NL2025438B1 - Error-checking unlocking method and error-checking lock core - Google Patents

Error-checking unlocking method and error-checking lock core Download PDF

Info

Publication number
NL2025438B1
NL2025438B1 NL2025438A NL2025438A NL2025438B1 NL 2025438 B1 NL2025438 B1 NL 2025438B1 NL 2025438 A NL2025438 A NL 2025438A NL 2025438 A NL2025438 A NL 2025438A NL 2025438 B1 NL2025438 B1 NL 2025438B1
Authority
NL
Netherlands
Prior art keywords
key
spring
data
unlocking
balls
Prior art date
Application number
NL2025438A
Other languages
Dutch (nl)
Inventor
Wu Xianfeng
Li Guiyu
Original Assignee
Nanjing Enwell Tech Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Enwell Tech Service Co Ltd filed Critical Nanjing Enwell Tech Service Co Ltd
Priority to NL2025438A priority Critical patent/NL2025438B1/en
Application granted granted Critical
Publication of NL2025438B1 publication Critical patent/NL2025438B1/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B39/00Locks giving indication of authorised or unauthorised unlocking
    • E05B39/04Locks giving indication of authorised or unauthorised unlocking with counting or registering devices
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B27/00Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks

Abstract

This application discloses an error-checking unlocking method and an error-checking lock core, the method including: acquiring lock core parameters; acquiring unlocking data, wherein the unlocking data includes: up-shifting distances AH of the spring balls where unlocking conditions are satisfied, and a distance h between a tip of a key and a popup mechanism where the unlocking conditions are satisfied; acquiring trigger nodes for determining whether a key is correct; acquiring actual data when the tip of the key reaches the trigger nodes, wherein the actual data includes up-shifting distances AH' of the respective spring balls; comparing AH' in the actual data with the corresponding AH in the unlocking data, and performing a popup operation where AH' are not equal to the corresponding AH. This application acquires trigger nodes for determining whether the current key is a correct key and compares correctness of the current key at positions of the trigger nodes, immediately initiates a key popup operation provided that determination conditions are not satisfied. Consequently, it can make an accurate determination quickly during insertion of the current key, and occurrence of any problem possibly caused by continuing insertion of a wrong key into a keyhole can be avoided.

