CA1235289A - Method for producing securing keys having closure possibilities differing from one another - Google Patents
Method for producing securing keys having closure possibilities differing from one anotherInfo
- Publication number
- CA1235289A CA1235289A CA000441301A CA441301A CA1235289A CA 1235289 A CA1235289 A CA 1235289A CA 000441301 A CA000441301 A CA 000441301A CA 441301 A CA441301 A CA 441301A CA 1235289 A CA1235289 A CA 1235289A
- Authority
- CA
- Canada
- Prior art keywords
- bore
- keys
- bores
- locations
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
Landscapes
- Pistons, Piston Rings, And Cylinders (AREA)
Abstract
ABSTRACT OF THE DISCLOSURE
For producing security keys, in a first method step bore patterns differing from one another are produced, each bore pattern having the same number of bore locations. The corresponding bores are standard bores, which however may vary in terms of their bore depth. In a second method step, a prespecified number of selected bore locations in each bore pattern is varied in terms of their positions. In a third method step, each selected bore locations is additionally varied in terms of a prespecified number of bore shapes differing from one another.
For producing security keys, in a first method step bore patterns differing from one another are produced, each bore pattern having the same number of bore locations. The corresponding bores are standard bores, which however may vary in terms of their bore depth. In a second method step, a prespecified number of selected bore locations in each bore pattern is varied in terms of their positions. In a third method step, each selected bore locations is additionally varied in terms of a prespecified number of bore shapes differing from one another.
Description
~:3~
METHOD FOR PRODUCING SECURIT~ KEYS HAVING
-CLOSURE POSSIBILITIES DIFFERING FROM ONE ANOTH~R
FIELD OF THE INVENTION
The present invention relates generally to a method for producing security keys having closure possibilities dif-fering from one another. In the locks associated with such keys, spring-loaded pin tumblers supported in radial bores can be displaced, in order to permit rotation of the cylinder plug, by the insertion of a security key which effects the correctly displaced positions of the rows of pin tumblers by means of bores disposed in the key. At least one of the bores of the key has two or more different shapes to match the head of the associated pin tumbler.
BACKGROUND OF THE INVENTION
A great number of security keys, having various pro-files 9 are known. The purpose of the profiling of these keys is to improve security against unauthorized methods of opening and to increase the possible number of closures while retain-ing the same key length. The enormous quantity of key pro-files and corresponding locks makes both the manufacturing process and the control of access to keys and locks extra-ordinarily uneconomical. This is exacerbated by the great number of cylinder components in a cylinder sequence. A
further disadvantage of known key profiles is the limited number of different closures attainable with them, which means that with some key shapes various cylinders can be unlocked.
~' ~35~
SUMMARY OF THE INVENTION
It is accordingly a principal object of the present invention to create a method which enables the production of security keys with a great number of different closure possi-bilities at a favorable cost.
A further object of the invention is to create a method permitting economical production of security keys with the aid of a computer.
It is also an object of the invention to create a method for producing security keys in which the associated cylinder plugs have the same key path cross section.
These objects are attained with a method in which different patterns of bores are produced on the keys, each pattern having the same number of bore locations, a given number of which are varied in terms of a number of different bore shapes. Advantageous developments of this method are also disclosed.
The method according to the invention enables con-siderable savings in terms of inventories of keys and rotors and also makes it possible to shorten the procurement time for replacement components greatly. It is also possible to dispense with broaching tools for profiling the rotors and profile milling cutters for manufacturing the keys.
An exemplary embodiment of the invention is described in further detail below, referring to the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a schematic illustration of five keys, fabricated in accordance with differing bore patterns;
Fig. 2 is a schematic illustration of five keys, each having two particularly selected bore locations;
Fig. 3 is a schematic illustration of five keys, in which the selected bore locations are additionally varied in terms of their shape;
~:3S~
Fig. 4 is a view of the shaft of a key having bores;
Fig. 5 is a longitudinal section through a shaft of a key as well as two pin tumblers; and Figs. 6a, 6b show cross-sectional profiles of stepped bores.
DESCRIPTION OF THE PREFERRED EMBODIMENT
Fig. 1, in terms of the schematically illustrated keys A-E, shows five different bore patterns, each having ten bores 5, whlch are disposed laterally in two rows. These bores 5 are standard bores; however, they may be different in terms of the bore depths. Additionally, it is possible for edgewise bores, not shown, to be provided. The term "bore pattern" is understood to mean a disposition of bores on a key. Naturally, a bore pattern must match the positions of the pin tumblers in the cylinder. The positions of the bore locations of a bore pattern are ascertained in a manner known per se, with the use of a computer being advantageous.
After different bore patterns have been produced, a suitable number of particularly selected bore locations 14 and 15 are selected, and these are varied in each bore pattern in terms of their position.
Fig. 2 shows five variations of two selected bore locations 14 and 15, which were all varied in the bore pattern B of Fig. 1. In addition to the five arrangements B1-B5, Z5 however, many other arrangements are also possible. Each selected bore location 14 and 15 is now addltionally varied in terms of its bore shape. Examples of possible shapes that may be selected are the different stepped bores a-k, ten of which are shown in Figs. 6a and 6b.
