CN2200042Y - Safe - Google Patents
Safe Download PDFInfo
- Publication number
- CN2200042Y CN2200042Y CN 94219137 CN94219137U CN2200042Y CN 2200042 Y CN2200042 Y CN 2200042Y CN 94219137 CN94219137 CN 94219137 CN 94219137 U CN94219137 U CN 94219137U CN 2200042 Y CN2200042 Y CN 2200042Y
- Authority
- CN
- China
- Prior art keywords
- circuit
- triode
- button
- safe
- resistance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Burglar Alarm Systems (AREA)
Abstract
Disclosed is a safe which can be monitored in a remote place. The utility model is characterized in that a remote monitor is additionally arranged outside of the safe, and the remote monitor can monitor the safe at a monitoring point; the remote monitor is provided with a switch circuit, a waiting switch, a circuit trigger, a contact circuit, and an alert circuit for alarm; the remote monitor is connected with the safe through a cable; the safe is provided with a cipher lock circuit which is provided with four groups of cipher keys for opening the safe in a normal state and opening the safe in an emergency state, and cipher can be changed. The utility model can raise the alarm when the cable is sheared, a cable circuit is of short circuit, the safe is contacted, the wrong cipher is pressed, etc. at the time of a theft standing in the front of the safe to steal the safe.
Description
The utility model belongs to a kind of insurance of valuables case.
Present normally used strongbox is because its warning device very easily destroys, and often alarm does not have the warning effect, so that strongbox prized case and happen occasionally, and national wealth is sustained a great loss.The strongbox of domestic production at present, the program control strongbox of treasure board that has Hangzhou electric appliance box shell factory to produce of better performances, this strongbox has used computer apparatus, mainly is the security performance of having strengthened the case lock, but also be not strange land monitoring, so still Nobody Knows during the burglary case at night.
The purpose of this utility model provides a kind of strongbox that can carry out the strange land monitoring, and this strongbox is furnished with the strange land monitor, and it is installed in the monitoring point, janitor's room for example, when strongbox is prized, can report to the police at the monitoring point, thereby in time prevent the stolen of strongbox.
The utility model is made up of casing (1), cipher lock circuit (2) and strange land monitor (3), compared with prior art is to have increased strange land monitor (3) newly, and has redesigned cipher lock circuit (2).Below this two partial circuit is described.
The electric functional-block diagram of cipher lock circuit (2) and strange land monitor (3) as shown in Figure 1.
Strange land monitor (3) is independent of outside the casing, is placed in the ICU, and be that outside line 1, outside line 2, outside line 3, outside line 4 link to each other with strongbox by 4 wires.Outside line 1 is the start line, and outside line 2 is to trigger line for shutdown line, outside line 3, and outside line 4 is a common wire.Strange land monitor (3) by on-off circuit (31), wait for switch (32), police whistle sound generator (33), lock sound circuit (34), circuit trigger (35), touch circuit (36), alarm music generator (37) and power supply (38) and form, circuit diagram is seen Fig. 2.On-off circuit (1) mainly contains local start button K
5, local shutdown button K
6, controllable silicon V
30, triode V
29, V
34, photoelectric tube V
32And relay J
1Knob down K during start
5, relay J
1Work, its contact is connected controllable silicon V
30The control utmost point, controllable silicon V
30Conducting is in the SBR of warning.Start also can be by the button N at strongbox place
1Come straighforward operation, make relay J by outside line 1
1Connect, finish start.When shutting down by day, press the button K
6, owing to photoelectric tube V on daytime
32Conducting is so the 6V power supply passes through V
29, V
32, V
34, R
48, K
6Ground connection, V
29Conducting, V
29Colelctor electrode and the emission between saturation voltage have only 0.1V, make controllable silicon V
30Turn-off, finish shutdown.Shutdown also can make outside line 2 ground connection from cipher lock circuit when coded lock is operated, finish remote-control closedown.When shutdown, triode V
33Also conducting, alarm music generator IC
2Be triggered, send the melody alarm.At night, because photoelectric tube V in the shutdown circuit
32So the not conducting of unglazed photograph is triode V
29Therefore also not conducting can not turn-off controllable silicon V
30, that is to say night the strange land monitor be to close constantly, Here it is so-called " refusing night to close ", drops into the SBR of reporting to the police.