Description

ERROR-CHECKING UNLOCKING METHOD AND ERROR-CHECKING LOCK CORE FIELD OF THE INVENTION
[0001] Embodiments of this application relate to the field of smart home technology, and in particular, to an error-checking unlocking method. Meanwhile, this application further relates to a lock core in line with the method.
BACKGROUND OF THE INVENTION
[0002] According to structure, locks may be classified into an electronic lock, a padlock, a drawer lock, a spring ball lock, a ball lock and the like, wherein the spring ball lock is the most popular lock structure with the operating principle of using a plurality of cylindrical components (referred to as lock springs, spring balls, or spring beads) having different heights to lock up a lock core, such that each lock spring can be pushed to a same height when a correct key is inserted, and then the lock core is released. In modern daily life, the spring ball lock is still a first choice of most families when selecting a household lock, due to its characteristics of low cost, easy installation and the like.
[0003] However, a relatively simple structure of the spring ball lock causes its durability and safety during usage to be restricted to some extent. For example, when a key having a shape similar to the key matched with the spring ball lock to be unlocked is used for a try of unlock, usually such key may be completely inserted into the lock body; however, it can be very easily seized up in the lock core and hardly drawn out due to its shape unmatched with the lock core; further, it can be possibly broken off in the lock core in an extremity, rendering the lock disabled. For another example, a conventional spring ball lock usually cannot effectively distinguish a key from other unlocking tools, such that it is possible for a criminal to try to simulate a shape of the key with other tools again and again, thus the burglar-proof performance of the spring ball lock is dramatically decreased.
SUMMARY OF THE INVENTION
[0004] This application provides an error-checking unlocking method and an error-checking lock core to address the deficiencies of a spring ball lock in the prior art such as non-effective identification of a correct key, lower safety performance and the like.
[0005] This application provides an error-checking unlocking method, including: acquiring lock core parameters, wherein the lock core parameters include a number n of spring balls, gaps s between the spring balls and spaces H between top ends of the spring balls and upper ends of spring ball trenches; acquiring unlocking data, wherein the unlocking data includes up-shifting distances AH of the spring balls where unlocking conditions are satisfied, and a distance h between a tip of a key and a popup mechanism where the unlocking conditions are satisfied; acquiring trigger nodes for determining whether a key is correct, wherein the trigger nodes are determined according to calculations on the unlocking data and the lock core parameters; acquiring actual data when the tip of the key reaches the trigger nodes, wherein the actual data includes up-shifting distances AH’ of the respective spring balls; and comparing AH' in the actual data with the corresponding AH in the unlocking data, and performing a popup operation provided that AH' are not equal to the corresponding AH.
[0006] This application further provides an error-checking lock core, including: an outer core, an inner core, spring ball cavities, spring balls and springs, wherein: the inner core, provided with a key cavity along a direction of a centre line of the inner core, is located within the outer core and rotatable with respect to the outer core; a plurality of spring ball cavities parallel to each other are provided, and the spring ball cavities have one ends located within the outer core and the other ends communicated with the key cavity; a group of the spring balls and the springs is provided in each of the spring ball cavities, upper ends of the springs are fixed on upper ends of the spring ball cavities and lower ends of the springs are connected to one ends of the spring balls; the error-checking lock core further includes first distance sensors, a popup mechanism and a controller, wherein, lower end faces of the spring balls are positioned at a same horizontal line where no key is inserted into the lock core, the first distance sensors are provided on the upper ends of the spring ball cavities for acquiring distances between upper ends of the spring balls and the upper ends of the spring ball cavities and feeding a signal back to the controller, the popup mechanism is provided at another side of the key cavity and provided with a popup block movable in a direction of the key cavity, the popup block has a front end provided with a second distance sensor for acquiring a distance between a tip of the key and the popup mechanism and feeding a signal back to the controller, and the first distance sensors, the popup mechanism and the second distance sensor are electrically connected to the controller, respectively.
[0007] The error-checking unlocking method and the error-checking lock core provided in this application may achieve the following advantages:
[0008] First, this application acquires trigger nodes for determining whether the current key is a correct key and determines correctness of the current key at positions of the trigger nodes, immediately initiates a key popup operation where determination conditions are not satisfied, and can make an accurate determination quickly during the insertion of the current key, thereby prevent any problem possibly caused by continuing insertion of a wrong key into a keyhole, such that a user can find the wrong key in use at an earlier time and change it timely.
[0009] Second, this application employs a procedure of performing data acquisition and data determination many times during the insertion of an unknown key, therefore it requires a tool inserted into the keyhole must have a fixed shape and an unchangeable material, thus can effectively prevent an unlocking person from picking lock by use of tools other than a key.
[0010] Third, this application starts up an alarm device and the popup mechanism at the same time depending on the determination result that the current key is false, which may not only remind the user of changing the key, but also attract other people and further warn the picklock person, thus improves burglar-proof performance.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] FIG. 1 is a flow chart of an error-checking unlocking method in an embodiment according to this application;
[0012] FIG. 2 is a step-by-step diagram of step S30 of an error-checking unlocking method in an embodiment according to this application;
[0013] FIG. 3 is a step-by-step diagram of step S50 of an error-checking unlocking method in an embodiment according to this application;
[0014] FIG. 4 is a flow chart of an error-checking unlocking method in another embodiment according to this application;
[0015] FIG. 5 is a schematic diagram of a structure of an error-checking lock core in an embodiment according to this application;
[0016] FIG. 6 is a constructional diagram of a controller of an error-checking lock core in an embodiment according to this application;
[0017] FIG. 7 is a diagram of a usage state of an error-checking lock core in use according to this application;
[0018] FIG. 8 is another diagram of usage state of an error-checking lock core in use according to this application;
[0019] FIG. 9 is yet another diagram of usage state of an error-checking lock core in use according to this application.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0020] Referring to FIG. 1, it is a flow chart of an error-checking unlocking method in an embodiment according to this application.
[0021] As can be seen from FIG. 1, this application provides an error-checking unlocking method, including the following steps.
