EP0424356B1 - Locking cylinder - Google Patents
Locking cylinder Download PDFInfo
- Publication number
- EP0424356B1 EP0424356B1 EP90890279A EP90890279A EP0424356B1 EP 0424356 B1 EP0424356 B1 EP 0424356B1 EP 90890279 A EP90890279 A EP 90890279A EP 90890279 A EP90890279 A EP 90890279A EP 0424356 B1 EP0424356 B1 EP 0424356B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- code
- key
- lock
- cylinder
- programming
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 230000005855 radiation Effects 0.000 claims abstract description 8
- 230000015654 memory Effects 0.000 claims description 37
- 230000006698 induction Effects 0.000 claims description 3
- 230000003287 optical effect Effects 0.000 claims description 2
- 230000008054 signal transmission Effects 0.000 claims 1
- 230000007246 mechanism Effects 0.000 abstract description 6
- 230000000903 blocking effect Effects 0.000 abstract description 5
- 238000003780 insertion Methods 0.000 abstract description 5
- 230000037431 insertion Effects 0.000 abstract description 5
- 241000220317 Rosa Species 0.000 abstract 1
- 230000008672 reprogramming Effects 0.000 description 9
- 238000013475 authorization Methods 0.000 description 7
- 230000008878 coupling Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 5
- 238000005859 coupling reaction Methods 0.000 description 5
- 230000003068 static effect Effects 0.000 description 5
- 230000001939 inductive effect Effects 0.000 description 4
- 238000000034 method Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 239000003990 capacitor Substances 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004382 potting Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
- E05B49/002—Keys with mechanical characteristics, e.g. notches, perforations, opaque marks
- E05B49/006—Keys with mechanical characteristics, e.g. notches, perforations, opaque marks actuating opto-electronic devices
Definitions
- the invention relates to a lock cylinder with a cylinder core rotatable in a lock housing and with tumblers which can be pushed into a release position from a core and housing bridging position by a key which can be inserted into a key channel of the cylinder core, and with at least one the lock housing and the cylinder core and the Key channel in the cylinder core penetrating hole, in which a radiation source, for example an infrared transmission diode for transmitting a signal, and opposite this a sensor is provided, to which a receiver and a comparison circuit for comparing a signal caused by recesses in the key by stopping the beam path when plugged in with a or several code signals which can be stored in at least one code memory is connected downstream, an electromagnetic interlock in the lock cylinder or in a mortise lock being connected to the comparison circuit sen and only one sensor is provided and two threshold values are set in the receiver for the analog signal arriving from this sensor and obtained only from a signal track of the key, and the signals detected above the lower
- Access control systems which operate on the basis of punched card codes or with magnetic track codes.
- a punch card or check card replaces the key.
- Electronic or mechanical readers determine the card code and, based on the target / actual comparison with the stored codes, derive the cardholder's possible blocking authorization.
- the key spine of a flat key for a cylinder lock bears marks in the form of incisions, the position of which relative to one another results in the code which, in addition to the mechanical locking mechanism, controls an electromechanical locking device.
- Lock cylinders are also known which, in addition to the mechanical pin tumblers, have an electronic locking level.
- the key is coded in addition to the variation criteria of the key profile and the toothing in such a way that a target / actual comparison is carried out electronically on the lock side after code recognition.
- Such a lock therefore only locks when the key profile fits into the key channel, when the toothing moves the core and housing pins of the cylinder into the parting area between the core and the housing and when code correspondence between the key and the lock has been determined.
- the specialist literature reveals active key systems, static passive key systems and dynamic passive key systems. In the active key systems, a transmitter is provided in the key, which sends a code to the lock for comparison with the lock-side code.
- Static passive key systems include a key with marks such as notches or bores, which are scanned as soon as the key is fully inserted into the lock and at least briefly comes into contact with the builder. The snapshot of the coding is subjected to the target / actual comparison, which then leads to unlocking if there is a match.
- the key code is successively removed during the insertion movement as it slides past reading heads, one after the other incoming signals are stored and the memory content is then subjected to a target comparison.
- Typical representatives of the aforementioned active key systems can be found in DE-OSen 30 05 890, 29 22 230 and 30 06 128.
- Transmitters are housed in the key, the code of which can be reprogrammed or changed by a random number generator in synchronism with the lock code during each locking process. These systems are not only complex, but also prone to malfunction due to the wireless transmission path.
- DE-OS 1 553 363 relates to a static passive key system.
- the key which has a perforated pattern, is inserted into the key channel.
- One key side is illuminated over the entire area. Light only passes through in the hole positions and activates photocells that trigger the unlocking process.
- This system requires a large-area light source and a large number of photocells, so that this construction is not suitable for adapting conventional cylinder locks.
- Static passive systems are also shown in DE-OS 29 25 214 and DE-AS 25 16 283. While in the first case, when the key is in the idle state, a key hole pattern lies between a large-area radiation source and a chain of light-sensitive elements of the lock, it is in second case notches in the key back. All such static passive key systems require large-volume fittings in the lock, which, as mentioned, preclude the adaptation of existing, highly specialized locking cylinders.
- a dynamic passive key system is known from CH-PS 640 297.
- the key itself has at least two code tracks on a non-mechanical basis, from which when inserted into the key channel by means of at least two lock-side read heads, clock information and code information associated with the clocks are derived.
- the clock information is required because every person inserts the key at different speeds and the insertion speed does not keep constant over the entire depth of the key channel.
- the effort with two tracks and associated with two or even four reading heads is great, in particular the reading heads require a lot of electrical energy.
- a security system of the latter category is known from EP-A-0 391 929.
- Flat keys are used whose beard profile is optically scanned.
- a special embodiment also provides for scanning bores which are provided one behind the other in the direction of insertion in the beard area and which have different diameters in order to distinguish between clock and code signals.
- the invention is based on such a system, which aims at a particularly practical coding, in particular recoding of the key-lock combination in the event of a key loss or a change in the locking hierarchy.
- the electronic criteria should be unconditionally superimposed on a high-quality key-lock combination on a cylinder basis, so that in particular the diversity of variations is increased and changes can also be made retrospectively regarding the locking authorization on site without replacing the lock.
- This object is achieved by the teaching given in the characterizing part of claim 1.
- the systems of the effective recoding can be used to increase the security of a single cylinder as well as for the flexible design of a locking system and for the immediate assignment and withdrawal of blocking authorizations for the single cylinder as well as for the system.
- the electronics scanning the mechanical code of the key ensure an enormous increase in variation and flexibility.
- the lock code changes cyclically without additional effort as soon as a new key is inserted, for example if the old key is lost becomes. The previously valid lock code will become ineffective.
- An advantage of this system is therefore that such a locking cylinder can be reprogrammed by the owner himself at any time.
- the code memory can be switched through to the receiver for programming or reprogramming key codes by means of a predetermined control code, for example a programming key. This makes the code memory accessible.
- a programmable memory can be provided, which deletes all previously entered codes when a programming key is inserted and is briefly open for reprogramming by successively inserting all of the keys authorized to lock.