Waiting for switch (32) mainly is a triode V
31, just often turn-offing, have only just conducting when strongbox is stolen, because after start, controllable silicon V
30Be conducting, so as long as wait for the triode V of switch (32)
31One conducting promptly triggers police whistle sound generator (33), sends warning.
Police whistle sound generator (32) mainly is that a model is 9561 IC
1, its 3 pin passes through resistance R
42And V
31Colelctor electrode join.
Circuit trigger (35) is for monitoring that the thief cuts off in strange land monitor (3) and the strongbox that outside line 3 and outside line 4 stubborn short circuits are provided with in line between the cipher lock circuit (2) or the line.It is a bridge-type trigger, by resistance R
35, R
38, R
39With the R in the cipher lock circuit
49Constitute electric bridge.Electric bridge mid point C and D indirect one is by triode V
26, V
27And V
28The trigger of forming.Just often, bridge balance does not have potential difference between C, D, V
26, V
27, V
28, D
10, D
11All not conductings are so wait for pipe V
31Also obstructed, be in monitored state; When outside line 3 or outside line 4 are cut off, D point current potential raises, V
26Conducting, V
27End V
28Also conducting makes and waits for pipe V
31Conducting, thus police whistle sound generator IC triggered
1Report to the police; If short circuit, i.e. D point ground connection, then V are twisted in outside line 3 and outside line 4
27Conducting, V
26End V
28Pipe V is waited in conducting
31Also conducting triggers and reports to the police.
Touch circuit (36) and be to antitheft person and touch the shell of strange land monitor (3) or strongbox and the metalwork of outside line is provided with.It is by resistance R
28And R
29The divider mid point of forming meets R
30---R
34Series resistance, the intermediate section pressure point is received changeover switch K
7Contact 4,3,2,1 on, can regulate the sensitivity of touch, R
34Terminal ground connection.Because the shell of strange land monitor and strongbox insulate to the earth, so triode V under normal circumstances
28Be not conducting, when the people touches the shell of strange land monitor or strongbox, then power supply by human body to triode V
28Constitute path, although flow through the very faint nothing harm of the electric current of human body, this weak current passes through V
28And V
31Amplification after be to send warning to trigger the police whistle sound generator.
Lock sound circuit (34) is in resistance R
42Two terminations, one bridge rectifier D
14---D
17, be the audio signal rectification of reporting to the police direct current, keep triode V
28And V
31Conducting keeps police whistle sound without cease.
Cryptochannel (2) is reported to the police (28) before by B group puzzle-sealed (20), A group password (21), B group password (22), door lock circuit (23), delay circuit (24), C group password (25), D group password (26), light-operated circuit (27), case and power supply (29) is formed, and sees Fig. 3.
A group password (21) is by 6 button A
1---A
6, 5 groups of RC charge and discharge circuit, 4 triode V
6---V
9With a clad pipe V
10, V
11Form, except the 1st group of RC circuit R
7C
1Meet A
1And A
2Tie point outside, all the other 4 groups of RC circuit R
8C
2---R
11C
5All receive corresponding triode V
6---V
9Emitter stage, a last triode V
6Emitter stage by meeting key A
3Receive next triode V
7Base stage, the rest may be inferred.B group password also is identical connection.In fact, two groups of cryptographic keies of A, B can be n, general n=4,5,6,7, and different n values, the level of confidentiality difference, the principle of circuit is the same.
