EP1185755B1 - Security turnkey and lock system - Google Patents

Security turnkey and lock system Download PDF

Info

Publication number
EP1185755B1
EP1185755B1 EP01916829A EP01916829A EP1185755B1 EP 1185755 B1 EP1185755 B1 EP 1185755B1 EP 01916829 A EP01916829 A EP 01916829A EP 01916829 A EP01916829 A EP 01916829A EP 1185755 B1 EP1185755 B1 EP 1185755B1
Authority
EP
European Patent Office
Prior art keywords
key
blocking
coding
pin
tumbler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP01916829A
Other languages
German (de)
French (fr)
Other versions
EP1185755A1 (en
Inventor
Arno KLEINHÄNI
Roman Mathiuet
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dormakaba Schweiz AG
Original Assignee
Kaba Schliessysteme AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=25738109&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP1185755(B1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Kaba Schliessysteme AG filed Critical Kaba Schliessysteme AG
Publication of EP1185755A1 publication Critical patent/EP1185755A1/en
Application granted granted Critical
Publication of EP1185755B1 publication Critical patent/EP1185755B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B17/00Accessories in connection with locks
    • E05B17/0004Lock assembling or manufacturing
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B17/00Accessories in connection with locks
    • E05B17/14Closures or guards for keyholes
    • E05B17/16Closures or guards for keyholes shaped as pins or key bits
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/0017Key profiles
    • E05B19/0023Key profiles characterized by variation of the contact surface between the key and the tumbler pins or plates
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B27/00Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7441Key
    • Y10T70/7486Single key
    • Y10T70/7508Tumbler type
    • Y10T70/7559Cylinder type
    • Y10T70/7588Rotary plug
    • Y10T70/7593Sliding tumblers
    • Y10T70/7599Transverse of plug
    • Y10T70/7605Pin tumblers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7441Key
    • Y10T70/778Operating elements
    • Y10T70/7791Keys
    • Y10T70/7842Single shank or stem
    • Y10T70/7859Flat rigid
    • Y10T70/7864Cylinder lock type
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7441Key
    • Y10T70/778Operating elements
    • Y10T70/7791Keys
    • Y10T70/7881Bitting
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7441Key
    • Y10T70/7915Tampering prevention or attack defeating
    • Y10T70/7932Anti-pick
    • Y10T70/7944Guard tumbler
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7441Key
    • Y10T70/7915Tampering prevention or attack defeating
    • Y10T70/7955Keyhole guards
    • Y10T70/7977Key-controlled

Definitions

  • the invention relates to a safety reversible key with associated cylinder according to the preamble of claim 1, a closing system with security reversible keys for locking systems according to the preamble of claim 13 and a Process for their preparation according to the preamble of claim 19.
  • Such Keys and locking systems are known, the keys being high Safety and correspondingly high number of possible coding permutations necessarily at least three, preferably at least four coding or Have Zunnens Researchn, which also on the flat sides of the key are arranged to the given place, i. the given key surface, as well as the corresponding space requirement for the tumbler rows in the cylinder to use as best as possible.
  • They are also keys with additional security elements known, which in turn require a certain amount of space.
  • the aim is to find a manufacturing process for such a system that is fast and worldwide universally applicable and applicable.
  • a safety reversible key with associated cylinder according to claim 1 by a Locking system with security reversible keys with associated cylinders according to Claim 13, and by a method for producing such key according to claim 19.
  • Lock code which has a coded block groove and an associated block Includes block tumbler pair, without additional space required by keys and Cylinder, i. with the existing coding positions on the key and the existing tumbler rows and positions on the cylinder, an additional Plug-in as well as a higher number of permutations and applications reached.
  • the area division on the key the first area with additional security elements have a unique segmentation into independent ones Defined market areas, a system is created, which is the above Task corresponds and which with the new, multi-stage manufacturing process is feasible.
  • block code which comprises a coded block groove and an associated block tumbler pair without additional space requirements for keys and cylinders, i. with the existing ones Coding positions on the key and the existing tumbler rows and - Positions on the cylinder, an additional insertion lock and a higher number achieved by permutations and applications.
  • Fig. 1a shows as an example a safety turning key S of a locking system with four tumbler rows A1 to A4 and with 22 coding positions Pi, each for one Drilling pattern left (L) and drilling pattern right (R).
  • the coding series A2 am Key S here has the positions R1 to R5 for the drilling pattern R and the Positions L6 to L11 for the hole pattern L on. All can be at the keys Positions of both hole patterns are coded, i. there are keys with hole pattern right, key with hole pattern left and key with both hole patterns R + L.
  • additional security elements which in The following are more specifically defined: a block code BC, a second coding Cod2, preferably with narrow milling, an insertion lock using control surface and control pin KF / KS and a flank control of Cod2 by means of a flat tumbler 23.
  • the simple basic coding Cod1 is e.g. a Coding by drilling, which relatively simple, decentralized everywhere executable is.
  • Fig. 1c shows another area division, wherein the area G1 in several Divisions G1.1, G1.2, etc. may be divided.
  • the range G1 may e.g. also a whole Comprise tumbler series A1.
  • all security elements in this attached a tumbler row e.g. also subareas with foremost positions at the top of the key of two tumbler rows (A1, A2) form the area G1, e.g. both Subareas G1.1, G1.2 may each have a block code BC.
  • the market areas Mi become with the area G1 established.
  • the subareas MMi can be defined with parts of the area G1 or with parts of the G2 range or they can also be parts of the Include areas G1 and G2.
  • Fig. 1e illustrates a relationship between regions G1, G2 at the key and the clear separation in the market area Mi, Submarket areas MMi and the further subdivisions for objects MMi.i. This is further explained to Fig. 18.
  • the area G1 contains at least three security elements Vi. Particularly important and advantageous is the new additional security element "Block code”. When explained for Fig. 2 block code as additional coding and Safety function remains the coding position P1 and its function on Key S and received on cylinder Z.
  • Fig. 2 shows schematically the operation of the inventive block code BC on a key S and on an associated cylinder Z.
  • the Spatial directions are denoted by x, y, z below and x is the key or cylinder axis.
  • x is the key or cylinder axis.
  • On the key a Blocknut BN is mounted or milled, which runs parallel to the key axis x and which at least until the first Coding position P1 runs.
  • the associated cylinder Z is corresponding at least at the rearmost coding position P1 one of the block groove BN corresponding tumbler pair with a sprung Blockzuiens BZ and with a prolonged block countermotion BG provided.
  • the block groove has a coded block depth B1, B2, B3 and this is the length of the 1b Block tumbler pairs (BZ + BG) coded such that 1b the distance db of the block groove BN from the cylinder sleeve 10 corresponds, i. that the block tumbler pair (or Block pin pair) with little play fits into the block groove.
  • BZ + BG Block tumbler pairs
  • the block lock BZ is on an inlet surface 6 of the key raised to the height of the block groove BN and passes with little play to the cylinder sleeve 10, the block groove to the corresponding coding position P1, wherein the block tumbler BZ in this first Coding position with a certain code level, here e.g.
  • FIG. 3 shows possible block stages Bi with a depth tb in comparison to FIGS Coding stages Ci with the code depths tc relative to the key surface 7.
  • coding levels C1 to C4 e.g. Gradations of 0.35 mm
  • the block depths Bi can also correspond to the code depths Ci, e.g. C1 to C4 and B1 to B4.
  • the code depth tc of the coding stages Ci may not be smaller as the block depth tb of the previous block groove Bi.
  • the block stage B3 combined with subsequent coding levels C3, C2 or C1 become.
  • FIGS. 4a, b, c show various possible tumbler forms (FIGS. 4a, b, c), associated forms of Blocknuten BN (Fig. 5a, b, c) and the tumblers associated coding forms (Fig. 6a, b, c).
  • Fig. 4a shows a conventional conical tumbler 21, e.g. for a basic coding Cod1, which by simple holes can be produced (Fig. 6a).
  • Fig. 4b shows a narrow cylindrical Zunnensform 22 with correspondingly narrow coding grooves (Fig. 6b), whose Production e.g. require a difficult to copy, complex milling process and which e.g. can be used as the second coding Cod2.
  • Fig. 4a shows a conventional conical tumbler 21, e.g. for a basic coding Cod1, which by simple holes can be produced
  • Fig. 4b shows a narrow cylindrical Zunessform 22 with correspondingly narrow coding grooves (Fig. 6b), whose Production e
  • FIG. 4c shows a Flat tumbler 23, which, for example, for the edge control of a narrow Milling coding (Fig. 6b) can be used, as explained later becomes.
  • Fig. 6b narrow Milling coding
  • the depth tb of the block grooves from one position to the next position remains the same or gets smaller (i.e. can become larger) and that also the width bb of the block grooves of one Position to the next stays the same or gets smaller.
  • FIG. 8 shows the function of the block code in three-dimensional representation and Fig. 9 Blocknutformen and the subsequent coding recesses, which correspond to the example of FIG. 14.
  • Fig. 8a b a key S1a is shown with a block groove, which has a block level B2 and with subsequent Coding positions L11 and R5 having the codes C1 and C2 (corresponding to the key S1a of Fig. 14).
  • Fig. 8a shows Blockzuroisspar BZ, BG block code B1, whose length 1b is greater than the distance db of the block groove of the cylinder sleeve 10. This will to block full-insertion of the key S1a in this cylinder.
  • Fig. 8b shows in contrast, a Blockzuroisspar BZ, BG with a block code B2, which the block code B2 corresponds to the block groove BN and which thus completely plugged can be. This corresponds to the key S1a in the diagram of FIG. 14, which the cylinder Z1 (with coding C1 at the position R5) opens.
  • FIGS. 9a to 9d show the keys S1, S2, S3 and S1a differently coded block grooves and positions L11 and R5. This also corresponds to the Closing function diagram of Fig. 14, which indicates which key-cylinder combinations open and lock what.
  • Fig. 10 shows a possible additional security element known per se Insertion lock by means of control surface KF at the key tip and associated Control pin KS in the cylinder.
  • This control surface KF extends over the median plane 5 the key, as well as the control pin KS, which on the rising Control surface KF hits and must be pushed by this out of the way, so the key can be inserted.
  • a key without proper control surface or only with normal inlet surfaces 6 hits with its tip on this Control pin KS, so that this prevents the insertion of the key.
  • This is a completely different arrangement and mode of action than according to the inventive Block code that does not need special control surfaces, but with each existing key entry surface 6 works.
  • FIG. 11a, 11b Another important additional security element, also in the same Tumbler row can be arranged, is shown in Fig. 11a, 11b.
  • Fig. 11a, 11b These illustrate a flank control on a narrow Codingfräsung Cod2, which is exerted by a flat tumbler 23.
  • the flat tumbler 23 (see, e.g., FIG. 4c) has a diameter d2 which is greater than the width d1 of Milling coding, so that the flat locking rests on the key surface 7, as shown in Fig. 11a.
  • a basic coding Cod1 e.g. According to Fig. 6a, with necessarily wide holes d3 the flat tumbler 23rd sink into these wells according to FIG. 11b, whereby the shearing line 9 of the Cylinder is blocked.
  • a simple fake hole instead the authorized, much more elaborate narrow milling coding Cod2 detected and the function of such a counterfeit key can be prevented.
  • Fig. 12 shows a cross section through a security reversible key with four Tumbler rows A1 to A4 in a cylinder according to the example of FIG. 1.
  • the series A1 is here with narrow milling coding Cod2 and with a Block tumbler pair BZ, BG formed.
  • the rows A3 and A4 (and optional also the series A2) are here with a simpler basic coding Cod1 educated.
  • the given key surface and the space in the cylinder best exploit for coding positions and security elements. To necessarily (at least two) Zuannos Herbertn also on the Flat sides of the key can be arranged.
  • FIG. 13a shows an example with five tumbler rows A1 to A5 and FIG. 13b an example with eight Zunnens Horn A1 to A8, which, however, only so far with Tumblers in the cylinder can be fitted, as there is space for it. Thanks to the use of narrow codings, however, it is also possible here at the Key all eight rows to code. This results in a high number accordingly possible permutations and other safety reserves. In principle, can Here, too, a block code be provided at the beginning of each tumbler series Ai.
  • FIGS. 14 to 17 are closing function diagrams with various Combinations of block codes Bi and codes Ci of the following Positions Pi shown.
  • the Keys may include drilling patterns R or L, or R + L (both) while the cylinders can only contain one drilling pattern R or L.
  • the diagram shows with "X", whether a combination fits key / cylinder, i. if the key is the relevant cylinder opens. Lock all other combinations.
  • FIGS. 14 to 17 show how with a few block codes Bi and then Position coding Ci different market areas Mi clearly from each other are distinguishable and, as in a market area, several derivatives, i. Hierarchical distinctions that can be realized by keys in a system.
  • This will be two independent market areas M1, M2 defined with three or two derivatives.
  • the key S11abc opens the cylinders Z11a, Z11b, Z11c.
  • FIG. 17 shows an example with only one position P1, however, in two tumbler rows A1, A2. Both positions P1 are coded C1, while with the block stages B1, B2, B3 of Blocknuten three independent market segments M1, M2 and M3.
  • the key S1 only opens the cylinder Z1, S2 only opens Z2 and S3 only opens Z3.
  • FIG. 18 illustrates an organization of the closing system according to the invention Security reversible keys in a hierarchical scheme.
  • the system owner SS e.g., a manufacturing company
  • the market areas Mi M1, M2, etc. are defined and authorized, being a market area e.g. a country or a general agency.
  • MMi are defined and separated, e.g. for different dealers or Investments in this area.
  • Another stage MMi.i can e.g. individual objects define. This is determined by the codings of the areas G1 and G2.
  • FIG. 19 schematically illustrates a manufacturing method for keys of an inventive device Systems with manufacturing levels H, G key and key areas with the manufactured variables Vi in the areas G.
  • Production may be made in at least two stages or locations, first by making variables of higher difficulty HS of the range G1 in a central location and then variables of lower difficulty of the range G2 decentrally or locally.
  • the production of the keys can also be done in three stages, first the first area G1 with variables Vi of the highest difficulty central: H1, then another area G1 / 2 with variables with a lower degree of difficulty regional: H1 / 2 and finally the coding G2 with The lowest level of difficulty of the G2 area can be fabricated locally at the point of application: H2.
  • the production of the G1 area can also be decentralized. For this purpose, production programs and the authorization "aut" can be controlled and controlled from the central station SS.