- programming can also be ended by inserting the program key again. If, for example, a key is given to a craftsman for a short period of time, the blocking authorization for this key can be revoked at night, at the weekend or after work has ended.
- the code memory has memory locations, the codes of which can be entered individually by means of a pluggable or optically or inductively coupled programming device.
- the programming device can individually access the memory locations of this code memory.
- a clock chip can be assigned to the code memory, so that certain blocking authorizations can take place as a function of time. For example, employees' office keys can only be locked on weekdays between 8 and 6 p.m.
- the watch chip may also be connected to an event log that includes every attempt to lock, including of the key code, registered under the time and date.
- the event memory can be read out by means of optical, inductive coupling or via a plug by means of a reader, at most with a printer.
- a special embodiment is characterized in that the radiation source and the sensor are provided in a rosette which can be pushed over the locking cylinder. It is also advantageous if the energy of the radiation source via isolated mounting screws in the rosette from a battery in a housing, which is preferably designed as part of a long plate of the fitting opposite the rosette, as well as the received signal from the sensor via these mounting screws in the housing provided receiver and then the comparison circuit can be fed.
- Fig. 1 shows a schematic representation of the lock area of a door with mortise lock and lock cylinder together with a block diagram for the functional representation
- Fig. 2 shows the lock cylinder together with a rosette in front view
- Fig. 3 shows a key.
- a standard lock cylinder 1 is inserted in a mortise lock 2 of a door 3.
- the lock cylinder 1 has a bore 4 which passes through the lock housing 5 and the cylinder core 6 and the key signal 7.
- a rosette 8 is slid over the part of the locking cylinder 1 projecting outward beyond the door surface, in which a bore is also provided, which is aligned with the bore 4 in the locking cylinder.
- In the rosette bore there is on the one hand an infrared transmitter diode 9 and on the other hand an infrared sensor 10, the signal of which is fed to a receiver 11.
- the incoming signal is compared in receiver 11 with two threshold values. If the lower threshold is exceeded, the receiver recognizes a clock signal; if the upper threshold is also exceeded, then a code signal ("1") is present.
- the bores 13, 14 provided in the key bit, 15, 16, 17, 18, 19 and 20 the infrared beam between the transmitter diode 9 and the sensor 10.
- the sensor emits signals of different strengths which result in a clock sequence 21 and lead a code sequence 22.
- the latter represents the electronic image of the mechanical hole track 13 to 20.
- the holes 14, 15 and 17, that is to say the second, third and fifth holes are larger in cross section than the other holes. The cross-sectional difference does not have to relate to the bore diameter, but concerns the effective dimming of the infrared beam.
- holes of the same size could also be used, which are offset in height for a smaller passage cross-section compared to the central axis of the infrared beam on the key.
- the bores could also run obliquely to the axis of the light beam in the key bit.
- the passage cross-section effective for the dimming can also be influenced thereby.
- all bores 13 to 20 give a signal when the key 12 is inserted into the key channel 7, which signal lies above the lower threshold of the receiver 11. This is indicated by eight clock pulses from clock track 21.
- the larger passage cross section of the key bores 14, 15 and 17 results in a signal of higher amplitude, which not only exceeds the lower but also the upper threshold in the receiver 11. Opposite the clock track 21, these signals are at the clock positions two, three and five.
- the code for key 12 is therefore 01101000.
- the determined code is compared in a comparison circuit 23 with a target code. If the code matches, an electromagnetic lock 25 is lifted via a line 24, which acts in the mortise lock on the bolt or the bolt mechanism or in the lock cylinder on the cylinder core, the locking lug or the coupling between the cylinder core and locking lug.
- the target code or codes that is to say those codes which lead to the unlocking of the electromechanical locking mechanism, are contained in FIG. 1 in three memories or memory groups, which in a practical case Execution can be realized together or alternatively.
- the code memory 26 comprises three target codes (C1, C2, C3), of which only the first code C1 is initially effectively compared to the actual code performed via the code track 22 to the comparison circuit 23. As soon as a key with the code C2 is inserted into the key channel 7, the code C2 is activated. C1 and C3 are ineffective.
- a freely reprogrammable memory 27 can be provided which contains the codes C n as target codes.
- the memory 27 can be opened for reprogramming by a code key, the code of which is compared with a special code K of a read-only memory 29 in the comparison circuit 28. If the key code of the programming key matches K, then a signal is sent to the code memory 27 or all codes of the keys subsequently inserted are stored in the memory 27. All original codes can be deleted for the time being, or the memory locations can be reassigned in sequence.
- the memory 27 can be opened, for example, for 2 minutes for reprogramming or reprogramming. This is indicated by a clock chip 30 and the dashed operative connection to the memory 27.
- the reprogramming phase can also be ended by inserting the programming key again.
- a third memory system comprises memories 31, 32, 33 and 34, the memory locations of which can be specifically accessed.
- a programming device 35 is provided, which is connected to the storage system via induction coils 36, 37.
- the aforementioned storage system allows the locking authorization to be coupled with a period of time, as is shown by the dashed active connection between the clock chip 30 and the memory 31.
- An event memory 38 is also provided, which records all incoming codes simultaneously with the date and time (control lines 39, 40). Furthermore, it is also recorded whether the code has released the electromechanical locking mechanism 25.
- the event memory 38 can be read out via an inductive coupling 41, 42 by means of a display device 43 at most with a log printer 44.
- the circuit has a battery 45 for energy supply, only one circuit to the infrared red diode being symbolically shown in FIG. 1.
- the battery 45 can be charged by means of an inductively coupled AC voltage via a rectified charger 46.
- the voltage supply can also take place without a battery, for example only with buffering via a capacitor with high capacitance via inductive coupling from the network with the interposition of a transformer (bell transformer).
- a single, common induction coil can be used for the inductive coupling of the programming device 35, the reading device 43, and the external voltage.
- a beep sounds as a signal for a positive code comparison by connecting an acoustic detector to line 24.
- the beep is no longer used as a warning and that the battery will be replaced as soon as possible should.
- voltage could be applied from the outside via the inductance (e.g. charging the aforementioned capacitor). Even if the voltage of the battery drops, the entire electronic system can be deactivated, so that only the mechanical locking criteria of a conventional locking cylinder are available for security and locking.
- the mortise lock can be designed as a panic lock, ie the bolt can be withdrawn with the inside handle.
- the inside handle is decoupled from a possible outside handle. While unlocking and locking from the outside of the door the agreement of the electronically mechanical code requires, the mechanical unlocking of the locking cylinder is sufficient for locking from the inside in one embodiment. "Unlocking" is done from the inside using the handle.
- a rosette with an infrared light barrier can also be provided on the inside of the door or lock.
- the eight-digit code was only mentioned in the exemplary embodiment. In practice, codes of 14 and more digits can be used, for example four digits being used to represent a checksum. This means that the read code can be checked and a reading error can even be corrected.
- a groove can be provided on both sides of the key bit, in the bottom of which the bores 13 to 20 lie. In this case, the grooves can be poured out so that the potting compound does not protrude over the surface of the key bit.