The process of opening safe door by operation A, B group cryptographic key is such: during strange land monitor (3) start, outside line 3 has electricity, the triode V in the B group puzzle-sealed (20)
1---V
4All conductings, A group password (21) has electricity, at this moment triode V
5End, B group password (22) does not have.Operation push-button A successively
1---A
5V then
6---V
9Conducting in succession.Press A again
6The time, V
10, V
11Conducting, outside line 2 ground connection, as can be seen from Figure 2, outside line 2 ground connection are then led ground monitor shutdown, at this moment, V in the B group puzzle-sealed (20)
1---V
4End V
5Conducting, B group password (22) has electricity, operates B more successively
1---B
6, connect the controllable silicon V in the door lock circuit (23)
16, the relay J of unblanking
2The motor M that unblanks is connected in work, can open safe door.
Delay circuit (24), C group password (25), D group password (26) and light-operated circuit (27) have been formed the emergent circuit of unpacking, sort circuit generally speaking need not, only organize password and forget under the situation of can't unpacking and use at B.Two groups of passwords of C, D respectively have 4 buttons, and light-operated circuit (27) is in series, and light-operated circuit (27) is by a photoelectric tube V
22With triode V
21, V
20Form clad pipe, the purpose that two groups of passwords are set is must have two people simultaneously on the scene during for emergent unpacking, and places the illumination position respectively by one group of button, and light-operated circuit (27), C, D cryptochannel are connected completely, and the one road makes the triode V in the delay circuit (24)
17Conducting, outside line 2 ground connection are led the triode V in the ground monitor (3)
33Conducting, alarm music generator alarm; Another road meets the D in the delay circuit (24)
6, R
23, C
12Charging circuit, unijunction transistor V after delaying time
18Conducting, the controllable silicon V in the trigger gate lock circuit (23)
16, relay J
2Work, motor M unblanks.
Warning circuit (38) is by controllable silicon V before the case
19, triode V
25, diode D
8, light emitting diode D
7, resistance R
27And button N
3And N
C5Form, press N
3, V
19Report to the police before the conducting, case and drop into.N
C5Be password key, click N
C5, V
19Disconnect, warning circuit is cancelled.K is the pedal switch that places strongbox preceding, and under the alarm condition, stealer one is set foot on pedal before being in case, and K is promptly closed, and outside line 3 ground connection are led ground monitor (3) and reported to the police.Triode V
24With photoelectric tube V
23Be that illumination is reported to the police, use up when stealer and shine V
23The time, V
23Conducting triggers and reports to the police.
The password panel is housed on safe door, A, B, C are arranged on the panel ... X, Y, Z be totally 26 buttons, each 6 key of two groups of passwords of A, B wherein, and C group password 4 keys are reported to the police before the case and are cancelled key 1 key, and all the other 9 keys are alarm keys.Other has three plain code key N
1, N
2, N
3Every group of cryptographic key can be chosen combination arbitrarily from 26 keys, reach secret, and its level of confidentiality is greater than 15
12, the connection of button as shown in Figure 4.Two of each button terminates to double-point double-throw switch K
nBand cutter end, K switch
nSwing to the top, button is alarm keys, pushes button, and outside line 3 ground connection are just reported to the police; K switch
nSwinging to the below is the cryptographic key position, and cryptographic key is by jack CK
nWith plug cryptographic key is received in the cipher lock circuit.It is simple that this password is changed circuit, and it is convenient to change.
Advantage of the present utility model is to be provided with the strange land monitor, can guard strongbox at janitor's room, and has fairly perfect warning function, has:
1, dual signal is reported to the police, i.e. during normal running, and the melody alarm; Siren is reported to the police during abnormal operation.The melody alarm should be treated as warning during body class.
2, two functions of refusing, i.e. " monitor is refused the pass, strongbox is refused out " drops into two refusing automatically during night, withdraw from two refusing during daytime.
3, strongbox is destructive reports to the police, and cuts off line such as the thief, line short circuit, and electric drill cutting strongbox all can be reported to the police.
