4,000- year-old palace near Egypt. Amazingly, this ancient wooden lock is of a very similar ...
  3. [3]
    Locks | The Engines of Our Ingenuity - University of Houston
    Egypt made the first locks 4000 years ago. They used wood. They also used a system of pins moved by a key -- not all that different from modern locks. For four ...<|separator|>
  4. [4]
    Linus Yale - Lemelson-MIT
    Yale patented his cylinder pin-tumbler lock in 1861. Later he perfected the mechanism known as the “clock lock” and invented the double lock, which placed two ...Missing: history | Show results with:history
  5. [5]
    [PDF] High Security Locking Devices ° A State-of-the-Art Report "
    The. Pin Tumbler cylinder, invented in 1865 by Linus Yale, Jr., was a major breakthrough in lock design and was the forerunner to all cylinder tumble locks [13] ...<|separator|>
  6. [6]
    Physical Security Toolbox: Types of Locks - USDA Forest Service
    Mar 29, 2013 · This Web site focuses on two types of locks: key-operated locks and combination locks. In normal operation, key-operated locks require a key to ...
  7. [7]
    What is a mechanical Lock? - Allegion
    Mechanical locks are mechanical devices which secure an opening by keeping a door closed until a release mechanism is activated; usually a lever, knob, key, or ...
  8. [8]
    Mechanical Locks | Schlage 101
    Mechanical locks are comprised of any type of device that is neither electrified nor electronic in nature which secures an opening by keeping a door closed ...
  9. [9]
    Anatomy of a Secure Lock - Goldy Locks, Inc.
    Oct 22, 2024 · Breaking down the components, we find key elements such as the Cylinder, Bolt, Latch, Keyway, and Pins. The Cylinder serves as the core, housing ...
  10. [10]
    How Locks Work: The Anatomy of Locks | Barry Bros Security
    Oct 14, 2022 · There are four main parts to a door lock, these being the cylinder, the bolt, the box strike and the keyhole.
  11. [11]
    Understanding the Anatomy of Different Lock Types - SouthOrd
    Oct 21, 2024 · Pin Tumbler Locks: The Standard Choice · Wafer Locks: A Variation on Pin Tumblers · Warded Locks: A Historical Classic · Disc Detainer Locks: ...
  12. [12]
    Lever tumbler lock - Wikipedia
    A lever tumbler lock is a type of lock whose mechanism uses a set of levers to prevent the bolt from moving in the lock.
  13. [13]
  14. [14]
  15. [15]
    What Materials Are Best for Machining Durable Lock Parts
    Dec 1, 2024 · Stainless steel, carbon steel, aluminum, zinc alloys, and brass are pleasant materials for developing sturdy and long-lasting components.
  16. [16]
  17. [17]
    Security: The Long History of the Lock and Key | Ancient Origins
    May 24, 2021 · The ancient Romans were the first to upgrade from wooden locks to metal ones between 870 and 900 BC. They developed metal locks and bronze keys ...
  18. [18]
    The History of the Very First Locks Ever Created - Premier Locksmith
    The earliest known locks date back to ancient Egypt around 4000 BC. These primitive devices were made of wood and utilized a basic pin tumbler mechanism.
  19. [19]
    ANSI Lock Grades Explained - ACME Locksmith
    Jun 23, 2025 · The ANSI lock grade system provides an indication as to the quality of the lock being purchased. The system is composed of three lock grades.
  20. [20]
    What Do ANSI Grade Levels Mean?
    Jan 7, 2020 · Grade one is the highest performance, followed by grades two and three. The ANSI/BHMA grading system is useful for ensuring the most appropriate ...
  21. [21]
    A Guide to ANSI Grade 1 vs. Grade 2 Door Hardware - PDQ Locks
    Oct 1, 2024 · Grade 1 represents the highest level of security and durability, suitable for commercial applications and high-traffic areas. Grade 2 offers a ...Missing: explanation | Show results with:explanation
  22. [22]
    Understanding ANSI Grades for Locks - Allegion
    Grade 3 Certification: As the minimal acceptable quality for residential door locks, Grade 3 is designed for basic residential security and light-duty ...Missing: explanation | Show results with:explanation<|control11|><|separator|>
  23. [23]
    [PDF] IPR2022-00174 Patent No. 9,687,920 B2 UNITED STATES PATENT ...
    key head 26 with a key bow 28, a key shoulder 30, and a key blade 32. The key blade 32 extends from key head 26, and the key shoulder 30 is adjacent to the key.
  24. [24]
    [PDF] Dictionary - CDSE
    Jan 10, 2023 · The locking mechanism is a set of rotating disc tumblers, which engage notches in the cast shackle and may be rotated by the angled cuts cast on ...
  25. [25]
    Tech. Description – Portfolio and Theory of Writing for Writing for ...
    The blade is the main part of the key that is inserted into the lock. This is the metal thin piece that is cut, or grinded into a specific pattern that matches ...
  26. [26]
    Cylindrical Lock: A Full Guide - iLockey
    Sep 6, 2023 · A cylinder lock is a lock with a latch or bolt locking mechanism contained in the hole portion by drilling two round holes in the door.Missing: rotating | Show results with:rotating
  27. [27]
    How Does a Double Cylinder Deadbolt Work? - Trademark Hardware
    Aug 21, 2021 · Double cylinder deadbolts include locksets that are keyed on either side. This functionality ensures that a home or business owner needs a key to engage or ...Missing: rotating | Show results with:rotating
  28. [28]
    Types Of Locks - Security Snobs
    They come in several varieties: single cylinder (one sided), double cylinder (locking cylinder on each side), and single cylinder with thumbturn (locking ...
  29. [29]
    How a Pin Tumbler Lock Works - ARCO Lock & Security
    These key pins are rounded at the ends to allow the serrated edge of the key to slide past them easily, and above these pins are spring-loaded driver pins ...
  30. [30]
    Tumbler Mechanism - an overview | ScienceDirect Topics
    Most pin tumbler lock mechanisms use warded keyways for additional security against incorrect keys and manipulation. The wards projecting into the keyway must ...
  31. [31]
    Pin tumbler - Lockwiki
    Dec 27, 2022 · A pin-tumbler is a cylinder based lock design that uses movable pins to prevent rotation of the plug. A key is used to properly elevate pins.
  32. [32]
    Warded - Lockwiki
    Dec 19, 2022 · A Warded lock (or ward lock) lock is a lock design that uses obstructions (called wards) on or inside the keyway to prevent incorrect keys from being inserted ...
  33. [33]
    How does the lock work - Warded lock | Armstrong Story Time
    Jun 2, 2021 · In a basic warded lock, a set of obstructions, often consisting of concentric plates protruding outwards, blocks the rotation of a key not ...
  34. [34]
    Disc detainer - Lockwiki
    Dec 25, 2022 · A disc-detainer (or disc lock, disk lock) is a lock design that uses rotating discs as locking components.
  35. [35]
    How does a disk detainer lock work? | Sure Lock & Key
    Dec 28, 2022 · The main elements of this lock are disks that are operated with the key directly. All these disks have gates of two types – true gates and false gates.<|separator|>
  36. [36]
    Lock Mechanisms - The Amazing King
    The shearline is that line (or plane) that must bisect the driver and key pins when the plug is turned. Pin tumbler locks operate by accepting a key that lifts ...
  37. [37]
    What Are Dimple Keys? - Keytek® Locksmith Training Academy
    Sep 26, 2023 · A dimple key has a rectangular blade with various cone shaped dimples drilled into the front and back of the blade at various depths.Missing: process mechanical milling
  38. [38]
    [PDF] Replication Prohibited: Attacking Restricted Keyways with 3D Printing
    Bump keys. Many locks are vulnerable to bumping, an attack in which a key of all low cuts is inserted just short of all the way in the lock, struck with a small ...Missing: technique | Show results with:technique
  39. [39]
    [PDF] How 3D Printing can Defeat Physical Security - ASEE PEER
    Impressioning is a common lock picking technique that allows an attacker to create a copy of the key for the target lock. However, it requires a decent amount ...
  40. [40]
    [PDF] Lock Mechanisms - Rage University
    In locksmithing terms, a ward is a metal barrier inside a lock mechanism that prevents just any key from opening the lock. The ward en- sures that only the ...<|separator|>
  41. [41]
    [PDF] Reconsidering Physical Key Secrecy: Teleduplication via Optical ...
    Oct 27, 2008 · These structures are shown in Figure 1. 2.1 Lock manipulation. There are a wide array of techniques by which a mechanical lock may be opened ...
  42. [42]
    The Evolution of Home Security: A look Into Smart Locks - Yale
    May 21, 2024 · From humble beginnings to cutting-edge technology, let's take a journey through the fascinating history and development of smart locks.
  43. [43]
  44. [44]
    Yale Assure Locks Now Connected by August
    Sep 25, 2018 · The Assure Locks - Connected by August will enable Yale customers to replace their existing [deadbolt] lock and keys with a smart keypad lock ...Missing: electronic evolution 1980s 2020s IoT
  45. [45]
    [PDF] Biometric Comparison Guide - Epic.org
    Fingerprint false accept rate varies by vendor, and is approximately 1 in. 100,000. Iris recognition false accept rate is 1 in 1.2 million statistically.Missing: smart locks
  46. [46]
    False Acceptance Rate (FAR) and False Recognition Rate (FRR)
    The false acceptance rate, or FAR, is the measure of the likelihood that the biometric security system will incorrectly accept an access attempt by an ...
  47. [47]
    Yale® Smart Lock with Matter | Smart Lock for Google Home
    Matter technology built in for seamless connectivity* · Works with Google Home, Apple Home, Amazon Alexa, and Samsung SmartThings · Requires Google Home app or ...
  48. [48]
    Yale Linus® Smart Door Lock
    Our Linus® Smart Lock uses Bluetooth Low Energy (BLE) technology, as well as AES and TLS encryption, aka bank grade security for your data. Authentication. Yale ...
  49. [49]
    [PDF] FIPS 197, Advanced Encryption Standard (AES)
    Nov 26, 2001 · FIPS 197, or AES, is a symmetric block cipher that encrypts and decrypts data using 128, 192, or 256 bit keys in 128 bit blocks.
  50. [50]
    What Are The Security Issues With Smart Door Locks? - Filta
    Jul 31, 2025 · Man-in-the-middle attacks – Hackers could intercept communication ... Battery Failure and Power Dependency: A Physical Security Concern.Missing: mitigations | Show results with:mitigations
  51. [51]
    Smart Locks Market Size to Hit USD 17.10 Billion by 2034
    The smart locks market is expected to grow at a compound annual growth rate (CAGR) of around 19.75% from 2025 to 2034. Who are the major players in the global ...
  52. [52]
    Smart Lock Market Size And Share | Industry Report, 2030
    The level handler segment is expected to witness at the fastest CAGR of 21.2% from 2025 to 2030, driven by the growing demand from commercial and multi- ...
  53. [53]
    How a Lock Works - Chesapeake & Ohio Canal National Historical ...
    Dec 10, 2022 · A lock is an elevator for boats. It lifts boats up or down to the next level on the canal. There are 74 locks on the C and O Canal. Only one ...
  54. [54]
    Canals and inland waterways - Locks, Navigation, Engineering
    On small canals, gates may be manually operated by a lever arm extending over the lock side. On large canals, hydraulic, mechanical, or electrical power is used ...Missing: components | Show results with:components
  55. [55]
    Welcome to the NYS Canal System | NYS Canals
    Locking Through​​ Lock Operators use electric controls to open and close the lock gates but it is gravity that makes the water flow in or out of the lock chamber ...Notice to Mariners Alerts · Career Opportunities · Navigation Information · CampingMissing: components | Show results with:components
  56. [56]
    [PDF] New York State Barge Canal, Lockport Locks (Erie Canal ...
    These early canal projects provided some improvement in navigation, but, more importantly, they taught engineers and planners some important lessons about ...<|separator|>
  57. [57]
    How do Canal Locks Work? - European Waterways
    The pound lock allows boats to move between levels easily, without affecting the general levels of the river, and without great delays. The invention of this ...
  58. [58]
    Different types of canal locks | Anglo Welsh Ltd
    Created for steep gradients, staircase locks have numerous locks in a row and appear like stairs in the landscape. Staircases don't have pounds (areas of water) ...
  59. [59]
    Tips for Boating Through a Lock
    It takes about 15 minutes to go through a lock, but you can experience it here in one minute. ... Lock numbers sometimes skip in sequence. The Erie Canal has no ...Missing: typical | Show results with:typical
  60. [60]
    How much is a "lock" - History & Heritage - Canal World
    Aug 20, 2022 · The result being that a standard lock on the L&LC is 80,000 gallons, whilst on narrow canals the figure could be more like 30,000 gallons, ...How much is a "lock" - Page 2 - History & HeritageLockage Water Used - General BoatingMore results from www.canalworld.net
  61. [61]
    The Panama Canal Adapts: Strategic Measures for Water Savings
    Oct 11, 2023 · The Canal has taken water-saving measures to supply 55% of the population and provide competitive and continuous service to global maritime trade.
  62. [62]
  63. [63]
    Expansion of the Panama Canal - Third set of locks | Webuild Group
    Each of the three chambers that make up each lock is 55 metres wide, 427 metres long and 23 to 33 metres deep, and is equipped with horizontally sliding gates ...
  64. [64]
    [PDF] Hydraulic Design of Navigation Locks - DTIC
    Oct 3, 1989 · For locks equipped with miter gates, tainter gates, and double-leaf vertical-lift gates, the operating machinery should be designed to open or.
  65. [65]
    [PDF] Lock & dock gates | Allianz Commercial
    Gates with vertical movement. Lift gate. These gates lift vertically out of position on static towers using winches and wire rope(s) or hydraulic cylinders.
  66. [66]
    [PDF] Design of Locks - Vlaams Instituut voor de Zee
    Lift gates, vertical storage of reserve gates and high, fixed bridges could be less acceptable (horizon pollution). During renovations, it could be ...
  67. [67]
    Traffic Signal Lights at Locks - Boat Ed
    Flashing amber light means approach the lock at a safe speed and under full control. Flashing green light means enter the lock. Unit 3 of 6; Topic 3 of 9 ...
  68. [68]
    Marine Bollards & Barriers | Marine Access - TrafficGuard, Inc.
    Marina bollards prevent vehicles from entering water, secure private pathways, and act as visual deterrents, also blocking staff-only areas.
  69. [69]
    [PDF] Joint Practices & Procedures for Ships on St. Lawrence Seaway
    Except in an emergency, no ship shall drop anchor in any canal or tie-up to any canal bank unless authorized to do so by the traffic controller. Every ...
  70. [70]
    Three Gorges Dam - Details about the Huge Water Conservancy ...
    There are 26 sets of turbine generator units in total, 700 MW for each.The shiplock is schemed out as a double-way and five-step lock.It is the world's largest ...
  71. [71]
    [PDF] The Kiel Canal - GDWS
    The Kiel Canal is the world's busiest man-made waterway, connecting the North and Baltic Seas, and is 98.6 km long.
  72. [72]
    The Seaway - Great Lakes St. Lawrence Seaway System
    The Montreal – Lake Ontario Section (consisting of seven locks) was completed in 1959. The combination of these two sections forms the St. Lawrence Seaway, ...
  73. [73]
    Safe Tidal Passage Mode for Locks in Estuaries
    Apr 17, 2025 · In estuaries, tidal passage mode can effectively alleviate ship congestion in lock chambers during peak periods.
  74. [74]
    Dams - Bonneville Power Administration
    Eight federal dams with a series of reservoirs and navigation locks make it easy and safer for vessels traveling upstream of Bonneville Lock and Dam. Locks are ...
  75. [75]
    Guntersville Dam | A Powerful Look at TVA's Masterpiece
    Oct 20, 2025 · The dam's 18 spillway gates provide a total discharge capacity of roughly 478,000 cubic feet per second, allowing TVA operators to regulate ...
  76. [76]
    SLHS Development Of Canal Locks - Stratford Local History Society
    Oct 31, 2024 · The Chinese introduced Flash Locks in Nanyang around 70BC. However they were nearly impossible to operate and many must have lost their lives ...
  77. [77]
    China's Grand Canal - Omrania
    Oct 1, 2019 · It was here that the pound lock was pioneered. The earliest segments of the canal were constructed around 500 BCE.
  78. [78]
    History of Canals | British Waterways
    Roman Canals. Canals were first developed in Britain as an irrigation and drainage resource. They often ran between natural water sources as a way of providing ...
  79. [79]
    HISTORY OF CANALS | Historyworld
    It is said that Chiao is required to construct two flash locks on the Grand canal only about 200 yards apart.Missing: 1000 | Show results with:1000<|separator|>
  80. [80]
    James Brindley | Canal Pioneer
    Feb 25, 2025 · One of our early canal engineers, Brindley played an essential role in shaping the way canals were built during the Industrial Revolution.
