EP0424356B1 - Locking cylinder - Google Patents

Locking cylinder Download PDF

Info

Publication number
EP0424356B1
EP0424356B1 EP90890279A EP90890279A EP0424356B1 EP 0424356 B1 EP0424356 B1 EP 0424356B1 EP 90890279 A EP90890279 A EP 90890279A EP 90890279 A EP90890279 A EP 90890279A EP 0424356 B1 EP0424356 B1 EP 0424356B1
Authority
EP
European Patent Office
Prior art keywords
code
key
lock
cylinder
programming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP90890279A
Other languages
German (de)
French (fr)
Other versions
EP0424356A1 (en
Inventor
Wilhelm Gantner
Heinz Luef
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Grundmann Schliesstechnik GmbH
Original Assignee
GRUNDMANN SCHLIESSTECHNIK
Grundmann Schliesstechnik GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GRUNDMANN SCHLIESSTECHNIK, Grundmann Schliesstechnik GmbH filed Critical GRUNDMANN SCHLIESSTECHNIK
Publication of EP0424356A1 publication Critical patent/EP0424356A1/en
Application granted granted Critical
Publication of EP0424356B1 publication Critical patent/EP0424356B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • E05B49/002Keys with mechanical characteristics, e.g. notches, perforations, opaque marks
    • E05B49/006Keys with mechanical characteristics, e.g. notches, perforations, opaque marks actuating opto-electronic devices

Definitions

  • the invention relates to a lock cylinder with a cylinder core rotatable in a lock housing and with tumblers which can be pushed into a release position from a core and housing bridging position by a key which can be inserted into a key channel of the cylinder core, and with at least one the lock housing and the cylinder core and the Key channel in the cylinder core penetrating hole, in which a radiation source, for example an infrared transmission diode for transmitting a signal, and opposite this a sensor is provided, to which a receiver and a comparison circuit for comparing a signal caused by recesses in the key by stopping the beam path when plugged in with a or several code signals which can be stored in at least one code memory is connected downstream, an electromagnetic interlock in the lock cylinder or in a mortise lock being connected to the comparison circuit sen and only one sensor is provided and two threshold values are set in the receiver for the analog signal arriving from this sensor and obtained only from a signal track of the key, and the signals detected above the lower
  • Access control systems which operate on the basis of punched card codes or with magnetic track codes.
  • a punch card or check card replaces the key.
  • Electronic or mechanical readers determine the card code and, based on the target / actual comparison with the stored codes, derive the cardholder's possible blocking authorization.
  • the key spine of a flat key for a cylinder lock bears marks in the form of incisions, the position of which relative to one another results in the code which, in addition to the mechanical locking mechanism, controls an electromechanical locking device.
  • Lock cylinders are also known which, in addition to the mechanical pin tumblers, have an electronic locking level.
  • the key is coded in addition to the variation criteria of the key profile and the toothing in such a way that a target / actual comparison is carried out electronically on the lock side after code recognition.
  • Such a lock therefore only locks when the key profile fits into the key channel, when the toothing moves the core and housing pins of the cylinder into the parting area between the core and the housing and when code correspondence between the key and the lock has been determined.
  • the specialist literature reveals active key systems, static passive key systems and dynamic passive key systems. In the active key systems, a transmitter is provided in the key, which sends a code to the lock for comparison with the lock-side code.
  • Static passive key systems include a key with marks such as notches or bores, which are scanned as soon as the key is fully inserted into the lock and at least briefly comes into contact with the builder. The snapshot of the coding is subjected to the target / actual comparison, which then leads to unlocking if there is a match.
  • the key code is successively removed during the insertion movement as it slides past reading heads, one after the other incoming signals are stored and the memory content is then subjected to a target comparison.
  • Typical representatives of the aforementioned active key systems can be found in DE-OSen 30 05 890, 29 22 230 and 30 06 128.
  • Transmitters are housed in the key, the code of which can be reprogrammed or changed by a random number generator in synchronism with the lock code during each locking process. These systems are not only complex, but also prone to malfunction due to the wireless transmission path.
  • DE-OS 1 553 363 relates to a static passive key system.
  • the key which has a perforated pattern, is inserted into the key channel.
  • One key side is illuminated over the entire area. Light only passes through in the hole positions and activates photocells that trigger the unlocking process.
  • This system requires a large-area light source and a large number of photocells, so that this construction is not suitable for adapting conventional cylinder locks.
  • Static passive systems are also shown in DE-OS 29 25 214 and DE-AS 25 16 283. While in the first case, when the key is in the idle state, a key hole pattern lies between a large-area radiation source and a chain of light-sensitive elements of the lock, it is in second case notches in the key back. All such static passive key systems require large-volume fittings in the lock, which, as mentioned, preclude the adaptation of existing, highly specialized locking cylinders.
  • a dynamic passive key system is known from CH-PS 640 297.
  • the key itself has at least two code tracks on a non-mechanical basis, from which when inserted into the key channel by means of at least two lock-side read heads, clock information and code information associated with the clocks are derived.
  • the clock information is required because every person inserts the key at different speeds and the insertion speed does not keep constant over the entire depth of the key channel.
  • the effort with two tracks and associated with two or even four reading heads is great, in particular the reading heads require a lot of electrical energy.
  • a security system of the latter category is known from EP-A-0 391 929.
  • Flat keys are used whose beard profile is optically scanned.
  • a special embodiment also provides for scanning bores which are provided one behind the other in the direction of insertion in the beard area and which have different diameters in order to distinguish between clock and code signals.
  • the invention is based on such a system, which aims at a particularly practical coding, in particular recoding of the key-lock combination in the event of a key loss or a change in the locking hierarchy.
  • the electronic criteria should be unconditionally superimposed on a high-quality key-lock combination on a cylinder basis, so that in particular the diversity of variations is increased and changes can also be made retrospectively regarding the locking authorization on site without replacing the lock.
  • This object is achieved by the teaching given in the characterizing part of claim 1.
  • the systems of the effective recoding can be used to increase the security of a single cylinder as well as for the flexible design of a locking system and for the immediate assignment and withdrawal of blocking authorizations for the single cylinder as well as for the system.
  • the electronics scanning the mechanical code of the key ensure an enormous increase in variation and flexibility.
  • the lock code changes cyclically without additional effort as soon as a new key is inserted, for example if the old key is lost becomes. The previously valid lock code will become ineffective.
  • An advantage of this system is therefore that such a locking cylinder can be reprogrammed by the owner himself at any time.
  • the code memory can be switched through to the receiver for programming or reprogramming key codes by means of a predetermined control code, for example a programming key. This makes the code memory accessible.
  • a programmable memory can be provided, which deletes all previously entered codes when a programming key is inserted and is briefly open for reprogramming by successively inserting all of the keys authorized to lock.
  • programming can also be ended by inserting the program key again. If, for example, a key is given to a craftsman for a short period of time, the blocking authorization for this key can be revoked at night, at the weekend or after work has ended.
  • the code memory has memory locations, the codes of which can be entered individually by means of a pluggable or optically or inductively coupled programming device.
  • the programming device can individually access the memory locations of this code memory.
  • a clock chip can be assigned to the code memory, so that certain blocking authorizations can take place as a function of time. For example, employees' office keys can only be locked on weekdays between 8 and 6 p.m.
  • the watch chip may also be connected to an event log that includes every attempt to lock, including of the key code, registered under the time and date.
  • the event memory can be read out by means of optical, inductive coupling or via a plug by means of a reader, at most with a printer.
  • a special embodiment is characterized in that the radiation source and the sensor are provided in a rosette which can be pushed over the locking cylinder. It is also advantageous if the energy of the radiation source via isolated mounting screws in the rosette from a battery in a housing, which is preferably designed as part of a long plate of the fitting opposite the rosette, as well as the received signal from the sensor via these mounting screws in the housing provided receiver and then the comparison circuit can be fed.
  • Fig. 1 shows a schematic representation of the lock area of a door with mortise lock and lock cylinder together with a block diagram for the functional representation
  • Fig. 2 shows the lock cylinder together with a rosette in front view
  • Fig. 3 shows a key.
  • a standard lock cylinder 1 is inserted in a mortise lock 2 of a door 3.
  • the lock cylinder 1 has a bore 4 which passes through the lock housing 5 and the cylinder core 6 and the key signal 7.
  • a rosette 8 is slid over the part of the locking cylinder 1 projecting outward beyond the door surface, in which a bore is also provided, which is aligned with the bore 4 in the locking cylinder.
  • In the rosette bore there is on the one hand an infrared transmitter diode 9 and on the other hand an infrared sensor 10, the signal of which is fed to a receiver 11.
  • the incoming signal is compared in receiver 11 with two threshold values. If the lower threshold is exceeded, the receiver recognizes a clock signal; if the upper threshold is also exceeded, then a code signal ("1") is present.
  • the bores 13, 14 provided in the key bit, 15, 16, 17, 18, 19 and 20 the infrared beam between the transmitter diode 9 and the sensor 10.
  • the sensor emits signals of different strengths which result in a clock sequence 21 and lead a code sequence 22.
  • the latter represents the electronic image of the mechanical hole track 13 to 20.
  • the holes 14, 15 and 17, that is to say the second, third and fifth holes are larger in cross section than the other holes. The cross-sectional difference does not have to relate to the bore diameter, but concerns the effective dimming of the infrared beam.
  • holes of the same size could also be used, which are offset in height for a smaller passage cross-section compared to the central axis of the infrared beam on the key.
  • the bores could also run obliquely to the axis of the light beam in the key bit.
  • the passage cross-section effective for the dimming can also be influenced thereby.
  • all bores 13 to 20 give a signal when the key 12 is inserted into the key channel 7, which signal lies above the lower threshold of the receiver 11. This is indicated by eight clock pulses from clock track 21.
  • the larger passage cross section of the key bores 14, 15 and 17 results in a signal of higher amplitude, which not only exceeds the lower but also the upper threshold in the receiver 11. Opposite the clock track 21, these signals are at the clock positions two, three and five.
  • the code for key 12 is therefore 01101000.
  • the determined code is compared in a comparison circuit 23 with a target code. If the code matches, an electromagnetic lock 25 is lifted via a line 24, which acts in the mortise lock on the bolt or the bolt mechanism or in the lock cylinder on the cylinder core, the locking lug or the coupling between the cylinder core and locking lug.
  • the target code or codes that is to say those codes which lead to the unlocking of the electromechanical locking mechanism, are contained in FIG. 1 in three memories or memory groups, which in a practical case Execution can be realized together or alternatively.
  • the code memory 26 comprises three target codes (C1, C2, C3), of which only the first code C1 is initially effectively compared to the actual code performed via the code track 22 to the comparison circuit 23. As soon as a key with the code C2 is inserted into the key channel 7, the code C2 is activated. C1 and C3 are ineffective.
  • a freely reprogrammable memory 27 can be provided which contains the codes C n as target codes.
  • the memory 27 can be opened for reprogramming by a code key, the code of which is compared with a special code K of a read-only memory 29 in the comparison circuit 28. If the key code of the programming key matches K, then a signal is sent to the code memory 27 or all codes of the keys subsequently inserted are stored in the memory 27. All original codes can be deleted for the time being, or the memory locations can be reassigned in sequence.
  • the memory 27 can be opened, for example, for 2 minutes for reprogramming or reprogramming. This is indicated by a clock chip 30 and the dashed operative connection to the memory 27.
  • the reprogramming phase can also be ended by inserting the programming key again.
  • a third memory system comprises memories 31, 32, 33 and 34, the memory locations of which can be specifically accessed.
  • a programming device 35 is provided, which is connected to the storage system via induction coils 36, 37.
  • the aforementioned storage system allows the locking authorization to be coupled with a period of time, as is shown by the dashed active connection between the clock chip 30 and the memory 31.
  • An event memory 38 is also provided, which records all incoming codes simultaneously with the date and time (control lines 39, 40). Furthermore, it is also recorded whether the code has released the electromechanical locking mechanism 25.
  • the event memory 38 can be read out via an inductive coupling 41, 42 by means of a display device 43 at most with a log printer 44.
  • the circuit has a battery 45 for energy supply, only one circuit to the infrared red diode being symbolically shown in FIG. 1.
  • the battery 45 can be charged by means of an inductively coupled AC voltage via a rectified charger 46.
  • the voltage supply can also take place without a battery, for example only with buffering via a capacitor with high capacitance via inductive coupling from the network with the interposition of a transformer (bell transformer).
  • a single, common induction coil can be used for the inductive coupling of the programming device 35, the reading device 43, and the external voltage.
  • a beep sounds as a signal for a positive code comparison by connecting an acoustic detector to line 24.
  • the beep is no longer used as a warning and that the battery will be replaced as soon as possible should.
  • voltage could be applied from the outside via the inductance (e.g. charging the aforementioned capacitor). Even if the voltage of the battery drops, the entire electronic system can be deactivated, so that only the mechanical locking criteria of a conventional locking cylinder are available for security and locking.
  • the mortise lock can be designed as a panic lock, ie the bolt can be withdrawn with the inside handle.
  • the inside handle is decoupled from a possible outside handle. While unlocking and locking from the outside of the door the agreement of the electronically mechanical code requires, the mechanical unlocking of the locking cylinder is sufficient for locking from the inside in one embodiment. "Unlocking" is done from the inside using the handle.
  • a rosette with an infrared light barrier can also be provided on the inside of the door or lock.
  • the eight-digit code was only mentioned in the exemplary embodiment. In practice, codes of 14 and more digits can be used, for example four digits being used to represent a checksum. This means that the read code can be checked and a reading error can even be corrected.
  • a groove can be provided on both sides of the key bit, in the bottom of which the bores 13 to 20 lie. In this case, the grooves can be poured out so that the potting compound does not protrude over the surface of the key bit.