Abstract

The security reversible key with an assigned cylinder (Z) has a blocking groove (BN) with a coded blocking depth (B 1 , B 2 , B 3 ), which runs parallel to the axis of the key (x) from the tip of the key to at least the first position (P 1 ) of a row of tumbler pins (A 2 ) on the key. In the assigned cylinder, at least at the rearmost coding position (P 1 ), a pair of tumbler pins corresponding to the blocking groove (BN) with a blocking tumbler pin (BZ) and an extended blocking counter pin (BG) are foreseen, whereby the blocking counter pin (BG) impinges on the cylinder housing ( 10 ), if the blocking groove is insufficiently deep and, with this, the complete insertion of a key with an insufficiently deep blocking groove is blocked by the pair of blocking tumbler pins. Simultaneously, the blocking tumbler pin (BZ) with the counter pin (BG) at the position (P 1 ) also serves as coding tumbler pin. In the case of the locking system with security reversible keys for locking installations at least two areas are defined, In a first area (G 1 ) several additional security elements and a blocking code function are provided while, in the second area (G 2 ), a more simple basic coding are foreseen. With the first area (G 1 ), an unequivocal segmentation into independent market areas (M 1 , M 2 , M 3 ) is defined and, with this, a world-wide unique locking system with enhanced security and applicability is created.

Description

Die Erfindung betrifft einen Sicherheits-Wendeschlüssel mit zugeordnetem Zylinder gemäss Oberbegriff von Anspruch 1, ein Schliesssystem mit Sicherheits-Wendeschlüsseln für Schliessanlagen gemäss Oberbegriff von Anspruch 13 und ein Verfahren zu deren Herstellung gemäss Oberbegriff von Anspruch 19. Solche Schlüssel und Schliesssysteme sind bekannt, wobei die Schlüssel mit hoher Sicherheit und entsprechend hoher Anzahl von möglichen Codierungspermutationen notwendigerweise mindestens drei, vorzugsweise mindestens vier Codierungs- bzw. Zuhaltungsreihen aufweisen, welche auch auf den Flachseiten des Schlüssels angeordnet sind, um den gegebenen Platz, d.h. die gegebene Schlüsseloberfläche, wie auch den entsprechenden Platzbedarf für die Zuhaltungsreihen im Zylinder bestmöglich zu nutzen. Es sind auch Schlüssel mit zusätzlichen Sicherheitselementen bekannt, welche wiederum einen gewissen Platz benötigen. Aus der US 5 438 857 ist ein solcher Schlüssel bekannt mit einer Einstecksperre als zusätzlichem Sicherheitselement. Hier ist eine zusätzliche Kontrollfläche am Schlüssel angebracht, welche mit einem zugeordneten Kontrollstift am Zylindereingang das Einstecken eines falschen Schlüssels verhindert. Dieser Kontrollstift ist länger als ein Codierungsstift und reicht über die Mittelebene des Schlüssels hinaus. Die Kontrollfläche ist an der Schlüsselspitze ansteigend angeordnet, reicht entsprechend ebenfalls über die Mittelebene des Schlüssels hinaus und hebt den Kontrollstift an und schiebt ihn damit aus dem Weg. Dieser Kontrollstift verhindert damit das Einstecken von Schlüsseln ohne korrekte Kontrollfläche. Diese Kontrollflächen können schon am Schlüsselrohling angebracht werden und ermöglichen damit einen Rohlingschutz.The invention relates to a safety reversible key with associated cylinder according to the preamble of claim 1, a closing system with security reversible keys for locking systems according to the preamble of claim 13 and a Process for their preparation according to the preamble of claim 19. Such Keys and locking systems are known, the keys being high Safety and correspondingly high number of possible coding permutations necessarily at least three, preferably at least four coding or Have Zuhaltungsreihen, which also on the flat sides of the key are arranged to the given place, i. the given key surface, as well as the corresponding space requirement for the tumbler rows in the cylinder to use as best as possible. They are also keys with additional security elements known, which in turn require a certain amount of space. From US 5,438,857 Such a key known with an insertion lock as an additional security element. Here is an additional control surface attached to the key, which with an associated control pin on the cylinder input, the insertion of a prevents wrong key. This control pen is longer than a coding pen and extends beyond the median plane of the key. The control surface is at the Keel tip rising arranged, extends likewise over the Center plane of the key and raises the control pin and pushes it out of the way. This control pin prevents the insertion of Keys without correct control surface. These control surfaces can already on Key blank are attached, thus enabling a blank protection.

Auch diese bekannten Hochsicherheitsschlüssel und Systeme mit Hochsicherheitsschlüsseln sind immer beschränkt durch den gegebenen Platz am Schlüssel und im Zylinder für die Codierungen und Sicherheitsfunktionen. Ihre Herstellung erfordert eine zentrale Fertigung, was die universelle Anwendung solcher Systeme weltweit einschränkt, erschwert und verzögert. Auch eine optimale Auslegung für beliebige Anlagen und Anwendungen wird dadurch stark beschränkt.These well-known high-security keys and systems with high-security keys are always limited by the given space on the key and in the cylinder for the coding and safety functions. Your production requires centralized manufacturing, which is the universal application of such systems Restricts, complicates and delays worldwide. Also an optimal design for any equipment and applications is severely limited.

Es ist nun Aufgabe der vorliegenden Erfindung, einen Sicherheits-Wendeschlüssel mit zugeordnetem Zylinder bzw. ein Schliesssystem mit Sicherheits-Wendeschlüsseln und zugeordneten Zylindern zu schaffen, welches als weltweites Unikat-Schliesssystem einsetzbar ist, mit höheren Permutationskapazitäten für beliebige Anwendungen, mit erhöhter Sicherheit und Kopierschutz sowie mit neuen Möglichkeiten, beliebige Marktbereiche und Anwendungen weltweit zu separieren und wobei ohne zusätzlichen Platzbedarf an Schlüssel und Zylinder eine höhere Sicherheit und eine grössere Anzahl von Permutationen erreicht wird. Als weiteres Ziel ist ein Herstellverfahren für ein solches System gesucht, das weltweit rasch und universell einsetzbar und anwendbar ist.It is an object of the present invention to provide a security reversible key with associated cylinder or a locking system with security reversible keys and associated cylinders to create, which as a worldwide Unikat locking system can be used, with higher permutation capacity for any application, with increased security and copy protection as well as with new ones Possibilities to separate any market areas and applications worldwide and wherein without additional space requirements for keys and cylinders a higher Safety and a greater number of permutations is achieved. As another The aim is to find a manufacturing process for such a system that is fast and worldwide universally applicable and applicable.

Diese Aufgabe wird erfindungsgemäss gelöst durch einen Sicherheits-Wendeschlüssel mit zugeordnetem Zylinder gemäss Patentanspruch 1, durch ein Schliesssystem mit Sicherheits-Wendeschlüsseln mit zugeordneten Zylindern gemäss Patentanspruch 13, sowie durch ein Verfahren zur Herstellung solcher Schlüssel nach Patentanspruch 19. Mit dem neuen zusätzlichen Sicherheitselement "Blockcode", welches eine codierte Blocknut und ein zugeordnetes Blockzuhaltungspaar umfasst, wird ohne zusätzlichen Platzbedarf an Schlüssel und Zylinder, d.h. mit den bestehenden Codierungspositionen am Schlüssel und den bestehenden Zuhaltungsreihen und -Positionen am Zylinder, eine zusätzliche Einstecksperre sowie eine höhere Anzahl von Permutationen und Anwendungen erreicht. Mit der Bereichseinteilung am Schlüssel, wobei der erste Bereich mit zusätzlichen Sicherheitselementen eine eindeutige Segmentierung in unabhängige Marktbereiche definiert, wird ein System geschaffen, welches der oben genannten Aufgabe entspricht und welches mit dem neuen, mehrstufigen Herstellverfahren realisierbar ist.This object is achieved according to the invention by a safety reversible key with associated cylinder according to claim 1, by a Locking system with security reversible keys with associated cylinders according to Claim 13, and by a method for producing such key according to claim 19. With the new additional security element "Block code", which has a coded block groove and an associated block Includes block tumbler pair, without additional space required by keys and Cylinder, i. with the existing coding positions on the key and the existing tumbler rows and positions on the cylinder, an additional Plug-in as well as a higher number of permutations and applications reached. With the area division on the key, the first area with additional security elements have a unique segmentation into independent ones Defined market areas, a system is created, which is the above Task corresponds and which with the new, multi-stage manufacturing process is feasible.