[0022] S10: lock core parameters including a number n of spring balls, gaps s between the spring balls and spaces H between top ends of the spring balls and upper ends of spring ball trenches are acquired. In this embodiment, the lock core parameters should be regarded to be obtained after a completion of production and fabrication of a 5 lock core, and will not be changed during usage. It should be stated that, the gaps s between the springs contemplated in this application are a constant value, that is, the respective spring balls are spaced equally and arranged uniformly. The spaces H between the top ends of all the spring balls and the upper ends of the spring ball trenches may be a same value or different values where no key is inserted into the lock core. If values of H are different, they may be recorded as H1, H2, ......, Hn depending on a sequence in which the spring balls are arranged.
[0023] Furthermore, in the embodiments of this application, lower ends of all spring balls should be positioned at a same horizontal plane, such that where a key is inserted, a same part on the key pushes each spring ball upward by a same distance, in this case a tooth profile parameter of the current key may be acquired at a position of each spring ball.
[0024] S20: unlocking data including up-shifting distances AH of the spring balls where unlocking conditions are satisfied, and a distance h between a tip of a key and a popup mechanism where the unlocking conditions are satisfied are acquired. Satisfaction of the unlocking conditions refers to a state where a key matched with the lock core is completely inserted into the lock core. At this time, the spring balls rise to different extents, as tooth profiles of the key have different heights. Also at this time, an uprising distance AH of each spring ball is a unique correct value that can make the inner core rotate. Specifically, AH is obtained by calculating a difference between a space H in the lock core parameters and a space H' between a top of a spring ball and an upper end of a spring ball trench measured where the unlocking conditions are satisfied. For example, where no key is inserted, the space between the top end of a spring ball A and the upper end of the spring ball trench is determined as H1, and where a correct key is inserted, the space between the top end of the spring ball A and the upper end of the spring ball trench is determined as H1', the up-shifting distance AH
=H1-H1" is thus determined.
[0025] S30: trigger nodes for determining whether a key is correct are acquired, wherein the trigger nodes are determined according to calculations on the unlocking data and the lock core parameters. Because distances H" between the top ends of the spring balls and the upper ends of the spring ball trenches actually measured during inserting a key into the lock core are continuously changed, whether the current key is a correct key may be determined more accurately and effectively by determining specific trigger nodes and further simulating states of the spring balls by use of corresponding positions of the trigger nodes when the current key is completely inserted into the lock core.
[0026] Specifically, it can refer to FIG. 2 for specific steps of acquiring the trigger nodes, which is a step-by-step diagram of step S30 of an error-checking unlocking method in an embodiment according to this application.
[0027] As can be seen from FIG. 2, in an implementable embodiment, step S30 may be divided into the following steps.
[0028] S31: a point, at which the distance between the tip of the key and the popup mechanism is h, is selected as the last trigger node. Because h is the distance between the tip of the key and the popup mechanism where the unlocking conditions are satisfied, that is, it indicates the current key has been completely inserted into the lock core when the distance equals to h. At this time, the uprising values of all the spring balls need to be compared with the up-shifting distances AH where the unlocking conditions are satisfied, then whether the current key is a correct key is finally determined.
[0029] S32: a point, at which the distance between the tip of the key and the popup mechanism is h+ (n-1) s, is selected as the first trigger node.
[0030] S33: a space between the adjacent trigger nodes is s.
[0031] In this embodiment, a manner of determining the trigger nodes is firstly determining the last trigger node, and then deducing backward to determine other trigger nodes. After the last trigger node has been determined, it is known that the current key pushes all of n spring balls to shift upward at this node, in this case the up-shifting distances of all the spring balls may be compared respectively with the corresponding data to determine whether the current key is a correct key. Further, because it is known that the gaps between the spring balls are s, it may be inferred that, when the distance between the tip of the key and the popup mechanism is h+s, the current key pushes n-1 spring balls to shift upward, in this case the up-shifting distances of the n-1 spring balls may be compared respectively with the corresponding data to determine whether the current key is a correct key. As such, every time the distance is increased by one gap between the spring balls, one trigger node can be determined, and finally it may be inferred that a point at which the distance is h+ (n-1) s is the first trigger node. For example, when the number of the spring balls is 5, and gaps of the spring balls are 10, where h=>5, the first trigger node may be represented as 5+ (5-1) *10=45, and the remained trigger nodes are: 35/25/15/5 in order.
[0032] S40: actual data is acquired when the tip of the key reaches the trigger nodes, wherein the actual data includes up-shifting distances AH’ of the respective spring balls. Specifically, distances H" between the top ends of the respective spring balls and the upper ends of the spring ball trenches are firstly measured, then values of AH' are obtained through a formula: AH' =H-H". As can be seen from the above, because initial positions of top ends of different spring balls may be different, the up-shifting distance AH’ of each spring ball needs to be independently calculated. For example, for a spring ball A, its up-shifting distance AH1'=H1-H1".
[0033] S50: AH' in the actual data are compared with the corresponding AH in the unlocking data, and a popup operation is performed where AH' are not equal to the corresponding AH. In this embodiment, because up-shifting distances of all the spring balls pushed by the same part on the key are equal to each other, an up-shifting distance of some spring ball pushed by a part of a key when the key has been finally completely inserted is simulated by actually measuring an up-shifting distance of this spring ball when the key reaches some trigger node, then correctness of the key can be determined without need of completely inserting the key. For example, when a key begins to insert and reaches the first trigger node, a first spring ball shifts upward, at this time the first spring ball is used for simulating an up-shifting amount of the last spring ball in the unlocking data. In this case the up-shifting amount of the spring ball at this time needs to be compared with the up-shifting amount of the last spring ball in the unlocking data to determine whether the key is correct. For another example, when the key continues its insertion into the lock core and reaches a second trigger node, first and second spring balls shift upward, at this time the first spring ball is used for simulating an up-shifting amount of the last second spring ball in the unlocking data, and the second spring ball is used for simulating an up-shifting amount of the last spring ball in the unlocking data. In this case the up-shifting amount of the first spring ball needs to be compared with the up-shifting amount of the last second spring ball in the unlocking data, and the up-shifting amount of the second spring ball needs to be compared with the up-shifting amount of the last spring ball in the unlocking data. As such, if the values for comparison are equal to each other respectively, insertion of the key will continue until the key reaches the last trigger node; otherwise. To the contrary, a popup operation is performed immediately if an unequal case occurs at any node.
[0034] Further, a manner of performing the popup operation in this application is not limited to only one. For example, a push rod having a key-like shape may be adopted to eject the key outward under drive of an actuating source.
[0035] Referring to FIG. 3, it is a step-by-step diagram of step S50 in an error-checking unlocking method in an embodiment according to this application.