Landscapes

  • Lock And Its Accessories (AREA)
  • Pens And Brushes (AREA)
  • Chairs Characterized By Structure (AREA)
  • Fluid-Damping Devices (AREA)
  • Bidet-Like Cleaning Device And Other Flush Toilet Accessories (AREA)

Abstract

A lock cylinder (1) carries a bore (4) passing through the cylinder housing (5), the cylinder core (6) and the key channel (3). A radiation source (9) and a sensor (10) are provided in a rose (8) or in another component surrounding the lock cylinder (1). Electronic signals of different amplitudes are generated by bores (13 to 20) of differing size which are located in the key bit of a flat key (12) and which fade out the beam path in the bore (4) of the lock cylinder. These signals are divided in a receiver (11) into a clock track (21) and a code track (22) by means of two threshold values. The code resulting from this is compared in a comparator circuit (23) with at least one desired code of one or more code stores (26, 27, 31, 32, 33, 34). When the codes correspond, the release of an electromechanical blocking mechanism (25) additionally provided takes place. One code store (26) contains a cyclically activatable sequence of codes (C1, C2, C3), a further store (27) is freely programmable (Cn) after the insertion of a programming key into the lock, and a third store (31 to 34) allows individual direct access to the storage locations (C10, C20, C30, ... Ci) by means of a programming unit (35). <IMAGE>