Die abhängigen Patentansprüche betreffen vorteilhafte Weiterbildungen der Erfindung, welche weitere Vorteile bezüglich universeller Anwendbarkeit, rascher weltweiter Herstellbarkeit, Sicherheit eines Schliesssystems, Kopiersicherheit, Anzahl von Permutationen und Anwendungen ermöglichen.The dependent claims relate to advantageous developments of Invention, which further advantages in terms of universal applicability, faster global manufacturability, security of a locking system, copy security, Allow number of permutations and applications.

Insbesondere mit dem neuen zusätzlichen Sicherheitselement "Blockcode", welches eine codierte Blocknut und ein zugeordnetes Blockzuhaltungspaar umfasst, wird ohne zusätzlichen Platzbedarf an Schlüssel und Zylinder, d.h. mit den bestehenden Codierungspositionen am Schlüssel und den bestehenden Zuhaltungsreihen und - Positionen am Zylinder, eine zusätzliche Einstecksperre sowie eine höhere Anzahl von Permutationen und Anwendungen erreicht.In particular, with the new additional security element "block code", which comprises a coded block groove and an associated block tumbler pair without additional space requirements for keys and cylinders, i. with the existing ones Coding positions on the key and the existing tumbler rows and - Positions on the cylinder, an additional insertion lock and a higher number achieved by permutations and applications.

Im folgenden wird die Erfindung anhand von Ausführungsbeispielen und Figuren weiter erläutert. Dabei zeigen

Fig. 1a
Codierungsreihen mit Codierungspositionen für zwei Bohrbilder an einem Schlüssel,
Fig. 1b
an einem Schlüssel eine Einteilung in Bereiche, mit einem ersten Bereich mit zusätzlichen Sicherheitselementen,
Fig. 1c
ein weiteres Beispiel einer Bereichseinteilung,
Fig. 1d
eine Segmentierung von Marktbereichen und Händlerbereichen an einem Schlüssel,
Fig. 1e
einen Zusammenhang zwischen Bereichseinteilung und Segmentierung von Marktbereichen,
Fig. 2
das Prinzip des Blockcodes mit Blocknut und Blockzuhaltungspaar,
Fig. 3
Beispiele von Codierungsstufen und Blockstufen,
Fig. 4
Beispiele verschiedener Zuhaltungsformen,
Fig. 5
der Fig. 4 entsprechende Blocknutformen,
Fig. 6
der Fig. 4 entsprechende Codierungsformen,
Fig. 7
eine sich über vier Positionen erstreckende Blocknut mit unterschiedlichen Bereichen,
Fig. 8
in dreidimensionaler Darstellung eine Blocknut mit Blockzuhaltungspaar,
Fig. 9
in dreidimensionaler Darstellung verschiedene Beispiele von Blocknuten mit Codierungspositionen (entsprechend dem Beispiel von Fig. 14),
Fig. 10
ein Sicherheitselement "Einstecksperre" mittels Kontrollfläche und Kontrollstift,
Fig. 11
ein Sicherheitselement "Flachzuhaltung" zur Flankenkontrolle von Codierungen,
Fig. 12
einen Schlüssel mit vier Zuhaltungsreihen und mit Blockzuhaltungen im Zylinder,
Fig. 13
Beispiele von Schlüsseln mit fünf und mit acht Codierungs- bzw. Zuhaltungsreihen,
Fig. 14
ein Schliessfunktionsschema mit zwei Bohrbildern und zwei Marktbereichen,
Fig. 15
ein Schliessfunktionsschema mit zwei Positionen und vier Marktbereichen,
Fig. 16
ein Schliessfunktionsschema mit zwei Positionen und einem Marktbereich,
Fig. 17
ein Schliessfunktionsschema mit je einer Position in zwei Zuhaltungsreihen und mit drei Marktbereichen,
Fig. 18
ein Organisationsschema eines Schliesssystems mit segmentierten Marktbereichen und Anwendungen,
Fig. 19
ein Herstellungsschema für Schlüssel eines erfindungsgemässen Schliesssystems.
In the following the invention with reference to embodiments and figures will be further explained. Show
Fig. 1a
Coding series with coding positions for two drilling patterns on a key,
Fig. 1b
on a key a division into areas, with a first area with additional security elements,
Fig. 1c
another example of an area division,
Fig. 1d
a segmentation of market areas and dealer areas on a key,
Fig. 1e
a connection between division and segmentation of market areas,
Fig. 2
the principle of the block code with block groove and block tumbler pair,
Fig. 3
Examples of coding levels and block levels,
Fig. 4
Examples of different tumbler forms,
Fig. 5
4 corresponding Blocknutformen,
Fig. 6
4 corresponding coding forms,
Fig. 7
an over four positions extending block groove with different areas,
Fig. 8
in a three-dimensional representation a block groove with Blockzuhaltungspaar,
Fig. 9
in three-dimensional representation, various examples of block grooves with coding positions (corresponding to the example of FIG. 14),
Fig. 10
a safety element "insertion lock" by means of control surface and control pin,
Fig. 11
a safety element "flat locking" for the edge control of encodings,
Fig. 12
a key with four rows of tumblers and block tumblers in the cylinder,
Fig. 13
Examples of keys with five and eight coding or tumbler rows,
Fig. 14
a closing function scheme with two hole patterns and two market areas,
Fig. 15
a closing function scheme with two positions and four market areas,
Fig. 16
a closing function scheme with two positions and a market area,
Fig. 17
a closing function diagram with one position each in two rows of tumblers and with three market areas,
Fig. 18
an organizational scheme of a locking system with segmented market areas and applications,
Fig. 19
a production scheme for keys of a novel closure system.

Fig. 1a zeigt als Beispiel einen Sicherheits-Wendeschlüssel S eines Schliesssystems mit vier Zuhaltungsreihen A1 bis A4 und mit 22 Codierungspositionen Pi, je für ein Bohrbild links (L) und ein Bohrbild rechts (R). Die Codierungsreihe A2 am Schlüssel S weist hier die Positionen R1 bis R5 für das Bohrbild R und die Positionen L6 bis L11 für das Bohrbild L auf. An den Schlüsseln können alle Positionen beider Bohrbilder codiert werden, d.h. es gibt Schlüssel mit Bohrbild rechts, Schlüssel mit Bohrbild links und auch Schlüssel mit beiden Bohrbildern R + L. Im zugeordneten Zylinder Z kann aus Platzgründen für die Zuhaltungen jedoch nur jede zweite Position und damit (im gleichen Bereich) nur entweder ein Bohrbild R oder ein Bohrbild L mit Zuhaltungen bestückt sein. Die erste Codierungsposition P1 (= L11) an der Schlüsselspitze entspricht hier der hintersten Zuhaltungsposition P1 im Zylinder bezüglich der Schlüsseleinsteckrichtung x.Fig. 1a shows as an example a safety turning key S of a locking system with four tumbler rows A1 to A4 and with 22 coding positions Pi, each for one Drilling pattern left (L) and drilling pattern right (R). The coding series A2 am Key S here has the positions R1 to R5 for the drilling pattern R and the Positions L6 to L11 for the hole pattern L on. All can be at the keys Positions of both hole patterns are coded, i. there are keys with hole pattern right, key with hole pattern left and key with both hole patterns R + L. However, in the associated cylinder Z may be due to space limitations for the tumblers only every second position and thus (in the same area) only either a hole pattern R or a hole pattern L be equipped with tumblers. The first encoding position P1 (= L11) at the key tip corresponds to the rearmost tumbler position P1 in the cylinder with respect to the key insertion direction x.

Fig. 1b illustriert das erfindungsgemässe Schliesssystem an einem Schlüssel S, wobei am Schlüssel mindestens zwei Bereiche definiert sind, mit einem ersten Bereich G1, in dem mindestens zwei zusätzliche Sicherheitselemente mit höherem Schwierigkeitsgrad zur Herstellung vorgesehen sind, und mit einem zweiten Bereich G2, in dem eine einfachere Grundcodierung Cod1 vorgesehen ist, wobei mit dem ersten Bereich G1 eine eindeutige Segmentierung in unabhängige Marktbereiche Mi = M1, M2 usw. festgelegt ist. Auch zusätzliche Sicherheitselemente, welche im folgenden genauer definiert werden, sind hier dargestellt: ein Blockcode BC, eine zweite Codierung Cod2, vorzugsweise mit schmaler Fräsung, eine Einstecksperre mittels Kontrollfläche und Kontrollstift KF/KS und eine Flankenkontrolle von Cod2 mittels einer Flachzuhaltung 23. Die einfache Grundcodierung Cod1 ist z.B. eine Codierung mittels Bohrungen, welche relativ einfach, dezentral überall ausführbar ist.Fig. 1b illustrates the inventive closing system on a key S, wherein at least two areas are defined on the key, with a first area G1, in the at least two additional security elements with higher Difficulty are provided for production, and with a second area G2, in which a simpler basic coding Cod1 is provided, with the first area G1 a unique segmentation into independent market areas Mi = M1, M2, etc. is set. Also additional security elements, which in The following are more specifically defined: a block code BC, a second coding Cod2, preferably with narrow milling, an insertion lock using control surface and control pin KF / KS and a flank control of Cod2 by means of a flat tumbler 23. The simple basic coding Cod1 is e.g. a Coding by drilling, which relatively simple, decentralized everywhere executable is.

Die Fig. 1c zeigt eine andere Bereichseinteilung, wobei der Bereich G1 in mehrere Teilbereiche G1.1, G1.2 usw. aufgeteilt sein kann. Je nach Anwendungen und gewünschter Systemauslegung kann der Bereich G1 z.B. auch eine ganze Zuhaltungsreihe A1 umfassen. Dabei sind auch alle Sicherheitselemente in dieser einen Zuhaltungsreihe angebracht. In einer anderen vorteilhaften Variante können z.B. auch Teilbereiche mit vordersten Positionen an der Spitze des Schlüssels von zwei Zuhaltungsreihen (A1, A2) den Bereich G1 bilden, wobei z.B. beide Teilbereiche G1.1, G1.2 je einen Blockcode BC aufweisen können.Fig. 1c shows another area division, wherein the area G1 in several Divisions G1.1, G1.2, etc. may be divided. Depending on applications and desired system design, the range G1 may e.g. also a whole Comprise tumbler series A1. Here are all security elements in this attached a tumbler row. In another advantageous variant can e.g. also subareas with foremost positions at the top of the key of two tumbler rows (A1, A2) form the area G1, e.g. both Subareas G1.1, G1.2 may each have a block code BC.

Die Fig. 1d illustriert die Aufteilung in mehrere unabhängige Marktbereiche Mi = M1, M2 etc. sowie die mögliche weitere Unterteilung jedes Marktbereichs in Marktteilbereiche MMi, z.B. in unabhängige Händlerbereiche oder Anwendungsbereiche für Anlagen und Objekte usw. Die Marktbereiche Mi werden mit dem Bereich G1 festgelegt. Die Teilbereiche MMi können mit Teilen des Bereichs G1 definiert werden oder auch mit Teilen des Bereichs G2 oder sie können ebenso Teile der Bereiche G1 und G2 umfassen. Fig. 1d illustrates the division into several independent market areas Mi = M1, M2 etc. as well as the possible further subdivision of each market area into market subareas MMi, e.g. in independent dealer areas or application areas for facilities and objects, etc. The market areas Mi become with the area G1 established. The subareas MMi can be defined with parts of the area G1 or with parts of the G2 range or they can also be parts of the Include areas G1 and G2.