Landscapes
- Lock And Its Accessories (AREA)
- Pens And Brushes (AREA)
- Chairs Characterized By Structure (AREA)
- Fluid-Damping Devices (AREA)
- Bidet-Like Cleaning Device And Other Flush Toilet Accessories (AREA)
Abstract
Description
Die Erfindung betrifft einen Schließzylinder mit einem in einem Schloßgehäuse drehbaren Zylinderkern und mit Zuhaltungen, die durch einen in einem Schlüsselkanal des Zylinderkernes einschiebbaren Schlüssel aus einer Kern und Gehäuse überbrückenden Lage in eine Freigabestellung schiebbar sind, und mit mindestens einer das Schloßgehäuse und den Zylinderkern sowie den Schlüsselkanal im Zylinderkern durchsetzenden Bohrung, in der eine Strahlenquelle, beispielsweise eine Infrarotsendediode zum Durchsenden eines Signals, und dieser gegenüberliegend ein Sensor vorgesehen ist, dem ein Empfänger und eine Vergleichsschaltung zum Vergleich eines von Ausnehmungen des Schlüssels durch Abblenden des Strahlenganges beim Einstecken hervorgerufenen Signals mit einem oder mehreren in mindestens einem Codespeicher abspeicherbaren Codesignalen nachgeschaltet ist, wobei an die Vergleichsschaltung eine elektromagnetische Verriegelung im Schließzylinder oder in einem Einstemmschloß angeschlossen ist und wobei nur ein einziger Sensor vorgesehen ist und im Empfänger zwei Schwellenwerte für das von diesem Sensor einlangende und lediglich aus einer Signalspur des Schlüssels gewonnene analoge Signal eingestellt sind, und die oberhalb der unteren Schwelle festgestellten Signale Taktsignale (Taktspur )und die oberhalb der oberen Schwelle festgestellten Signale Codesignale (Codespur ) sind, die als getakteter Code an die Vergleichsschaltung angeschlossen sind, an deren zweiten Eingang mindestens ein Codespeicher liegt.The invention relates to a lock cylinder with a cylinder core rotatable in a lock housing and with tumblers which can be pushed into a release position from a core and housing bridging position by a key which can be inserted into a key channel of the cylinder core, and with at least one the lock housing and the cylinder core and the Key channel in the cylinder core penetrating hole, in which a radiation source, for example an infrared transmission diode for transmitting a signal, and opposite this a sensor is provided, to which a receiver and a comparison circuit for comparing a signal caused by recesses in the key by stopping the beam path when plugged in with a or several code signals which can be stored in at least one code memory is connected downstream, an electromagnetic interlock in the lock cylinder or in a mortise lock being connected to the comparison circuit sen and only one sensor is provided and two threshold values are set in the receiver for the analog signal arriving from this sensor and obtained only from a signal track of the key, and the signals detected above the lower threshold clock signals (clock track) and those above the Upper threshold detected signals are code signals (code track), which are connected as a clocked code to the comparison circuit, at the second input of which there is at least one code memory.
Bei Einzelschlössern besteht der Wunsch, etwa bei Verlust oder Diebstahl eines Schlüssels den Schließzylinder umprogrammieren zu können. Bei den bekannten Ausführungen führt das Anstecken eines Schlüssels einer zweiten Schlüsselgarnitur zum Umordnen der mechanischen Zuhaltungsstifte, wodurch die Umprogrammierung vollzogen ist und mit den Schlüssein der ersten Schlüsselgarnitur nicht mehr gesperrt werden kann. Ein vielfaches Umprogrammieren ist bei diesen Ausführungen nicht möglich.In the case of individual locks, there is a desire to be able to reprogram the locking cylinder if a key is lost or stolen. In the known designs, the insertion of a key of a second key set leads to the rearrangement of the mechanical tumbler pins, as a result of which the reprogramming is carried out and can no longer be locked with the keys in the first key set. Multiple reprogramming is not possible with these versions.
Bei Schließanlagen ist es oftmals erforderlich, Sperrberechtigungen zu ändern, also etwa Einschränkungen oder Erweiterungen vorzunehmen. Dies erfordert den Austausch von Schließzylindern und ist in vielen Fallen nur durch Austausch der gesamten Schließanlage möglich.With locking systems, it is often necessary to change locking authorizations, i.e. to make restrictions or extensions. This requires the exchange of locking cylinders and in many cases is only possible by replacing the entire locking system.
Es sind ferner Zutrittskontrollsysteme bekannt, die auf der Basis von Lochkartencodes oder mit Magnetspurcodes arbeiten. Eine Lochkarte oder Scheckkarte ersetzt dabei den Schlüssel. Elektronische oder mechanische Lesegeräte stellen den Kartencode fest und leiten nach Soll-Istvergleich mit den eingespeicherten Codes die eventuelle Sperrberechtigung des Karteninhabers ab. Bei einer bekannten Ausführung trägt der Schlüsselrücken eines Flachschlüssels für ein Zylinderschloß Marken in Form von Einschnitten, deren Lage zueinander den Code ergeben, der zusätzlich zum mechanischen Gesperre eine elektromechanische Zuhaltung steuert.Access control systems are also known which operate on the basis of punched card codes or with magnetic track codes. A punch card or check card replaces the key. Electronic or mechanical readers determine the card code and, based on the target / actual comparison with the stored codes, derive the cardholder's possible blocking authorization. In a known embodiment, the key spine of a flat key for a cylinder lock bears marks in the form of incisions, the position of which relative to one another results in the code which, in addition to the mechanical locking mechanism, controls an electromechanical locking device.
Ferner sind Schließzylinder bekannt, die zusätzlich zu den mechanischen Stiftzuhaltungen über eine elektronische Sperrebene verfügen. Dazu ist der Schlüssel neben den Variationskriterien des Schlüsselprofils und der Zahnung noch derart codiert, daß schloßseitig nach Codeerkennung ein Soll-Istverlgeich elektronisch durchgeführt wird. Ein solches Schloß sperrt somit erst dann, wenn das Schlüsselprofil in den Schlüsselkanal paßt, wenn die Zahnung die Kern- und Gehäusestifte des Zylinders in die Teilungsfläche zwischen Kern und Gehäuse verschiebt und wenn Codeübereinstimmung zwischen Schlüssel und Schloß festgestellt wurde. Die Fachliteratur läßt Aktivschlüsselsysteme, statische Passivschlüsselsysteme und dynamische Passivschlüsselsysteme erkennen. Bei den Aktivschlüsselsystemen ist im Schlüssel ein Sender vorgesehen, der einen Code an das Schloß zum Vergleich mit dem schloßseitigen Code aussendet. Statische Passivschlüsselsysteme umfassen einen Schlüssel mit Marken wie Kerben oder Bohrungen, die abgetastet werden, sobald der Schlüssel in das Schloß vollständig eingesteckt und wenigstens kurzzeitig in Buhelage gekommen ist. Die Momentaufnahme der Codierung wird dem Soll-Istvergleich unterworfen, der dann bei Übereinstimmung zur Entriegelung führt. Bei dem dynamischen Passivschlüsselsystem wird der Schlüsselcode sukzessive während der Einschubbewegung beim Vorbeigleiten an Leseköpfen abgenommen, die seitlich nacheinander einlangenden Signale gespeichert und der Speicherinhalt sodann einem Sollvergleich unterzogen.Lock cylinders are also known which, in addition to the mechanical pin tumblers, have an electronic locking level. For this purpose, the key is coded in addition to the variation criteria of the key profile and the toothing in such a way that a target / actual comparison is carried out electronically on the lock side after code recognition. Such a lock therefore only locks when the key profile fits into the key channel, when the toothing moves the core and housing pins of the cylinder into the parting area between the core and the housing and when code correspondence between the key and the lock has been determined. The specialist literature reveals active key systems, static passive key systems and dynamic passive key systems. In the active key systems, a transmitter is provided in the key, which sends a code to the lock for comparison with the lock-side code. Static passive key systems include a key with marks such as notches or bores, which are scanned as soon as the key is fully inserted into the lock and at least briefly comes into contact with the builder. The snapshot of the coding is subjected to the target / actual comparison, which then leads to unlocking if there is a match. With the dynamic passive key system, the key code is successively removed during the insertion movement as it slides past reading heads, one after the other incoming signals are stored and the memory content is then subjected to a target comparison.