Description

Die Erfindung betrifft einen Schließzylinder mit einem in einem Schloßgehäuse drehbaren Zylinderkern und mit Zuhaltungen, die durch einen in einem Schlüsselkanal des Zylinderkernes einschiebbaren Schlüssel aus einer Kern und Gehäuse überbrückenden Lage in eine Freigabestellung schiebbar sind, und mit mindestens einer das Schloßgehäuse und den Zylinderkern sowie den Schlüsselkanal im Zylinderkern durchsetzenden Bohrung, in der eine Strahlenquelle, beispielsweise eine Infrarotsendediode zum Durchsenden eines Signals, und dieser gegenüberliegend ein Sensor vorgesehen ist, dem ein Empfänger und eine Vergleichsschaltung zum Vergleich eines von Ausnehmungen des Schlüssels durch Abblenden des Strahlenganges beim Einstecken hervorgerufenen Signals mit einem oder mehreren in mindestens einem Codespeicher abspeicherbaren Codesignalen nachgeschaltet ist, wobei an die Vergleichsschaltung eine elektromagnetische Verriegelung im Schließzylinder oder in einem Einstemmschloß angeschlossen ist und wobei nur ein einziger Sensor vorgesehen ist und im Empfänger zwei Schwellenwerte für das von diesem Sensor einlangende und lediglich aus einer Signalspur des Schlüssels gewonnene analoge Signal eingestellt sind, und die oberhalb der unteren Schwelle festgestellten Signale Taktsignale (Taktspur )und die oberhalb der oberen Schwelle festgestellten Signale Codesignale (Codespur ) sind, die als getakteter Code an die Vergleichsschaltung angeschlossen sind, an deren zweiten Eingang mindestens ein Codespeicher liegt.The invention relates to a lock cylinder with a cylinder core rotatable in a lock housing and with tumblers which can be pushed into a release position from a core and housing bridging position by a key which can be inserted into a key channel of the cylinder core, and with at least one the lock housing and the cylinder core and the Key channel in the cylinder core penetrating hole, in which a radiation source, for example an infrared transmission diode for transmitting a signal, and opposite this a sensor is provided, to which a receiver and a comparison circuit for comparing a signal caused by recesses in the key by stopping the beam path when plugged in with a or several code signals which can be stored in at least one code memory is connected downstream, an electromagnetic interlock in the lock cylinder or in a mortise lock being connected to the comparison circuit sen and only one sensor is provided and two threshold values are set in the receiver for the analog signal arriving from this sensor and obtained only from a signal track of the key, and the signals detected above the lower threshold clock signals (clock track) and those above the Upper threshold detected signals are code signals (code track), which are connected as a clocked code to the comparison circuit, at the second input of which there is at least one code memory.

Bei Einzelschlössern besteht der Wunsch, etwa bei Verlust oder Diebstahl eines Schlüssels den Schließzylinder umprogrammieren zu können. Bei den bekannten Ausführungen führt das Anstecken eines Schlüssels einer zweiten Schlüsselgarnitur zum Umordnen der mechanischen Zuhaltungsstifte, wodurch die Umprogrammierung vollzogen ist und mit den Schlüssein der ersten Schlüsselgarnitur nicht mehr gesperrt werden kann. Ein vielfaches Umprogrammieren ist bei diesen Ausführungen nicht möglich.In the case of individual locks, there is a desire to be able to reprogram the locking cylinder if a key is lost or stolen. In the known designs, the insertion of a key of a second key set leads to the rearrangement of the mechanical tumbler pins, as a result of which the reprogramming is carried out and can no longer be locked with the keys in the first key set. Multiple reprogramming is not possible with these versions.

Bei Schließanlagen ist es oftmals erforderlich, Sperrberechtigungen zu ändern, also etwa Einschränkungen oder Erweiterungen vorzunehmen. Dies erfordert den Austausch von Schließzylindern und ist in vielen Fallen nur durch Austausch der gesamten Schließanlage möglich.With locking systems, it is often necessary to change locking authorizations, i.e. to make restrictions or extensions. This requires the exchange of locking cylinders and in many cases is only possible by replacing the entire locking system.

Es sind ferner Zutrittskontrollsysteme bekannt, die auf der Basis von Lochkartencodes oder mit Magnetspurcodes arbeiten. Eine Lochkarte oder Scheckkarte ersetzt dabei den Schlüssel. Elektronische oder mechanische Lesegeräte stellen den Kartencode fest und leiten nach Soll-Istvergleich mit den eingespeicherten Codes die eventuelle Sperrberechtigung des Karteninhabers ab. Bei einer bekannten Ausführung trägt der Schlüsselrücken eines Flachschlüssels für ein Zylinderschloß Marken in Form von Einschnitten, deren Lage zueinander den Code ergeben, der zusätzlich zum mechanischen Gesperre eine elektromechanische Zuhaltung steuert.Access control systems are also known which operate on the basis of punched card codes or with magnetic track codes. A punch card or check card replaces the key. Electronic or mechanical readers determine the card code and, based on the target / actual comparison with the stored codes, derive the cardholder's possible blocking authorization. In a known embodiment, the key spine of a flat key for a cylinder lock bears marks in the form of incisions, the position of which relative to one another results in the code which, in addition to the mechanical locking mechanism, controls an electromechanical locking device.

Ferner sind Schließzylinder bekannt, die zusätzlich zu den mechanischen Stiftzuhaltungen über eine elektronische Sperrebene verfügen. Dazu ist der Schlüssel neben den Variationskriterien des Schlüsselprofils und der Zahnung noch derart codiert, daß schloßseitig nach Codeerkennung ein Soll-Istverlgeich elektronisch durchgeführt wird. Ein solches Schloß sperrt somit erst dann, wenn das Schlüsselprofil in den Schlüsselkanal paßt, wenn die Zahnung die Kern- und Gehäusestifte des Zylinders in die Teilungsfläche zwischen Kern und Gehäuse verschiebt und wenn Codeübereinstimmung zwischen Schlüssel und Schloß festgestellt wurde. Die Fachliteratur läßt Aktivschlüsselsysteme, statische Passivschlüsselsysteme und dynamische Passivschlüsselsysteme erkennen. Bei den Aktivschlüsselsystemen ist im Schlüssel ein Sender vorgesehen, der einen Code an das Schloß zum Vergleich mit dem schloßseitigen Code aussendet. Statische Passivschlüsselsysteme umfassen einen Schlüssel mit Marken wie Kerben oder Bohrungen, die abgetastet werden, sobald der Schlüssel in das Schloß vollständig eingesteckt und wenigstens kurzzeitig in Buhelage gekommen ist. Die Momentaufnahme der Codierung wird dem Soll-Istvergleich unterworfen, der dann bei Übereinstimmung zur Entriegelung führt. Bei dem dynamischen Passivschlüsselsystem wird der Schlüsselcode sukzessive während der Einschubbewegung beim Vorbeigleiten an Leseköpfen abgenommen, die seitlich nacheinander einlangenden Signale gespeichert und der Speicherinhalt sodann einem Sollvergleich unterzogen.Lock cylinders are also known which, in addition to the mechanical pin tumblers, have an electronic locking level. For this purpose, the key is coded in addition to the variation criteria of the key profile and the toothing in such a way that a target / actual comparison is carried out electronically on the lock side after code recognition. Such a lock therefore only locks when the key profile fits into the key channel, when the toothing moves the core and housing pins of the cylinder into the parting area between the core and the housing and when code correspondence between the key and the lock has been determined. The specialist literature reveals active key systems, static passive key systems and dynamic passive key systems. In the active key systems, a transmitter is provided in the key, which sends a code to the lock for comparison with the lock-side code. Static passive key systems include a key with marks such as notches or bores, which are scanned as soon as the key is fully inserted into the lock and at least briefly comes into contact with the builder. The snapshot of the coding is subjected to the target / actual comparison, which then leads to unlocking if there is a match. With the dynamic passive key system, the key code is successively removed during the insertion movement as it slides past reading heads, one after the other incoming signals are stored and the memory content is then subjected to a target comparison.