Fig. 1e illustriert beispielsweise einen Zusammenhang zwischen den Bereichen G1, G2 am Schlüssel und der eindeutigen Separation im Marktbereich Mi, Teilmarktbereiche MMi sowie den weiteren Unterteilungen für Objekte MMi.i. Dies wird zu Fig. 18 weiter erläutert.For example, Fig. 1e illustrates a relationship between regions G1, G2 at the key and the clear separation in the market area Mi, Submarket areas MMi and the further subdivisions for objects MMi.i. This is further explained to Fig. 18.

Vorteilhafterweise enthält der Bereich G1 mindestens drei Sicherheitselemente Vi. Besonders wichtig und vorteilhaft ist das neue zusätzliche Sicherheitselement "Blockcode". Beim zu Fig. 2 erläuterten Blockcode als zusätzlicher Codierungs- und Sicherheitsfunktion bleibt die Codierungsposition P1 und deren Funktion am Schlüssel S und am Zylinder Z erhalten.Advantageously, the area G1 contains at least three security elements Vi. Particularly important and advantageous is the new additional security element "Block code". When explained for Fig. 2 block code as additional coding and Safety function remains the coding position P1 and its function on Key S and received on cylinder Z.

Die Fig. 2 zeigt schematisch die Funktionsweise des erfindungsgemässen Blockcodes BC an einem Schlüssel S und an einem zugeordneten Zylinder Z. Die Raumrichtungen sind im folgenden mit x, y, z bezeichnet und x ist die Schlüssel- bzw. Zylinderachse. Am Schlüssel ist eine Blocknut BN angebracht bzw. eingefräst, welche parallel zur Schlüsselachse x verläuft und welche mindestens bis zur ersten Codierungsposition P1 verläuft. Im zugeordneten Zylinder Z ist entsprechend mindestens an der hintersten Codierungsposition P1 ein der Blocknut BN entsprechendes Zuhaltungspaar mit einer gefederten Blockzuhaltung BZ und mit einer verlängerten Blockgegenzuhaltung BG vorgesehen. Die Blocknut weist eine codierte Blocktiefe B1, B2, B3 auf und dieser entsprechend ist die Länge 1b des Blockzuhaltungspaars (BZ + BG) so codiert, dass 1b dem Abstand db der Blocknut BN von der Zylinderhülse 10 entspricht, d.h. dass das Blockzuhaltungspaar (oder Blockstiftpaar) mit wenig Spiel in die Blocknut hineinpasst. Beim Einstecken des Schlüssels ergibt sich folgender Ablauf (a - b - c): Die Blockzuhaltung BZ wird an einer Einlauffläche 6 des Schlüssels angehoben bis auf die Höhe der Blocknut BN und durchläuft mit wenig Spiel zur Zylinderhülse 10 die Blocknut bis zur entsprechenden Codierungsposition P1, wobei die Blockzuhaltung BZ in diese erste Codierungsposition mit einer bestimmten Codestufe, hier z.B. C2, abgesenkt wird. In dieser Position P1 wirkt das Blockzuhaltungspaar BZ, BG als normale Codierungsposition bezüglich Drehen des Zylinders, welche bei richtiger Codierung die Scherlinie 9 freigeben muss. Wenn die Blocknut BN zuwenig tief ist bzw. eine falsche Codierung Bi aufweist, so steht die Blockgegenzuhaltung BG an der Zylinderhülse 10 auf und das weitere Einstecken des Schlüssels wird an der Einlauffläche blockiert (wenn 1b grösser ist als db, siehe Fig. 8a). Der Blockcode ergibt somit eine zusätzliche Sicherheitsfunktion, indem das Ganz-Einstecken verhindert werden kann mit zusätzlichen Codierungsstufen (Bi) der Blocknut, wobei die bisherige Codierungsfunktion an der Position P1 erhalten bleibt. Überdies wird weder am Schlüssel, d.h. an den Schlüsselpositionen noch im Zylinder ein zusätzlicher Platz benötigt für den Blockcode. Am Zylinder wird einfach eine bisherige normale Codierzuhaltung durch die spezielle Blockzuhaltung ersetzt.Fig. 2 shows schematically the operation of the inventive block code BC on a key S and on an associated cylinder Z. The Spatial directions are denoted by x, y, z below and x is the key or cylinder axis. On the key a Blocknut BN is mounted or milled, which runs parallel to the key axis x and which at least until the first Coding position P1 runs. In the associated cylinder Z is corresponding at least at the rearmost coding position P1 one of the block groove BN corresponding tumbler pair with a sprung Blockzuhaltung BZ and with a prolonged block countermotion BG provided. The block groove has a coded block depth B1, B2, B3 and this is the length of the 1b Block tumbler pairs (BZ + BG) coded such that 1b the distance db of the block groove BN from the cylinder sleeve 10 corresponds, i. that the block tumbler pair (or Block pin pair) with little play fits into the block groove. When inserting the Key results in the following sequence (a - b - c): The block lock BZ is on an inlet surface 6 of the key raised to the height of the block groove BN and passes with little play to the cylinder sleeve 10, the block groove to the corresponding coding position P1, wherein the block tumbler BZ in this first Coding position with a certain code level, here e.g. C2, is lowered. In In this position P1, the block tumbler pair BZ, BG acts as normal Coding position with respect to turning the cylinder, which with correct coding the shear line 9 must release. If the block groove BN is too low or one has false coding Bi, so is the block counterhold BG at the Cylinder sleeve 10 and the further insertion of the key is at the Entry surface blocked (if 1b is greater than db, see Fig. 8a). The block code thus gives an additional safety function by the whole-plugging can be prevented with additional coding levels (Bi) of the block groove, wherein the previous coding function is maintained at position P1. Moreover, will neither at the key, i. at the key positions still in the cylinder additional space needed for the block code. At the cylinder becomes simply one previous normal Codierzuhaltung replaced by the special Blockzuhaltung.

Fig. 3 zeigt mögliche Blockstufen Bi mit einer Tiefe tb im Vergleich zu den Codierungsstufen Ci mit den Codetiefen tc bezogen auf die Schlüsseloberfläche 7. In den folgenden Beispielen werden hier Codierungsstufen C1 bis C4 (z.B. mit Abstufungen von 0.35 mm) sowie drei Blockstufen B1, B2, B3 mit Blocktiefen von z.B. 1.05, 0.55 und 0 mm verwendet, wobei eine Blockstufe B3 mit Tiefe 0 mm keine Blockierungsfunktion mehr ausüben kann. Die Blocktiefen Bi können auch den Codetiefen Ci entsprechen, also z.B. C1 bis C4 und B1 bis B4. In einem weiteren Beispiel sind fünf Codierungsstufen C1 bis C5 mit vier Blockstufen B1 bis B4 kombiniert dargestellt, z.B. mit Stufenabständen von 0.3 mm der Ci und von 0.4 mm der Bi. Laut Kombinationsregel für die Blockstufen Bi mit den Codierungsstufen Ci darf die Codetiefe tc der Codierungsstufen Ci nicht kleiner sein als die Blocktiefe tb der vorangehenden Blocknut Bi. In diesem Beispiel kann somit die Blockstufe B3 mit anschliessenden Codierungsstufen C3, C2 oder C1 kombiniert werden. FIG. 3 shows possible block stages Bi with a depth tb in comparison to FIGS Coding stages Ci with the code depths tc relative to the key surface 7. In In the following examples, coding levels C1 to C4 (e.g. Gradations of 0.35 mm) as well as three block steps B1, B2, B3 with block depths of e.g. 1.05, 0.55 and 0 mm, with a block stage B3 with depth 0 mm can no longer exercise a blocking function. The block depths Bi can also correspond to the code depths Ci, e.g. C1 to C4 and B1 to B4. In one Another example is five coding stages C1 to C5 with four block stages B1 to B4 combined, e.g. with step distances of 0.3 mm of the Ci and 0.4 mm of Bi. According to combination rule for the block stages Bi with the Coding stages Ci, the code depth tc of the coding stages Ci may not be smaller as the block depth tb of the previous block groove Bi. Thus, in this example the block stage B3 combined with subsequent coding levels C3, C2 or C1 become.

Die Fig. 4, 5 und 6 zeigen verschiedene mögliche Zuhaltungsformen (Fig. 4a, b, c), zugeordnete Formen der Blocknuten BN (Fig. 5a, b, c) sowie den Zuhaltungen zugeordnete Codierungsformen (Fig. 6a, b, c). Die Fig. 4a zeigt eine übliche konische Zuhaltungsform 21, z.B. für eine Grundcodierung Cod1, welche durch einfache Bohrungen herstellbar ist (Fig. 6a). Fig. 4b zeigt eine schmale zylindrische Zuhaltungsform 22 mit entsprechend schmalen Codierungsnuten (Fig. 6b), deren Herstellung z.B. ein schwer kopierbares, aufwändiges Fräsverfahren erfordern und welche z.B. als zweite Codierung Cod2 einsetzbar ist. Die Fig. 4c zeigt eine Flachzuhaltung 23, welche beispielsweise zur Flankenkontrolle einer schmalen Fräscodierung (Fig. 6b) eingesetzt werden kann, wie später noch weiter erläutert wird. Es sind weitere Zuhaltungsformen möglich und bekannt, welche sich im Prinzip aus einer Kombination von zylindrischen und konischen Abschnitten zusammensetzen. Die Blocknutformen und die Codierungsformen können unterschiedlich ausgebildet sein und damit die Kopierbarkeit erschweren und auch eine zusätzliche Verschleierung der Codierformen bewirken.4, 5 and 6 show various possible tumbler forms (FIGS. 4a, b, c), associated forms of Blocknuten BN (Fig. 5a, b, c) and the tumblers associated coding forms (Fig. 6a, b, c). Fig. 4a shows a conventional conical tumbler 21, e.g. for a basic coding Cod1, which by simple holes can be produced (Fig. 6a). Fig. 4b shows a narrow cylindrical Zuhaltungsform 22 with correspondingly narrow coding grooves (Fig. 6b), whose Production e.g. require a difficult to copy, complex milling process and which e.g. can be used as the second coding Cod2. Fig. 4c shows a Flat tumbler 23, which, for example, for the edge control of a narrow Milling coding (Fig. 6b) can be used, as explained later becomes. There are other Zuhaltungsformen possible and known, which in the Principle of a combination of cylindrical and conical sections put together. The block groove shapes and the coding shapes can be formed differently and thus complicate the copying and also cause additional concealment of Codierformen.

Die Fig. 7a, b, c illustrieren ein Beispiel einer Blocknut, welche sich über die vier vordersten Codierungspositionen Pi = L11, R5, L10 und R4 von zwei Bohrbildern R, L erstreckt und welche entsprechend mehrere unterschiedlich codierte Bereiche BN 1 bis BN4 aufweisen. Als Regel ist dabei zu beachten, dass die Tiefe tb der Blocknuten von einer Position zur nächsten Position gleich bleibt oder kleiner wird (d.h. nicht grösser werden kann) und dass ebenso die Breite bb der Blocknuten von einer Position zur nächsten gleich bleibt oder kleiner wird. Dies ergibt mit drei Blockstufen B1 bis B3 und mit zwei Blocknutbreiten bb1 und bb2 die dargestellten Blockstufen Bi, bbi der vier Blocknutbereiche BN1 bis BN4.Figs. 7a, b, c illustrate an example of a block groove extending across the four frontmost coding positions Pi = L11, R5, L10 and R4 of two drilling patterns R, L extends and which correspondingly several differently coded areas BN. 1 to BN4 have. As a rule, it should be noted that the depth tb of the block grooves from one position to the next position remains the same or gets smaller (i.e. can become larger) and that also the width bb of the block grooves of one Position to the next stays the same or gets smaller. This results in three Block stages B1 to B3 and with two Blocknutbreiten bb1 and bb2 the illustrated Block stages Bi, bbi of the four block groove areas BN1 to BN4.