Typische Vertreter der vorgenannten Aktivschlüsselsysteme sind den DE-OSen 30 05 890, 29 22 230 und 30 06 128 zu entnehmen. Es sind jeweils Sender im Schlüssel untergebracht, deren Code umprogrammierbar ist oder durch einen Zufallsgenerator bei jedem Sperrvorgang synchron mit dem Schloßcode verändert wird. Diese Systeme sind nicht nur aufwendig, sondern infolge der drahtlosen Übertragungsstrecke auch störungsanfällig.Typical representatives of the aforementioned active key systems can be found in DE-OSen 30 05 890, 29 22 230 and 30 06 128. Transmitters are housed in the key, the code of which can be reprogrammed or changed by a random number generator in synchronism with the lock code during each locking process. These systems are not only complex, but also prone to malfunction due to the wireless transmission path.
Die DE-OS 1 553 363 betrifft ein statisches Passivschlüsselsystem. Der Schlüssel der über ein Lochmuster verfügt, wird in den Schlüsselkanal eingeschoben. Die eine Schlüsselseite wird über die gesamte Fläche beleuchtet. Licht tritt nur in den Lochpositionen durch und aktiviert Fotozellen, die den Entriegelungsvorgang auslösen. Dieses System erfordert eine großflächige Lichtquelle und eine Vielzahl von Fotozellen, sodaß diese Konstruktion etwa zur Adaption herkömmlicher Zylinderschlösser ausscheidet.DE-OS 1 553 363 relates to a static passive key system. The key, which has a perforated pattern, is inserted into the key channel. One key side is illuminated over the entire area. Light only passes through in the hole positions and activates photocells that trigger the unlocking process. This system requires a large-area light source and a large number of photocells, so that this construction is not suitable for adapting conventional cylinder locks.
Statische Passivsysteme zeigen auch die DE-OS 29 25 214 und die DE-AS 25 16 283. Während im ersten Fall im Ruhezustand des eingeschobenen Schlüssels ein Lochmuster des Schlüssels zwischen einer großflächigen Stahlungsquelle und einer Kette von lichtempfindlichen Elementen des Schlosses liegt, sind es im zweiten Fall Kerben im Schlüsselrücken. Alle derarigen statischen Passivschlüsselsysteme verlangen großvolumige Einbauten im Schloß, die, wie erwähnt, eine Adaptierung vorhandener hochspezialisierter Schließzylinder ausschließen.Static passive systems are also shown in DE-OS 29 25 214 and DE-AS 25 16 283. While in the first case, when the key is in the idle state, a key hole pattern lies between a large-area radiation source and a chain of light-sensitive elements of the lock, it is in second case notches in the key back. All such static passive key systems require large-volume fittings in the lock, which, as mentioned, preclude the adaptation of existing, highly specialized locking cylinders.
Aus der CH-PS 640 297 ist ein dynamisches Passivschlüsselsystem bekannt. Der Schlüssel selbst verfügt über mindestens zwei Codespuren auf nicht mechanischer Grundlage, auswelchen beim Einschieben in den Schlüsselkanal mittels mindestens zweier schloßseitiger Leseköpfe eine Taktinformation und den Takten zugeordnet eine Codeinformation abgeleitet wird. Die Taktinformation ist erforderlich, weil jeder Mensch den Schlüssel mit unterschiedlicher Geschwindigkeit einschiebt und die Einschubgeschwindigkeit auch keineswegs über die gesamte Tiefe des Schlüsselkanals konstant hält. Der Aufwand bei zwei Spuren und damit verbunden bei zwei oder gar vier Leseköpfen ist groß, insbesondere erfordern die Leseköpfe viel elektrische Energie.A dynamic passive key system is known from CH-PS 640 297. The key itself has at least two code tracks on a non-mechanical basis, from which when inserted into the key channel by means of at least two lock-side read heads, clock information and code information associated with the clocks are derived. The clock information is required because every person inserts the key at different speeds and the insertion speed does not keep constant over the entire depth of the key channel. The effort with two tracks and associated with two or even four reading heads is great, in particular the reading heads require a lot of electrical energy.