Typische Vertreter der vorgenannten Aktivschlüsselsysteme sind den DE-OSen 30 05 890, 29 22 230 und 30 06 128 zu entnehmen. Es sind jeweils Sender im Schlüssel untergebracht, deren Code umprogrammierbar ist oder durch einen Zufallsgenerator bei jedem Sperrvorgang synchron mit dem Schloßcode verändert wird. Diese Systeme sind nicht nur aufwendig, sondern infolge der drahtlosen Übertragungsstrecke auch störungsanfällig.Typical representatives of the aforementioned active key systems can be found in DE-OSen 30 05 890, 29 22 230 and 30 06 128. Transmitters are housed in the key, the code of which can be reprogrammed or changed by a random number generator in synchronism with the lock code during each locking process. These systems are not only complex, but also prone to malfunction due to the wireless transmission path.

Die DE-OS 1 553 363 betrifft ein statisches Passivschlüsselsystem. Der Schlüssel der über ein Lochmuster verfügt, wird in den Schlüsselkanal eingeschoben. Die eine Schlüsselseite wird über die gesamte Fläche beleuchtet. Licht tritt nur in den Lochpositionen durch und aktiviert Fotozellen, die den Entriegelungsvorgang auslösen. Dieses System erfordert eine großflächige Lichtquelle und eine Vielzahl von Fotozellen, sodaß diese Konstruktion etwa zur Adaption herkömmlicher Zylinderschlösser ausscheidet.DE-OS 1 553 363 relates to a static passive key system. The key, which has a perforated pattern, is inserted into the key channel. One key side is illuminated over the entire area. Light only passes through in the hole positions and activates photocells that trigger the unlocking process. This system requires a large-area light source and a large number of photocells, so that this construction is not suitable for adapting conventional cylinder locks.

Statische Passivsysteme zeigen auch die DE-OS 29 25 214 und die DE-AS 25 16 283. Während im ersten Fall im Ruhezustand des eingeschobenen Schlüssels ein Lochmuster des Schlüssels zwischen einer großflächigen Stahlungsquelle und einer Kette von lichtempfindlichen Elementen des Schlosses liegt, sind es im zweiten Fall Kerben im Schlüsselrücken. Alle derarigen statischen Passivschlüsselsysteme verlangen großvolumige Einbauten im Schloß, die, wie erwähnt, eine Adaptierung vorhandener hochspezialisierter Schließzylinder ausschließen.Static passive systems are also shown in DE-OS 29 25 214 and DE-AS 25 16 283. While in the first case, when the key is in the idle state, a key hole pattern lies between a large-area radiation source and a chain of light-sensitive elements of the lock, it is in second case notches in the key back. All such static passive key systems require large-volume fittings in the lock, which, as mentioned, preclude the adaptation of existing, highly specialized locking cylinders.

Aus der CH-PS 640 297 ist ein dynamisches Passivschlüsselsystem bekannt. Der Schlüssel selbst verfügt über mindestens zwei Codespuren auf nicht mechanischer Grundlage, auswelchen beim Einschieben in den Schlüsselkanal mittels mindestens zweier schloßseitiger Leseköpfe eine Taktinformation und den Takten zugeordnet eine Codeinformation abgeleitet wird. Die Taktinformation ist erforderlich, weil jeder Mensch den Schlüssel mit unterschiedlicher Geschwindigkeit einschiebt und die Einschubgeschwindigkeit auch keineswegs über die gesamte Tiefe des Schlüsselkanals konstant hält. Der Aufwand bei zwei Spuren und damit verbunden bei zwei oder gar vier Leseköpfen ist groß, insbesondere erfordern die Leseköpfe viel elektrische Energie.A dynamic passive key system is known from CH-PS 640 297. The key itself has at least two code tracks on a non-mechanical basis, from which when inserted into the key channel by means of at least two lock-side read heads, clock information and code information associated with the clocks are derived. The clock information is required because every person inserts the key at different speeds and the insertion speed does not keep constant over the entire depth of the key channel. The effort with two tracks and associated with two or even four reading heads is great, in particular the reading heads require a lot of electrical energy.

Aus der EP-A-0 391 929 ist ein Sicherheitssystem der letztgenannten Kategorie bekannt. Es werden Flachschlüssel verwendet deren Bartprofil optisch abgetastet wird. Eine besondere Ausführung sieht auch eine Abtastung von Bohrungen vor, die im Bartbereich in Einschubrichtung hintereinander vorgesehen sind und zur Unterscheidung von Takt- und Codesignalen unterschiedlich groß im Durchmesser ausgeführt wurden. Beim Einschieben des Schlüssels in einen Schlüsselkanal wird ein quer zum Kanal orientierter Lichtstrahl wiederholt unterbrochen bzw. abgeblendet, sodaß ein Sensor eine Folge von Impulsen erfaßt. Das Vorhandensein von Impulsen einerseits und das Überschreiten einer Schwelle anderseits führt zur Differenzierung zwischen einem Takt und einem davon abgeleiteten Code. Von einem solchen System geht die Erfindung aus, die auf eine besonders praxisgerechte Codierung, insbesondere Umcodierung der Schlüssel-Schloßkombination bei Schlüsselverlust oder Änderung der Sperrhierachie abzielt. Die elektronischen Kriterien sollen einer hochwertigen Schlüssel-Schloßkombination auf Zylinderbasis bedingungslos überlagerbar sein, damit insbesondere die Variationsvielfalt gesteigert wird und auch nachträglich Änderungen bezüglich der Sperrberechtigung vor Ort ohne Austausch des Schlosses vorgenommen werden können. Diese Aufgabe wird erfindungsgemäß durch die im Kennzeichen des Anspruchs 1 gegebene Lehre gelöst. Die Systeme der wirksamen Umcodierung können zur Erhöhung der Sicherheit eines Einzelzylinders ebenso eingesetzt werden, wie zur flexiblen Gestaltung einer Schließanlage und für die sofortige Zuteilung und den Entzug von Sperrberechtigungen beim Einzelzylinder ebenso wie bei der Anlage. Während die Sicherheit vor Gewaltanwendung von dem mechanischen Gesperre übernommen wird, gewährleistet die den mechanischen Code des Schlüssels abtastende Elektronik einen enormen Variationszuwachs sowie Flexibilität. Ohne zusätzlichen Aufwand ändert sich der Schloßcode in zyklischer Folge, sobald ein neuer Schlüssel, etwa bei Verlust des alten Schlüssels, angesteckt wird. Der bisher gültige Schloßcode wird dadurch unwirksam. Ein Vorteil dieses Systems liegt somit darin, daß ein derartiger Schließzylinder vom Wohnungsinhaber selbst den Bedürfnissen nach jederzeit selbst umprogrammierbar ist. Alternativ oder ergänzend dazu kann der Codespeicher zur Ein- bzw. Umprogrammierung von Schlüsselcodes durch einen vorbestimmten Steuercode beispielsweise eines Probrammierschlüssels an den Empfänger durchschaltbar sein. Dadurch wird der Codespeicher zugänglich. Es kann ein programmierbarer Speicher vorgesehen sein, der bei Einstecken eines Programmierschlüssels alle bisher eingegebenen Codes löscht und kurzzeitig für eine Neuprogrammierung durch aufeinanderfolgendes Einstecken aller sperrberechtigten Schlüssel offen ist. Die Programmierung kann außer zeitlimitiert auch durch neuerliches Einstecken des Programmschlüssels beendet werden. Wenn etwa einem Handwerker ein Schlüssel kurzzeitig überlassen wird, dann kann die Sperrberechtigung dieses Schlüssels nachts, am Wochenende oder nach Beendigung der Arbeit entzogen werden. Bei der dazu besonders geeigneten Ausführungsform weist der Codespeicher Speicherplätze auf, deren Codes mittels eines ansteckbaren oder optisch bzw. induktiv koppelbaren Programmiergerätes individuell eingebbar sind. Selbst wenn der Handwerker oder ein während der eigenen Abwesenheit den Schlüssel innehabender Nachbar diesen verliert, dann ist lediglich der Code des verlorenen Schlüssels durch das Programmiergerät aus dem Signalspeicher zu löschen. Selbst bei übereinstimmender Zahnung und Profilierung, die zu einem Überwinden der mechanischen Zuhaltungen führen würde, sperrt das Schloß nun mit diesem Schlüssel - sollte er in falsche Hände geraten sein - nicht.A security system of the latter category is known from EP-A-0 391 929. Flat keys are used whose beard profile is optically scanned. A special embodiment also provides for scanning bores which are provided one behind the other in the direction of insertion in the beard area and which have different diameters in order to distinguish between clock and code signals. When the key is inserted into a key channel, a light beam oriented transversely to the channel is repeatedly interrupted or dimmed, so that a sensor detects a sequence of pulses. The presence of pulses on the one hand and the crossing of a threshold on the other hand leads to the differentiation between a clock and a code derived from it. The invention is based on such a system, which aims at a particularly practical coding, in particular recoding of the key-lock combination in the event of a key loss or a change in the locking hierarchy. The electronic criteria should be unconditionally superimposed on a high-quality key-lock combination on a cylinder basis, so that in particular the diversity of variations is increased and changes can also be made retrospectively regarding the locking authorization on site without replacing the lock. This object is achieved by the teaching given in the characterizing part of claim 1. The systems of the effective recoding can be used to increase the security of a single cylinder as well as for the flexible design of a locking system and for the immediate assignment and withdrawal of blocking authorizations for the single cylinder as well as for the system. While the security against violence is taken over by the mechanical locking mechanism, the electronics scanning the mechanical code of the key ensure an enormous increase in variation and flexibility. The lock code changes cyclically without additional effort as soon as a new key is inserted, for example if the old key is lost becomes. The previously valid lock code will become ineffective. An advantage of this system is therefore that such a locking cylinder can be reprogrammed by the owner himself at any time. As an alternative or in addition to this, the code memory can be switched through to the receiver for programming or reprogramming key codes by means of a predetermined control code, for example a programming key. This makes the code memory accessible. A programmable memory can be provided, which deletes all previously entered codes when a programming key is inserted and is briefly open for reprogramming by successively inserting all of the keys authorized to lock. In addition to being time-limited, programming can also be ended by inserting the program key again. If, for example, a key is given to a craftsman for a short period of time, the blocking authorization for this key can be revoked at night, at the weekend or after work has ended. In the embodiment which is particularly suitable for this purpose, the code memory has memory locations, the codes of which can be entered individually by means of a pluggable or optically or inductively coupled programming device. Even if the handyman or a neighbor holding the key during his or her absence loses it, then the code of the lost key can only be deleted from the signal memory by the programming device. Even if the toothing and profiling match, which would lead to overcoming the mechanical tumblers, the lock does not lock with this key - should it have fallen into the wrong hands.