[0036] As can be seen from FIG. 3, in an implementable embodiment, step S50 may be divided into the following steps.
[0037] S51: up-shifting distance H1', ..., Hm' of the respective spring balls are acquired in sequence along a direction in which the key is inserted, wherein, me[1, n] and Hm'>0. H1' is represented as an up-shifting distance of the first spring ball, and Hm is represented as an up-shifting distance of the last spring ball along the direction in which the key is inserted and whose up-shifting amount is not zero.
[0038] S52: up-shifting distances AH1, AH2, ..., AHn of the respective spring balls in the unlocking data are called in sequence along the direction in which the key is inserted. Because the unlocking data has been acquired in step S20, the unlocking data only needs to be called in this step.
[0039] S53: AH' are compared with AH one by one in a reverse order. Specifically, Hm' is compared with AHn, Hm-1' is compared with AHn-1 and so on, until the up-shifting distances of all the spring balls shifting upward are compared with the corresponding values in the unlocking data.
[0040] Further, according to the method provided in this embodiment, when the actual data obtained at some trigger node is fully consistent with the unlocking data, it is believed that the portion of the key that has been inserted into the lock core satisfies the requirement for a correct key, and insertion of the remained portion of the key into the lock core can continue without any operation until it reaches a next trigger node, and the performing of the comparison and determination procedure is thus started again. In comparison with the previous trigger node, the number of the spring balls shifting upward is increased by one at the next trigger node, and the spring balls shifting upward at the previous node are equivalent to being translated forward on the whole. Thus, it can be determined that the up-shifting amount of these spring balls may still satisfy the requirement of consistence with the corresponding amount in the unlocking data. Hence in step 50, only an up-shifting amount of the newly increased spring ball needs to be compared with the corresponding data in the unlocking data, unnecessary comparison steps are thus avoided. In this way, it can effectively save data processing amount and improve unlocking efficiency.
[0041] Referring to FIG. 4, it is a flow chart of an error-checking unlocking method in another embodiment according to this application.
[0042] As can be seen from FIG. 4, in another embodiment, the method further includes the following steps.
[0043] An alarm operation is performed provided that AH' are not equal to the corresponding AH. When a system determines the current inserted key does not satisfy the determination conditions of a correct key, the alarm operation is performed concurrently as the popup operation is performed. On one hand, it prompts the user to change the key, on the other hand, it further attract other people. Furthermore, it warns the picklock person. Therefore, burglar-proof performance is improved.
[0044] Further, there may be various specific manners of performing the alarm operation in this application, such as providing an alarm lamp, providing an externally provided voice speaker, or sending alarm information to a network terminal in a manner of being communicated with the network terminal, and so on.
[0045] As can be seen from the above technical solutions, this application provides an error-checking unlocking method. This method can acquire trigger nodes for determining whether the current key is a correct key and compare correctness of the current key at positions of the trigger nodes, immediately initiate a key popup operation where determination conditions are not satisfied, and can make an accurate determination quickly during insertion of the current key. Consequently, occurrence of any problem possibly caused by continuing insertion of a wrong key into a keyhole can be avoided.
[0046] Referring to FIG. 5, it is a schematic diagram of a structure of an error-checking lock core in an embodiment according to this application.
[0047] As can be seen from FIG. 5, this application further provides an error-checking lock core, to which the error-checking unlocking method provided in this application can be applied. The error-checking lock core includes: an outer core 1, an inner core 2, spring ball cavities 3, spring balls 4 and springs 5, wherein: the inner core 2, provided with a key cavity 11 along a direction of a centre line of the inner core 2, is located within the outer core 1 and rotatable with respect to the outer core 1; a plurality of spring ball cavities 3 parallel to each other are provided, and the spring ball cavities 3 have one ends located within the outer core 1 and the other ends communicated with the key cavity 11; a group of the spring balls 4 and the springs 5 is provided in each of the spring ball cavities 3, upper ends of the springs 5 having are fixed on upper ends of the spring ball cavities 3 and lower ends of the springs 5 are connected to one ends of the spring balls 4; characterized in that, the error-checking lock core further includes first distance sensors 6, a popup mechanism 7 and a controller 8.
[0048] Lower end faces of the spring balls 4 are positioned at a same horizontal line where no key is inserted into the lock core, such that a same part of the key pushes each spring ball upward by a same distance where a key is inserted,, a tooth profile parameter of the current key thus may be acquired at a position of each spring ball.
[0049] The first distance sensors 6 are provided on the upper ends of the spring ball cavities 3 for acquiring distances between upper ends of the spring balls 4 and the upper ends of the spring ball cavities 3 and feeding a signal back to the controller 8.
[0050] The popup mechanism 7 is provided at other side of the key cavity 11 and provided with a popup block 71 movable in a direction of the key cavity 11. The popup block 71 may be actuated by the popup mechanism 7 to move along a direction of the key cavity 11 opposite to a direction in which the key is inserted, thereby ejecting the key outward. When the key has been completely ejected out, the popup block 71 is actuated by the popup mechanism 7 to return to its initial position. The popup block 71 has a front end provided with a second distance sensor 72 for acquiring a distance between a tip of the key and the popup mechanism and feeding a signal back to the controller 8.
[0051] The first distance sensors 6, the popup mechanism 7 and the second distance sensor 72 are electrically connected to the controller 8, respectively. In this embodiment, the controller 8 is used for performing data acquisition, data analysis, data determination, and performing a control on startup of the popup mechanism. Specifically, the controller 8 is provided therein with a plurality of unit modules for accomplishing different functions.
[0052] Referring to FIG. 6, it is a constructional diagram of a controller of an error-checking lock core in an embodiment according to this application.
[0053] As can be seen from FIG. 6, in an embodiment, the controller 8 is provided therein with a signal receiving unit 81, a data input unit 82, a signal processing unit 83 and an executive control unit 84.
[0054] The signal receiving unit 81 is used for acquiring data fed back from the first distance sensors 6 and the second distance sensor 7, and transmitting the data to the signal processing unit, wherein the fed back data may include distances between top ends of the spring balls and upper ends of spring ball trenches and a distance between the tip of the key and the popup mechanism.
[0055] The data input unit 82 is used for inputting lock core parameters and unlocking data to the signal processing unit 83, wherein the lock core parameters include: a number n of spring balls, gaps s between the spring balls and spaces H between the top ends of the spring balls and the upper ends of the spring ball trenches, and the unlocking data includes: up-shifting distances AH of the spring balls where unlocking conditions are satisfied, and a distance h between the tip of the key and the popup mechanism where the unlocking conditions are satisfied.