Die Fig. 8 zeigt die Funktion des Blockcodes in dreidimensionaler Darstellung und Fig. 9 Blocknutformen und die anschliessenden Codierungsvertiefungen, welche dem Beispiel von Fig. 14 entsprechen. In Fig. 8a, b ist ein Schlüssel S1a dargestellt mit einer Blocknut, welche eine Blockstufe B2 aufweist und mit anschliessenden Codierungspositionen L11 und R5, welche die Codierungen C1 und C2 aufweisen (entsprechend dem Schlüssel S1a von Fig. 14).FIG. 8 shows the function of the block code in three-dimensional representation and Fig. 9 Blocknutformen and the subsequent coding recesses, which correspond to the example of FIG. 14. In Fig. 8a, b a key S1a is shown with a block groove, which has a block level B2 and with subsequent Coding positions L11 and R5 having the codes C1 and C2 (corresponding to the key S1a of Fig. 14).

Fig. 8a zeigt Blockzuhaltungspaar BZ, BG mit Blockcode B1, deren Länge 1b grösser ist als der Abstand db der Blocknut von der Zylinderhülse 10. Damit wird das Ganz-Einstecken des Schlüssels S1a in diesem Zylinder blockiert. Fig. 8b zeigt demgegenüber ein Blockzuhaltungspaar BZ, BG mit einem Blockcode B2, welcher dem Blockcode B2 der Blocknut BN entspricht und welcher somit ganz eingesteckt werden kann. Dies entspricht im Schema von Fig. 14 dem Schlüssel S1a, welcher den Zylinder Z1 (mit Codierung C1 an der Position R5) öffnet.Fig. 8a shows Blockzuhaltungspaar BZ, BG block code B1, whose length 1b is greater than the distance db of the block groove of the cylinder sleeve 10. This will to block full-insertion of the key S1a in this cylinder. Fig. 8b shows in contrast, a Blockzuhaltungspaar BZ, BG with a block code B2, which the block code B2 corresponds to the block groove BN and which thus completely plugged can be. This corresponds to the key S1a in the diagram of FIG. 14, which the cylinder Z1 (with coding C1 at the position R5) opens.

Die Fig. 9a bis 9d zeigen die Schlüssel S1, S2, S3 und S1a mit unterschiedlich codierten Blocknuten und Positionen L11 und R5. Dies entspricht ebenfalls dem Schliessfunktionsschema von Fig. 14, das angibt, welche Schlüssel-Zylinderkombinationen öffnen und welche sperren.FIGS. 9a to 9d show the keys S1, S2, S3 and S1a differently coded block grooves and positions L11 and R5. This also corresponds to the Closing function diagram of Fig. 14, which indicates which key-cylinder combinations open and lock what.

Fig. 10 zeigt als mögliches zusätzliches Sicherheitselement eine an sich bekannte Einstecksperre mittels Kontrollfläche KF an der Schlüsselspitze und zugeordnetem Kontrollstift KS im Zylinder. Diese Kontrollfläche KF reicht über die Mittelebene 5 des Schlüssels hinaus, ebenso wie der Kontrollstift KS, welcher auf die ansteigende Kontrollfläche KF trifft und von dieser aus dem Weg geschoben werden muss, damit der Schlüssel eingesteckt werden kann. Ein Schlüssel ohne richtige Kontrollfläche bzw. nur mit normalen Einlaufflächen 6 trifft mit seiner Spitze auf diesen Kontrollstift KS, so dass dieser das Einstecken des Schlüssels verhindert. Dies ist eine völlig andere Anordnung und Wirkungsweise als gemäss dem erfinderischen Blockcode, der keine speziellen Steuerflächen benötigt, sondern mit jeder bestehenden Schlüsseleinlauffläche 6 funktioniert. Vorteilhafterweise kann jedoch der neue Blockcode mit den Blockzuhaltungen BZ mit dieser bekannten Einstecksperre durch Kontrollflächen KF und Kontrollstift KS kombiniert und im speziellen sogar in der selben Zuhaltungsreihe (z.B. A2) angeordnet werden, wobei der Kontrollstift KS irgendwo vor dem Blockzuhaltungspaar BZ, BG im Zylinder angeordnet wird.Fig. 10 shows a possible additional security element known per se Insertion lock by means of control surface KF at the key tip and associated Control pin KS in the cylinder. This control surface KF extends over the median plane 5 the key, as well as the control pin KS, which on the rising Control surface KF hits and must be pushed by this out of the way, so the key can be inserted. A key without proper control surface or only with normal inlet surfaces 6 hits with its tip on this Control pin KS, so that this prevents the insertion of the key. This is a completely different arrangement and mode of action than according to the inventive Block code that does not need special control surfaces, but with each existing key entry surface 6 works. Advantageously, however the new block code with the block tumblers BZ with this known Insertion lock combined by control surfaces KF and control pin KS and in the even in the same tumbler series (e.g., A2), where the control pin KS somewhere before the Blockzuhaltungspaar BZ, BG in the cylinder is arranged.

Ein weiteres wichtiges zusätzliches Sicherheitselement, das ebenfalls in der gleichen Zuhaltungsreihe angeordnet werden kann, ist in Fig. 11a, 11b dargestellt. Diese illustrieren eine Flankenkontrolle an einer schmalen Codierfräsung Cod2, welche durch eine Flachzuhaltung 23 ausgeübt wird. Die Flachzuhaltung 23 (siehe z.B. Fig. 4c) weist einen Durchmesser d2 auf, der grösser ist als die Breite d1 der Fräscodierung, so dass die Flachzuhaltung auf der Schlüsseloberfläche 7 aufliegt, wie in Fig. 11a gezeigt ist. Demgegenüber wird bei einer Grundcodierung Cod1, z.B. gemäss Fig. 6a, mit notwendigerweise breiten Bohrungen d3 die Flachzuhaltung 23 in diese Vertiefungen hineinsinken gemäss Fig. 11b, wodurch die Scherlinie 9 des Zylinders blockiert wird. Damit kann z.B. eine einfache gefälschte Bohrung anstelle der autorisierten, viel aufwändigeren schmalen Fräscodierung Cod2 detektiert und die Funktion eines derart gefälschten Schlüssels verhindert werden.Another important additional security element, also in the same Tumbler row can be arranged, is shown in Fig. 11a, 11b. These illustrate a flank control on a narrow Codingfräsung Cod2, which is exerted by a flat tumbler 23. The flat tumbler 23 (see, e.g., FIG. 4c) has a diameter d2 which is greater than the width d1 of Milling coding, so that the flat locking rests on the key surface 7, as shown in Fig. 11a. On the other hand, in a basic coding Cod1, e.g. According to Fig. 6a, with necessarily wide holes d3 the flat tumbler 23rd sink into these wells according to FIG. 11b, whereby the shearing line 9 of the Cylinder is blocked. Thus, e.g. a simple fake hole instead the authorized, much more elaborate narrow milling coding Cod2 detected and the function of such a counterfeit key can be prevented.

Vorteilhafterweise können somit auf engem Raum und in einer einzigen Zuhaltungsreihe die folgenden sehr wirksamen Sicherheitselemente kombiniert werden: zusätzlich zum erfindungsgemässen Blockcode BC eine zweite Codierung Cod2 mit schmaler Fräsung, eine Einsteckkontrolle mittels Kontrollstift KS und Kontrollfläche KF sowie eine Flankenkontrolle der schmalen Codierung Cod2 mittels einer Flachzuhaltung 23. Advantageously, thus, in a small space and in a single Coupling series combines the following very effective security elements become: in addition to the inventive block code BC a second coding Cod2 with narrow milling, a plug-in control by means of control pin KS and Control surface KF and a flank control of the narrow code Cod2 by means of a flat tumbler 23.

Fig. 12 zeigt einen Querschnitt durch einen Sicherheits-Wendeschlüssel mit vier Zuhaltungsreihen A1 bis A4 in einem Zylinder entsprechend dem Beispiel von Fig. 1. Die Reihe A1 ist hier mit schmaler Fräscodierung Cod2 und mit einem Blockzuhaltungspaar BZ, BG ausgebildet. Die Reihen A3 und A4 (und wahlweise auch die Reihe A2) sind hier mit einer einfacheren Grundcodierung Cod1 ausgebildet. Wichtig ist, die gegebene Schlüsseloberfläche und den Platz im Zylinder bestmöglich für Codierungspositionen und Sicherheitselemente auszunützen. Dazu müssen notwendigerweise (mindestens zwei) Zuhaltungsreihen auch auf den Flachseiten des Schlüssels angeordnet sein.Fig. 12 shows a cross section through a security reversible key with four Tumbler rows A1 to A4 in a cylinder according to the example of FIG. 1. The series A1 is here with narrow milling coding Cod2 and with a Block tumbler pair BZ, BG formed. The rows A3 and A4 (and optional also the series A2) are here with a simpler basic coding Cod1 educated. Importantly, the given key surface and the space in the cylinder best exploit for coding positions and security elements. To necessarily (at least two) Zuhaltungsreihen also on the Flat sides of the key can be arranged.

Bei etwas grösseren Schlüsseln können auch mehr als vier Zuhaltungsreihen vorgesehen werden.For larger keys, more than four rows of tumblers can be used be provided.

Fig. 13a zeigt dazu ein Beispiel mit fünf Zuhaltungsreihen A1 bis A5 und Fig. 13b ein Beispiel mit acht Zuhaltungsreihen A1 bis A8, welche jedoch nur soweit mit Zuhaltungen im Zylinder bestückt werden können, wie Platz dafür vorhanden ist. Dank dem Einsatz von schmalen Codierungen ist es jedoch auch hier möglich, am Schlüssel alle acht Reihen zu codieren. Dies ergibt entsprechend eine hohe Anzahl von möglichen Permutationen sowie weitere Sicherheitsreserven. Im Prinzip kann auch hier am Beginn jeder Zuhaltungsreihe Ai ein Blockcode vorgesehen werden.13a shows an example with five tumbler rows A1 to A5 and FIG. 13b an example with eight Zuhaltungsreihen A1 to A8, which, however, only so far with Tumblers in the cylinder can be fitted, as there is space for it. Thanks to the use of narrow codings, however, it is also possible here at the Key all eight rows to code. This results in a high number accordingly possible permutations and other safety reserves. In principle, can Here, too, a block code be provided at the beginning of each tumbler series Ai.