Auf die Speicherplätze dieses Codespeichers kann durch das Programmiergerät individuell zugegriffen werden. Dem Codespeicher kann ein Uhrenchip zugeordnet werden, sodaß gewisse Sperrberechtigungen zeitabhängig erfolgen können. So etwa können die Büroschlüssel der Angestellten nur wochentags zwischen 8 und 18 h sperrberechtigt sein. Das Uhrenchip kann auch an einen Ereignisspeicher angeschlossen sein, der jeden Sperrversuch, einschließlich des Schlüsselcodes, unter Uhrzeitangabe und Datum registriert. Der Ereignisspeicher kann durch optische, induktive Kopplung oder über einen Stecker mittels eines Lesegerätes allenfalls mit Drucker ausgelesen werden.The programming device can individually access the memory locations of this code memory. A clock chip can be assigned to the code memory, so that certain blocking authorizations can take place as a function of time. For example, employees' office keys can only be locked on weekdays between 8 and 6 p.m. The watch chip may also be connected to an event log that includes every attempt to lock, including of the key code, registered under the time and date. The event memory can be read out by means of optical, inductive coupling or via a plug by means of a reader, at most with a printer.

In konstruktiver Hinsicht ist eine besondere Ausführungsform dadurch gekennzeichnet, daß die Strahlenquelle und der Sensor in einer dem Schließzylinder überschiebbaren Rosette vorgesehen sind. Weiters ist vorteilhaft, wenn die Energie der Strahlenquelle über isoliert geführte Montageschrauben in der Rosette von einer Batterie in einem Gehäuse, das vorzugsweise als Teil eines Langschildes des der Rosette gegenüberliegenden Beschlages ausgebildet ist, wie auch das empfangene Signal des Sensors über diese Montageschrauben den im Gehäuse vorgesehenen Empfänger und sodann der Vergleichsschaltung zuführbar sind.In terms of design, a special embodiment is characterized in that the radiation source and the sensor are provided in a rosette which can be pushed over the locking cylinder. It is also advantageous if the energy of the radiation source via isolated mounting screws in the rosette from a battery in a housing, which is preferably designed as part of a long plate of the fitting opposite the rosette, as well as the received signal from the sensor via these mounting screws in the housing provided receiver and then the comparison circuit can be fed.

Ein Ausführungsbeispiel des Erfindungsgegenstandes ist in den Zeichnungen dargestellt.An embodiment of the subject of the invention is shown in the drawings.

Fig. 1 zeigt in schematischer Darstellung den Schloßbereich einer Tür mit Einstemmschloß und Schließzylinder zusammen mit einem Blockschaltbild zur Funktionsdarstellung, Fig. 2 den Schließzylinder zusammen mit einer Rosette in Frontansicht und Fig. 3 einen Schlüssel.Fig. 1 shows a schematic representation of the lock area of a door with mortise lock and lock cylinder together with a block diagram for the functional representation, Fig. 2 shows the lock cylinder together with a rosette in front view and Fig. 3 shows a key.

Ein serienmäßiger Schließzylinder 1 ist in einem Einstemmschloß 2 einer Tür 3 eingesetzt. Der Schließzylinder 1 trägt eine Bohrung 4, die das Schloßgehäuse 5 und den Zylinderkern 6 sowie den Schlüsselksnal 7 durchsetzt. Dem über die Türfläche nach außen überstehenden Teil des Schließzylinders 1 ist eine Rosette 8 überschoben, in welcher ebenfalls eine Bohrung vorgesehen ist, die mit der Bohrung 4 im Schließzylinder fluchtet. In der Rosettenbohrung liegt einerseits eine Infrarotsendediode 9 und anderseits ein Infrarotsensor 10, dessen Signal einem Empfänger 11 zugeführt wird. Im Empfänger 11 wird das ankommende Signal mit zwei Schwellenwerten verglichen. Wird die untere Schwelle überschritten, dann erkennt der Empfänger ein Taktsignal, wird auch die obere Schwelle überschritten, dann liegt ein Codesignal ("1") vor.A standard lock cylinder 1 is inserted in a mortise lock 2 of a door 3. The lock cylinder 1 has a bore 4 which passes through the lock housing 5 and the cylinder core 6 and the key signal 7. A rosette 8 is slid over the part of the locking cylinder 1 projecting outward beyond the door surface, in which a bore is also provided, which is aligned with the bore 4 in the locking cylinder. In the rosette bore there is on the one hand an infrared transmitter diode 9 and on the other hand an infrared sensor 10, the signal of which is fed to a receiver 11. The incoming signal is compared in receiver 11 with two threshold values. If the lower threshold is exceeded, the receiver recognizes a clock signal; if the upper threshold is also exceeded, then a code signal ("1") is present.