Aus der EP-A-0 391 929 ist ein Sicherheitssystem der letztgenannten Kategorie bekannt. Es werden Flachschlüssel verwendet deren Bartprofil optisch abgetastet wird. Eine besondere Ausführung sieht auch eine Abtastung von Bohrungen vor, die im Bartbereich in Einschubrichtung hintereinander vorgesehen sind und zur Unterscheidung von Takt- und Codesignalen unterschiedlich groß im Durchmesser ausgeführt wurden. Beim Einschieben des Schlüssels in einen Schlüsselkanal wird ein quer zum Kanal orientierter Lichtstrahl wiederholt unterbrochen bzw. abgeblendet, sodaß ein Sensor eine Folge von Impulsen erfaßt. Das Vorhandensein von Impulsen einerseits und das Überschreiten einer Schwelle anderseits führt zur Differenzierung zwischen einem Takt und einem davon abgeleiteten Code. Von einem solchen System geht die Erfindung aus, die auf eine besonders praxisgerechte Codierung, insbesondere Umcodierung der Schlüssel-Schloßkombination bei Schlüsselverlust oder Änderung der Sperrhierachie abzielt. Die elektronischen Kriterien sollen einer hochwertigen Schlüssel-Schloßkombination auf Zylinderbasis bedingungslos überlagerbar sein, damit insbesondere die Variationsvielfalt gesteigert wird und auch nachträglich Änderungen bezüglich der Sperrberechtigung vor Ort ohne Austausch des Schlosses vorgenommen werden können. Diese Aufgabe wird erfindungsgemäß durch die im Kennzeichen des Anspruchs 1 gegebene Lehre gelöst. Die Systeme der wirksamen Umcodierung können zur Erhöhung der Sicherheit eines Einzelzylinders ebenso eingesetzt werden, wie zur flexiblen Gestaltung einer Schließanlage und für die sofortige Zuteilung und den Entzug von Sperrberechtigungen beim Einzelzylinder ebenso wie bei der Anlage. Während die Sicherheit vor Gewaltanwendung von dem mechanischen Gesperre übernommen wird, gewährleistet die den mechanischen Code des Schlüssels abtastende Elektronik einen enormen Variationszuwachs sowie Flexibilität. Ohne zusätzlichen Aufwand ändert sich der Schloßcode in zyklischer Folge, sobald ein neuer Schlüssel, etwa bei Verlust des alten Schlüssels, angesteckt wird. Der bisher gültige Schloßcode wird dadurch unwirksam. Ein Vorteil dieses Systems liegt somit darin, daß ein derartiger Schließzylinder vom Wohnungsinhaber selbst den Bedürfnissen nach jederzeit selbst umprogrammierbar ist. Alternativ oder ergänzend dazu kann der Codespeicher zur Ein- bzw. Umprogrammierung von Schlüsselcodes durch einen vorbestimmten Steuercode beispielsweise eines Probrammierschlüssels an den Empfänger durchschaltbar sein. Dadurch wird der Codespeicher zugänglich. Es kann ein programmierbarer Speicher vorgesehen sein, der bei Einstecken eines Programmierschlüssels alle bisher eingegebenen Codes löscht und kurzzeitig für eine Neuprogrammierung durch aufeinanderfolgendes Einstecken aller sperrberechtigten Schlüssel offen ist. Die Programmierung kann außer zeitlimitiert auch durch neuerliches Einstecken des Programmschlüssels beendet werden. Wenn etwa einem Handwerker ein Schlüssel kurzzeitig überlassen wird, dann kann die Sperrberechtigung dieses Schlüssels nachts, am Wochenende oder nach Beendigung der Arbeit entzogen werden. Bei der dazu besonders geeigneten Ausführungsform weist der Codespeicher Speicherplätze auf, deren Codes mittels eines ansteckbaren oder optisch bzw. induktiv koppelbaren Programmiergerätes individuell eingebbar sind. Selbst wenn der Handwerker oder ein während der eigenen Abwesenheit den Schlüssel innehabender Nachbar diesen verliert, dann ist lediglich der Code des verlorenen Schlüssels durch das Programmiergerät aus dem Signalspeicher zu löschen. Selbst bei übereinstimmender Zahnung und Profilierung, die zu einem Überwinden der mechanischen Zuhaltungen führen würde, sperrt das Schloß nun mit diesem Schlüssel - sollte er in falsche Hände geraten sein - nicht.A security system of the latter category is known from EP-A-0 391 929. Flat keys are used whose beard profile is optically scanned. A special embodiment also provides for scanning bores which are provided one behind the other in the direction of insertion in the beard area and which have different diameters in order to distinguish between clock and code signals. When the key is inserted into a key channel, a light beam oriented transversely to the channel is repeatedly interrupted or dimmed, so that a sensor detects a sequence of pulses. The presence of pulses on the one hand and the crossing of a threshold on the other hand leads to the differentiation between a clock and a code derived from it. The invention is based on such a system, which aims at a particularly practical coding, in particular recoding of the key-lock combination in the event of a key loss or a change in the locking hierarchy. The electronic criteria should be unconditionally superimposed on a high-quality key-lock combination on a cylinder basis, so that in particular the diversity of variations is increased and changes can also be made retrospectively regarding the locking authorization on site without replacing the lock. This object is achieved by the teaching given in the characterizing part of claim 1. The systems of the effective recoding can be used to increase the security of a single cylinder as well as for the flexible design of a locking system and for the immediate assignment and withdrawal of blocking authorizations for the single cylinder as well as for the system. While the security against violence is taken over by the mechanical locking mechanism, the electronics scanning the mechanical code of the key ensure an enormous increase in variation and flexibility. The lock code changes cyclically without additional effort as soon as a new key is inserted, for example if the old key is lost becomes. The previously valid lock code will become ineffective. An advantage of this system is therefore that such a locking cylinder can be reprogrammed by the owner himself at any time. As an alternative or in addition to this, the code memory can be switched through to the receiver for programming or reprogramming key codes by means of a predetermined control code, for example a programming key. This makes the code memory accessible. A programmable memory can be provided, which deletes all previously entered codes when a programming key is inserted and is briefly open for reprogramming by successively inserting all of the keys authorized to lock. In addition to being time-limited, programming can also be ended by inserting the program key again. If, for example, a key is given to a craftsman for a short period of time, the blocking authorization for this key can be revoked at night, at the weekend or after work has ended. In the embodiment which is particularly suitable for this purpose, the code memory has memory locations, the codes of which can be entered individually by means of a pluggable or optically or inductively coupled programming device. Even if the handyman or a neighbor holding the key during his or her absence loses it, then the code of the lost key can only be deleted from the signal memory by the programming device. Even if the toothing and profiling match, which would lead to overcoming the mechanical tumblers, the lock does not lock with this key - should it have fallen into the wrong hands.
Auf die Speicherplätze dieses Codespeichers kann durch das Programmiergerät individuell zugegriffen werden. Dem Codespeicher kann ein Uhrenchip zugeordnet werden, sodaß gewisse Sperrberechtigungen zeitabhängig erfolgen können. So etwa können die Büroschlüssel der Angestellten nur wochentags zwischen 8 und 18 h sperrberechtigt sein. Das Uhrenchip kann auch an einen Ereignisspeicher angeschlossen sein, der jeden Sperrversuch, einschließlich des Schlüsselcodes, unter Uhrzeitangabe und Datum registriert. Der Ereignisspeicher kann durch optische, induktive Kopplung oder über einen Stecker mittels eines Lesegerätes allenfalls mit Drucker ausgelesen werden.The programming device can individually access the memory locations of this code memory. A clock chip can be assigned to the code memory, so that certain blocking authorizations can take place as a function of time. For example, employees' office keys can only be locked on weekdays between 8 and 6 p.m. The watch chip may also be connected to an event log that includes every attempt to lock, including of the key code, registered under the time and date. The event memory can be read out by means of optical, inductive coupling or via a plug by means of a reader, at most with a printer.
In konstruktiver Hinsicht ist eine besondere Ausführungsform dadurch gekennzeichnet, daß die Strahlenquelle und der Sensor in einer dem Schließzylinder überschiebbaren Rosette vorgesehen sind. Weiters ist vorteilhaft, wenn die Energie der Strahlenquelle über isoliert geführte Montageschrauben in der Rosette von einer Batterie in einem Gehäuse, das vorzugsweise als Teil eines Langschildes des der Rosette gegenüberliegenden Beschlages ausgebildet ist, wie auch das empfangene Signal des Sensors über diese Montageschrauben den im Gehäuse vorgesehenen Empfänger und sodann der Vergleichsschaltung zuführbar sind.In terms of design, a special embodiment is characterized in that the radiation source and the sensor are provided in a rosette which can be pushed over the locking cylinder. It is also advantageous if the energy of the radiation source via isolated mounting screws in the rosette from a battery in a housing, which is preferably designed as part of a long plate of the fitting opposite the rosette, as well as the received signal from the sensor via these mounting screws in the housing provided receiver and then the comparison circuit can be fed.