4, strongbox is moved, is stood before the touch, case, password pushes the wrong and can both report to the police.
In addition, password is unpacked stronger logicality, will press two groups of passwords of A, B again, and the scope of these two groups of passwords be very big by the program to A, two groups of passwords of B earlier, and the stranger is difficult to grasp, and can not try again to press, as trying by one by reporting to the police to the warning button.The replacing of password is also very convenient.
Description of drawings:
Fig. 1 is the electric functional-block diagram of coded lock and strange land monitor
Fig. 2 is the electrical schematic diagram of strange land monitor
Fig. 3 is the cipher lock circuit schematic diagram
Fig. 4 is a password changer wiring diagram
Embodiment
The electrical schematic diagram that the utility model is implemented is as Fig. 1--and shown in Figure 4, its component parameter or model are annotated on figure.
In configuration aspects, the structure of strange land monitor is independent of outside the insurance casing, and circuit is contained in separately in the instrument box.One 4 core cable of strange land monitor and strongbox body and function is connected.Power supply (29) in the cipher lock circuit (2), D group password (26), light-operated circuit (27) all are placed in the drawer of strongbox bottom, drawer can be pulled out when emergent unpacking, so that operation D organizes cryptographic key, and make the photoelectric tube V of light-operated circuit (27)
23Obtain illumination.Other circuit all is installed in the door cavity of strongbox, wherein the cryptographic key of A, B, C group, 9 alarm keys and operated key N
1, N
2, N
3All be contained on the password panel on the safe door.Keeping a foothold of strongbox made with insulation materials, and the strongbox shell insulate to the earth.Ward off a retarding chamber in addition in the insurance casing, retarding chamber liner fire proofing material, retarding chamber are adorned a fire-retardant wicket outward in addition, can deposit valuable especially fearness in the retarding chamber and burn article.
Claims (3)
1, a kind of strongbox, form by casing (1), cipher lock circuit (2), it is characterized in that also having comprised strange land monitor (3), it is independent of outside casing (1) structure, its circuit mainly by on-off circuit (31), wait for switch (32), police whistle sound generator (33), lock sound circuit (34), circuit trigger (35), touch circuit (36), alarm music generator (37) and power supply (38) and forms, on-off circuit (31) mainly contains this locality button K that starts shooting
5, local parallel operation button K
6, controllable silicon V
30, triode V
29, V
34, photoelectric tube V
32And relay J
1, triode V
29Emitter and collector be attempted by controllable silicon V
30Anode and negative electrode, photoelectric tube V
32With triode V
34Constitute clad pipe, local start button K
5Control relay J
1, local shutdown button K
6Control shutdown circuit ground connection; Waiting for switch (32) mainly is a triode V
31, between its emitter stage and base stage and connect a resistance R
41Police whistle sound generator (33) mainly is that a model is 9561 IC
1, its 3 pin passes through resistance R
42With triode V
31Colelctor electrode join; Circuit trigger (35) is a bridge-type trigger, resistance R
35, R
38, R
39Constitute three arms of electric bridge, triode V
26, V
27With diode D
10, D
11Symmetry is connected into flip-flop circuit, triode V
26And V
27Colelctor electrode be connected to triode V
28Base stage, V
28Grounded emitter, colelctor electrode passes through resistance R
36Receive the triode V that waits for switch (32)
31Base stage; Touching circuit (36) is by resistance R
28And R
29Mid point connects by resistance R after connecing 220 volts of voltage dividing potential drops
30-R
34The series resistance of forming, R
30-R
34Each dividing point connect the conversion K switch
7Contact 4,3,2,1, R
34Terminal ground connection.