In den Fig. 14 bis 17 sind Schliessfunktionsschemen mit verschiedenen Kombinationen von Blockcodes Bi und Codierungen Ci der anschliessenden Positionen Pi dargestellt. In der Spalte links sind die Codierungen Bi, Ci der Schlüssel Si angegeben und in der Reihe oben die Codierungen der Zylinder Zi. Die Schlüssel können die Bohrbilder R oder L, oder R + L (beide) aufweisen, während die Zylinder nur ein Bohrbild R oder L enthalten können. Das Schema zeigt mit "X", ob eine Kombination Schlüssel / Zylinder passt, d.h. ob der Schlüssel den betreffenden Zylinder öffnet. Alle anderen Kombinationen sperren. Die Fig. 14 bis 17 zeigen, wie mit wenigen Blockcodierungen Bi und anschliessenden Positionscodierungen Ci verschiedene Marktbereiche Mi eindeutig voneinander unterscheidbar sind und wie in einem Marktbereich mehrere Ableitungen, d.h. hierarchische Unterscheidungen, von Schlüsseln in einer Anlage realisierbar sind.In Figs. 14 to 17 are closing function diagrams with various Combinations of block codes Bi and codes Ci of the following Positions Pi shown. In the column on the left are the codes Bi, Ci the Key Si indicated and in the row above the codes of cylinders Zi. The Keys may include drilling patterns R or L, or R + L (both) while the cylinders can only contain one drilling pattern R or L. The diagram shows with "X", whether a combination fits key / cylinder, i. if the key is the relevant cylinder opens. Lock all other combinations. FIGS. 14 to 17 show how with a few block codes Bi and then Position coding Ci different market areas Mi clearly from each other are distinguishable and, as in a market area, several derivatives, i. Hierarchical distinctions that can be realized by keys in a system.

Das Schema von Fig. 14 (welches den Fig. 8 und 9 entspricht) zeigt Codierungen Ci mit zwei Bohrbildem und mit zwei Positionen
P1 = L11 und P2 = R5
mit 5 Bestückungsvarianten mit Blockstufen Bi = B1, B2, B3 der Blocknuten
und Codierungsstufen Ci = C1 und C2.
Damit werden zwei unabhängige Marktbereiche M1, M2
mit drei bzw. zwei Ableitungen definiert.
Der Schlüssel S3 z.B. öffnet die Zylinder Z1 und Z3.
The diagram of Fig. 14 (which corresponds to Figs. 8 and 9) shows codings Ci with two drilling patterns and two positions
P1 = L11 and P2 = R5
with 5 assembly variants with block stages Bi = B1, B2, B3 of the block grooves
and coding stages Ci = C1 and C2.
This will be two independent market areas M1, M2
defined with three or two derivatives.
The key S3, for example, opens the cylinders Z1 and Z3.

Fig. 15 zeigt nur ein Bohrbild L mit Blockcode über zwei Positionen
P1 = L11 und P2 = L10
mit Blockstufen B1, B2, B3
und mit Codierungsstufen C1, C2.
Damit werden vier unabhängige Marktbereiche M1 bis M4
mit je drei Ableitungen definiert.
Der Schlüssel S11abc öffnet z.B. die Zylinder Z11a, Z11b, Z11c.
Fig. 15 shows only one hole pattern L with block code over two positions
P1 = L11 and P2 = L10
with block steps B1, B2, B3
and with coding levels C1, C2.
This will become four independent market areas M1 to M4
defined with three derivatives each.
The key S11abc, for example, opens the cylinders Z11a, Z11b, Z11c.

Fig. 16 zeigt ein Bohrbild L mit zwei Positionen
P1 = L11 und P2 = L10
mit Blockcode B1, B2, B3
und Codierungsstufen L11 = C1 und L10 = C1,
wobei mit den Blockstufen in einem Marktbereich fünf Ableitungen erzeugt werden.
D.h. Schlüssel S11abcde öffnet die fünf Zylinder Z11a bis Z11e
und der Schlüssel S11a öffnet nur den Zylinder Z11a.
Fig. 16 shows a drilling pattern L with two positions
P1 = L11 and P2 = L10
with block code B1, B2, B3
and coding levels L11 = C1 and L10 = C1,
wherein five derivatives are generated with the block stages in one market area.
That means key S11abcde opens the five cylinders Z11a to Z11e
and the key S11a only opens the cylinder Z11a.

Fig. 17 zeigt ein Beispiel mit nur je einer Position P1 jedoch in zwei Zuhaltungsreihen A1, A2. Beide Positionen P1 sind mit C1 codiert,
während mit den Blockstufen B1, B2, B3 der Blocknuten
drei unabhängige Marktbereiche M1, M2 und M3 definiert werden.
Der Schlüssel S1 öffnet nur den Zylinder Z1, S2 öffnet nur Z2 und S3 öffnet nur Z3.
FIG. 17 shows an example with only one position P1, however, in two tumbler rows A1, A2. Both positions P1 are coded C1,
while with the block stages B1, B2, B3 of Blocknuten
three independent market segments M1, M2 and M3.
The key S1 only opens the cylinder Z1, S2 only opens Z2 and S3 only opens Z3.

Fig. 18 illustriert eine Organisation des erfindungsgemässen Schliesssystems mit Sicherheits-Wendeschlüsseln in einem hierarchischen Schema. Der Systeminhaber SS (z.B. eine Herstellerfirma) stellt die höchste hierarchische Stufe dar, welche die Marktbereiche Mi = M1, M2 usw. festlegt und autorisiert, wobei ein Marktbereich z.B. ein Land oder eine Generalvertretung sein kann. In den Marktbereichen werden weitere Teilbereiche MMi definiert und separiert, z.B. für verschiedene Händler oder Anlagen in diesem Bereich. Eine weitere Stufe MMi.i kann z.B. Einzelobjekte definieren. Dies wird festgelegt durch die Codierungen der Bereiche G1 und G2.FIG. 18 illustrates an organization of the closing system according to the invention Security reversible keys in a hierarchical scheme. The system owner SS (e.g., a manufacturing company) represents the highest hierarchical level that the Market areas Mi = M1, M2, etc. are defined and authorized, being a market area e.g. a country or a general agency. In the market areas will be further subregions MMi are defined and separated, e.g. for different dealers or Investments in this area. Another stage MMi.i can e.g. individual objects define. This is determined by the codings of the areas G1 and G2.

Die Fig. 19 illustriert schematisch ein Herstellverfahren für Schlüssel eines erfindungsgemässen Systems mit Herstellungsstufen H, Bereichen G am Schlüssel und mit den gefertigten Variablen Vi in den Bereichen G. Generell erfolgt die Herstellung H mit abnehmendem Schwierigkeitsgrad HS auf tieferen Stufen bzw. dezentral. FIG. 19 schematically illustrates a manufacturing method for keys of an inventive device Systems with manufacturing levels H, G key and key areas with the manufactured variables Vi in the areas G. In general, the Production H with decreasing difficulty level HS at lower levels or decentralized.

Die in den verschiedenen Bereichen Gi und den entsprechenden Herstellungsstufen Hi gefertigten Variablen Vi und Sicherheitselemente sind beispielsweise in der Tabelle ebenfalls angegeben.
Mit der Herstellung von Schlüsseln und Zylindern eines Schliesssystems mit mindestens zwei Bereichen G1, G2 an den Schlüsseln wird zuerst der erste Bereich an den Schlüsseln an einem zentralen Fabrikationsort hergestellt H1 bzw. gesteuert und autorisiert und die Codierung Cod1 der Schlüssel des zweiten Bereichs G2 und die Bestückung der Zylinder mit entsprechenden Stiften kann anschliessend dezentral bei einem lokalen Vertreter erfolgen: H2.
The variables Vi and security elements fabricated in the different regions Gi and the corresponding manufacturing stages Hi are also indicated in the table, for example.
With the production of keys and cylinders of a locking system having at least two areas G1, G2 on the keys, first the first area on the keys at a central place of manufacture is H1, and the coding Cod1 is the key of the second area G2 and the Equipping the cylinders with corresponding pins can then be carried out decentrally by a local representative: H2.

Die Herstellung kann in mindestens zwei Stufen bzw. an verschiedenen Orten erfolgen, wobei zuerst Variablen mit höherem Schwierigkeitsgrad HS des Bereichs G1 an einem zentralen Ort und anschliessend Variablen mit niedrigerem Schwierigkeitsgrad des Bereichs G2 dezentral oder lokal gefertigt werden.
Die Herstellung der Schlüssel kann auch in drei Stufen erfolgen, wobei zuerst der erste Bereich G1 mit Variablen Vi des höchsten Schwierigkeitsgrads zentral: H1, dann ein weiterer Bereich G1/2 mit Variablen mit tieferem Schwierigkeitsgrad regional: H1/2 und schliesslich die Codierung G2 mit dem tiefsten Schwierigkeitsgrad des Bereichs G2 lokal am Ort der Anwendung gefertigt werden: H2.
In einer Weiterentwicklung des Systems kann auch die Fertigung des Bereichs G1 dezentral erfolgen. Dazu können Herstellungsprogramme und die Autorisierung "aut" von der Zentrale SS aus gesteuert und konrolliert werden.
Production may be made in at least two stages or locations, first by making variables of higher difficulty HS of the range G1 in a central location and then variables of lower difficulty of the range G2 decentrally or locally.
The production of the keys can also be done in three stages, first the first area G1 with variables Vi of the highest difficulty central: H1, then another area G1 / 2 with variables with a lower degree of difficulty regional: H1 / 2 and finally the coding G2 with The lowest level of difficulty of the G2 area can be fabricated locally at the point of application: H2.
In a further development of the system, the production of the G1 area can also be decentralized. For this purpose, production programs and the authorization "aut" can be controlled and controlled from the central station SS.

Mit dem erfindungsgemässen System und den Herstellverfahren wird eine universelle Unterscheidung von Marktbereichen und Teilbereichen sowie eine rasche lokale Fertigung ermöglicht. With the inventive system and the manufacturing process is a universal distinction between market areas and subareas as well as rapid local production allows.

Im Rahmen dieser Beschreibung werden die folgenden Bezeichnungen verwendet:

x, y, z
Raumrichtungen
x
Schlüsselachse
S, Si
Schlüssel
Z, Zi
Zylinder
Pi
Codierungspositionen
R, L
Rechts-, Links-Bohrbild
Ri, Li
Rechts-, Links-Codierungspositionen
Ai
Codierungs-, Zuhaltungsreihen
Bi
codierte Blockstufen
Ci
Codierungsstufen
BC
Blockcode
BN
Blocknut
BZ
Blockzuhaltung
BG
Blockgegenzuhaltung
BZ + BG
Blockzuhaltungspaar, Blockstiftpaar
lb
Länge von BZ + BG
db
Abstand von BN bis 10
tb
Tiefe von BN
bb
Breite von BN
tc
Tiefe der Codierungsstufen Ci
d1, d2, d3
Durchmesser
Cod1
Grundcodierung
Cod2
zweite (verschiedene) Codierung
KF
Kontrollfläche
KS
Kontrollstift
Mi
Marktbereiche
MMi
Marktteilbereiche
SS
Systeminhaber
aut
Autorisierung
H1, H2
Herstellungsstufen
HS
Herstellungs-Schwierigkeitsgrad
G1, G2
Bereiche an S
Vi
Variablen, Sicherheitselemente
5
Mittelebene von S
6
Einlauffläche an S
7
Oberfläche von S
9
Scherlinie in Z
10
Zylindergehäuse
11, 12
Auflageflächen an Zuhaltungen
15
Einlaufschräge an Zuhaltungen
21 - 23
verschiedene Zuhaltungsformen
23
Flachzuhaltung
The following terms are used in this description:
x, y, z
spatial directions
x
key axis
S, Si
key
Z, Zi
cylinder
pi
coding positions
R, L
Right, left drilling pattern
Ri, Li
Right, left coding positions
Ai
Coding, tumbler series
Bi
coded block levels
ci
coding steps
BC
block code
BN
blocking groove
BZ
Blockzuhaltung
BG
blocking counter
BZ + BG
Block tumbler pair, block pin pair
lb
Length of BZ + BG
db
Distance from BN to 10
tb
Depth of BN
bb
Width of BN
tc
Depth of the coding stages Ci
d1, d2, d3
diameter
Cod1
basic coding
Cod2
second (different) coding
KF
control Panel
KS
control pin
Wed.
market areas
MMi
Market sections
SS
system owner
aut
authorization
H1, H2
manufacturing stages
HS
Manufacturing Difficulty
G1, G2
Areas at S
vi
Variables, security elements
5
Median plane of S
6
Inlet surface at S
7
Surface of S
9
Shear line in Z
10
cylinder housing
11, 12
Bearing surfaces on tumblers
15
Inlet slope to tumblers
21 - 23
different types of tumbler
23
flat pin