Ein Ausführungsbeispiel des Erfindungsgegenstandes ist in den Zeichnungen dargestellt.An embodiment of the subject of the invention is shown in the drawings.
Fig. 1 zeigt in schematischer Darstellung den Schloßbereich einer Tür mit Einstemmschloß und Schließzylinder zusammen mit einem Blockschaltbild zur Funktionsdarstellung, Fig. 2 den Schließzylinder zusammen mit einer Rosette in Frontansicht und Fig. 3 einen Schlüssel.Fig. 1 shows a schematic representation of the lock area of a door with mortise lock and lock cylinder together with a block diagram for the functional representation, Fig. 2 shows the lock cylinder together with a rosette in front view and Fig. 3 shows a key.
Ein serienmäßiger Schließzylinder 1 ist in einem Einstemmschloß 2 einer Tür 3 eingesetzt. Der Schließzylinder 1 trägt eine Bohrung 4, die das Schloßgehäuse 5 und den Zylinderkern 6 sowie den Schlüsselksnal 7 durchsetzt. Dem über die Türfläche nach außen überstehenden Teil des Schließzylinders 1 ist eine Rosette 8 überschoben, in welcher ebenfalls eine Bohrung vorgesehen ist, die mit der Bohrung 4 im Schließzylinder fluchtet. In der Rosettenbohrung liegt einerseits eine Infrarotsendediode 9 und anderseits ein Infrarotsensor 10, dessen Signal einem Empfänger 11 zugeführt wird. Im Empfänger 11 wird das ankommende Signal mit zwei Schwellenwerten verglichen. Wird die untere Schwelle überschritten, dann erkennt der Empfänger ein Taktsignal, wird auch die obere Schwelle überschritten, dann liegt ein Codesignal ("1") vor.A standard lock cylinder 1 is inserted in a
Beim Einschieben eines Schlüssels 12 (Fig. 3) in den Schlüsselkanal 7 takten die im Schlüsselbart vorgesehenen Bohrungen 13,14, 15, 16, 17, 18, 19 und 20 den Infrarotstrahl zwischen der Sendediode 9 und dem Sensor 10. Infolge der unterschiedlichen Bohrungsdurchmesser am Schlüssel 12 gibt der Sensor unterschiedlich starke Signale ab, die im Empfänger 11 infolge der vorgenannten Schwellen zu einer Taktfolge 21 und einer Codefolge 22 führen. Letztere stellt das elektronische Abbild der mechanischen Lochspur 13 bis 20 dar. Im Auführungsbeispiel sind die Bohrungen 14, 15 und 17, also die zweite, dritte und fünfte Bohrung im Querschnitt größer, als die übrigen Bohrungen. Der Querschnittsunterschied muß sich nicht auf den Bohrungsdurchmesser beziehen, sondern betrifft die wirksame Abblendung des Infrarotstrahls. So könnten auch jeweils gleich große Bohrungen verwendet werden, die für einen kleineren Durchtrittsquerschnitt gegenüber der Mittelalchse des Infrarotstrahles auf dem Schlüssel in der Höhe versetzt sind. Die Bohrungen könnten für unterschiedliche Abblendung des Infrarotstrahles auch schräg zur Achse des Lichtstrahles im Schlüsselbartverlaufen. Auch dadurch ist der für die Abblendung wirksame Durchtrittsquerschnitt beeinflußbar. Zurück zum Ausführungsbeispiel ergeben alle Bohrungen 13 bis 20 beim Einschieben des Schlüssels 12 in den Schlüsselkanal 7 ein Signal, das über der unteren Schwelle des Empfängers 11 liegt. Dieses wird durch acht Taktimpulse der Taktspur 21 angedeutet. Durch den größeren Durchtrittsquerschnitt der Schlüsselbohrungen 14, 15 und 17 ergibt sich jeweils ein Signal höherer Amplitude, das nicht nur die untere, sondern auch die obere Schwelle im Empfänger 11 übersteigt. Der Taktspur 21 gegenübergestellt liegen diese Signale auf den Taktpositionen zwei, drei und fünf. Der Code des Schlüssels 12 lautet daher 01101000.When a key 12 (FIG. 3) is inserted into the
In einer Vergleichschaltung 23 wird der ermittelte Code mit einem Soll-Code verglichen. Bei Codeübereinstimmung wird über eine Leitung 24 eine elektromagnetische Verriegelung 25 ausgehoben, die im Einstemmschloß auf den Riegel oder die Riegelmechanik bzw. im Schließzylinder auf dem Zylinderkern, die Sperrnase oder die Kupplung zwischen Zylinderkern und Sperrnase wirkt.The determined code is compared in a
Der oder die Soll-Codes, also jene Codes, die zur Entriegelung des elektromechanischen Gesperres führen, sind in Fig. 1 in drei Speichern bzw. Speichergruppen enthalten, die bei einer praktischen Ausführung gemeinsam oder alternativ realisiert sein können. Der Codespeicher 26 umfaßt drei Sollcodes (C₁, C₂, C₃), von denen nur der erste Code C₁ vorerst wirksam dem über die Codespur 22 an die Vergleichsschaltung 23 geführten Ist-Code gegenübergestellt wird. Sobald ein Schlüssel mit dem Code C₂ in den Schlüsselkanal 7 gesteckt wird, erfolgt die Aktivierung des Codes C₂. C₁ und C₃ sind unwirksam. In der Praxis werden mit dem Schloßsystem drei Garnituren von Schlüsseln mitgeliefert, wobei bei Verlust oder Diebstahl eines Schlüssels der ersten Garnitur die mit C₁ codiert ist, die Umprogrammierung auf C₂ durch Anstecken eines Schlüssels der zweiten Garnitur erfolgt. Dieser Vorgang kann nochmals mit C₃ oder mehrmals wiederholt werden. Es ist eine zyklische Reihung möglich, die bei C₁ schließlich wieder beginnt.The target code or codes, that is to say those codes which lead to the unlocking of the electromechanical locking mechanism, are contained in FIG. 1 in three memories or memory groups, which in a practical case Execution can be realized together or alternatively. The
Alternativ oder zusätzlich kann ein frei umprogrammierbarer Speicher 27 vorgesehen sein, der die Codes Cn als Sollcodes enthält. Der Speicher 27 kann zur Umprogrammierung durch einen Codeschlüssel geöffnet werden, dessen Code in der Vergleichsschaltung 28 einen besonderen Code K eines Festspeichers 29 gegenübergestellt wird. Stimmt der Schlüsselcode des Programmierschlüssels mit K überein, dann erfolgt ein Signal an den Codespeicher 27 bzw. es werden unmittelbar alle Codes der nachfolgend eingesteckten Schlüssel in Speicher 27 abgelegt. Dabei können vorerst sämtliche ursprünglichen Codes gelöscht werden oder aber es erfolgt die Neubelegung der Speicherplätze der Reihe nach. Mit dem Einstecken eines Programmierschlüssels kann der Speicher 27 beispielsweise für 2 Minuten für das Umprogrammieren bzw. Neuprogrammieren geöffnet sein. Dies ist durch einen Uhrenchip 30 und die strichlierte Wirkverbindung zum Speicher 27 angedeutet. Die Phase der Umprogrammierung kann auch durch ein neuerliches Einstecken des Programmierschlüssels beendet werden.Alternatively or additionally, a freely
Ein drittes Speichersystem umfaßt Speicher 31, 32, 33 und 34 auf deren Speicherplätze gezielt zugegriffen werden kann. Dazu ist ein Programmiergerät 35 vorgesehen, das über Induktionsspulen 36, 37 an das Speichersystem angeschlossen ist. Das vorgenannte Speichersystem erlaubt die Kopplung der Sperrberechtigung mit einer Zeitspanne, wie dies durch die strichlierte Wirkverbindung zwischen dem Uhrenchip 30 und dem Speicher 31 dargestellt ist.A third memory system comprises