Fig. 3 schematically shows five variations B51-B55 of bore shapes in terms o the pattern B5 of Fig. 29 and referring also to Figs. 6a and 6b. Here again, the possible number of profiles is far greater than five. With the example chosen here, having ten bore locations, two selected bore locations and ten bore shapes, it is possible to produce 5~
162,000 profile variations and accordingly the same number of keys having closure possibilities differing from one another.
In Figs. 4 and 5, a shaft 10 produced in accordance with the invention of a key is shown, with eight standard bores 11 and two stepped bores g and k; the associated tips 12 and 13 of pin tumblers are also shown.
Figs. 6a and 6b shows ten cross-sectional profiles a-k of differing stepped bores.
The security key according to the invention may be embodied either as a normal key or as a reversible key, and it may have a flat or rhomboid profile.
It will be understood that the foregoing text and drawing relate to an embodiment of the invention given by way of example but not limitation, various other embodiments and variants being possible within the spirit and scope of the invention.
METHOD FOR PRODUCING SECURIT~ KEYS HAVING
-CLOSURE POSSIBILITIES DIFFERING FROM ONE ANOTH~R
FIELD OF THE INVENTION
The present invention relates generally to a method for producing security keys having closure possibilities dif-fering from one another. In the locks associated with such keys, spring-loaded pin tumblers supported in radial bores can be displaced, in order to permit rotation of the cylinder plug, by the insertion of a security key which effects the correctly displaced positions of the rows of pin tumblers by means of bores disposed in the key. At least one of the bores of the key has two or more different shapes to match the head of the associated pin tumbler.
BACKGROUND OF THE INVENTION
A great number of security keys, having various pro-files 9 are known. The purpose of the profiling of these keys is to improve security against unauthorized methods of opening and to increase the possible number of closures while retain-ing the same key length. The enormous quantity of key pro-files and corresponding locks makes both the manufacturing process and the control of access to keys and locks extra-ordinarily uneconomical. This is exacerbated by the great number of cylinder components in a cylinder sequence. A
further disadvantage of known key profiles is the limited number of different closures attainable with them, which means that with some key shapes various cylinders can be unlocked.
~' ~35~
SUMMARY OF THE INVENTION
It is accordingly a principal object of the present invention to create a method which enables the production of security keys with a great number of different closure possi-bilities at a favorable cost.
A further object of the invention is to create a method permitting economical production of security keys with the aid of a computer.
It is also an object of the invention to create a method for producing security keys in which the associated cylinder plugs have the same key path cross section.
These objects are attained with a method in which different patterns of bores are produced on the keys, each pattern having the same number of bore locations, a given number of which are varied in terms of a number of different bore shapes. Advantageous developments of this method are also disclosed.
The method according to the invention enables con-siderable savings in terms of inventories of keys and rotors and also makes it possible to shorten the procurement time for replacement components greatly. It is also possible to dispense with broaching tools for profiling the rotors and profile milling cutters for manufacturing the keys.
An exemplary embodiment of the invention is described in further detail below, referring to the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a schematic illustration of five keys, fabricated in accordance with differing bore patterns;
Fig. 2 is a schematic illustration of five keys, each having two particularly selected bore locations;
Fig. 3 is a schematic illustration of five keys, in which the selected bore locations are additionally varied in terms of their shape;
~:3S~
Fig. 4 is a view of the shaft of a key having bores;
Fig. 5 is a longitudinal section through a shaft of a key as well as two pin tumblers; and Figs. 6a, 6b show cross-sectional profiles of stepped bores.
DESCRIPTION OF THE PREFERRED EMBODIMENT
Fig. 1, in terms of the schematically illustrated keys A-E, shows five different bore patterns, each having ten bores 5, whlch are disposed laterally in two rows. These bores 5 are standard bores; however, they may be different in terms of the bore depths. Additionally, it is possible for edgewise bores, not shown, to be provided. The term "bore pattern" is understood to mean a disposition of bores on a key. Naturally, a bore pattern must match the positions of the pin tumblers in the cylinder. The positions of the bore locations of a bore pattern are ascertained in a manner known per se, with the use of a computer being advantageous.
After different bore patterns have been produced, a suitable number of particularly selected bore locations 14 and 15 are selected, and these are varied in each bore pattern in terms of their position.
Fig. 2 shows five variations of two selected bore locations 14 and 15, which were all varied in the bore pattern B of Fig. 1. In addition to the five arrangements B1-B5, Z5 however, many other arrangements are also possible. Each selected bore location 14 and 15 is now addltionally varied in terms of its bore shape. Examples of possible shapes that may be selected are the different stepped bores a-k, ten of which are shown in Figs. 6a and 6b.
Fig. 3 schematically shows five variations B51-B55 of bore shapes in terms o the pattern B5 of Fig. 29 and referring also to Figs. 6a and 6b. Here again, the possible number of profiles is far greater than five. With the example chosen here, having ten bore locations, two selected bore locations and ten bore shapes, it is possible to produce 5~
162,000 profile variations and accordingly the same number of keys having closure possibilities differing from one another.