Claims (22)

  1. Security reversible-key with at least three coding - / tumbler pin rows (A1, A2, A3), which are also located on the flat sides of the key (S), with an assigned cylinder (Z) with pin rows of pairs of tumbler pins, consisting of tumbler pins and counter pins at the positions of the tumbler pin rows of a given bore pattern, characterized in that the key has a blocking groove BN, which runs parallel to the key axis (x) from the tip of the key to at least the first position (P1) of a tumbler pin row on the key,
    that the blocking groove has a coded blocking depth (B1, B2, B3),
    that in the assigned cylinder at least at the rearmost coding position (P1) a pair of tumbler pins corresponding to the blocking groove BN with a blocking tumbler pin BZ and an extended blocking counter pin BG is foreseen,
    so that the blocking counter pin impinges on the cylinder housing (10) if the blocking groove is not deep enough and with this the complete insertion of a key with an insufficiently deep blocking groove is blocked by the pair of blocking tumbler pins and whereby the blocking tumbler pin BZ with the blocking counter pin BG following the insertion of the key at the position (P1) is also utilized as a coding tumbler pin with coding steps (C1, C2, C3, C4) with respect to the turning of the cylinder.
  2. Key in accordance with claim 1, characterized in that at least four rows of tumbler pins (A1 - A4) are foreseen.
  3. Key in accordance with claim 1, characterized in that at least two different codings (Cod1, Cod2) are foreseen.
  4. Key in accordance with claim 1, characterized in that coding positions (Pi) from two different bore patterns (R, L) are foreseen.
  5. Key in accordance with claim 1, characterized by a blocking groove, which runs to at least the first two positions (P1, P2) at the very front of a coding row (A2) and by blocking tumbler pins BZ1, BZ2 and blocking counter pins BG1, BG2 corresponding to these positions, with coded step depths of these at least two positions at the very front.
  6. Key in accordance with claim 5, characterized in that the blocking groove has at least two differently shaped sectors BN1, BN2.
  7. Key in accordance with claim 1, characterized in that the blocking groove extends over more than one coding position and whereby the depth (tb) of the blocking groove remains the same from one position (P1) to the next position (P2) or gets smaller.
  8. Key in accordance with claim 1, characterized in that the blocking groove extends over more than one coding position and whereby the width (bb) of the blocking groove remains the same from one position (P1) to the next position (P2) or gets smaller.
  9. Key in accordance with claim 1, characterized in that at more than one row of tumbler pins (A1, A2) respectively one blocking groove each with assigned pairs of blocking tumbler pins is foreseen.
  10. Key in accordance with claim 1, characterized in that as an additional security element at the tip of the key a rising control face KF is located, which pushes an assigned control pin KS out of the way, whereby the control pin KS prevents the insertion of a key without a control face KF.
  11. Key in accordance with claim 10, characterized in that the control pin KS is implemented as a flat pin (23), which additionally carries out a flank control at a narrow coding milling (Cod2).
  12. Key in accordance with claim 1, characterized in that in a row of tumbler pins (A2) the following security elements are located: Blocking code (BC), second coding (Cod2), insertion blocking system by means of control face (KF) and control pin (KS) as well as flank control by means of a flat pin (23).
  13. Locking system with security reversible keys for locking systems with at least three coding - / tumbler pin rows (A1, A2, A3), which are also located on the flat sides of the keys (S), with assigned cylinders (Z) with pin rows of pairs of tumbler pins, consisting of tumbler pins and counter pins at the positions of a given bore pattern and with at least two additional security elements, characterized in that at least two areas on the keys are defined, whereby in a first area G1 at least two additional security elements with a higher degree of manufacturing difficulty are foreseen and in the second area G2 a more simple basic coding (Cod1) is foreseen, and whereby with the first area G1 an unequivocal segmentation into independent market areas (M1, M2, ...) is defined and whereby the first area G1 as an additional security element has a blocking code (BC), i.e., the keys have a blocking groove BN, which runs parallel to the axis of the key (x) from the tip of the key to at least the first position (P1) of a tumbler pin row on the key, the blocking groove has a coded blocking depth (B1, B2, B3), in the assigned cylinder at least at the rearmost coding position (P1) a pair of tumbler pins with a blocking tumbler pin BZ and an extended blocking counter pin BG corresponding to the blocking groove BN are foreseen, so that the blocking counter pin BG impinges on the cylinder housing (10), if the blocking groove is not deep enough and therefore the complete insertion of a key with an insufficiently deep blocking groove is blocked by the pair of blocking tumbler pins, and whereby the blocking tumbler pin BZ with the blocking counter pin BG after the insertion of the key at the position (P1) is also utilized as a coding tumbler pin with coding steps (C1, C2, C3, C4) with respect to the turning of the cylinder.
  14. Locking system in accordance with claim 13, characterized in that as security elements in the first area G1 a second coding (Cod2), an insertion blocking by means of control faces (KF) on the key and assigned control pin (KS) in the cylinder, a flank control by means of a flat tumbler pin (23) and a blocking code (BC) are foreseen.
  15. Locking system in accordance with claim 13, characterized in that on the keys in areas different bore patterns (R, L) are foreseen.
  16. Locking system in accordance with claim 13, characterized in that at least three security elements are foreseen in the first area G1.
  17. Locking system in accordance with claim 13, characterized in that as security elements a second coding (Cod2) with a narrow milling is foreseen.
  18. Locking system in accordance with claim 13, characterized in that all security elements of the area G1 are affixed in one coding row (A2).
  19. Method for the manufacturing of keys and cylinders of a locking system with at least two areas (G1, G2) on the keys (S) in accordance with claim 13, characterized in that first the first area G1 on the keys is manufactured, resp., controlled and authorized in a central place of manufacture (H1), and that the coding (Cod1) of the keys of the second area G2 and the equipping of the cylinders with corresponding pins subsequently is able to take place decentralized at a local representative (H2).
  20. Method in accordance with claim 19, characterized in that the manufacturing takes place in at least two steps, resp., at different locations, whereby first variables (Vi) with a higher degree of difficulty (HS) of the area G1 are manufactured at a central location and subsequently variables with a lower degree of difficulty of the area G2 are manufactured decentralized or locally.
  21. Method in accordance with claim 19, characterized in that the manufacturing of the keys takes place in at least three steps, whereby first the first area G1 with variables (Vi) of the highest degree of difficulty is manufactured centrally (H1), thereupon a further area (G1/2) with variables with a lower degree of difficulty is manufactured regionally (H1/2) and finally the coding with the lowest degree of difficulty of the area G2 is manufactured locally at the place of application (H2).
  22. Method in accordance with claim 19, characterized in that the manufacturing of the area G1 is also able to take place decentralized, whereby the manufacturing programmes and the authorization (aut) for this are controlled and checked from a central location SS.
EP01916829A 2000-04-11 2001-04-02 Security turnkey and lock system Expired - Lifetime EP1185755B1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
CH719002000 2000-04-11
CH7192000 2000-04-11
CH7202000 2000-04-11
CH72000 2000-04-11
PCT/CH2001/000207 WO2001077466A1 (en) 2000-04-11 2001-04-02 Security turnkey and lock system

Publications (2)

Publication Number Publication Date
EP1185755A1 EP1185755A1 (en) 2002-03-13
EP1185755B1 true EP1185755B1 (en) 2004-06-30

Family

ID=25738109

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01916829A Expired - Lifetime EP1185755B1 (en) 2000-04-11 2001-04-02 Security turnkey and lock system

Country Status (21)

Country Link
US (1) US6912881B2 (en)
EP (1) EP1185755B1 (en)
JP (2) JP4358471B2 (en)
CN (1) CN1243898C (en)
AT (1) ATE270370T1 (en)
AU (2) AU6411200A (en)
CA (1) CA2372313C (en)
CZ (1) CZ299579B6 (en)
DE (1) DE50102720D1 (en)
DK (1) DK1185755T3 (en)
ES (1) ES2223808T3 (en)
HK (1) HK1049361A1 (en)
HU (1) HU229173B1 (en)
MY (1) MY122538A (en)
NO (1) NO336386B1 (en)
NZ (1) NZ515825A (en)
PL (1) PL201483B1 (en)
PT (1) PT1185755E (en)
SK (1) SK286550B6 (en)
WO (1) WO2001077466A1 (en)
ZA (1) ZA200109663B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL153068A (en) * 2002-11-24 2010-12-30 Dany Markbreit Backward compatible lock system, key blanks and keys therefor
US7707864B1 (en) * 2004-08-17 2010-05-04 Justin Melendez Locking device
EP1635012A3 (en) * 2004-09-01 2009-06-17 Alpha Corporation Cylinder lock device
AT503738B1 (en) * 2006-06-01 2008-08-15 Evva Werke KEY
CN101595269B (en) * 2006-12-21 2013-06-26 卡巴公司 Locking system with security turning keys
FR2933727A1 (en) * 2008-07-09 2010-01-15 Emka France Flat key for controlling rotor of conventional lock, has series of teeth that is not symmetric with respect to plane perpendicular to flat key-bit and passes through median longitudinal axis of flat key
AT506955B1 (en) * 2008-08-12 2010-01-15 Evva Werke CYLINDER LOCK WITH CYLINDER HOUSING AND FLAT KEY FOR A CYLINDER LOCK
US20100279237A1 (en) * 2009-05-02 2010-11-04 Trent Charles Farrer System and Method for Entertaining and Producing a Fire Show
DE102009025993B3 (en) * 2009-06-18 2011-01-20 C. Ed. Schulte Gesellschaft mit beschränkter Haftung Zylinderschloßfabrik Locking device and key for a locking device
DE102009050129A1 (en) 2009-10-21 2011-04-28 Abus Pfaffenhain Gmbh locking system
CN103109028B (en) * 2010-09-07 2015-04-01 三恭金属株式会社 Lock device
RU2629737C2 (en) 2012-08-29 2017-08-31 Дормакаба Швайц Аг Preparation, protected key, closing system and method of manufacture
US9624696B2 (en) 2014-06-04 2017-04-18 Schlage Lock Company Llc Lock plug including modular cartridges
AT518317B1 (en) * 2016-03-11 2018-04-15 Evva Sicherheitstechnologie Key and associated lock
DE102018203781B4 (en) 2018-03-13 2022-04-07 Karl-Heinz Strahl Pin cylinder key system and keys therefor
CH716813B1 (en) 2019-11-18 2023-09-29 Sea Schliess Systeme Ag Key, cylinder lock, locking system and method for coding a key.
AT523792A1 (en) * 2020-04-20 2021-11-15 Evva Sicherheitstechnologie Flat key for a cylinder lock
AT523800B1 (en) 2020-05-12 2022-06-15 Evva Sicherheitstechnologie Cross-sectional profile for a flat key or the keyway of a cylinder lock
EP4063594A1 (en) * 2021-03-24 2022-09-28 MG Serrature S.p.A. Reversible flat key and cylinder lock with reversible flat key
CH718959A1 (en) * 2021-09-14 2023-03-15 Dormakaba Austria Gmbh Key element, in particular key or key blank, manufacturing process and locking system.
CH719611A1 (en) 2022-04-14 2023-10-31 Dormakaba Schweiz Ag Key element, lock cylinder, locking system and method for producing a key element.