  81. [81]
    James Brindley: The canal pioneer who changed England - BBC
    Jul 31, 2016 · He made British canals narrow, to save water. The "Brindley lock" allows boats to descend and ascend waterways. And he used puddle clay to ...
  82. [82]
    The Masonry Locks - HISTORIC STRUCTURE REPORT - NPS History
    For a copy of King's patent see U.S. De- partment of the Interior, National ... strike in western Maryland had halted repairs and improvements to the canal.
  83. [83]
    Whitford -- History of the Canal System of New York -- Chapter XXV
    The electrical equipment at these locks is housed in a concrete cabin nine feet high, built on the wall, where it is out of danger from flood.
  84. [84]
    Historical Context: Improving Lift Locks :: Consider The Source Online
    During the 19th century, cut stone was the preferred material for lock walls; in the 20th century, it was reinforced concrete. Because wood was plentiful ...
  85. [85]
    Overview of synchronization primitives - .NET - Microsoft Learn
    Sep 1, 2022 · The System.Threading.SpinLock structure, like Monitor, grants exclusive access to a shared resource based on the availability of a lock. When ...Waithandle Class And... · Synchronization Of Access To... · Thread Interaction, Or...
  86. [86]
    Spinlock vs. Semaphore | Baeldung on Computer Science
    Mar 24, 2023 · spinlock achieves process synchronization by busy waiting. Hence ... semaphore is a synchronization tool that doesn't enforce busy waiting.2. Process Synchronization... · 3. Spinlock Vs. Semaphore · 4. Summary
  87. [87]
  88. [88]
  89. [89]
    The mathematics behind the Banker's Algorithm (EWD 623)
    Jan 24, 2015 · It is the purpose of the so-called “Banker's Algorithm” to investigate, whether a given pattern of loans and needs is safe or not.Missing: original paper
  90. [90]
    Deadlock Prevention - GeeksforGeeks
    Sep 4, 2025 · Deadlock prevention is a strategy used in computer systems to ensure that different processes can run smoothly without getting stuck waiting ...
  91. [91]
    Measuring context switching and memory overheads for Linux threads
    Sep 4, 2018 · Without pinning, the switch time goes up to ~2.2 microseconds [2]. These numbers are largely consistent with the reports in the fibers talk ...Linux Threads And Nptl · Threads, Processes And The... · Memory Usage Of Threads<|separator|>
  92. [92]
    Producer-Consumer Problem With Example in Java | Baeldung
    Feb 23, 2022 · In this tutorial, we'll learn how to implement the Producer-Consumer problem in Java. This problem is also known as a bounded-buffer problem ...
  93. [93]
    Mutexes and Semaphores Demystified - Barr Group
    May 4, 2016 · The cause of the widespread modern confusion between mutexes and semaphores is historical, as it dates all the way back to the 1974 invention of ...
  94. [94]
    Transaction locking and row versioning guide - SQL Server
    This guide describes locking and row versioning mechanisms the Database Engine uses to ensure the integrity of each transaction.Missing: MySQL | Show results with:MySQL
  95. [95]
    [PDF] The Notions of Consistency and Predicate Locks in a Database ...
    This paper defines the concepts of trans- action, consistency and schedule and shows that con- sistency requires that a transaction cannot request new locks ...
  96. [96]
    flock(2) - Linux manual page - man7.org
    The `flock` system call applies or removes advisory locks on an open file, using shared or exclusive locks. It may block if an incompatible lock is held.Description Top · Versions Top · History Top<|separator|>
  97. [97]
    Optimistic versus pessimistic concurrency control mechanisms in ...
    Two kinds of concurrency control mechanisms are considered in this paper, namely optimistic and pessimistic ones. ... Analysis of locking policies in database ...
  98. [98]
    Deadlocks Guide - SQL Server - Microsoft Learn
    Oct 10, 2025 · A deadlock occurs when two or more tasks permanently block each other by each task having a lock on a resource that the other tasks are trying to lock.<|separator|>
  99. [99]
    Data Concurrency and Consistency - Oracle Help Center
    Oracle Database maintains data consistency by using a multiversion consistency model and various types of locks and transactions.
  100. [100]
    [PDF] A Method for Obtaining Digital Signatures and Public-Key ...
    A public-key cryptosystem can be used to “bootstrap” into a standard encryption scheme such as the NBS method. Once secure communications have been established,.
  101. [101]
    An overview of the SSL/TLS handshake - IBM
    The SSL/TLS handshake establishes secret keys by agreeing on protocol, selecting algorithms, authenticating with certificates, and generating a shared key.
  102. [102]
    [PDF] Bitcoin: A Peer-to-Peer Electronic Cash System
    The proof-of-work involves scanning for a value that when hashed, such as with SHA-256, the hash begins with a number of zero bits.
  103. [103]
    [PDF] The Knowledge Complexity of Interactive Proof Systems
    (We. Page 7. 192. S. GOLDWASSER, S. MICALI, AND C. RACKOFF may interpret 0 as the judge's decision that the sample came from U(x); 1 as the decision that the ...
  104. [104]
    [PDF] Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS ...
    Actual systems are potentially at risk, including cryptographic tokens, network-based cryptosystems, and other applications where attackers can make reasonably ...
  105. [105]
    NIST Releases First 3 Finalized Post-Quantum Encryption Standards
    Aug 13, 2024 · The standard uses the CRYSTALS-Dilithium algorithm, which has been renamed ML-DSA, short for Module-Lattice-Based Digital Signature Algorithm.
  106. [106]
    FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism ...
    This standard specifies a key-encapsulation mechanism called ML-KEM. The security of ML-KEM is related to the computational difficulty of the Module Learning ...
  107. [107]
    FIPS 204, Module-Lattice-Based Digital Signature Standard | CSRC
    This standard specifies ML-DSA, a set of algorithms that can be used to generate and verify digital signatures.
  108. [108]
    Physical and Physiological Profiles of Brazilian Jiu-Jitsu Athletes - NIH
    Feb 13, 2017 · The aim of the sport is to make your opponent give up the combat by means of choke, joint locks (wrist, elbow, knee and ankle locks) or pressure ...
  109. [109]
  110. [110]
    Traditional Jujutsu - Historical Overview..!! - by USJJF
    Methods taught in jujitsu or jujutsu circles include striking, throwing, restraining (pinning and strangling), joint locks, weaponry, and grappling.
  111. [111]
    History of Ju Jitsu - United Society of JuJitsu Organizations
    In the early 17th century during the Edo period, jujutsu would continue to ... joint-lock, strangle or throw. During the same period the numerous ...
  112. [112]
    All Judo Joint Locking Techniques (Kansetsu-Waza)
    Here is the list of all Armbars and Arm Locks Technoques: ; Gyaku Juji Gatame ; Ashi Gatame ; Hiza Gatame (a drawing and another) ; Ude Hishigi Ashi Gatame (Leg ...
  113. [113]
    Aikido Technique - Kote-Gaeshi (Wrist Reversal) - Black Belt Wiki
    It is also known as an Aikido wrist reversal, reverse wrist turn or wrist turn-out. This technique is also part of Aikido Randori-No kata, one of the Aikido ...
  114. [114]
    BJJ 101: Heel Hooks - Evolve MMA
    Sep 28, 2021 · A heel hook is a leg-based submission that aims to twist the foot either medially or laterally using the heel. This technique puts immense pressure on the ...
  115. [115]
    Mastering the Armbar Technique in BJJ - NAGA Fighter
    Jun 28, 2024 · Step over their head, sit back while squeezing your knees and curling your heels, then slowly lay back to finish the armbar. From Side Control.
  116. [116]
    The Risk of Joint and Neck Injuries in Mixed Martial Arts—Grappling ...
    A study evaluating the incidence of injury in BJJ competitions shows that there are 9.2 injuries per 1000 exposures, and the most common are orthopedic ones—78% ...Missing: nerve | Show results with:nerve
  117. [117]
    Incidence of Elbow Injury Patterns in Japanese Adolescent Judo ...
    Oct 23, 2024 · Joint-locking techniques are permitted in high school, comprising 17.0% of all elbow injuries. There was a significant difference in injury ...3. Results · 3.3. Elbow Injuries During... · 4. Discussion
  118. [118]
    PERIPHERAL NERVE INJURY IN SPORTS - PMC - NIH
    According to Hirasawa and Sakakida, peripheral nerve injury accounts for less than 0.5% of sports-related injuries (1), while the prevalence of peripheral nerve ...Clinical Presentation · Peroneal Nerve Injury · Fig. 10Missing: statistics martial arts
  119. [119]
    Teaching Joint Locks | YMAA
    Feb 3, 2014 · We got together and we brainstormed. The problems with teaching Defensive Tactics, Martial Arts, and Self Defense rarely lie in the techniques.Missing: torque scholarly
  120. [120]
    Joint Locks in the Martial Arts
    Arm locks(juji-gatame) are probably the most common locks during a fight, because the arm can potentially resist less than , for example, the leg. They are also ...
  121. [121]
    The Full Nelson and Half Nelson Explained - Grapplezilla
    Jun 8, 2021 · The 2nd reason is to punish opponents. All Nelson Holds have the element of pressure being placed on the neck and this is not a comfortable ...
  122. [122]
    What Is The Half-Nelson In BJJ? - Evolve MMA
    Aug 6, 2023 · The Nelson Holds are wrestling techniques that aim to pin the opponent by immobilizing the arms and neck to secure a dominant position. It is ...
  123. [123]
    BJJ 101: The Guillotine Choke - Evolve MMA
    Apr 21, 2018 · The choke works by putting pressure on the carotid arteries, forcing an opponent caught in the submission to tap out. However, it should be ...
  124. [124]
    Catch-as-catch-can wrestling | Traditional, Freestyle & Submission
    Oct 31, 2025 · Catch-as-catch-can wrestling allows most holds and tactics, except those that may injure, and the goal is to force both shoulders to the ground.
  125. [125]
    Catch Wrestling: The Better Olympic Wrestling Style
    Apr 19, 2023 · Catch Wrestling would be a better Olympic wrestling style than Freestyle Wrestling. It is more realistic, more exciting, and more inclusive.
  126. [126]
    Freestyle wrestling: Rules, scoring, and all you need to know
    Oct 26, 2024 · Two competing wrestlers face each other on a mat, nine-metre in diameter, with the primary objective of pinning the opponent's shoulders to the ...
  127. [127]
    [PDF] INTERNATIONAL WRESTLING RULES - UWW
    In order to determine whether a wrestler has actually been pinned to the mat by both shoulders ... two leg fouls in Greco-Roman Wrestling. - by technical ...<|separator|>
  128. [128]
    Pankration | Greek, Martial Art, Combat - Britannica
    Oct 17, 2025 · In 648 bce the pankration, a kind of no-holds-barred combat, was included. This brutal contest combined wrestling, boxing, and street fighting.
  129. [129]
    Pankration - World History Encyclopedia
    Feb 9, 2016 · Pankration is an ancient martial art which mixes wrestling and boxing. The sport can be traced as far back as the second millennium BCE in the territory of ...<|separator|>
  130. [130]
    What is bridging in BJJ? - NAGA Fighter
    Oct 17, 2024 · Bridge to create space, followed by a hip escape (shrimp) to recover guard or move into a more favorable position. Shrimping without first ...