Beim Einschieben eines Schlüssels 12 (Fig. 3) in den Schlüsselkanal 7 takten die im Schlüsselbart vorgesehenen Bohrungen 13,14, 15, 16, 17, 18, 19 und 20 den Infrarotstrahl zwischen der Sendediode 9 und dem Sensor 10. Infolge der unterschiedlichen Bohrungsdurchmesser am Schlüssel 12 gibt der Sensor unterschiedlich starke Signale ab, die im Empfänger 11 infolge der vorgenannten Schwellen zu einer Taktfolge 21 und einer Codefolge 22 führen. Letztere stellt das elektronische Abbild der mechanischen Lochspur 13 bis 20 dar. Im Auführungsbeispiel sind die Bohrungen 14, 15 und 17, also die zweite, dritte und fünfte Bohrung im Querschnitt größer, als die übrigen Bohrungen. Der Querschnittsunterschied muß sich nicht auf den Bohrungsdurchmesser beziehen, sondern betrifft die wirksame Abblendung des Infrarotstrahls. So könnten auch jeweils gleich große Bohrungen verwendet werden, die für einen kleineren Durchtrittsquerschnitt gegenüber der Mittelalchse des Infrarotstrahles auf dem Schlüssel in der Höhe versetzt sind. Die Bohrungen könnten für unterschiedliche Abblendung des Infrarotstrahles auch schräg zur Achse des Lichtstrahles im Schlüsselbartverlaufen. Auch dadurch ist der für die Abblendung wirksame Durchtrittsquerschnitt beeinflußbar. Zurück zum Ausführungsbeispiel ergeben alle Bohrungen 13 bis 20 beim Einschieben des Schlüssels 12 in den Schlüsselkanal 7 ein Signal, das über der unteren Schwelle des Empfängers 11 liegt. Dieses wird durch acht Taktimpulse der Taktspur 21 angedeutet. Durch den größeren Durchtrittsquerschnitt der Schlüsselbohrungen 14, 15 und 17 ergibt sich jeweils ein Signal höherer Amplitude, das nicht nur die untere, sondern auch die obere Schwelle im Empfänger 11 übersteigt. Der Taktspur 21 gegenübergestellt liegen diese Signale auf den Taktpositionen zwei, drei und fünf. Der Code des Schlüssels 12 lautet daher 01101000.When a key 12 (FIG. 3) is inserted into the key channel 7, the bores 13, 14 provided in the key bit, 15, 16, 17, 18, 19 and 20 the infrared beam between the transmitter diode 9 and the sensor 10. As a result of the different bore diameters on the key 12, the sensor emits signals of different strengths which result in a clock sequence 21 and lead a code sequence 22. The latter represents the electronic image of the mechanical hole track 13 to 20. In the exemplary embodiment, the holes 14, 15 and 17, that is to say the second, third and fifth holes, are larger in cross section than the other holes. The cross-sectional difference does not have to relate to the bore diameter, but concerns the effective dimming of the infrared beam. Thus, holes of the same size could also be used, which are offset in height for a smaller passage cross-section compared to the central axis of the infrared beam on the key. For different dimming of the infrared beam, the bores could also run obliquely to the axis of the light beam in the key bit. The passage cross-section effective for the dimming can also be influenced thereby. Back to the exemplary embodiment, all bores 13 to 20 give a signal when the key 12 is inserted into the key channel 7, which signal lies above the lower threshold of the receiver 11. This is indicated by eight clock pulses from clock track 21. The larger passage cross section of the key bores 14, 15 and 17 results in a signal of higher amplitude, which not only exceeds the lower but also the upper threshold in the receiver 11. Opposite the clock track 21, these signals are at the clock positions two, three and five. The code for key 12 is therefore 01101000.

In einer Vergleichschaltung 23 wird der ermittelte Code mit einem Soll-Code verglichen. Bei Codeübereinstimmung wird über eine Leitung 24 eine elektromagnetische Verriegelung 25 ausgehoben, die im Einstemmschloß auf den Riegel oder die Riegelmechanik bzw. im Schließzylinder auf dem Zylinderkern, die Sperrnase oder die Kupplung zwischen Zylinderkern und Sperrnase wirkt.The determined code is compared in a comparison circuit 23 with a target code. If the code matches, an electromagnetic lock 25 is lifted via a line 24, which acts in the mortise lock on the bolt or the bolt mechanism or in the lock cylinder on the cylinder core, the locking lug or the coupling between the cylinder core and locking lug.

Der oder die Soll-Codes, also jene Codes, die zur Entriegelung des elektromechanischen Gesperres führen, sind in Fig. 1 in drei Speichern bzw. Speichergruppen enthalten, die bei einer praktischen Ausführung gemeinsam oder alternativ realisiert sein können. Der Codespeicher 26 umfaßt drei Sollcodes (C₁, C₂, C₃), von denen nur der erste Code C₁ vorerst wirksam dem über die Codespur 22 an die Vergleichsschaltung 23 geführten Ist-Code gegenübergestellt wird. Sobald ein Schlüssel mit dem Code C₂ in den Schlüsselkanal 7 gesteckt wird, erfolgt die Aktivierung des Codes C₂. C₁ und C₃ sind unwirksam. In der Praxis werden mit dem Schloßsystem drei Garnituren von Schlüsseln mitgeliefert, wobei bei Verlust oder Diebstahl eines Schlüssels der ersten Garnitur die mit C₁ codiert ist, die Umprogrammierung auf C₂ durch Anstecken eines Schlüssels der zweiten Garnitur erfolgt. Dieser Vorgang kann nochmals mit C₃ oder mehrmals wiederholt werden. Es ist eine zyklische Reihung möglich, die bei C₁ schließlich wieder beginnt.The target code or codes, that is to say those codes which lead to the unlocking of the electromechanical locking mechanism, are contained in FIG. 1 in three memories or memory groups, which in a practical case Execution can be realized together or alternatively. The code memory 26 comprises three target codes (C₁, C₂, C₃), of which only the first code C₁ is initially effectively compared to the actual code performed via the code track 22 to the comparison circuit 23. As soon as a key with the code C₂ is inserted into the key channel 7, the code C₂ is activated. C₁ and C₃ are ineffective. In practice, three sets of keys are supplied with the lock system, and if a key of the first set is lost or stolen, which is coded with C₁, the reprogramming to C₂ takes place by inserting a key of the second set. This process can be repeated with C₃ or several times. A cyclic sequence is possible, which finally starts again at C₁.

Alternativ oder zusätzlich kann ein frei umprogrammierbarer Speicher 27 vorgesehen sein, der die Codes Cn als Sollcodes enthält. Der Speicher 27 kann zur Umprogrammierung durch einen Codeschlüssel geöffnet werden, dessen Code in der Vergleichsschaltung 28 einen besonderen Code K eines Festspeichers 29 gegenübergestellt wird. Stimmt der Schlüsselcode des Programmierschlüssels mit K überein, dann erfolgt ein Signal an den Codespeicher 27 bzw. es werden unmittelbar alle Codes der nachfolgend eingesteckten Schlüssel in Speicher 27 abgelegt. Dabei können vorerst sämtliche ursprünglichen Codes gelöscht werden oder aber es erfolgt die Neubelegung der Speicherplätze der Reihe nach. Mit dem Einstecken eines Programmierschlüssels kann der Speicher 27 beispielsweise für 2 Minuten für das Umprogrammieren bzw. Neuprogrammieren geöffnet sein. Dies ist durch einen Uhrenchip 30 und die strichlierte Wirkverbindung zum Speicher 27 angedeutet. Die Phase der Umprogrammierung kann auch durch ein neuerliches Einstecken des Programmierschlüssels beendet werden.Alternatively or additionally, a freely reprogrammable memory 27 can be provided which contains the codes C n as target codes. The memory 27 can be opened for reprogramming by a code key, the code of which is compared with a special code K of a read-only memory 29 in the comparison circuit 28. If the key code of the programming key matches K, then a signal is sent to the code memory 27 or all codes of the keys subsequently inserted are stored in the memory 27. All original codes can be deleted for the time being, or the memory locations can be reassigned in sequence. When a programming key is inserted, the memory 27 can be opened, for example, for 2 minutes for reprogramming or reprogramming. This is indicated by a clock chip 30 and the dashed operative connection to the memory 27. The reprogramming phase can also be ended by inserting the programming key again.

Ein drittes Speichersystem umfaßt Speicher 31, 32, 33 und 34 auf deren Speicherplätze gezielt zugegriffen werden kann. Dazu ist ein Programmiergerät 35 vorgesehen, das über Induktionsspulen 36, 37 an das Speichersystem angeschlossen ist. Das vorgenannte Speichersystem erlaubt die Kopplung der Sperrberechtigung mit einer Zeitspanne, wie dies durch die strichlierte Wirkverbindung zwischen dem Uhrenchip 30 und dem Speicher 31 dargestellt ist.A third memory system comprises memories 31, 32, 33 and 34, the memory locations of which can be specifically accessed. For this purpose, a programming device 35 is provided, which is connected to the storage system via induction coils 36, 37. The aforementioned storage system allows the locking authorization to be coupled with a period of time, as is shown by the dashed active connection between the clock chip 30 and the memory 31.

Es ist ferner noch ein Ereignisspeicher 38 vorgesehen, der sämtliche einlangende Codes gleichzeitig mit Datum und Uhrzeit festhält (Steuerleitungen 39, 40). Ferner wird auch aufgezeichnet, ob der Code zu einer Aufhebung des elektromechanischen Gesperres 25 geführt hat. Der Ereignisspeicher 38 kann über eine induktive Ankopplung 41, 42 mittels eines Anzeigegerätes 43 allenfalls mit Protokolldrucker 44 ausgelesen werden.An event memory 38 is also provided, which records all incoming codes simultaneously with the date and time (control lines 39, 40). Furthermore, it is also recorded whether the code has released the electromechanical locking mechanism 25. The event memory 38 can be read out via an inductive coupling 41, 42 by means of a display device 43 at most with a log printer 44.

Zur Energieversorung verfügt die Schaltung über eine Batterie 45, wobei in Fig. 1 symbolisch nur ein Stromkreis zur Infratrotsendediode dargestellt ist. Die Batterie 45 kann mittels einer induktiv angekuppelten Wechselspannung über ein gleichgerichtetes Ladegerät 46 aufgeladen werden. Die Spannungsversorgung kann auch ohne Batterie, beispielsweise nur mit einer Pufferung über einen Kondensator mit hoher Kapazität über die induktive Kopplung aus dem Netz unter Zwischenschaltung eines Transformators (Klingeltransformators) erfolgen. Zur induktiven Ankopplung des Programmiergerätes 35, des Lesegerätes 43, und der Fremdspannung kann eine einzige, gemeinsame Induktionsspule verwendet werden.The circuit has a battery 45 for energy supply, only one circuit to the infrared red diode being symbolically shown in FIG. 1. The battery 45 can be charged by means of an inductively coupled AC voltage via a rectified charger 46. The voltage supply can also take place without a battery, for example only with buffering via a capacitor with high capacitance via inductive coupling from the network with the interposition of a transformer (bell transformer). A single, common induction coil can be used for the inductive coupling of the programming device 35, the reading device 43, and the external voltage.

Wird die Batterie 45 verwendet, dann erfolgt ein Piepston als Signal für einen positiven Codevergleich durch Anschluß eines akustischen Melders an die Leitung 24. Sobald die Spannung unter einen gewissen voranstellbaren Wert absinkt, entfällt der Piepston als Warnung und Hinweis, daß baldmöglichst die Batterie ausgetauscht werden soll. Im Notfall könnte Spannung von außen über die Induktivität angelegt werden (z. B. Aufladung des vorgenannten Kondensators). Es kann auch bei Absinken der Spannung der Batterie das gesamte elektronische System unwirksam geschaltet werden, sodaß nurmehr die mechanischen Schloßkriterien eines üblichen Schließzylinders für Sicherheit und Sperrvorgang zur Verfügung stehen.If the battery 45 is used, then a beep sounds as a signal for a positive code comparison by connecting an acoustic detector to line 24. As soon as the voltage drops below a certain value that can be predicted, the beep is no longer used as a warning and that the battery will be replaced as soon as possible should. In an emergency, voltage could be applied from the outside via the inductance (e.g. charging the aforementioned capacitor). Even if the voltage of the battery drops, the entire electronic system can be deactivated, so that only the mechanical locking criteria of a conventional locking cylinder are available for security and locking.

Das Einstemmschloß kann als Panikschloß ausgebildet sein, d.h., daß mit dem Innendrücker der Riegel zurückgezogen werden kann. Der Innendrücker ist dabei von einem eventuellen Außendrücker entkoppelt. Während das Auf- und Zusperren von der Türaußenseite die Übereinstimmung des elektronisch mechanischen Codes verlangt, genügt für das Zusperren von der Innenseite bei einer Ausführungsform die mechanische Entriegelung des Schließzylinders. Das "Aufsperren" erfolgt von der Innenseite über den Drücker. Natürlich kann bei beidseitig gewünschter erhöhter Sicherheit auch an der Tür- bzw. Schloßinnenseite eine Rosette mit einer Infrarotlichtschranke vorgesehen sein.The mortise lock can be designed as a panic lock, ie the bolt can be withdrawn with the inside handle. The inside handle is decoupled from a possible outside handle. While unlocking and locking from the outside of the door the agreement of the electronically mechanical code requires, the mechanical unlocking of the locking cylinder is sufficient for locking from the inside in one embodiment. "Unlocking" is done from the inside using the handle. Of course, with increased security desired on both sides, a rosette with an infrared light barrier can also be provided on the inside of the door or lock.

Der achtstelligeCode wurde bloß im Ausführungsbeispiel genannt. Es können in der Praxis Codes von 14 und mehr Stellen verwendet werden, wobei beispielsweise vier Stellen zur Darstellung einer Checksumme herangezogen werden. Damit kann der abgelesene Code kontrolliert und ein Lesefehler sogar richtiggestellt werden.The eight-digit code was only mentioned in the exemplary embodiment. In practice, codes of 14 and more digits can be used, for example four digits being used to represent a checksum. This means that the read code can be checked and a reading error can even be corrected.

Es besteht ferner die Möglichkeit, die Bohrungen 13 bis 20 mit Kunststoff, der von dem Infrarotstrahl durchdrungen wird, zu vergießen. Beiderseits des Schlüsselbartes kann jeweils eine Nut vorgesehen sein, in deren Nutengrund die Bohrungen 13 bis 20 liegen. In diesem Fall können die Nuten ausgegossen werden, sodaß die Vergußmasse nicht über die Oberfläche des Schlüsselbartes hervortritt.There is also the possibility of potting the holes 13 to 20 with plastic, which is penetrated by the infrared beam. A groove can be provided on both sides of the key bit, in the bottom of which the bores 13 to 20 lie. In this case, the grooves can be poured out so that the potting compound does not protrude over the surface of the key bit.

Claims (3)

  1. Lock cylinder with a cylinder plug (6) that can be rotated in a lock case (5) and with levers that can be moved by a key (12), which can be inserted into a keyway (7) in the cylinder plug (6), from a position that bridges the plug and the case into a releasing position, and with a minimum of one bore (4) that penetrates the lock case (5) and the cylinder plug (6), as well as the keyway (7) in the cylinder plug (6), in which a radiation source, for example an infra-red transmitting diode (9) for the transmission of a signal, and a sensor (10) on the opposite side are provided, behind which a receiver (11) and a comparator circuit (23) are provided where a signal, which is generated when a key (12) is inserted, the recesses (13 - 20) of which dim the beam path, is compared to one or several code signals that can be stored in a minimum of one code memory (26, 27, 31 - 34), with an electromagnetic locking device (25) in the lock cylinder (1) or in a mortice lock (2) being connected to the comparator circuit, and with only one single sensor (10) being provided, while two threshold values are set in the receiver (11) for the analog signal that arrives from that sensor (10) and is obtained merely from one signal trace of the key (12), where the signals detected above the lower threshold value are timing pulses (timing trace 21), and where the signals detected above the upper threshold value are code pulses (code trace 22), which are connected to the comparator circuit (23) as a timed code, while a minimum of one code memory (26, 27, 31 - 34) is connected to the second input of the circuit, characterized in that the code memory (26) contains several codes (C₁, C₂, C₃), which can be retrieved cyclically, one after the other, and which can be activated individually by inserting a key that contains a new code, with the previous code in code memory (6) being taken out of operation at the same time and/or, respectively, where the code memory (27) can be connected to the receiver (11) by means of a pre-determined control code, for example of a programming key, for programming or re-programming the key codes, and/or, respectively, where the code memory has memory locations (31, 32, 33, 34), the codes of which may be entered individually by means of an optical plug-in programming device (35, 36) or a plug-in programming device (35, 36) that can be coupled through induction.
  2. Lock cylinder according to Claim 1, characterized in that the radiation source (9) and the sensor (10) are provided in a keyhole escutcheon (8) that can slipped over the lock cylinder (1).
  3. Lock cylinder according to Claim 2, characterized in that the energy of the radiation source (9) can be conducted via insulated assembly screws in the keyhole escutcheon (8), from a battery (45) which is in a case that is preferably embodied as component of the lockset plate of the fitting opposite the keyhole escutcheon (8), just as the received signal from the sensor (10) can be conducted via these assembly screws to the receiver (11) that is provided in that case, and then to the comparator circuit (23).
EP90890279A 1989-10-20 1990-10-11 Locking cylinder Expired - Lifetime EP0424356B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AT2417/89 1989-10-20
AT0241789A AT391909B (en) 1989-10-20 1989-10-20 LOCKING CYLINDER AND CYLINDLE KEY

Publications (2)

Publication Number Publication Date
EP0424356A1 EP0424356A1 (en) 1991-04-24
EP0424356B1 true EP0424356B1 (en) 1995-03-22

Family

ID=3533969

Family Applications (1)

Application Number Title Priority Date Filing Date
EP90890279A Expired - Lifetime EP0424356B1 (en) 1989-10-20 1990-10-11 Locking cylinder

Country Status (3)

Country Link
EP (1) EP0424356B1 (en)
AT (2) AT391909B (en)
DE (1) DE59008752D1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5677682A (en) * 1992-08-05 1997-10-14 Thorsen; Anders Christian Electronic lock system
DE4403728A1 (en) * 1994-02-07 1995-08-10 Winkhaus Fa August Lock cylinder key system
DK174939B1 (en) 2002-04-11 2004-03-08 Ruko As Electro-mechanical cylinder lock key combination with optical code and key thereto
CN102003119B (en) * 2010-11-15 2013-05-08 唐名姣 Safety lock and key thereof

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE429884B (en) * 1979-06-05 1983-10-03 Thelin & Co Id Select ELECTRONIC WELDING
US4558175A (en) * 1982-08-02 1985-12-10 Leonard J. Genest Security system and method for securely communicating therein
GB2127479B (en) * 1982-09-18 1987-04-08 Sr John Maxwell Mullin Security device
GB2169947A (en) * 1984-12-13 1986-07-23 Lowe & Fletcher Ltd Fastener
US4868559A (en) * 1987-10-02 1989-09-19 Universal Photonix, Inc. Security system employing optical key shape reader

Also Published As

Publication number Publication date
AT391909B (en) 1990-12-27
DE59008752D1 (en) 1995-04-27
ATA241789A (en) 1990-06-15
EP0424356A1 (en) 1991-04-24
ATE120253T1 (en) 1995-04-15

Similar Documents

Publication Publication Date Title
DE4428947C1 (en) Coded remote operation of vehicle central locking system
DE3517858A1 (en) LOCKING SYSTEM
EP0224607B1 (en) Locking device including an electronic identification system
EP0600194B1 (en) Access control system
EP0709534A1 (en) Lock activated by an identity carrier
EP0410024B1 (en) Electronic locking system
EP0187363B1 (en) Mechanical and non-mechanical coded key and lock actuated by it
EP0911466B1 (en) Wearfree programmable electronic locking device
EP0424356B1 (en) Locking cylinder
DE10056119A1 (en) Electronic lock system in which a padlock has a wireless interface via which it receives access code that it then evaluates by comparison with codes stored in memory, thus reducing the number of keys personnel have to carry
EP0287686B2 (en) Controlled locking device
EP1828993A1 (en) Access control system with a number of closing devices
EP1083277B1 (en) Locking system and method of its operation
DE2635180B2 (en) Process for the electronically controlled release of door, safe and function locks using electronically coded keys and a circuit arrangement for carrying out the process
DE4236863A1 (en) Vehicle active-key programming for central door-locking system - involves encoding key with unique fixed and variable component data-set for subsequent transfer to, and matching of, lock control unit.
DE19621909A1 (en) Electronic access control system for doors
DE102015113243B4 (en) Cabinet door lock that communicates wirelessly with a central unit
CH592797A5 (en) Electronic gate circuit with separate transmitter and receiver - each with two antennae and demodulators and shift register or multiple OR=gate connected with coincidence unit
CH678555A5 (en) Lock with electronic coding
EP1155213B1 (en) Locker arrangement
EP1031918B1 (en) Closing device
DE19961877A1 (en) Safe deposit system
DE2735048A1 (en) Electronically controlled door, safe and function lock release - uses electronically coded key with changing codings and stored variable binary code
CH700937B1 (en) Locker activating device for activating safe, has mechatronic device including receiving unit and co-operating with key unit such that mechatronic device activates key unit based on received data
DE2309055A1 (en) ELECTRIC LOCK

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE

17P Request for examination filed

Effective date: 19910527

17Q First examination report despatched

Effective date: 19930730

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: GRUNDMANN SCHLIESSTECHNIK GESELLSCHAFT M.B.H.

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 19950322

Ref country code: ES

Free format text: THE PATENT HAS BEEN ANNULLED BY A DECISION OF A NATIONAL AUTHORITY

Effective date: 19950322

Ref country code: DK

Effective date: 19950322

REF Corresponds to:

Ref document number: 120253

Country of ref document: AT

Date of ref document: 19950415

Kind code of ref document: T

ET Fr: translation filed
REF Corresponds to:

Ref document number: 59008752

Country of ref document: DE

Date of ref document: 19950427

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 19950419

ITF It: translation for a ep patent filed

Owner name: STUDIO CONS. BREVETTUALE S.R.L.

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Effective date: 19951011

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 19951031

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 19990907

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 19990908

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 19990928

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 19990929

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19991009

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 19991029

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20000124

Year of fee payment: 10

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20001011

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: THE PATENT HAS BEEN ANNULLED BY A DECISION OF A NATIONAL AUTHORITY

Effective date: 20001030

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20001031

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20001031

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20001031

BERE Be: lapsed

Owner name: GRUNDMANN SCHLIESSTECHNIK G.M.B.H.

Effective date: 20001031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010501

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20001011

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

EUG Se: european patent has lapsed

Ref document number: 90890279.4

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010629

NLV4 Nl: lapsed or anulled due to non-payment of the annual fee

Effective date: 20010501

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010703

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20051011