Locally designed lock designed to stay locked

Issue 5 2022 Editor's Choice

Ettienne Kock is a mechanical engineer who has designed a new type of lock, along with a ‘Smart Gate’ that is both durable and secure. Unlike the locks we are used to today, Kock’s Blade Lock has not only proven its durability in tough conditions, it is also as close to unbreakable as one can get.

Kock started his career with Armscor when it was still an excellent place to learn about designing and manufacturing top-class products. He then went on to join a clutch manufacturer, where he designed clutches and oversaw the local manufacturing process for his products. He was soon promoted to a managerial position, where he was responsible for four factories manufacturing parts for many well-known companies and projects.

He soon realised that management was not his forte, as his heart was always focused on designing new or updated products that would be better and make a difference. As an example, back in the day when families would do their monthly grocery shopping in one outing, supermarkets had big trolleys to hold all the goods purchased. Kock designed a new trolley with a floating base that would descend as more things were selected from the shelves, and then rise again as goods were taken out of the trolley and placed on the cashier’s counter.

This was a great help for people with bad backs or who were too short to comfortably take goods out of the bottom of the trolley. Unfortunately, the market changed and people are more inclined to buy less, more often, these days. The result was that his user-friendly trolley was shelved.


Safe room.


Safe room door open.

What’s the point of a lock?

While the unrestricted criminal efforts in South Africa are world-renowned, Kock also noticed that many crimes were committed because people could simply kick in a door, or it was simple and quick work to break and disable security doors, no matter who the manufacturer was. This got him thinking.

He says that today we have locks that can talk to you, unlock by analysing your face or even be controlled by mobile devices from far away, but criminals can still break them and enter a home or business premises with little difficulty. This led him to undertake an analysis of why this happens, which consisted of a long study of locking mechanisms used today, as well as how they are installed.

Kock explains that locks today are designed into doors and give the criminal a single point to focus on. If they can damage the door or wall around the point where the lock sits when locked, often accomplished with a few kicks, the door is open. Similarly, security doors and gates may have more than one lock, but it is only a small point load that has to be overcome to make the entire door or gate useless. A crowbar and some energy is often all that is required to make that single point load ineffective.

Even doors with a solid beam around them (and a lock in the middle of the door with a millimetre or two of space) can be broken by focusing the energy of the criminal on one point. Another facet of the design of doors is that one side of the door is supported by a beam or doorframe that won’t allow one to push the door open in that direction. Naturally this protection can’t be on both sides because that will not allow you to open the door at all – another weakness, although a necessary one with the current designs.

Remove the point load

The first step in creating a secure door and lock was therefore to take away the point load. More than that, however, any keyholes and other areas that could be picked or broken – or provide any form of leverage – had to go as well.

The result was the Blade Lock. This lock is anchored in the wall itself, not the door. The door has no keyholes or any access mechanism that forms a point load, but two steel plates on the front and back of the door (see images). The Blade Lock slots in between those plates, meaning the point load is distributed over the length of the lock – which is normally about 1,6 metres long.

Using the formula to calculate pressure (pressure = force divided by area, or p=F/A), it’s easy to see how increasing the area of the lock itself dramatically increases the pressure needed to do some damage. There is also a secret (which is patented) that Kock designed to ensure that any pressure applied to this lock is distributed over the full length of the lock.

International standards say a secure lock should be able to withstand an impact of 200 joules, which is similar to dropping 20 kg from about 1 m, or 1,5 tonnes resting on an area. Testing showed the Blade Lock easily passed this test and showed no damage. Kock admits he 'overdesigned' the lock, but his purpose was to find a solution that was truly secure.

As for durability, the first locks made were installed in a security company’s operations room, which has 24-hour access. After four years (Covid got in the way and stopped production), Kock removed a lock and examined it. The lock was functioning as it had at the start and there was no visible wear.

Reliable automation

The lock can be made for any requirement, but the thinnest plate is 5 mm thick and includes sealed bearings of 13 mm. Additionally, there is no key, so everything is automated – which obviously raises the question of reliability, given Eskom’s apparent lack of engineering skills.

The fact that the lock is electronic should be of no concern, however. Kock says the actuator he uses has been tested for 150 000 cycles. Applied to a door which is opened and closed ten times per day, this means it would last well over 20 years.

The electronic circuit that opens and closes the door was initially designed by Kock himself, but he then worked with a company to design what he calls “a formal circuit” with additional functionality. An electrical pulse of 0,3 seconds is all that is required to lock or unlock the Blade Lock. Two signals are actually sent: one to the actuator, and one to a switch at the top of the door and lock that indicates that the door is closed.

The electronic signals use approximately 8 milliamps, which means a 7 Ah, 12 V battery will last for three or four weeks before needing a recharge.

The locking circuit is also network-enabled (GSM, Wi-Fi, etc.). This means doors can be linked to a control room and warn of unauthorised access after-hours, and even for remote ingress or egress control. Kock stresses that all is needed is a positive or negative signal to lock or unlock the device.

A remote control using a roaming frequency can be used for locking and unlocking, which means that multiple people can be issued a remote, and lost or stolen devices can be locked out. Moreover, as a safety precaution for secure areas that may need lockdown solutions, a signal from a control room can lock all the doors and prevent any remotes from working until the situation is resolved.

A safe room, as another example, can also use the Blade Lock to automatically lock when the door is closed, making it safer in an emergency. Kock has also constructed a smart security gate, named the Smart Gate, where the crossbars are laser-cut into place making use of the Blade Lock. There are no welding or other weak points to attack, ensuring that a secure lock is not made useless by a weak gate.

A short video of the Blade Lock and the Smart Gate can be found at https://youtu.be/xHyg0sJ_zdg (or use the short link: www.securitysa.com/*blade).




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...