  131. [131]
    BJJ Shrimping Guide: How To Shrimp & What to Avoid? - Elite Sports
    In a scissor motion you use shrimping to escape the hips to the side. It gives you enough room to change the angle and attack the opponent. 7.3. Half Guard ...What is shrimping in BJJ? · History of BJJ Shrimping · Defensive Shrimping<|separator|>
  132. [132]
    The Most Common Submissions In MMA | Evolve Daily
    Mar 19, 2018 · Guillotine chokes are responsible for 18 percent of all submissions in the UFC. Even the best grapplers in the world can fall victim to the ...
  133. [133]
    Full Nelson: How A Simple Wrestling Hold Remains Iconic In WWE
    Oct 9, 2023 · The Full Nelson is a basic wrestling hold where the attacker simply stands behind the victim, wraps their arms around the shoulders, locks the fingers right ...
  134. [134]
    Drilling Techniques: The Key to Perfecting Your Jiu-Jitsu Moves
    May 20, 2024 · Shadow grappling is another type of solo drill where practitioners simulate grappling movements in the air. This drill helps refine techniques ...
  135. [135]
    From Rehearsal to Reality: How to Train for Chaos - Breaking Muscle
    Nov 22, 2021 · Here's the three-part progressive model I use in Brazilian jiu jitsu, and it applies fantastically here. 1. Drilling. Practice the technique or ...
  136. [136]
    Ensuring Safety in Jiu Jitsu Submissions: Techniques and Precautions
    Tapping Out: Encourage your training partner to tap out early to avoid being choked unconscious. Always release the choke immediately when your partner taps.
  137. [137]
    Beginner's Guide to BJJ: Essential Etiquette and Safety Rules
    Tapping is Mandatory. The most important rule in BJJ is the tap. A tap signifies submission, discomfort, or injury, and it must be respected immediately and ...
  138. [138]
    Brazilian Jiu-Jitsu Injury Prevention Guide - Smoothflo Academy
    Communicate during sparring—use verbal taps or signals if necessary. ... Wear mouthguards, knee pads, or any other protective gear you might need, especially if ...
  139. [139]
    How to Prevent Injuries in BJJ Training: Essential Tips for Safe ...
    Tap early and often: If you're caught in a submission or position where you feel uncomfortable or at risk, tap out early. It's better to lose the position ...
  140. [140]
    Mixed Martial Arts: Injury Patterns, Trends, and Misconceptions
    Another recent study on Brazilian Jiu-Jitsu athletes found that 30% of fighters reported at least one knee injury in the last year, with MCL (38%) and LCL (19%) ...Missing: locks ligament
  141. [141]
    Injuries in martial arts and combat sports: Prevalence, characteristics ...
    53.6% athletes suffered injury in the last 12 months. The most common were tendon injuries (39%) and sprains (39%), followed by dislocation/subluxation (23%).
  142. [142]
    Recovering from Jiu-Jitsu Injuries: Tips and Strategies for Safe ...
    Follow the RICE Protocol · Rest: Give your body time to heal. Avoid activities that stress the injured area. · Ice: Apply ice to reduce swelling and numb pain.Missing: grappling | Show results with:grappling
  143. [143]
    Rehab BJJ Injuries: Ultimate Guide to Guarantee Recovery -
    Jan 24, 2019 · To get his pain under control we treated the joint with a gapping technique, eased his quad tension with some soft-tissue work, and followed ...
  144. [144]
    Using Video Feedback to Improve Martial Arts Performance
    Aug 10, 2025 · One of the procedures commonly used to improve sports performance is video feedback (VF), which includes showing an athlete a video clip of ...Missing: loops | Show results with:loops
  145. [145]
    The Role of Video Analysis in Improving Martial Arts Techniques
    Unlike verbal feedback, which can be subjective, video analysis provides visual proof of what needs fixing. This makes feedback more concrete and actionable, ...
  146. [146]
    What is MMA? / Competition Rules - IMMAF
    Furthermore, unlike in professional MMA or Thai boxing, elbow strikes are not permitted in Amateur MMA. The referee can stop the match at any time if either ...
  147. [147]
    [PDF] Assumption of Risk and Consent Doctrine in Sport
    In fact, analysis of the concepts of assumption of risk and consent should be case-by-case and should take into account such factors as the specific game ...Missing: grappling | Show results with:grappling
  148. [148]
    Reimagining Sports Training Through Virtual Reality in 2025
    Jun 30, 2025 · A 2025 review tracked VR's growing role in karate, fencing, judo, taekwondo, and wrestling. noting faster reaction times and decision-making ...
  149. [149]
    Advancements in virtual reality for performance enhancement ... - NIH
    Mar 5, 2025 · The conclusion was that VR training significantly improved Karate athletes' reaction behaviors, such as shortening reaction time and ...
  150. [150]
    The pioneers of locking: The names you need to know - Red Bull
    Jan 15, 2019 · Don 'Campbellock' Campbell created locking by mistake after watching fellow students dance the Funky Chicken, The Sling and The Slide in his ...
  151. [151]
    The Campbellock Timeline
    19 yr. old Don Campbell created the dance “The Campbellock” at LA Trade Technical College in Downtown LA. He was trying to do a dance called “The Robot Shuffle”
  152. [152]
    Genre Focus Series: Funk with Splice Sounds - Blog
    Oct 23, 2015 · The average tempo of a funk tune would range between 90 – 110 bpm. This is a comfortable for most people to get down and dirty on the dance ...
  153. [153]
    The Steps & Moves Of Locking
    The following is a list of some of the basic moves steps and gestures as they were developed by the various old school pioneers of the locking era.
  154. [154]
    Our Story of the History of Locking
    Don Campbell Himself created, initiated and emphasized the improvisational dance style of “Campbellocking.” Don “Campbellock” Campbell early soul Train Line.Missing: Campbellockers | Show results with:Campbellockers
  155. [155]
  156. [156]
    Lock, Shock & Barrel's Backstory - Disney Theory - YouTube
    Aug 6, 2022 · Oogie fell down the Halloween Holiday Door when he found it. He wandered the woods since his holiday "New Bug Day" was forgotten and his world ...
  157. [157]
    The 10 Most Essential Episodes of BREAKING BAD - Nerdist
    Nov 8, 2018 · Letting Krazy-8 go was no longer an option. Instead Walt choked him to death with the bike lock that held Krazy-8 hostage. It's a gruesome ...<|control11|><|separator|>
  158. [158]
    Wind Temple walkthrough in Zelda: Tears of the Kingdom - Polygon
    Before you start solving the lock puzzles in the Wind Temple, make sure you have some wood and flint on-hand, as you'll need to melt large chunks of ice to get ...
  159. [159]
    The Trial Symbols, Allegory and Motifs - GradeSaver
    Jun 13, 2021 · Among the many interpretations of the parable that exist, the door can be seen as a symbol of the knowledge of the "law" that rules existence, ...
  160. [160]
    The Complete List Of Hacker Video Games - Cybercrime Magazine
    Jul 19, 2025 · This collection of games includes hacker characters, hacking abilities, artificial intelligence, cybernetics, programming, and more.
  161. [161]
    Lock, Stock And Barrel - Meaning & Origin Of The Phrase
    It may have been that the term migrated from cannons or other sorts of gun which were more barrel-shaped. Note: that 'lock, stock and barrel' refers to muskets, ...
  162. [162]
    Lock Her UP! Padlocks for Girls Who Talk Too Much
    May 28, 2020 · The woman's mouth closed with a padlock, a symbol of female self-control that is at least as old as the Middle Ages.
  163. [163]
    Everything You've Heard About Chastity Belts Is a Lie - Atlas Obscura
    Here is the truth: Chastity belts, made of metal and used to ensure female fidelity, never really existed.
  164. [164]
    Love Locks many hearts together, forever. - Cool San Diego Sights!
    Jun 8, 2020 · Each lock symbolizes an unbreakable bond of love. Love Locks was created by artists Rick Randall and Jaydon Sterling Randall in 2016. People ...
  165. [165]
    Loki Bound - Norse Mythology for Smart People
    Loki was then fastened to three rocks in the cave with the entrails of his slain son, which the gods had turned into iron chains. Skadi placed a poisonous ...
  166. [166]
    Chinese Longevity Locks & Other Children's Accessories - Clars
    Oct 27, 2017 · They were typically worn around the neck 'long' (horizontally) to symbolize longevity and some are in the shape of ruyi head – a rebus meaning ...Missing: folklore | Show results with:folklore
  167. [167]
    What Is Jungian Analysis? - Michael Vannoy Adams
    For Freud, a lock (or the keyhole in a lock) is a vagina, and a key is a penis. On this analogy, the insertion of a key in a lock is an allusion to sexual ...Dreams, The Ego, And The... · Explication · Amplification
  168. [168]
    Tony Lock Profile - Cricket Player England | Stats, Records, Video
    Tony Lock was an aggressive, attacking left-arm spinner, who complemented ideally the subtleties of Jim Laker's off-spin when Surrey were winning the County ...
  169. [169]
    Tony Lock - The History Press
    Sep 8, 2022 · The rollercoaster career of Tony Lock, extending over twenty-five years, is the saga of a resilient cricketer who triumphed over adversity.<|control11|><|separator|>
  170. [170]
    Sean Lock: Comedian and 8 Out of 10 Cats captain dies aged 58
    Aug 18, 2021 · Born in Chertsey, Surrey, Lock left school in the early 1980s and began working on building sites but developed skin cancer, which he blamed on ...
  171. [171]
    Oscar Nominee Sondra Locke Dies at 74 - Variety
    Dec 13, 2018 · Locke was born in 1944 as Sandra Louise Smith and raised in Shelbyville, Tenn. She changed her named to Sondra in her early 20s and won a ...Missing: biography | Show results with:biography
  172. [172]
    Alain Locke and the Visual Arts - Yale University Press
    Sep 6, 2022 · Alain Locke (1885–1954), leading theorist of the Harlem Renaissance, maintained a lifelong commitment to the visual arts.
  173. [173]
    Gary Locke (2009-2011) - Miller Center
    Gary Locke was born on January 21, 1950, in Seattle, Washington, into a family of Chinese immigrants. After growing up in Seattle, Locke attended Yale ...Missing: biography | Show results with:biography
  174. [174]
    Edwin A. Locke | Robert H. Smith School of Business
    Edwin A. Locke, Professor Emeritus, Ph.D., Cornell University. Contact: elocke@umd.edu. Primary Research Areas. Selected Publications.Missing: philosopher | Show results with:philosopher
  175. [175]
    Sir Charles Lock Eastlake 1793–1865 | Tate
    Sir Charles Lock Eastlake (17 November 1793 – 24 December 1865) was a British painter, gallery director, collector and writer of the 19th century.Missing: historian | Show results with:historian
  176. [176]
  177. [177]
    Lock Martin - Biography - IMDb
    Overview · Born. October 12, 1916 · Pennsylvania, USA · Died. January 19, 1959 · Los Angeles, California, USA (cancer) · Birth name. Joseph Lockard Martin Jr.
  178. [178]
    Lock Name Meaning and Lock Family History at FamilySearch
    960 people in Family Tree. We found 1,667,570 records for the Lock last name. Explore historical collections, such as birth records, death certificates, ...