Es ist ferner noch ein Ereignisspeicher 38 vorgesehen, der sämtliche einlangende Codes gleichzeitig mit Datum und Uhrzeit festhält (Steuerleitungen 39, 40). Ferner wird auch aufgezeichnet, ob der Code zu einer Aufhebung des elektromechanischen Gesperres 25 geführt hat. Der Ereignisspeicher 38 kann über eine induktive Ankopplung 41, 42 mittels eines Anzeigegerätes 43 allenfalls mit Protokolldrucker 44 ausgelesen werden.An
Zur Energieversorung verfügt die Schaltung über eine Batterie 45, wobei in Fig. 1 symbolisch nur ein Stromkreis zur Infratrotsendediode dargestellt ist. Die Batterie 45 kann mittels einer induktiv angekuppelten Wechselspannung über ein gleichgerichtetes Ladegerät 46 aufgeladen werden. Die Spannungsversorgung kann auch ohne Batterie, beispielsweise nur mit einer Pufferung über einen Kondensator mit hoher Kapazität über die induktive Kopplung aus dem Netz unter Zwischenschaltung eines Transformators (Klingeltransformators) erfolgen. Zur induktiven Ankopplung des Programmiergerätes 35, des Lesegerätes 43, und der Fremdspannung kann eine einzige, gemeinsame Induktionsspule verwendet werden.The circuit has a
Wird die Batterie 45 verwendet, dann erfolgt ein Piepston als Signal für einen positiven Codevergleich durch Anschluß eines akustischen Melders an die Leitung 24. Sobald die Spannung unter einen gewissen voranstellbaren Wert absinkt, entfällt der Piepston als Warnung und Hinweis, daß baldmöglichst die Batterie ausgetauscht werden soll. Im Notfall könnte Spannung von außen über die Induktivität angelegt werden (z. B. Aufladung des vorgenannten Kondensators). Es kann auch bei Absinken der Spannung der Batterie das gesamte elektronische System unwirksam geschaltet werden, sodaß nurmehr die mechanischen Schloßkriterien eines üblichen Schließzylinders für Sicherheit und Sperrvorgang zur Verfügung stehen.If the
Das Einstemmschloß kann als Panikschloß ausgebildet sein, d.h., daß mit dem Innendrücker der Riegel zurückgezogen werden kann. Der Innendrücker ist dabei von einem eventuellen Außendrücker entkoppelt. Während das Auf- und Zusperren von der Türaußenseite die Übereinstimmung des elektronisch mechanischen Codes verlangt, genügt für das Zusperren von der Innenseite bei einer Ausführungsform die mechanische Entriegelung des Schließzylinders. Das "Aufsperren" erfolgt von der Innenseite über den Drücker. Natürlich kann bei beidseitig gewünschter erhöhter Sicherheit auch an der Tür- bzw. Schloßinnenseite eine Rosette mit einer Infrarotlichtschranke vorgesehen sein.The mortise lock can be designed as a panic lock, ie the bolt can be withdrawn with the inside handle. The inside handle is decoupled from a possible outside handle. While unlocking and locking from the outside of the door the agreement of the electronically mechanical code requires, the mechanical unlocking of the locking cylinder is sufficient for locking from the inside in one embodiment. "Unlocking" is done from the inside using the handle. Of course, with increased security desired on both sides, a rosette with an infrared light barrier can also be provided on the inside of the door or lock.
Der achtstelligeCode wurde bloß im Ausführungsbeispiel genannt. Es können in der Praxis Codes von 14 und mehr Stellen verwendet werden, wobei beispielsweise vier Stellen zur Darstellung einer Checksumme herangezogen werden. Damit kann der abgelesene Code kontrolliert und ein Lesefehler sogar richtiggestellt werden.The eight-digit code was only mentioned in the exemplary embodiment. In practice, codes of 14 and more digits can be used, for example four digits being used to represent a checksum. This means that the read code can be checked and a reading error can even be corrected.
Es besteht ferner die Möglichkeit, die Bohrungen 13 bis 20 mit Kunststoff, der von dem Infrarotstrahl durchdrungen wird, zu vergießen. Beiderseits des Schlüsselbartes kann jeweils eine Nut vorgesehen sein, in deren Nutengrund die Bohrungen 13 bis 20 liegen. In diesem Fall können die Nuten ausgegossen werden, sodaß die Vergußmasse nicht über die Oberfläche des Schlüsselbartes hervortritt.There is also the possibility of potting the
Claims (3)
- Lock cylinder with a cylinder plug (6) that can be rotated in a lock case (5) and with levers that can be moved by a key (12), which can be inserted into a keyway (7) in the cylinder plug (6), from a position that bridges the plug and the case into a releasing position, and with a minimum of one bore (4) that penetrates the lock case (5) and the cylinder plug (6), as well as the keyway (7) in the cylinder plug (6), in which a radiation source, for example an infra-red transmitting diode (9) for the transmission of a signal, and a sensor (10) on the opposite side are provided, behind which a receiver (11) and a comparator circuit (23) are provided where a signal, which is generated when a key (12) is inserted, the recesses (13 - 20) of which dim the beam path, is compared to one or several code signals that can be stored in a minimum of one code memory (26, 27, 31 - 34), with an electromagnetic locking device (25) in the lock cylinder (1) or in a mortice lock (2) being connected to the comparator circuit, and with only one single sensor (10) being provided, while two threshold values are set in the receiver (11) for the analog signal that arrives from that sensor (10) and is obtained merely from one signal trace of the key (12), where the signals detected above the lower threshold value are timing pulses (timing trace 21), and where the signals detected above the upper threshold value are code pulses (code trace 22), which are connected to the comparator circuit (23) as a timed code, while a minimum of one code memory (26, 27, 31 - 34) is connected to the second input of the circuit, characterized in that the code memory (26) contains several codes (C₁, C₂, C₃), which can be retrieved cyclically, one after the other, and which can be activated individually by inserting a key that contains a new code, with the previous code in code memory (6) being taken out of operation at the same time and/or, respectively, where the code memory (27) can be connected to the receiver (11) by means of a pre-determined control code, for example of a programming key, for programming or re-programming the key codes, and/or, respectively, where the code memory has memory locations (31, 32, 33, 34), the codes of which may be entered individually by means of an optical plug-in programming device (35, 36) or a plug-in programming device (35, 36) that can be coupled through induction.