[0056] The signal processing unit 83 is used for determining whether a popup operation is to be performed according to the inputted data. Specifically, trigger nodes are firstly obtained from the unlocking data and the lock core parameters; when a key is inserted into the lock core and reaches the trigger nodes, the signal processing unit 83 compares the actually measured up-shifting distances AH’ of the respective spring balls with the up-shifting distances AH of the respective spring balls where the unlocking conditions are satisfied; no popup operation is performed where values of AH’ are equal to those of AH at corresponding positions respectively; to the contrary the popup operation is performed where the values of AH' are not equal to those of AH respectively.
[0057] The executive control unit 84 is used for performing a control on the popup mechanism 7 according to the determination result of the signal processing unit 83.
Where the key is determined to be a correct key, the executive control unit does not perform the control on the popup mechanism, and where the key is determined to be a wrong key, the executive control unit controls the popup mechanism 7 to start up to exit the wrong key.
[0058] Optionally, the error-checking lock core further includes an alarm 9 electrically connected to the controller 8, the alarm 9 for performing an alarm operation.
[0059] Specifically, usage of the above error-checking lock core are explained and illustrated in FIGS.7-9, and in this embodiment, number n of the spring balls is equal to 5.
[0060] Referring to FIGS.7-9, they are diagrams showing changes of states of an error-checking lock core during usage according to this application.
[0061] Before a determination on correctness of an unknown key is performed, the trigger nodes for determining whether the key is correct are firstly to be determined.
The determination process comprises: firstly inserting a correct key into the lock core completely, measuring the distance h between the tip of the key and the popup mechanism at this time using the second distance sensor, measuring the distances between top ends of five spring balls and the upper ends of the spring ball trenches at this time by use of the first distance sensors, and obtaining up-shifting distances AH1, AH2, ..., AH5 of the five spring balls through calculation. In other words, when an unknown key is inserted into the lock core and the distance between the tip of the key and the popup mechanism is h, it may determine whether the key is a correct key or not by comparing the up-shifting distances of the five spring balls with values of the corresponding AH at this time. Hence, when the distance between the tip of the key and the popup mechanism is h, the last trigger node is determined. After the last trigger node has been determined, other trigger nodes are determined in a backward-reversing manner. After the last trigger node has been determined, it is known that the current key pushes all the five spring balls to shift upward at this node, in this case the up-shifting distances of all the spring balls may be compared respectively with the corresponding data to determine whether the current key is a correct key. Further, because it is known that the gaps between the spring balls are s, it may be inferred that, when the distance between the tip of the key and the popup mechanism is h+s, the current key pushes n-1 spring balls to shift upward, in this case the up-shifting distances of the n-1 spring balls may be compared respectively with the corresponding data to determine whether the current key is a correct key. As such, every time the distance is increased by one gap between two adjacent spring balls, one trigger node can be determined, and finally it may be inferred that a point at which the distance is h+ (n-1) s is a first trigger node. For example, when number of the spring balls is 5, and gaps of the spring balls are 10, where h=5, the first trigger node may be represented as 5+ (5-1) *10=45, and the remained trigger nodes are: 35/25/15/5 in order.
[0062] After all the trigger nodes have been determined, a process of inserting an unknown key may be determined. As shown in FIG. 7, when the unknown key is inserted into the lock core, the second distance sensor starts acquiring a distance L between the tip of the key and the popup mechanism. When the value of L reaches the first trigger node, a first spring ball closest to the keyhole is pushed to shift upward, at this time a distance between the top end of the spring ball and the upper end of the spring ball trench is acquired by the first distance sensor, the up-shifting distance AH1' is thus calculated. The value of AH1' is compared with that of AH5, and the controller issues a control instruction to the popup mechanism to exit the key provided that the above values are not equal to each other.
[0063] Where the values in the above comparison are equal to each other, the control operation is not performed and the insertion of the key can continue. As shown in FIG. 8, when the unknown key continues to insert into the lock core and reaches the second trigger node, two spring balls are simultaneously pushed to shift upward, at this time distances between the top ends of the spring balls and the upper ends of the spring ball trenches are acquired by the first distance sensors, thereby calculating the up-shifting distances AH1' and AH2'. The value of AH2' is compared with that of AH5, and the value of AH1' with that of AH4, and where the values in any group are not equal to each other, the controller issues a control instruction to the popup mechanism to exit the key.
[0064] As such, as shown in FIG. 9, where the respective groups of values in the above comparisons are equal to each other respectively, the performing of the similar comparison procedure is continued. It should be noted that, corresponding relations between two values to be compared need to be adjusted once a new spring ball shifting upward appears,, such that the corresponding relations follow the manner of comparing the above values one by one in an reverse order.
[0065] As can be seen from the above technical solutions, this application provides an error-checking lock core, including an outer core, an inner core, spring ball cavities, spring balls and springs, wherein: the inner core, provided with a key cavity along a direction of a centre line of the inner core, is located within the outer core and rotatable with respect to the outer core; a plurality of spring ball cavities parallel to each other are provided, and the spring ball cavities have one ends located within the outer core and the other ends communicated with the key cavity; a group of the spring balls and the springs is provided in each of the spring ball cavities, upper ends of the springs are fixed on upper ends of the spring ball cavities and lower ends of the springs are connected to one ends of the spring balls. The error-checking lock core further includes first distance sensors, a popup mechanism and a controller. Lower end faces of the spring balls are positioned at a same horizontal line where no key is inserted into the lock core. The first distance sensors are provided on the upper ends of the spring ball cavities for acquiring distances between upper ends of the spring balls and the upper ends of the spring ball cavities and feeding a signal back to the controller. The popup mechanism is provided at another side of the key cavity and provided with a popup block movable in a direction of the key cavity, the popup block has a front end provided with a second distance sensor for acquiring a distance between a tip of the key and the popup mechanism and feeding a signal back to the controller. The first distance sensors, the popup mechanism and the second distance sensor are electrically connected to the controller.
[0066] The error-checking lock core provided in this application can acquire trigger nodes for determining whether the current key is a correct key and compare correctness of the current key at positions of the trigger nodes, immediately initiate a key popup operation where determination conditions are not satisfied. Consequently, it can make an accurate determination quickly during the insertion of the current key, and occurrence of any problem possibly caused by continuing insertion of a wrong key into a keyhole can be avoided.

Claims (7)

CONCLUSIESCONCLUSIONS 1. Een fout controlerende ontgrendel methode voor een slot, met het kenmerk dat de methode omvat: het verkrijgen van kern parameters van het slot, waarbij de kern parameters van het slot omvatten: een aantal n veerkogels, uitsparingen s tussen de veerkogels en ruimtes H tussen de boveneinden van de veerkogels en de bovenste einden van veerkogel sleuven; het verkrijgen van ontgrendel gegevens, waarbij de ontgrendel gegevens naar- boven-gerichte verschuifafstanden AH van de veerkogels omvatten waaraan de ontgrendel voorwaarden voldoen, en een afstand h tussen een tip van een sleutel en een pop-up mechanisme waaraan de ontgrendel voorwaarden voldoen; het verkrijgen van stuurposities om te bepalen of de sleutel correct is, waarbij de stuurposities worden bepaald volgens berekeningen uitgevoerd op de ontgrendel gegevens en de kern parameters van het slot; het verkrijgen van actuele gegevens wanneer de tip van de sleutel de stuurposities bereikt, waarbij de actuele gegevens naar-boven-gerichte verschuifafstanden AH’ van de respectievelijke veerkogels omvatten; en het vergelijken van AH’ van de actuele gegevens met de overeenkomende AH van de ontgrendel gegevens, en het uitvoeren van een pop-up bewerking onder de voorwaarde dat AH’ niet gelijk is aan de overeenkomende AH.An error checking unlock method for a lock, characterized in that the method comprises: obtaining core parameters of the lock, the core parameters of the lock including: a number n spring balls, recesses s between the spring balls and spaces H slots between the top ends of the spring balls and the top ends of the spring ball; obtaining unlock data, the unlock data comprising upward sliding distances AH of the spring balls that meet the unlocking conditions, and a distance h between a tip of a key and a pop-up mechanism that the unlocking conditions meet; obtaining control positions to determine if the key is correct, the control positions being determined according to calculations performed on the unlock data and the core parameters of the lock; obtaining current data when the tip of the key reaches the steering positions, the current data including upward shifting distances AH "of the respective spring balls; and comparing AH "of the current data with the corresponding AH of the unlocked data, and performing a pop-up operation under the condition that AH" is not equal to the corresponding AH. 2. De fout controlerende ontgrendel methode voor een slot volgens conclusie 1, met het kenmerk, dat de stap van het vergelijken van AH’ van de actuele gegevens met de overeenkomende AH van de ontgrendel gegevens de stappen omvat van: het verkrijgen van afstanden H1’, ..., Hm’ van de respectievelijke veerkogels in een volgorde volgens een richting waarin de sleutel wordt gestoken, waarin m € [1, n] en Hm > 0; het oproepen van naar-boven-gerichte verschuifafstanden AH1, AH2, …, AHn van de ontgrendel gegevens van de overeenkomende veerkogels in de volgorde langs de richting waarin de sleutel wordt gestoken; en het één voor één in een omgekeerde volgorde vergelijken AH met AH.The error checking unlock method for a lock according to claim 1, characterized in that the step of comparing AH 'of the current data with the corresponding AH of the unlocking data comprises the steps of: obtaining distances H1' , ..., Hm 'of the respective spring balls in a sequence according to a key insertion direction, where m € [1, n] and Hm> 0; calling upward shifting distances AH1, AH2,…, AHn from the unlock data of the corresponding spring balls in the order along the direction of insertion of the key; and comparing AH to AH one by one in reverse order. 3. De fout controlerende ontgrendel methode voor een slot volgens conclusie 1 of 2, met het kenmerk, dat de stap van het verkrijgen van de stuurposities om te bepalen of de sleutel correct is de stappen omvat van:The error checking unlock method for a lock according to claim 1 or 2, characterized in that the step of obtaining the control positions to determine if the key is correct comprises the steps of: het selecteren van een punt als de laatste stuurpositie, waarbij de afstand tussen de tip van de sleutel en het pop-up mechanisme h is; en het selecteren van een punt als de eerste stuurpositie, waarbij de afstand tussen de tip van de sleutel en het pop-up mechanisme h+{n-1)-s is; waarbij s een ruimte tussen de aangrenzende stuurposities is.selecting a point as the last steering position, the distance between the tip of the key and the pop-up mechanism being h; and selecting a point as the first steering position, the distance between the tip of the key and the pop-up mechanism being h + {n-1) -s; where s is a space between the adjacent control positions. 4. De fout controlerende ontgrendel methode voor een slot volgens een van de voorgaande conclusies 1-3, met het kenmerk, dat de methode verder omvat: het uitvoeren van een alarmeringsactie onder voorwaarde dat AH" niet gelijk is aan de overeenkomende AH.The error checking unlocking method for a lock according to any one of the preceding claims 1-3, characterized in that the method further comprises: performing an alerting action under the condition that AH "is not equal to the corresponding AH. 5. Een fout controlerende cilinder slot omvattende: een buitenkern (1), een binnenkern (2), veerkogel ruimtes (3), veerkogels (4) en veren (5), waarbij de binnenkern (2) is voorzien van een sleutelgat (11) langs een richting van een middellijn van de binnenkern (2) is gelegen binnen de buitenkern {1) en roteerbaar ten opzichte van de buitenkern (1); een groot aantal veerkogel ruimtes (3) die evenwijdig aan elkaar zijn aangebracht, en de veerkogel ruimtes (3) bezitten één einde dat zich in de buitenkern (1) bevindt en de andere einde dat in verbinding staat met de sleutelgat (11}; in elk van de veerkogel ruimtes (3) is een groep van de veerkogels (4) en de veren (5) aangebracht, de bovenste uiteinden van de veren (5) zijn bevestigd aan de boveneinden van de veerkogel ruimtes (3) en de onderste uiteinden van de veren (5) zijn verbonden met één uiteinde van de veerkogels (4); gekenmerkt doordat, het fout controlerende cilinder slot verder eerste afstandssensoren (8), een pop- upmechanisme (7) en een regelaar (8) omvat, waarin, de onderste uiteinden van de veerkogels (4) zich op dezelfde horizontale lijn bevinden, indien geen sleutel in het cilinderslot is gestoken, de eerste afstandssensoren (8) zijn aangebracht op de boveneinden van de veerkogel ruimtes (3) voor het vaststellen van afstanden tussen de boveneinden van de veerkogels (4) en de boveneinden van de veerkogel ruimtes (3) en het terugvoeren van een signaal naar de regelaar (8), het pop-up mechanisme (7) is voorzien aan een andere zijde van het sleutelgat (11) en is voorzien van een pop-up blokelement (71) dat beweegbaar is in de richting van het sleutelgat (11), waarbij het pop-up blokelement (71) een voorste einde bezit voorzien van een tweede afstandssensor (72) voor het verkrijgen van een afstand tussen een tip van de sleutel en het pop-up mechanisme en het terugvoeren van een signaal aan de regelaar (8), en waarbij de eerste afstandssensoren (8), het pop-up mechanisme (7) en de tweede afstandssensar (72) respectievelijk elektrisch zijn verbonden met de regelaar (8).A fault checking cylinder lock comprising: an outer core (1), an inner core (2), spring ball spaces (3), spring balls (4) and springs (5), the inner core (2) being provided with a keyhole (11). ) along a direction of a centerline of the inner core (2) is located within the outer core (1) and rotatable with respect to the outer core (1); a plurality of spring ball spaces (3) arranged parallel to each other, and the spring ball spaces (3) have one end located in the outer core (1) and the other end communicating with the keyhole (11}; in each of the spring ball spaces (3) is a group of the spring balls (4) and the springs (5) arranged, the upper ends of the springs (5) are attached to the upper ends of the spring ball spaces (3) and the lower ends of the springs (5) are connected to one end of the spring balls (4); characterized in that, the fault checking cylinder lock further comprises first distance sensors (8), a pop-up mechanism (7) and a controller (8), wherein, the lower ends of the spring balls (4) are on the same horizontal line, if no key is inserted in the cylinder lock, the first distance sensors (8) are mounted on the upper ends of the spring ball spaces (3) to determine distances between the upper ends of the spring balls ( 4) and the top ends of the spring ball spaces (3) and returning a signal to the controller (8), the pop-up mechanism (7) is provided on another side of the keyhole (11) and is provided with a pop-up block element (71) movable in the direction of the keyhole (11), the pop-up block element (71) having a front end provided with a second distance sensor (72) for obtaining a distance between a tip of the key and the pop-up mechanism and returning a signal to the controller (8), and wherein the first remote sensors (8), the pop-up mechanism (7) and the second remote sensor (72) are respectively electrically connected with the regulator (8). 6. Het fout controlerende cilinder slot volgens conclusie 5, met het kenmerk, dat het slot binnen de regelaar (8) voorziet is van: een signaal ontvangsteenheid (81) voor het verkrijgen van de gegevens die worden teruggevoerd door de eerste afstandssensaren (6) en de tweede afstandssensor (72), en het verzenden van de gegevens naar een signaalverwerkende eenheid (83); een data-invoereenheid (82) voor het invoeren van kern parameters van het slot en ontgrendelgegevens naar de signaalverwerkende eenheid (83), waarbij de kern parameters van het slot omvatten: een aantal n veerkogels, uitsparingen s tussen de veerkogels en ruimtes H tussen de boveneinden van de veerkogels en de bovenste einden van veerkogel sleuven, en waarbij de ontgrendel gegevens omvatten: naar- boven-gerichte verschuifafstanden AH van de veerkogels waaraan de ontgrendel voorwaarden voldoen, en een afstand h tussen een tip van een sleutel en een pop-up mechanisme waaraan de ontgrendel voorwaarden voldoen; de signaalverwerkende eenheid (83) voor het vaststellen of een pop-up bewerking moet worden uitgevoerd aan de hand van de ingevoerde gegevens; en een uitvoerende besturingseenheid (84) voor het uitvoeren van een controle met betrekking tot het pop-up mechanisme (7) volgens het vaststellingsresultaat van de signaalverwerkende eenheid (83).The error checking cylinder lock according to claim 5, characterized in that the lock within the controller (8) includes: a signal receiving unit (81) for obtaining the data returned from the first remote sensors (6) and the second remote sensor (72), and sending the data to a signal processing unit (83); a data input unit (82) for inputting core parameters of the lock and unlocking data to the signal processing unit (83), the core parameters of the lock comprising: a number n of spring balls, recesses s between the spring balls and spaces H between the upper ends of the spring balls and the upper ends of spring ball slots, and where the unlocking data includes: upward sliding distances AH of the spring balls with which the unlocking conditions meet, and a distance h between a tip of a key and a pop-up mechanism that the unlock conditions meet; the signal processing unit (83) for determining whether to perform a pop-up operation from the inputted data; and an executive control unit (84) for performing a check on the pop-up mechanism (7) according to the determination result of the signal processing unit (83). 7. Het fout controlerende cilinder slot volgens conclusie 5 of 8, met het kenmerk dat het fout controlerende slotkern verder een alarm (9) omvat dat elektrisch is verbonden met de regelaar (8).The fault checking cylinder lock according to claim 5 or 8, characterized in that the fault checking lock core further comprises an alarm (9) electrically connected to the controller (8).
NL2025438A 2020-04-28 2020-04-28 Error-checking unlocking method and error-checking lock core NL2025438B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NL2025438A NL2025438B1 (en) 2020-04-28 2020-04-28 Error-checking unlocking method and error-checking lock core

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NL2025438A NL2025438B1 (en) 2020-04-28 2020-04-28 Error-checking unlocking method and error-checking lock core

Publications (1)

Publication Number Publication Date
NL2025438B1 true NL2025438B1 (en) 2021-04-06

Family

ID=71784609

Family Applications (1)

Application Number Title Priority Date Filing Date
NL2025438A NL2025438B1 (en) 2020-04-28 2020-04-28 Error-checking unlocking method and error-checking lock core

Country Status (1)

Country Link
NL (1) NL2025438B1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5691711A (en) * 1995-02-24 1997-11-25 Jorgensen; Adam A. Digital electronic key and lock system
WO2000060197A1 (en) * 1999-04-06 2000-10-12 David Chaum Electronic lock that can learn to recognize any ordinary key
US20170298654A1 (en) * 2016-04-14 2017-10-19 Schlage Lock Company Llc Lock cylinder with electronic key recognition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5691711A (en) * 1995-02-24 1997-11-25 Jorgensen; Adam A. Digital electronic key and lock system
WO2000060197A1 (en) * 1999-04-06 2000-10-12 David Chaum Electronic lock that can learn to recognize any ordinary key
US20170298654A1 (en) * 2016-04-14 2017-10-19 Schlage Lock Company Llc Lock cylinder with electronic key recognition

Similar Documents

Publication Publication Date Title
EP3358508A1 (en) Abnormality detection apparatus, abnormality detection method, and program
Bifet et al. Learning from time-changing data with adaptive windowing
CN111339129B (en) Remote meter reading abnormity monitoring method and device, gas meter system and cloud server
Kumar et al. A generalized approach for inconsistency detection in data fusion from multiple sensors
WO2007067471A1 (en) Evaluating anomaly for one-class classifiers in machine condition monitoring
CN109062189A (en) A kind of industrial process method for diagnosing faults for complex fault
CN112241351B (en) Data processing method, device, equipment and medium
NL2025438B1 (en) Error-checking unlocking method and error-checking lock core
CN108959188A (en) Granger Causality based on quantization minimal error entropy criterion sentences the method for distinguishing
CN114925536A (en) Airborne system PHM testability modeling and diagnosis strategy optimization method and device
van de Bovenkamp et al. Survival time of the susceptible-infected-susceptible infection process on a graph
CN110138614A (en) A kind of online network flow abnormal detecting method and system based on tensor model
CN105717851A (en) Real Time Trigger Using A Finite State Machine Having A Counting State
CN110992396A (en) K-means + + clustering algorithm-based multi-extension target tracking method
CN210685635U (en) Mistake-proofing lock cylinder
CN106649438A (en) Time series data unexpected fault detection method
CN110442512A (en) The method for testing reliability and relevant device of information management system by all kinds of means
Wu et al. A high-throughput and arbitrary-distribution pattern generator for the constrained random verification
CN109798028A (en) A kind of mistake proofing method for unlocking and mistake proofing lock core
Chouchane et al. Diagnosis on a sliding window for partially observable Petri nets
US7146301B2 (en) Efficient production of disjoint multiple traces
CN114692792B (en) Makeup radio frequency identification testing platform
Frosini Objective Bayesian intervals: some remarks on Gini’s approach
CN115130440B (en) Business data entry processing system suitable for equipment financing
Old Simulation study

Legal Events

Date Code Title Description
MM Lapsed because of non-payment of the annual fee

Effective date: 20230501