  179. [179]
    Lock - District Council of Elliston
    Right in the heart of Eyre Peninsula, Lock is a small rural hub servicing a flourishing farming community. The town was named after Corporal Albert Lock, a ...
  180. [180]
    Lock residents use historic name to attract visitors to the isolated SA ...
    Oct 17, 2020 · The town is named after World War I soldier Albert Ernest Lock. It is believed to be the only town in Australia named after a fallen voluntary soldier.
  181. [181]
    Correctional Facility | Clinton County, PA
    Lock Haven, founded by Jeremiah Church in 1833, became the county seat of Clinton County in 1844. It is located in one of the most scenic parts of Pennsylvania ...
  182. [182]
    History of the Water System | Baltimore City Department of Public ...
    Construction of Loch Raven Dam was also completed in 1915 with the spillway crest extended to its present elevation in 1923. Annexation of additional land ...
  183. [183]
    Camden Locks | Places to visit - Canal & River Trust
    Camden Locks is a lively area with markets, canalside eateries, and opportunities to find gifts, art, and antiques. You can also walk from Little Venice and ...
  184. [184]
    A Brief History Of Escapement Development - Hodinkee
    May 12, 2015 · The oldest known mechanical escapement is the verge escapement. Prior to the verge escapement, water clocks were prevalent. The verge escapement ...
  185. [185]
    Chapter 8. Other Mechanisms - Carnegie Mellon University
    In many ratchet mechanisms the pawl is held against the wheel during motion by the action of a spring. The usual form of the teeth of a ratchet wheel is that ...<|control11|><|separator|>
  186. [186]
    The case of the Swiss lever escapement mechanism - ScienceDirect
    The Swiss lever escapement is the most common and accounts for roughly 95% of existing mechanical watch movements. The contact occurs roughly 500,000 times ...Missing: detents clicks
  187. [187]
    The Schmidt List: Top 5 Funky Clicks - Quill & Pad
    Sep 16, 2017 · The click is a humble pawl commonly found shaped like a beak or as a cam with two tips. It is held in tension by a spring that forces it against the ratchet ...<|control11|><|separator|>
  188. [188]
    Abraham-Louis Breguet(1747-1823) | THE SEIKO MUSEUM GINZA
    In 1801 Breguet patented the "Tourbillon" ("whirlwind" in French) escapement, one of the finest expressions of the watchmaking art. Watches usually gain or ...
  189. [189]
    Non-back-drivable clutch based self-locking mechanism ... - Frontiers
    This paper presents a line-contact based non-back-drivable clutch (NBDC) that does not cause changes in the transmission ratio, ensuring the motion performance ...Missing: anti- | Show results with:anti-
  190. [190]
    [PDF] The Practical Lubrication of Clocks and Watches
    The purpose of lubricating a watch or clock is to minimise friction between points of contact. To be effective the working surfaces of the clock movement need ...
  191. [191]
    A Review on Biomechanics of Anterior Cruciate Ligament and ...
    May 13, 2018 · The ACL primarily restricts anterior sliding of the tibia over the femur thereby preventing hyperextension of the knee joint [1]. The ACL ...
  192. [192]
    The anterior cruciate ligament and functional stability of the knee joint
    Dec 10, 2003 · The ACL also prevents hyperextension of the knee, limits excessive tibial rotation (internal rotation more so than external rotation), and ...
  193. [193]
    Clinico-Radiological Correlation Between Anterior Cruciate ...
    May 7, 2024 · The ACL primarily restricts anterior sliding of the tibia over the fixed femur, thereby also postulating to prevent hyperextension of the knee ...
  194. [194]
    Enzymes: principles and biotechnological applications - PMC
    In the light of this finding, in 1958 Daniel Koshland extended Fischer's ideas and presented the 'induced-fit model' of substrate and enzyme binding, in which ...
  195. [195]
    (PDF) Macro-to-nanoscale investigation of wall-plate joints in the ...
    Aug 8, 2019 · The exoskeleton is composed of six interlocking wall plates, and the interlocks between neighbouring plates (alae) allow barnacles to expand and ...
  196. [196]
    Articulation and growth of skeletal elements in balanid barnacles ...
    Sep 4, 2019 · In some barnacles, the carinal margins of the plates develop a system of teeth and sockets which interlock tightly with a complementary system ...Missing: locking | Show results with:locking
  197. [197]
    Biomechanics and morphology of the coiled tendrils of the climbing ...
    They securely anchor a plant to its support, either by coiling around the support (e.g. Luffa aegyptiaca, Cobaea scandens and Passiflora caerulea, Fig. 1A) or ...Missing: locking | Show results with:locking
  198. [198]
    Scientists unwind the secrets of climbing plants' tendrils
    Aug 30, 2012 · When it encounters a foothold, the end of the tendril wraps around it, securing a support. The tendril then shortens by coiling up into a ...
  199. [199]
    Ancient Clostridium DNA and variants of tetanus neurotoxins ...
    Sep 6, 2023 · Accounts of tetanus diagnostic features (“lockjaw”) date back to written descriptions by Hippocrates (c. 380 BCE) and the ancient ...
  200. [200]
    Medicine and Disease in History: Tetanus – Journeys into the Past
    May 21, 2019 · The 19th century was revolutionary for tetanus research, as the disease was first replicated in 1884 through producing tetanus in animals, and ...
  201. [201]
    CRISPR Clinical Trials: A 2025 Update - Innovative Genomics Institute
    Jul 9, 2025 · An update on the progress of CRISPR clinical trials with the latest data and a survey of the CRISPR landscape in 2025.
  202. [202]
    New CRISPR tool enables more seamless gene editing - Yale News
    Mar 20, 2025 · Yale scientists have developed a CRISPR technology that can assess genetic interactions on a host of immunological responses to multiple diseases, including ...