In Figs. 4 and 5, a shaft 10 produced in accordance with the invention of a key is shown, with eight standard bores 11 and two stepped bores g and k; the associated tips 12 and 13 of pin tumblers are also shown.
Figs. 6a and 6b shows ten cross-sectional profiles a-k of differing stepped bores.
The security key according to the invention may be embodied either as a normal key or as a reversible key, and it may have a flat or rhomboid profile.
It will be understood that the foregoing text and drawing relate to an embodiment of the invention given by way of example but not limitation, various other embodiments and variants being possible within the spirit and scope of the invention.
Claims (4)
1. A method for producing a plurality of security keys having closure possibilities differ-ing from one another, wherein spring-loaded pin tumblers supported in radially extending bores in the cylinder of a lock are displaceable by means of a security key to permit rotation of the cylinder plug, the security key being insertable into the key path of the cylinder plug and capable, by means of bores, of effecting the correctly displaced position of the rows of pin tumblers, wherein at least the bores in the keys have two or more different shapes for the head of an associated pin tumbler, comprising:
producing different bore patterns in said plurality of keys, each bore pattern having the same number of bore locations;
varying, in each bore pattern, a pre-specified number of selected bore locations; and additionally varying at each specified bore location, a prespecified number of bore shapes differing from one another.
producing different bore patterns in said plurality of keys, each bore pattern having the same number of bore locations;
varying, in each bore pattern, a pre-specified number of selected bore locations; and additionally varying at each specified bore location, a prespecified number of bore shapes differing from one another.
2. A method as defined by claim 1, wherein additionally varying said bore shapes by providing certain of said bore shapes with stepped portions.
3. A method as defined by claim 1 or 2, where-in said security key is a reversible key by providing identical bore patterns on opposite faces of the keys.
4. A method for producing a plurality of security keys having closure possibilities differing from one another, wherein spring-loaded pin tumblers supported in radially extending bores in the cylinder of a lock, said cylinder including a cylinder plug having a key path are displaceable by means of a security key to permit rotation of the cylinder plug, the security key being insertable into the key path of the cylinder plug and capable, by means of bores, of effecting a correctly displaced position of the rows of pin tumblers, wherein at least the bores in the keys have two or more different shapes for the head of an associated pin tumbler, comprising:
producing different bore patterns in said plurality of keys, each bore pattern having the same number of bore locations, the positional arrangement of said bore hole locations being different in each of said patterns;
selecting, in each bore pattern, a pre-specified number of bore hole locations, said pre-specified number being at least 1;
varying the position within said bore hole pattern of said preselected number of bore hole locations;
additionally varying at each specified bore location, a prespecified number of bore shapes dif-fering from one another, said prespecified number being at least 1.
producing different bore patterns in said plurality of keys, each bore pattern having the same number of bore locations, the positional arrangement of said bore hole locations being different in each of said patterns;
selecting, in each bore pattern, a pre-specified number of bore hole locations, said pre-specified number being at least 1;
varying the position within said bore hole pattern of said preselected number of bore hole locations;
additionally varying at each specified bore location, a prespecified number of bore shapes dif-fering from one another, said prespecified number being at least 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA000441301A CA1235289A (en) | 1983-11-16 | 1983-11-16 | Method for producing securing keys having closure possibilities differing from one another |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA000441301A CA1235289A (en) | 1983-11-16 | 1983-11-16 | Method for producing securing keys having closure possibilities differing from one another |
Publications (1)
Publication Number | Publication Date |
---|---|
CA1235289A true CA1235289A (en) | 1988-04-19 |
Family
ID=4126540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA000441301A Expired CA1235289A (en) | 1983-11-16 | 1983-11-16 | Method for producing securing keys having closure possibilities differing from one another |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA1235289A (en) |
-
1983
- 1983-11-16 CA CA000441301A patent/CA1235289A/en not_active Expired
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4553452A (en) | Method for producing security keys having closure possibilities differing from one another | |
US6945082B2 (en) | Key blank, key and master keying system | |
CA1150072A (en) | Cylinder lock with associated flat key | |
US5809816A (en) | Cylinder lock and key combination including a profiled key | |
US4325241A (en) | System for the increase of the number of differing locking possibilities in rotary cylinder locks | |
JP4864956B2 (en) | Key blank | |
US3349587A (en) | Method of increasing the number of different locking combinations | |
US5088306A (en) | Cylinder lock with changeable keyway | |
US5079936A (en) | High security cylinder lock | |
CA1328174C (en) | Lock cylinder and key with a security element matched thereto | |
JP3076370B2 (en) | Locking device and key | |
US7028517B2 (en) | Cylinder lock with programmable keyway | |
CA1235289A (en) | Method for producing securing keys having closure possibilities differing from one another | |
KR101616550B1 (en) | Lock, key blank, and key of a hierarchical lock system | |
JPS60108127A (en) | Safety key and manufacture thereof | |
GB2078843A (en) | Improvements relating to locks and keys | |
EP0144481A1 (en) | Method of making safety keys with locking possibilities differing from each other | |
JP2003035057A (en) | Cylinder lock | |
JPH03197780A (en) | Pin cylinder lock and key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MKEX | Expiry |