Best of 2015: Automotive Tools

Dec. 1, 2015
Advanced Diagnostics, Keyline and Genuine Lishi tools make the job easier

Any locksmith involved with car lock servicing must either have specialized programming tools or be limited to key fitting for a small amount of the older, pre-electronic security vehicles still on the road. Electronic security in some form is now a standard feature on most vehicles, whether they be high-end or economy models. Vehicle manufacturers have treated electronic vehicle security servicing information as a secret which was shared only with their dealerships.

Advanced Diagnostics Programming System

Advanced Diagnostics has pioneered the development of electronic programming tools in support of locksmiths who had lost much of the automotive lock servicing business to car dealerships.  

In order to stay one step ahead of car thefts, electronic countermeasures are continually changed and upgraded by vehicle manufacturers. After each upgrade, Advanced Diagnostics must perform tests and develop new servicing procedures. During the last 25 years there have been dozens of different car makers, hundreds of individual car models and constant changes in electronic vehicle security systems.  Advanced Diagnostics has done an admirable job of developing a programming tool which can program a large percentage of these electronic systems..

Locksmiths have several options of which Advanced Diagnostics tool to purchase. The T-Code Pro was developed to electronically program car models made by over 60 car manufacturers. Locksmiths who purchase a T-Code Pro have unlimited usage. As new information becomes available, software modules can be purchased, then downloaded online and directly installed on the device.

Another alternative is the MVP Pro tool, a lower cost way to enter the vehicle programming business. The MVP Pro uses a pay-as-you-go electronic token system. An electronic token is used each time the MVP Pro is used. Tokens can be purchased easily and quickly on the internet. Color coded dongle connectors simplify programming procedures. The MVP Pro is supplied with the latest software installed. As new software becomes available, it can be easily downloaded via the internet free of charge.

Advanced Diagnostics programming tools can program keys, proximity keys, smart keys, flip keys, remotes, aftermarket and OEM keys plus fobs. In addition, the programming tools can read immobilizer PIN codes , identify ECU types and read pre-code data. A technical support hotline is available.  An Advanced Diagnostics training facility in Las Vegas has just been completed where locksmiths can receive first-hand instruction.  

Genuine Lishi Tools Of Excellence

Laser (sidewinder) keys first appeared on Mercedes vehicles in approximately 1980. When keys were lost, locksmiths either referred Mercedes owners to their dealer or they developed key fitting methods of their own and spent hours tearing down door panels and disassembling locks.  Almost every car manufacturer is using sidewinder keys in some or all of their vehicle models today. An Asian inventor named Li had an idea for a tool which would easily pick and decode sidewinder and Tibbe automotive locks without lock disassembly.  These picking tools have now become a necessity for the automotive locksmith.

A short history is in order. Li and an engineer named Song collaborated on developing his picking tool and introduced the '13 Song' picks.  Mr. Li later began making additional picking tools and branded his tools as "Lishi." Mr. Li then developed a business relationship with UAP/Tradelocks and the picking tools were branded as "Genuine Lishi" tools. Two years ago that business relationship ended. UAP continues to develop Genuine Lishi picking tools while Mr. Li returned to producing and selling tools into the Chinese market.

There are now over 70 different Genuine Lishi tools available. According to UAP, clone copies of Genuine Lishi picking tools from Asia are now appearing. One method of determining the authenticity of a Genuine Lishi tool is by the serialized number printed on each tool.

Genuine Lishi tools provide a way to manipulate each tumbler independently.  Generally, each tool contains a key blade section which fits fully into the lock cylinder. A movable probe is installed in the blade assembly. Each tool has a hinged arm which can be folded outwards. The arm is used to provide leverage for turning tension.  A display area is attached to the bow of each Genuine Lishi tool. The display area contains lines and numbers which show depth and space locations used by each specific lock type. 

A knob on the probe allows the user to move the probe to different space and depth positions. A pointer on the knob shows where the probe is located inside the lock cylinder. Basic operation begins by exerting a slight turning tension with the hinged arm. The pointer on the probe is then aligned with a chosen space on the display area. The probe can be moved sideways to set the chosen tumbler to its unlocked position.  This process is continued until all wafers are aligned and the plug can be turned.

While the general picking procedure is the same for all locks, each type of vehicle requires its own specific picking techniques.  Some locks with split tumblers must be picked twice before the lock plug is fully unlocked. A user guide has been written to assist in learning the intricacies of each type of vehicle lock.

Once the lock plug is in the unlocked position, wafers in the lock are rigidly held in the same location as if an operating key had been inserted. The Genuine Lishi tool can then be used to read the wafer depths.  The probe is moved to each wafer location and moved sideways against each wafer. The pointer on the probe then shows the depth number on the display area.  

Very few vehicles have key codes printed on the locks today. Lock disassembly can be tedious and time-consuming. Genuine Lishi tools provide a professional, fast and non-invasive system for picking and decoding high security vehicle locks.

Watch for a new Genuine Lishi pick which will be introduced soon for sidewinder locks introduced on some 2014+ Honda cycles.

884 Keyline Decryptor Mini

Keyline USA has taken the mystery out of programming transponder keys with their new 884 Decryptor Mini. A free Keyline USA catalog titled "Product Guide 2015" is available from your local locksmith distributor. This 64-page catalog lists all popular cars by year, make and model plus it lists the proper Keyline transponder to use.  Keyline has developed a TK100 transponder which can be used for cloning the majority of transponder systems sold in North America. Older fixed code types such as PT5 transponders used by GM can also be cloned.  Most Fixed code, Texas Crypto, first and second generation Philips Crypto and Megamos Crypto can be cloned.  There are a few exceptions where certain car models, years or types of original transponders cannot be programmed but  the 884 Decryptor Mini can easily clone the vast majority of transponder-equipped vehicles on the market.

The 884 Decryptor Mini can be operated by either an Android tablet or phone which is equipped with USB-OTG or a Personal Computer (PC) which has an internet connection. Windows 7 or higher is required.  An included wire connects from the cloner to a USB port on the PC. If a tablet or phone is used, an adaptor wire is included for connecting to the micro USB port on the phone or tablet.

A free Keyline App can be downloaded from the internet.  First, connect the wire between the cloner and the PC or phone/tablet.  Source www.keyline-USA.com and select the 884 Decryptor Mini page. Click on 'download' and follow directions for installing on your PC.  If you are using an Android phone or tablet, go to the Google Play store, search "Keyline" and then elect 'Install' to download the free App. The final procedure is to register your new 884 Decryptor Mini and to create a profile and password. 

No outside power is required to operate the 884 Decryptor Mini. Power is obtained from the USB port. An internet connection is required during cloning since cloning procedures are obtained from the cloud.