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2344473B2 (en) * 1973-09-04 1976-04-29 Josef Voss KG, 5040 Brühl CYLINDER CORE IN A CYLINDER LOCK WITH FLAT KEY
CH591001A5 (en) * 1975-09-11 1977-08-31 Bauer Kaba Ag
CH608069A5 (en) * 1975-09-19 1978-12-15 Dom Sicherheitstechnik Reversible flat key for a cylinder lock
US4139877A (en) * 1977-11-04 1979-02-13 Townsend Robert H Modular read/write head carriage with drive for floppy disk units
CH638585A5 (en) * 1979-04-24 1983-09-30 Ernst Keller LOCKING SYSTEM WITH A VARIETY OF DIFFERENT LOCKING POSSIBILITIES.
CH651350A5 (en) * 1980-09-05 1985-09-13 Ernst Keller Cylinder lock with a reversible key
DE3225952A1 (en) 1982-07-10 1984-01-12 Karrenberg, Wilhelm, 5620 Velbert Flat key for a lock cylinder
DE3542008A1 (en) * 1985-11-28 1987-06-04 Dom Sicherheitstechnik Key for lock cylinders
CH675894A5 (en) * 1988-08-27 1990-11-15 Bauer Kaba Ag
CH679507A5 (en) * 1989-12-15 1992-02-28 Bauer Kaba Ag
IL104349A (en) 1993-01-08 1997-01-10 Mul T Lock Ltd Locking apparatus
FR2704893B1 (en) * 1993-05-05 1995-08-11 Tesa Safety lock and open key for such a lock.
US5687594A (en) * 1996-01-18 1997-11-18 Wang; Teng-Kuo Lock and key combination with changeable combination of locking pieces
US5822921A (en) * 1996-06-19 1998-10-20 Excel Indusries, Inc. Door with biasing window regulator
DE19654136C2 (en) * 1996-12-23 1999-11-18 Schulte C E Gmbh Locking cylinder
ITTO980491A1 (en) * 1998-06-05 1999-12-05 Mottura Serrature Di Sicurezza CYLINDER LOCK.
US6378739B1 (en) * 1999-03-05 2002-04-30 Afa Polytek, B.V. Precompression system for a liquid dispenser
DE19958306C2 (en) * 1999-12-03 2002-03-14 Zeiss Carl Coordinate measuring

Also Published As

Publication number Publication date
CN1243898C (en) 2006-03-01
CA2372313A1 (en) 2001-10-18
AU4401701A (en) 2001-10-23
PL352630A1 (en) 2003-08-25
EP1185755A1 (en) 2002-03-13
CA2372313C (en) 2008-10-07
ES2223808T3 (en) 2005-03-01
NO336386B1 (en) 2015-08-10
NO20016033D0 (en) 2001-12-10
AU784184B2 (en) 2006-02-16
DE50102720D1 (en) 2004-08-05
ATE270370T1 (en) 2004-07-15
JP2003535238A (en) 2003-11-25
CZ299579B6 (en) 2008-09-03
SK17132001A3 (en) 2002-10-08
DK1185755T3 (en) 2004-11-01
HK1049361A1 (en) 2003-05-09
HUP0201583A2 (en) 2002-10-28
CZ20014179A3 (en) 2002-04-17
JP2009036018A (en) 2009-02-19
MY122538A (en) 2006-04-29
HU229173B1 (en) 2013-09-30
SK286550B6 (en) 2008-12-05
JP4358471B2 (en) 2009-11-04
CN1366571A (en) 2002-08-28
ZA200109663B (en) 2002-11-25
NZ515825A (en) 2003-11-28
US6912881B2 (en) 2005-07-05
WO2001077466A1 (en) 2001-10-18
PT1185755E (en) 2004-11-30
AU6411200A (en) 2001-10-18
PL201483B1 (en) 2009-04-30
US20030101783A1 (en) 2003-06-05
NO20016033L (en) 2002-02-08
JP4864956B2 (en) 2012-02-01

Similar Documents

Publication Publication Date Title
EP1185755B1 (en) Security turnkey and lock system
AT396500B (en) FLAT KEY BLANK, FLAT KEY AND RELATED KEY CYLINDER
DE1728599C3 (en) Flat key for cylinder locks with pin tumblers
EP1607553B1 (en) Lock cylinder
EP0008310A1 (en) Cylinder lock and reversible flat key
EP2504508B1 (en) Locking system
DE102008045739A1 (en) lock cylinder
EP2890856B1 (en) Blank, security key, lock system, and production method
DE102009033487A1 (en) closing device
DE2533494B2 (en) Lock cylinder with pin tumblers and key
EP3426865A1 (en) Key and corresponding lock
DE102010012261B4 (en) locking system
DE102006058558B4 (en) Reversible key for profile cylinder
WO2007082580A1 (en) Copy-proof profiled flat key for cylinder locks
DE102007014900A1 (en) Lock device for use in motor vehicle, has two types of flat blank tumblers positioned in cylinder core, where movements of two types of flat blank tumblers point in two radial directions that are different to each other
EP1746226B1 (en) Key
EP2290178B1 (en) Flat key
EP2094922A1 (en) Locking system with security turning keys
DE19535225C1 (en) Locking system
AT408678B (en) CYLINDLE LOCK WITH CYLINDER CASE AND ROTATING CYLINDER CORE
DE19732450B4 (en) Reversible key lock cylinder
DE4123378A1 (en) Key for cylinder lock - has offset cross=section of key shank which increases lock security
WO2003060261A1 (en) Cylinder-lock and flat-key combination
DE19824065A1 (en) Lock cylinder for four-way turning keys
EP1270852B1 (en) Key for a lock cylinder and locking system with several lock cylinders

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20011122

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: SI PAYMENT 20011122

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Extension state: SI

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20040630

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20040630

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: GERMAN

REF Corresponds to:

Ref document number: 50102720

Country of ref document: DE

Date of ref document: 20040805

Kind code of ref document: P

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20040930

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 20040917

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: FREI PATENTANWALTSBUERO

REG Reference to a national code

Ref country code: DK

Ref legal event code: T3

REG Reference to a national code

Ref country code: PT

Ref legal event code: SC4A

Free format text: AVAILABILITY OF NATIONAL TRANSLATION

Effective date: 20040927

ET Fr: translation filed
REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2223808

Country of ref document: ES

Kind code of ref document: T3

REG Reference to a national code

Ref country code: IE

Ref legal event code: FD4D

PLAQ Examination of admissibility of opposition: information related to despatch of communication + time limit deleted

Free format text: ORIGINAL CODE: EPIDOSDOPE2

PLBQ Unpublished change to opponent data

Free format text: ORIGINAL CODE: EPIDOS OPPO

PLAQ Examination of admissibility of opposition: information related to despatch of communication + time limit deleted

Free format text: ORIGINAL CODE: EPIDOSDOPE2

PLAR Examination of admissibility of opposition: information related to receipt of reply deleted

Free format text: ORIGINAL CODE: EPIDOSDOPE4

PLBI Opposition filed

Free format text: ORIGINAL CODE: 0009260

PLBQ Unpublished change to opponent data

Free format text: ORIGINAL CODE: EPIDOS OPPO

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20050402

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20050402

PLAB Opposition data, opponent's data or that of the opponent's representative modified

Free format text: ORIGINAL CODE: 0009299OPPO

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20050430

PLAX Notice of opposition and request to file observation + time limit sent

Free format text: ORIGINAL CODE: EPIDOSNOBS2

26 Opposition filed

Opponent name: KESO AG

Effective date: 20050323

R26 Opposition filed (corrected)

Opponent name: KESO AG

Effective date: 20050323

NLR1 Nl: opposition has been filed with the epo

Opponent name: KESO AG

NLR1 Nl: opposition has been filed with the epo

Opponent name: KESO AG

PLAF Information modified related to communication of a notice of opposition and request to file observations + time limit

Free format text: ORIGINAL CODE: EPIDOSCOBS2

PLBB Reply of patent proprietor to notice(s) of opposition received

Free format text: ORIGINAL CODE: EPIDOSNOBS3

PLBP Opposition withdrawn

Free format text: ORIGINAL CODE: 0009264

PLBD Termination of opposition procedure: decision despatched

Free format text: ORIGINAL CODE: EPIDOSNOPC1

PLBM Termination of opposition procedure: date of legal effect published

Free format text: ORIGINAL CODE: 0009276

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: OPPOSITION PROCEDURE CLOSED

27C Opposition proceedings terminated

Effective date: 20060107

NLR2 Nl: decision of opposition

Effective date: 20060107

PLAB Opposition data, opponent's data or that of the opponent's representative modified

Free format text: ORIGINAL CODE: 0009299OPPO

REG Reference to a national code

Ref country code: ES

Ref legal event code: PC2A

Owner name: KABA AG

Effective date: 20121106

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 16

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 17

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 18

REG Reference to a national code

Ref country code: CH

Ref legal event code: PFA

Owner name: KABA SCHLIESSSYSTEME AG, CH

Free format text: FORMER OWNER: KABA SCHLIESSSYSTEME AG, CH

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20200420

Year of fee payment: 20

Ref country code: ES

Payment date: 20200629

Year of fee payment: 20

Ref country code: DE

Payment date: 20200420

Year of fee payment: 20

Ref country code: NL

Payment date: 20200427

Year of fee payment: 20

Ref country code: FI

Payment date: 20200421

Year of fee payment: 20

Ref country code: DK

Payment date: 20200422

Year of fee payment: 20

Ref country code: PT

Payment date: 20200401

Year of fee payment: 20

Ref country code: FR

Payment date: 20200420

Year of fee payment: 20

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20200428

Year of fee payment: 20

Ref country code: GB

Payment date: 20200427

Year of fee payment: 20

Ref country code: SE

Payment date: 20200427

Year of fee payment: 20

Ref country code: BE

Payment date: 20200427

Year of fee payment: 20

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 20200421

Year of fee payment: 20

REG Reference to a national code

Ref country code: DE

Ref legal event code: R071

Ref document number: 50102720

Country of ref document: DE

REG Reference to a national code

Ref country code: DK

Ref legal event code: EUP

Expiry date: 20210402

REG Reference to a national code

Ref country code: NL

Ref legal event code: MK

Effective date: 20210401

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: GB

Ref legal event code: PE20

Expiry date: 20210401

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20210401

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK07

Ref document number: 270370

Country of ref document: AT

Kind code of ref document: T

Effective date: 20210402

REG Reference to a national code

Ref country code: BE

Ref legal event code: MK

Effective date: 20210402

REG Reference to a national code

Ref country code: FI

Ref legal event code: MAE

REG Reference to a national code

Ref country code: SE

Ref legal event code: EUG

REG Reference to a national code

Ref country code: ES

Ref legal event code: FD2A

Effective date: 20210726

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20210414

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20210403