- Lock cylinder according to Claim 1, characterized in that the radiation source (9) and the sensor (10) are provided in a keyhole escutcheon (8) that can slipped over the lock cylinder (1).
- Lock cylinder according to Claim 2, characterized in that the energy of the radiation source (9) can be conducted via insulated assembly screws in the keyhole escutcheon (8), from a battery (45) which is in a case that is preferably embodied as component of the lockset plate of the fitting opposite the keyhole escutcheon (8), just as the received signal from the sensor (10) can be conducted via these assembly screws to the receiver (11) that is provided in that case, and then to the comparator circuit (23).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT2417/89 | 1989-10-20 | ||
AT0241789A AT391909B (en) | 1989-10-20 | 1989-10-20 | LOCKING CYLINDER AND CYLINDLE KEY |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0424356A1 EP0424356A1 (en) | 1991-04-24 |
EP0424356B1 true EP0424356B1 (en) | 1995-03-22 |
Family
ID=3533969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP90890279A Expired - Lifetime EP0424356B1 (en) | 1989-10-20 | 1990-10-11 | Locking cylinder |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP0424356B1 (en) |
AT (2) | AT391909B (en) |
DE (1) | DE59008752D1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5677682A (en) * | 1992-08-05 | 1997-10-14 | Thorsen; Anders Christian | Electronic lock system |
DE4403728A1 (en) * | 1994-02-07 | 1995-08-10 | Winkhaus Fa August | Lock cylinder key system |
DK174939B1 (en) | 2002-04-11 | 2004-03-08 | Ruko As | Electro-mechanical cylinder lock key combination with optical code and key thereto |
CN102003119B (en) * | 2010-11-15 | 2013-05-08 | 唐名姣 | Safety lock and key thereof |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE429884B (en) * | 1979-06-05 | 1983-10-03 | Thelin & Co Id Select | ELECTRONIC WELDING |
US4558175A (en) * | 1982-08-02 | 1985-12-10 | Leonard J. Genest | Security system and method for securely communicating therein |
GB2127479B (en) * | 1982-09-18 | 1987-04-08 | Sr John Maxwell Mullin | Security device |
GB2169947A (en) * | 1984-12-13 | 1986-07-23 | Lowe & Fletcher Ltd | Fastener |
US4868559A (en) * | 1987-10-02 | 1989-09-19 | Universal Photonix, Inc. | Security system employing optical key shape reader |
-
1989
- 1989-10-20 AT AT0241789A patent/AT391909B/en not_active IP Right Cessation
-
1990
- 1990-10-11 AT AT90890279T patent/ATE120253T1/en not_active IP Right Cessation
- 1990-10-11 DE DE59008752T patent/DE59008752D1/en not_active Expired - Fee Related
- 1990-10-11 EP EP90890279A patent/EP0424356B1/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
ATE120253T1 (en) | 1995-04-15 |
ATA241789A (en) | 1990-06-15 |
EP0424356A1 (en) | 1991-04-24 |
DE59008752D1 (en) | 1995-04-27 |
AT391909B (en) | 1990-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE4428947C1 (en) | Coded remote operation of vehicle central locking system | |
DE69130477T2 (en) | ELECTRONIC SECURITY SYSTEM | |
EP0842500B1 (en) | Locking device for systems access to which is time-restricted | |
DE3517858A1 (en) | LOCKING SYSTEM | |
EP0600194B1 (en) | Access control system | |
EP0709534A1 (en) | Lock activated by an identity carrier | |
EP0410024B1 (en) | Electronic locking system | |
EP0224607A1 (en) | Locking device including an electronic identification system | |
EP0187363B1 (en) | Mechanical and non-mechanical coded key and lock actuated by it | |
DE10056119A1 (en) | Electronic lock system in which a padlock has a wireless interface via which it receives access code that it then evaluates by comparison with codes stored in memory, thus reducing the number of keys personnel have to carry | |
EP0911466B1 (en) | Wearfree programmable electronic locking device | |
EP0424356B1 (en) | Locking cylinder | |
EP0287686B2 (en) | Controlled locking device | |
EP1083277B1 (en) | Locking system and method of its operation | |
EP1828993A1 (en) | Access control system with a number of closing devices | |
DE2635180B2 (en) | Process for the electronically controlled release of door, safe and function locks using electronically coded keys and a circuit arrangement for carrying out the process | |
DE4236863A1 (en) | Vehicle active-key programming for central door-locking system - involves encoding key with unique fixed and variable component data-set for subsequent transfer to, and matching of, lock control unit. | |
DE19621909A1 (en) | Electronic access control system for doors | |
DE102015113243B4 (en) | Cabinet door lock that communicates wirelessly with a central unit | |
CH592797A5 (en) | Electronic gate circuit with separate transmitter and receiver - each with two antennae and demodulators and shift register or multiple OR=gate connected with coincidence unit | |
CH678555A5 (en) | Lock with electronic coding | |
EP1155213B1 (en) | Locker arrangement | |
EP1031918B1 (en) | Closing device | |
DE19961877A1 (en) | Safe deposit system | |
CH700937B1 (en) | Locker activating device for activating safe, has mechatronic device including receiving unit and co-operating with key unit such that mechatronic device activates key unit based on received data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE |
|
17P | Request for examination filed |
Effective date: 19910527 |
|
17Q | First examination report despatched |
Effective date: 19930730 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GRUNDMANN SCHLIESSTECHNIK GESELLSCHAFT M.B.H. |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 19950322 Ref country code: ES Free format text: THE PATENT HAS BEEN ANNULLED BY A DECISION OF A NATIONAL AUTHORITY Effective date: 19950322 Ref country code: DK Effective date: 19950322 |
|
REF | Corresponds to: |
Ref document number: 120253 Country of ref document: AT Date of ref document: 19950415 Kind code of ref document: T |
|
ET | Fr: translation filed | ||
REF | Corresponds to: |
Ref document number: 59008752 Country of ref document: DE Date of ref document: 19950427 |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 19950419 |
|
ITF | It: translation for a ep patent filed | ||
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Effective date: 19951011 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 19951031 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed | ||
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 19990907 Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: SE Payment date: 19990908 Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 19990928 Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 19990929 Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 19991009 Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 19991029 Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20000124 Year of fee payment: 10 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20001011 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: THE PATENT HAS BEEN ANNULLED BY A DECISION OF A NATIONAL AUTHORITY Effective date: 20001030 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20001031 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20001031 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20001031 |
|
BERE | Be: lapsed |
Owner name: GRUNDMANN SCHLIESSTECHNIK G.M.B.H. Effective date: 20001031 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20010501 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20001011 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
EUG | Se: european patent has lapsed |
Ref document number: 90890279.4 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20010629 |
|
NLV4 | Nl: lapsed or anulled due to non-payment of the annual fee |
Effective date: 20010501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20010703 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20051011 |