2, strongbox according to claim 1 is characterized in that the A group password (21) in the cipher lock circuit (2) has 6 button A
1---A
6, 5 groups charge and discharge circuit RC, 4 triode V
6---V
9With a clad pipe V
10, V
11, remove the 1st group and charge and discharge circuit R
7C
1Meet button A
1And A
2Tie point outside, all the other 4 groups charge and discharge circuit R
8C
2---R
11C
5All receive corresponding triode V
6---V
9Emitter stage, a last triode V
6Emitter stage by button A
3By arriving next triode V
7Base stage, below analogize button A
6Control clad pipe V
10, V
11Break-make; The button B of B group password (22)
1---B
5Connection is identical with A group password (21), button B
6Pass through resistance R
17Controllable silicon V in the control gate lock circuit (23)
16C group password (25) and D group password (26) all are that these two groups of password keys are together in series by light-operated circuit (27) again by 4 button series connection, and light-operated circuit (27) is by two triode V
20, V
21With a photoelectric tube V
22The clad pipe of forming.
3, strongbox according to claim 2, the connection that it is characterized in that A, B, three groups of password keys of C are that each is by being keyed to corresponding 2 * 2 double-throw double-pole switch K
nBand cutter end, commutator K
nA side joint to two core jack CK
n, opposite side is received outside line 3 and outside line 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 94219137 CN2200042Y (en) | 1994-08-16 | 1994-08-16 | Safe |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 94219137 CN2200042Y (en) | 1994-08-16 | 1994-08-16 | Safe |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2200042Y true CN2200042Y (en) | 1995-06-07 |
Family
ID=33834093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 94219137 Expired - Fee Related CN2200042Y (en) | 1994-08-16 | 1994-08-16 | Safe |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2200042Y (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102654012A (en) * | 2011-03-03 | 2012-09-05 | 文卡德埃尔赛弗公司 | Tamper switch activation without power |
-
1994
- 1994-08-16 CN CN 94219137 patent/CN2200042Y/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102654012A (en) * | 2011-03-03 | 2012-09-05 | 文卡德埃尔赛弗公司 | Tamper switch activation without power |
CN102654012B (en) * | 2011-03-03 | 2015-08-05 | 文卡德埃尔赛弗公司 | Switch activator is harassed without the need to electric power |
US9777510B2 (en) | 2011-03-03 | 2017-10-03 | Assa Abloy Ab | Tamper switch activation without power |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US3444546A (en) | Protection system | |
CN2200042Y (en) | Safe | |
CN201649968U (en) | Strongbox integrated with control alarm system device | |
CN2244601Y (en) | Anti-theft alarm iron door | |
US4015256A (en) | Electronic control unit for intrusion system | |
CN2383920Y (en) | Controller for door permutation lock | |
CN205005177U (en) | Show anti -theft device with video monitoring function | |
US5654691A (en) | Auxiliary backup device of burglary alarm system | |
CN205206508U (en) | Alarm device is used in theftproof | |
CN2410692Y (en) | Fully automatic anti-theft robbing-proof alarm device | |
CN2175291Y (en) | Multi-function alarm safe with anti-destroyed function | |
CN205334652U (en) | Burglar alarm is used to door | |
CN2150589Y (en) | Multiple-anti-theft self-locking alarm | |
CN2240168Y (en) | Multi-functional alarm for cipher control safety and security | |
CN2128288Y (en) | Alarm lock | |
CN2277544Y (en) | Burglar alarm using bleeper | |
CN2319866Y (en) | Net-type high sensitive cut-off anti-theft alarming device | |
CN2142492Y (en) | Electronic theft-deterrent door | |
CN2394387Y (en) | Alarm for preventing pager from stealing | |
CN2148985Y (en) | Omnibearing anti-theft automatic alarm | |
CN2241420Y (en) | Theftproof alarm device for telephone | |
CN2077143U (en) | Electronic cipher anti-stealing alarm | |
CN203311547U (en) | Bridge type early warning device | |
US1171756A (en) | Lock circuit-closer. | |
CN2185300Y (en) | Multipurpose anti-picking alarm lock of radio, wireless remote-control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |