TWI227299B - Variable code type cylinder lock - Google Patents

Variable code type cylinder lock Download PDF

Info

Publication number
TWI227299B
TWI227299B TW092112807A TW92112807A TWI227299B TW I227299 B TWI227299 B TW I227299B TW 092112807 A TW092112807 A TW 092112807A TW 92112807 A TW92112807 A TW 92112807A TW I227299 B TWI227299 B TW I227299B
Authority
TW
Taiwan
Prior art keywords
pin
password
cylinder
variable
inner cylinder
Prior art date
Application number
TW092112807A
Other languages
Chinese (zh)
Other versions
TW200307782A (en
Inventor
Masayuki Mori
Original Assignee
Takigen Mfg Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Takigen Mfg Co filed Critical Takigen Mfg Co
Publication of TW200307782A publication Critical patent/TW200307782A/en
Application granted granted Critical
Publication of TWI227299B publication Critical patent/TWI227299B/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B27/00Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
    • E05B27/005Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in with changeable combinations
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B27/00Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
    • E05B27/0003Details
    • E05B27/0017Tumblers or pins

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

This invention provides a variable code type cylinder lock. The lock includes an inner cylinder 2 with an inner cylinder side sliding hole 31, a code pin 32 received in the inner cylinder side sliding hole 31, a variable pin 33 abutting the code pin 32 from an outer cylinder side 1 to extend the length of the code pin 32, an outside cylinder side sliding hole 34 piercing through the outer cylinder 1 to communicate with the inner cylinder side sliding hole 31 when the code pin 32 is at a reference position X, a driver pin 36 received in the outer cylinder side sliding hole 34 and urged towards the inner cylinder 2 side by a spring 35, an outer cylinder side sliding hole 37 piercing through the outer cylinder 1 to communicate the inner cylinder side sliding hole 31 when the code pin 32 is at a changed position Y, and a driver pin 39 received in the outer cylinder side sliding hole 37 and urged towards the inner cylinder 2 by a spring 38.

Description

1227299 玖、發明說明·· 【發明所屬之技術領域】 本發明是關於-種圓筒鎖,尤其是關於一種可變更密 碼的圓筒鎖。 【先前技術】 、往已知有一種僅能以事先準備好的變更用鑰匙之次 數來夂更在碼的所谓用完即丢型可變鎖碼型圓筒鎖。這種 圓::鎖是如第13圖所示具有:外筒1;内筒2;穿設於此 内筒:的内筒側滑動孔3】;收容於此内筒側滑動孔3工的 …馬銷3 2,以及從外筒1側抵接於此密碼銷3 2以延長密 瑪銷32之長度的可變銷33。且具有:穿設於外筒卜且當 密=銷32位於基準位置時可與内筒側滑動孔31相連通的 外筒側/月動孔34,以及收容於此外筒側滑動孔34,並由彈 ^朝内筒1側彈壓的傳動銷3 6。又具有··穿設於内筒2, 且使内筒2轉動預定角度時會向外筒側滑動孔34開口的可 ’头銷收合孔6。纟於具有複數段此構成,因此可進行複數 次的密碼變更。 接下來說明上述圓筒鎖的作用。 一般操作是如第13圖(b])至(b-3)所示,在將一般鑰 匙NK插入鑰匙孔2a的狀態下使其朝順時針方向旋轉來進 行。此時,由於可變銷33經常收容於内筒側滑動孔Μ, 及該可變銷33與傳動们6的抵接面經常位於内筒2的外 周面上,因此内筒2可在第13圖的(b_2)至(b_3)的範圍内 轉動。 314641 5 1227299 密碼變更是如第13圖〇1)至(C-3)所示,取代一般輪 匙Νκ而使用變更用鑰匙ck來進行。亦即,當密碼銷32 位於基準位置時,將變更用鑰匙ck插入鑰匙孔2a,藉此 使可變銷33抵抗傳動銷36的彈壓而收容於外筒側滑動孔 34,並且形成該可變銷33與密碼銷32之抵接面位於内筒 2之外周面上的狀態(參照第13圖(c-1))。 接下來,在插入變更用鑰匙CK的狀態下,也就是在 可變銷33收容於外筒側滑動孔34的狀態下進行轉動操 作,直到可變銷收容孔6來到基準位置為止(參照第圖 (c-2))。藉此,收容於外筒側滑動孔34的可變銷33就會順 著傳動銷3 6的彈壓而收容於可變銷收容孔6。 接下來,在插入變更用鑰匙CK的狀態下,也就是在 可變銷33收容於收容孔6的狀態下進行轉動操作,直到内 筒側滑動孔31來到基準位置為止(參照第13圖…」))。如 上述將抵接於密碼銷32以延長該密碼銷32之長度的可織 銷33加以去除,可縮短密碼銷32之外觀上的長度,且; 1 1從1土尸遢失鐵 延’也可由管理人員將該圓筒鎖的密碼變更成新密碼, 此使遺失⑽匙無法再❹,同時使新的料產生效用 而且,上述圓筒鎖在管理者將保養作業等委 個作業者的情況下仍然有效。這是因為將某作業領域的 辦從作MA移交給作時m使用作掌者^ 所使用過的錄匙,而且不需要交換圓筒鎖即可迅速進> 314641 6 1227299 作業者B之餘匙產生效用的處理。 然而,由於上述圓筒鎖可進行密碼變更的次數有限, 因此-旦使用完該變更次數,之後便無法再進行密瑪變 更,而只能交換圓筒鎖來解決。1227299 发明 、 Explanation of the invention ... [Technical field to which the invention belongs] The present invention relates to a cylinder lock, and more particularly to a cylinder lock whose password can be changed. [Prior art] There is a known so-called disposable-loss variable-lock cylinder lock that can only change the number of times the key is changed in advance. This kind of circle :: lock has: the outer cylinder 1; the inner cylinder 2; the inner cylinder side sliding hole 3] which is inserted through the inner cylinder; and the inner cylinder side sliding hole 3 is housed ... horse pin 32, and a variable pin 33 that abuts on this cipher pin 32 from the outer cylinder 1 side to extend the length of the Mimar pin 32. It also has an outer cylinder side / moon moving hole 34 which is inserted in the outer cylinder and can communicate with the inner cylinder side sliding hole 31 when the dense = pin 32 is at the reference position, and is accommodated in the outer cylinder side sliding hole 34, and The driving pin 3 6 is pressed by the elastic element ^ toward the inner cylinder 1 side. It also has a pin-receiving hole 6 which is provided in the inner cylinder 2 and is opened to the outer cylinder-side sliding hole 34 when the inner cylinder 2 is rotated by a predetermined angle. Since this structure has multiple segments, it is possible to change the password multiple times. Next, the operation of the cylinder lock will be described. The general operation is performed by rotating the general key NK clockwise with the general key NK inserted in the key hole 2a as shown in Figs. 13 (b)) to (b-3). At this time, since the variable pin 33 is often accommodated in the inner cylinder side sliding hole M, and the abutting surface of the variable pin 33 and the transmissions 6 is often located on the outer peripheral surface of the inner cylinder 2, the inner cylinder 2 can be positioned at the 13th position. (B_2) to (b_3) in the figure. 314641 5 1227299 As shown in Fig. 13 (1) to (C-3), the password is changed by using the change key ck instead of the general key Nκ. That is, when the cipher pin 32 is located at the reference position, the change key ck is inserted into the key hole 2a, whereby the variable pin 33 is housed in the outer cylinder-side slide hole 34 against the spring pin of the transmission pin 36, and the variable is formed. The state where the contact surface of the pin 33 and the pin 32 is located on the outer peripheral surface of the inner cylinder 2 (refer to FIG. 13 (c-1)). Next, in the state where the change key CK is inserted, that is, the variable pin 33 is accommodated in the outer cylinder-side slide hole 34, until the variable pin accommodation hole 6 reaches the reference position (refer to the first (C-2)). Thereby, the variable pin 33 accommodated in the outer cylinder-side slide hole 34 is accommodated in the variable pin accommodation hole 6 in accordance with the elasticity of the transmission pin 36. Next, in a state in which the change key CK is inserted, that is, the variable pin 33 is accommodated in the accommodation hole 6, until the inner cylinder-side slide hole 31 reaches the reference position (refer to FIG. 13 ... "))). As described above, removing the woven pin 33 that abuts on the password pin 32 to extend the length of the password pin 32 can shorten the appearance length of the password pin 32, and The password of the cylinder lock can be changed to a new password by the management personnel. This makes it impossible to recover the lost key, and at the same time makes the new material effective. Moreover, the above cylinder lock is used when the administrator assigns maintenance work to the operator. Down is still valid. This is because the office in a certain field of work is transferred from the work MA to the workman, and the recording key used has been used, and it can be quickly entered without the need to exchange cylinder locks.> 314641 6 1227299 The spoon produces a useful treatment. However, because the cylinder lock can be changed a limited number of times, once the number of changes is used, it is not possible to change the Mimar afterwards, but only by replacing the cylinder lock.

因此,上述管理者是委託複數個作業者的情況下,即 使某作業領域的承辦從作業者A經由複數個作業者再回到 作業者A ’也無法再使用之前作業者A所使用的密碼,而 只能使用新的密碼,’即使是8段可變式的鎖,將A ϋ作為-個週期來組成交換順序時,在進入第4週 期時也必須更換所有的圓筒鎖。 ,頂 8段 多 而且,鑰匙的遺失並不會在短時間内發生好幾次 年發生一次。若是如此,則在一年每一階段使用 可變式的鎖的情況下,|全部使用完8段,最少也需要8 年的時間。經過這麼長的時間,㈣遺失的錄匙進入的可 能性會變得極小’目此應該亦可使8年前所使㈣密碼再 度恢復,但過去的圓筒鎖並沒有辦法做到這一點。 再者’即使是因為使用者的誤會而暫時遺失鑰匙的情 況,-旦變更密碼就無法恢復成原來的密碼,因此會造成 有限之可雙後碼之使用上的浪費,以致圓筒鎖的壽命變 短0 【發明内容】 本毛月疋為了解決這種問題而研創者,其目的在於提 供一種可永久反覆進行密碼變更的可變鎖碼型圓筒鎖。 本^明之其他目的是除了上述目的之外,又在於提供 7 3)4641 1227299 種可迅速且安全地進行密碼變 本發明之又其他目的是除了上述目型圓筒鎖。 供-種不需要大幅變更習知可變鎖的::於提 能以:單構造且低成本加以製造的可變鎖: = 而 為了達成上述目的,本發明之可口同鎖。 徵為具有:外筒;㈣;收前这固同鎖的特 的密碼銷;收容在穿設於前述外筒之滑=内同之滑動孔 内筒側彈壓的傳動銷;設置在 亚且朝則述 間的可變銷;從前述穷碼销盘、, 與前述傳動銷之 J述在碼銷與前述傳動銷之間去除針、十、1 變銷而收容該可變銷的可變銷收容機構; 除的可變銷回到前述穷 吏則处破去 μ 與料傳動銷之間的可變鎖η 设機構,且可逆向進行密碼變更。 4回 而且’本發明之可變鎖碼型圓筒鎖的特徵 =筒;穿設於前述内筒的内筒側滑動孔;收容於前』 内剩動孔的密碼銷;從前述外筒側抵接於前述密碼: =延長、碼銷之長度的可變銷;穿設於前述外筒,且告 前述密碼銷位於基準位置χ時可與前述内筒側滑動孔^ 通的第i外筒側滑動孔;收容於前述第】外筒側滑動孔, f由彈簧朝前述内筒側彈堡的第"專動銷;穿設於前述外 訇,且當前述密碼銷位於密碼變更位置γ時可盥前述内言 側滑動孔相連通的第2外筒側滑動孔;以及收容於前述; 2外筒側滑動孔’並由彈簧朝前述内筒側彈壓的第2傳動 銷;當前述密碼銷位於密碼變更位置丫時,選擇使前述可 變銷抵抗前述第2傳動銷的彈壓而收容於前述第2 314641 8 ^227299 ^動孔、或是使選擇前述可變銷順著前述第2傳動銷的彈 :而收容於前述内筒側滑動孔,然後使前述密碼銷回到基 :位置X ’错此即可利用前述密碼銷之長度的變更來逆向 進行密碼變更。 :者’上述圓筒鎖又具有用來將密碼變更時 之 轉動範圍限定於基準位置x丨 +位置X到在碼變更位置Y’同時使該 制的2 π與—般操作時的内筒之轉動範圍重複而加以限 制的轉動限制機構。 【實施方式】 以下根據所附圖面來說明本發明之一實施形態。 (基本構成) J二巧實施形態之可變鎖碼型圓筒鎖的橫剖視 口弟2圖是該圓筒鎖的縱剖視圖。 此圓筒鎖是如第i圖所示, 碼生成邻3 由外同1、内同2、可變密 巧玍成邛3、以及固有密 宓石馬头士加 王成邛4所構成。在此,固有 山”、、成邛4所生成的密碼是夂圓μ 法變更。相斟% L 口圓同鎖所固有,之後並無 後述步驟進行〜,更,而”、、“3所生成的密碼可依 而日 山碼父更而且該密石馬變更可逆向進行。 且’此圓筒鎖是如第2圊 密碼生成部3、以及4段固有::::分別具有5段可變 安全性佳的固有密碼,且可生= 成部4。藉此即可生成 以丁力, 生成8種可變密碼(#1至8)。 、’十對離輸匙孔2a最遠的楚 3以及第4俨旧士…▲ 的$ 5段可變密碼生成部 段的構成亦與下述相同。 —成加以說明,但其他 31464] 9 1227299 (可變密碼生成部的構成) 可變密碼生成部3是由第1圖的符號3丨至3 9所構成。 亦即具有:穿設於内筒2的内筒側滑動孔3 1 ;收容於此内 筒側滑動孔31的密碼銷32 ;從外筒丨側抵接於此密碼銷 3 2以延長密碼銷3 2之外觀上長度的可變鎖3 3。 且具有:穿設於外筒1,且在一般狀態下,也就是密 碼銷32位於基準位置X時可與内筒側滑動孔3丨相連通的 外筒側滑動孔34 ;以及收容於外筒側滑動孔34,並由彈簧 3 5朝内筒2側彈壓的傳動銷3 6。 又具有·穿設於外靖1,且在對於内筒2進行轉動操 作,使密碼銷32位於密碼變更位置γ時可與内筒側滑動 孔3 1相連通的外筒側滑動孔37 ;以及收容於外筒側滑動 孔3 7,並由彈黃3 8朝内筒2側彈壓的傳動銷3 9。 (固有密碼生成部的構成) 固有密碼生成部4是由第}圖的符號4丨至48所構成。 亦即具有··穿設於内筒2的内筒側滑動孔4丨;以及收容於 此内筒側滑動孔4 1的密碼銷42。 且具有:穿設於外筒1,且在一般狀態下,也就是密 碼銷32位於基準位置X時可與内筒側滑動孔4丨相連通的 外筒側滑動孔43 ;以及收容於外筒側滑動孔43,並由彈筈 44朝内筒2側彈壓的傳動銷45。 ” 又具有··穿設於外筒丨,且在對於内筒2進行轉動操 作,使密碼銷32位於密石馬變更位置γ時可與内筒側滑動 孔41相連通的外筒側滑動孔# ;以及收容於此外筒側滑 31464] 10 1227299 動孔4 6,並由彈簧4 7朝内筒2側彈壓的傳動銷4 8。 以下針對使用於上述圓筒鎖的兩種鑰匙(變更用鑰匙 及一般輪匙)、以及相對於這些餘匙之轉動限制機構的構成 及作用加以說明。 (’交更用輸4 · 一般錄匙的構成) 變更用鑰匙是變更圓筒鎖之密碼時所使用的鑰匙,有 CK1至CK8八種。若針對這些當中的變更用鑰匙cK1及 CK2加以說明,則是如第3圖⑷所示,在鑰匙板cKla、 2a分別形成有旋轉限制用的缺口部CKlb、2b ;作用於可 變密碼生成部3的可變密碼部CKlc、2c ;以及作用於固有 密碼生成部4的固有密碼部(未圖示)。此外,圖面所示的 變更用鑰匙只有CK1及CK2,但關於其他變更用鑰匙(CK3 至8)’除了可變密碼部(CK3c至8c)的構成各不相同之外, 缺口部(CK3b至8b)的形成位置以及固有密碼部的構成分 別共通。 一般錄匙是進行一般開閉操作時所使用的錄匙,有 NK1至NK8八種。—般鑰匙NK1及nK2是如第3圖(b) 所示’與上述變更用錄匙CK1及CK2相 口部 其餘皆具有與該變更用 ‘圖示,但其他一般输匙 NKlb、2b的形成位置不同之外,其餘丨 鑰匙大致相同的構成。而且,雖未圖示 (NK3至8)也具有相同的構成。 (鑰匙的轉動限制) 外筒1是如第4圖⑷所示,挾持鑰匙孔h在左右具Therefore, when the manager is entrusting a plurality of operators, even if the contractor in a certain work area returns from the operator A to the operator A through the plurality of operators, the password used by the previous operator A cannot be used again. Only new passwords can be used. 'Even for 8-segment variable locks, when A ϋ is used as a cycle to form the exchange sequence, all cylinder locks must be replaced when entering the fourth cycle. There are more than 8 paragraphs. Moreover, the loss of keys does not happen several times in a short period of time. If so, in the case of using a variable lock at each stage of the year, all 8 segments are used, and it will take at least 8 years. After such a long period of time, the possibility of the entry of the lost recording key will be extremely small. At this point, it should be possible to restore the encryption code that was used 8 years ago, but the cylinder lock in the past could not do this. Furthermore, even if the key is temporarily lost due to misunderstanding of the user, once the password is changed, it cannot be restored to the original password, so it will cause a waste of limited use of the double post code, and the life of the cylinder lock. Shortening 0 [Summary of the Invention] The author of this article, Moyuki Nakamura, aims to provide a variable lock cylinder lock that can change the password permanently and repeatedly. The other purpose of the present invention is to provide 7 3) 4641 1227299 passwords that can be changed quickly and securely in addition to the above purpose. Another purpose of the present invention is in addition to the above-mentioned cylinder lock. Supply-A type of variable lock that does not require significant changes to the conventional variable lock: Yu Ti can be manufactured with: a single structure and low cost: = In order to achieve the above purpose, the delicious interlock of the present invention. The features are: the outer cylinder; ㈣; the special password pin that is locked together before being retracted; the transmission pin housed in the inner cylinder side of the slide hole that slides through the slide hole = the same inside; Then the variable pin between the said; from the poor code pin disc, and the drive pin described in J between the code pin and the drive pin, remove the needle, ten, 1 variable pin to accommodate the variable pin variable pin Containing mechanism; except for the variable pin returned to the aforementioned poor official, the variable lock η mechanism between μ and the material transmission pin is broken, and the password can be changed in reverse. 4 times and the feature of the variable lock cylinder lock of the present invention is a cylinder; a sliding hole provided on the inner cylinder side of the inner cylinder; a PIN pin accommodated in the inner motion hole; from the outer cylinder side Abutting on the aforementioned password: = variable pin of extension and code pin length; the i-th outer cylinder which is installed on the outer cylinder and informs the aforementioned password pin at the reference position χ that it can communicate with the inner cylinder side sliding hole ^ Side sliding hole; accommodated in the aforementioned first outer cylinder side sliding hole, f " special movement pin of spring bouncer towards the inner cylinder side; worn in the outer outer sleeve, and when the password pin is in the password changing position γ The second outer cylinder side sliding hole communicating with the inner side sliding hole can be accommodated; and the second transmission pin accommodated in the aforementioned; 2 outer cylinder side sliding hole 'and spring-biased by the spring toward the inner cylinder side; When it is located at the password change position, the variable pin is selected to be housed in the second 2314641 8 ^ 227299 ^ moving hole against the spring force of the second transmission pin, or the variable pin is selected to follow the second transmission pin. Bullet: it is contained in the slide hole on the inner cylinder side, and then the password is Pin back to position: position X 'wrong. You can use the change in the length of the password pin to reverse the password change. : 'The cylinder lock mentioned above has the inner cylinder used to limit the rotation range when the password is changed to the reference position x 丨 + position X to the code change position Y' while making the system 2 π and normal operation. A rotation restriction mechanism that restricts the rotation range repeatedly. [Embodiment] An embodiment of the present invention will be described below based on the drawings. (Basic Structure) A cross-sectional view of a variable lock cylinder lock of J Erqiao's embodiment. The second figure is a longitudinal sectional view of the cylinder lock. This cylinder lock is shown in Figure i. The code generation neighbor 3 is composed of outer identity 1, inner identity 2, variable density, and 3, and inherent density. Here, the passwords generated by Intrinsic Mountain ", and Chengzhang 4 are changed by the circle method μ. Considering that% L is unique to interlocking circles, there is no subsequent step to perform ~, more, and" 3, " The generated password can be changed in accordance with the code of Rishan and the change of the dense stone horse can be reversed. And 'This cylinder lock is inherent to the 3rd and 4th paragraphs of the 2nd password generation section: ::: each has 5 sections. Change the inherent password with good security, and it can be generated = 成 部 4. This can generate Ding Li, 8 variable passwords (# 1 to 8). "Ten pairs of Chu farthest from the keyhole 2a The structure of the $ 5 variable password generation section of the 3rd and 4th old man ... ▲ is also the same as the following. — Cheng explained, but other 31464] 9 1227299 (Configuration of the variable password generation section) Variable password The generating section 3 is composed of symbols 3 丨 to 3 9 in the first figure. That is, the generating section 3 includes: an inner cylinder-side sliding hole 3 1 inserted in the inner cylinder 2; and a cipher pin 32 accommodated in the inner cylinder-side sliding hole 31. ; Abutment on the cipher pin 3 2 from the outer cylinder 丨 side to extend the length of the lock pin 3 2 on the appearance of the variable lock 3 3. In the state, that is, the outer cylinder side slide hole 34 which can communicate with the inner cylinder side slide hole 3 丨 when the cipher pin 32 is located at the reference position X; and the outer cylinder side slide hole 34 is received by the spring 35 toward the inner cylinder Two-side spring-loaded transmission pin 3 6. It also has a penetrating outer casing 1 and it can communicate with the inner cylinder side sliding hole 3 1 when the inner cylinder 2 is rotated to make the pin 32 at the password change position γ. The outer cylinder-side slide hole 37; and the transmission pin 3 9 housed in the outer cylinder-side slide hole 37 and elastically pushed toward the inner cylinder 2 by the elastic yellow 38. (Configuration of the unique password generation unit) The unique password generation unit 4 It is composed of the symbols 4 丨 to 48 in the figure. That is, it has an inner cylinder-side sliding hole 4 through the inner cylinder 2; and a cipher pin 42 accommodated in the inner cylinder-side sliding hole 41. And has: an outer cylinder-side sliding hole 43 which is inserted through the outer cylinder 1 and can communicate with the inner cylinder-side sliding hole 4 丨 in a normal state, that is, when the PIN 32 is located at the reference position X; and is accommodated in the outer cylinder A side sliding hole 43, and a transmission pin 45 that is pushed toward the inner tube 2 side by the spring 44. " The inner cylinder 2 performs a rotation operation, so that the cipher pin 32 is located at the dense stone horse changing position γ and can communicate with the inner cylinder side slide hole 41; and the outer cylinder side slide 31464] 10 1227299 moving hole 4 6 and the transmission pin 4 8 which is spring-pressed toward the inner cylinder 2 by the spring 4 7. The structure and function of the two types of keys (change key and general key) used for the above cylinder locks and the rotation restricting mechanism with respect to the remaining keys are described below. (The structure of the “Transfer 4”. The structure of the general recording key) The key for change is the key used when changing the password of the cylinder lock. There are eight types from CK1 to CK8. If the change keys cK1 and CK2 among these are described, as shown in FIG. 3 (a), the key plates cKla and 2a are formed with notch portions CKlb and 2b for rotation restriction, respectively, and act on the variable password generation unit. The variable cryptographic sections CKlc and 2c of 3; and a unique cryptographic section (not shown) that acts on the unique password generating section 4. In addition, the change keys shown in the figure are only CK1 and CK2, but the other change keys (CK3 to 8) 'differ in the configuration of the variable password section (CK3c to 8c), and the notch section (CK3b to 8b) The formation position and the structure of the unique encryption unit are common to each other. General recording keys are used for general opening and closing operations. There are eight types of NK1 to NK8. —General keys NK1 and nK2 are as shown in Fig. 3 (b). 'The rest of the mouth part with the above-mentioned change recording keys CK1 and CK2 have the icon for the change, but the formation of other general keys NKlb, 2b. Except for different positions, the rest of the keys are roughly the same. Moreover, although not shown (NK3 to 8), they have the same configuration. (Key rotation restriction) The outer cylinder 1 is shown in FIG.

轉動限制銷5a是如第4圖(b) 11 314641 1227299 及第5圖(b)所示,形成左暫 小成在對應於一般鑰匙Νκ之缺口 位置。另一方面,轉動限制女 邛的 ’限制銷讣是如第4圖(c)及第 (a)所不,形成在對應於變更 圖 又更用鑰匙CK之缺口部的位 藉由此構成,朝順時針方向 置 才卞万向對於一般鑰匙Νκ 作時,並不會受到轉動限制姑 < 仃褥動刼 平寻職制銷5a的拘束而可轉 時針方向進行轉動操作時,备a 仁朝延 不轉動(參照第5圖(b))。另 + ] I良制而 另—方面,朝逆時針方向對於掷 更用鑰匙CK1至8進行韓 门對於,交 遲仃轉動細作時,並不會受 銷5b的限制而可轉動,但朝 t制 會受到轉動限制銷5&的限制而m订轉動知作時’ ……’限制而不轉動(參照第5圖(a))。 内同2疋如苐4圖” ^ ?絲 斤不’八有兩條轉動限制凹 槽2b、2c。轉動限制凹槽 利四 j U僧2b疋形成在對應於上述 制銷5a的位置,可決定一 專動限 叙餘起NK的轉動範圍。一 面,轉動限制凹槽2c异裕士 士上丨& 另 方 僧及疋形成在對應於上述轉動限 的位置,可將變更用路ef_ π ’J銷5b 肘又更用鑰咗CK的轉動範圍 更位置Y為止的範圍。 '至在碼受 如上所述’藉由在外筒i設置轉動控 且在内筒2設置轉動控制凹才曹2b、2c, a 5b,並 鑰匙CK進行密碼變更 广變更用 位置…、碼變更位置¥的範圍,且可 在基: 該轉動範圍不與使用一般鑰起皿進 動:向,使 2之轉動範圍重複,因此可正確無誤、確::、¥的内筒 密瑪變更的操作,亦可確保安全性。Λ迅逮地進行 以下說明上述構成的圓筒鎖之作 此外,以下的說 314641 12 1227299 明是針對密碼編號# i及# 〜 及#2的密碼變換加以說明,關於其他 密碼編號的組合(例如Μ β 4。 斤 ’、 及# 8、# 5及# 6寺)的密碼變換美太 上也與下述相同。而且杲牡u 、土本 一 疋針對所有鑰匙的固有密碼部皆為 正常狀態,且因固有密碼生成部4所導致之内冑2的轉動 =亚不會發生作用的情況加以說明。而在該固有密碼部 異常的情況下,該轉動限制就會發生作用,内冑2便會因 為固有在碼生成部4之傳動銷45的拘束而無法轉動。 (順向的密碼變更) 以下針對順向(##2)的密碼變更時,第5段可變密 碼生成部3之作用加以說明。 當内筒2處於一般狀態時,亦即密碼銷32位於基準位 置X蚪(芩照第6圖(a)及第1〇圖(a)),將變更用鑰匙CK1 插入鑰匙孔2a(參照第6圖(b)及第10圖(b))。此時,可變 銷3 3 g在順著傳動銷3 6的彈壓而收容於内筒側滑動孔3 1 的狀態下,形成可變銷33與密碼銷32之抵接面來到内筒 2之外周面上的狀態,因此内筒2可朝逆時針方向轉動。 接下末在將變更用输匙C K1插入餘匙孔2 a的狀態 下朝逆時針方向轉動45。,使密碼銷32移動至密碼變更 位置Y ’並且使内筒側滑動孔3 1連通於外筒側滑動孔3 7 (茶ft?、第6圖(c))。此時,可變銷33會在收容於内筒側滑動 孔3 1的狀態下移動至密碼變更位置γ,並且形成在該密碼 變更位置Υ抵接於傳動鎖3 9的狀態。 接下來’從鑰匙孔2a抽出變更用鑰匙CK1孓後(參照 第7圖(a)) ’將變更用輸匙cK2插入輪匙孔2a(參照第7 13 31464] 1227299 回^ ))此日寸,可變銷3 3會抵抗傳動銷3 9的彈壓而形成 、,於外筒側滑動孔3 7的狀態,並且形成可變銷3 3與密 、有 之抵接面來到内筒2之外周面上的狀態,因此内筒 2可朝順時針方向轉動。 接下來,在將變更用鑰匙CK2插入鑰匙孔2a的狀態 下朝順時針方向轉動45。,使密碼銷32移動至基準位置 亚且使内筒側滑動孔3 1連通於外筒側滑動孔34(參照 第7圖(c)及第丨〇圖(c))。此時,可變銷33仍收容於外筒 月動孔3 7 ’藉此即完成順向(# 1 -> # 2)的密碼變更(參照第 8圖(a)及第11圖(a))。 以下’針對上述順向的密碼變更後(密碼編號#2),第5 I又可’交在、碼生成部3的一般時之作用加以說明。 在抽出鑰匙的狀態下,所有傳動銷36都是位於内筒2 的外周面上,因此内筒2不會轉動(參照第8圖(a)及第i J 圖(a)) ’即使將一般鑰匙NK1插入鑰匙孔2a,第5段的傳 動銷36還是位於内筒2的外周面上,因此内筒2不會轉動 (參照第11圖(b))。 相對於此,將一般鑰匙NK2插入鑰匙孔2a時,第5 段的傳動銷3 6與密碼銷32之抵接面會位於内筒2的外周 面上(參照第8圖(b)及第11圖(c))。因此,在將一般錄匙 NK2插入鑰匙孔2a的狀態下可進行内筒2的轉動操作, 且可朝順時針方向對於該内筒2進行45。的轉動操作,使 預定的開閉機構作用(參照第8圖(c))。 (逆向的密碼變更) 31464] 1227299 以下針對逆向(#2—#1)的密碼變更時,第5段可變密 碼生成部3之作用加以說明。 當内筒2處於一般狀態時,亦即密碼銷32位於基準位 置X時(參照第8圖(a)),將變更用鑰匙CK2插入鑰匙孔2a (參知、第7圖(c)) ^此時,會形成密碼鎖32與傳動銷36之 抵接面來到内筒2之外周面上的狀態,因此内筒2可朝逆 時針方向轉動。 接下來,在將變更用錄匙CK2插入錄匙孔2a的狀態 下朝逆時針方向轉動4 5。,使密碼銷3 2移動至密碼變更位 置Y ’並且使内筒側滑動孔3 1連通於外筒側滑動孔3 7 (參 照第7圖(b))。此時,可變銷3 3是收容於外筒側滑動孔3 7。 接下來,從鑰匙孔2a抽出變更用鑰匙CK2之後(參照 第7圖(a)),將變更用鑰匙CK1插入鑰匙孔2a(參照第6 圖(0) °此時,可變銷33會順著傳動銷39的彈壓而形成 收容於内筒側滑動孔3 1的狀態,並且形成可變銷33與密 碼銷3 2之抵接面來到内筒2之外周面上的狀態。 接下來’在將變更用鑰匙CK1插入鑰匙孔2a的狀態 下朝順時針方向轉動45。,使密碼銷32移動至基準位置 X 並且使内同側滑動孔3 1連通於外筒側滑動孔3 4 (參照 第6圖(b))。此時,可變銷33會在收容於内筒側滑動孔3 j 的狀態下移動至基準位置X,並且形成在該基準位置χ抵 接於傳動銷3 6的狀態,藉此即完成逆向#丨)的密碼變 更(參照第6圖(a)及第12圖(a))。 此外,上述一連串的作用是關於第5段可變密碼生成 314641 !227299 部3的作用,但與這些並行,關於第4段可變密碼生成部 3也是進行與上述順向密碼變更相同的可變銷3 3之授受。 相對於此’第1至第3段可變密碼生成部3只要是關於上 述岔碼變換(# 1 — #2或#2— # 1 ),就不會進行可變銷33的授 受。 & 以下’針對上述逆向密碼變更後(密碼編號#丨),第4 · 5段可變密碼生成部3的一般時之作用加以說明。 在抽出鑰匙的狀態下,所有傳動銷3 6皆位於内筒2 的外周面上,因此内筒2不會轉動(參照第9圖(a)及第12 圖(a)),即使將一般鑰匙NK2插入鑰匙孔2a,第4段的傳 動銷36還是位於内筒2的外周面上,因此内筒2不會轉動 (芩照第12圖(b))。 相對於此,將一般鑰匙NK1插入鑰匙孔2a時,第4 段的傳動銷36與密碼銷32之抵接面會位於内筒2的外周 面上,而且第5段的傳動銷36與可變銷33之抵接面也會 位方、内筒2的外周面上(參照第9圖(b)及第1 2圖(c))。因 此,在將一般输匙NK1插入餘匙孔2a的狀態下可進行内 同2的轉動操作,且可朝順時針方向對於該内筒2進行4 $。 的轉動操作,使預定的開閉機構作用(參照第9圖(c))。 (其他) 上述實施形態是具有5段可變密碼生成部3以及4段 有i碼生成部4,但並不限定於此,例如亦可使可變密 T生成部3及固有密碼生成部4的數量分別形成兩倍,或 反之減少這些的數畺。另外,亦可具有兩行以上的可變 314641 ]6 1227299 山碼生成部3以及一 可變密碼生成部3 、固有密碼生成部4,或是僅具有 [發明之效果] 本务明的可變描 可逆向進行可變銷二 筒鎖由於具有上述構成,所以 圓筒鎖僅能夠以有pp…因此不是像習知的可變鎖码型 型,而可永久反覆進Ί數進行密碼變更之所謂用完即吾 可迅速且安全地進 才 大幅變更習知可變:二=。再者,此圓筒鎖並不需要 且低成本加以製造馬•鎖的構造,而能以簡單構造 具體而言,柄诚士 根據本發明的可變鎖碼型圓筒鎖,由於不 f要因為使用完有限之可變鎖碼而更換圓筒鎖,而可進行 岔碼變更直到圓筒鎖的壽命為止,因此較為經濟。 而且,即使是遺失餘匙時,也不須在意已經進行過的 密碼變更之次數,而可導入新的密碼。 而且,即使在因為使用者之誤會而暫時遺失鑰匙,但 立刻又找到输匙的情況下,纟可迅速使原來的密碼恢復。 再者,在管理者將保養作業等委託給複數個作業者的 情況下,即使是排定各作業的順序,或變更該作業的組織 時’也不需要更換圓筒鎖,而可迅速且經濟地應付。 【圖式簡單說明】 第1圖是本發明一實施形態之可變鎖碼型圓筒鎖的橫 剖視圖(弟2圖的A-A剖面)。 弟2圖是該圓筒鎖的縱剖視圖(第1圖的X1剖面)。 314641 17 1227299 第3圖是橡用於該圓筒鎖之(a)變更用錄匙的俯視圖, 以及(b)—般鑰逛的俯視圖。 第4圖是謂來說明該圓筒鎖的轉動限制機構之構成的 (a) 前視圖,(b)^B剖視圖,以及(c)C-C剖視圖。 第5圖是利用該圓筒鎖(a)相對於變更用鑰匙之轉動限 制的說明圖,以及β)相對於一般鑰匙之轉動限制的說明 圖。 第6圖是用來說明該圓筒鎖的密碼變換時之作用的橫 剖視圖(第1〇圖的A-A剖面),(a)〜(b)-> (c)是順向密碼變 換(其1) , (c)^ (a)是逆向密碼變換(其2)。 第7圖是用來說明該圓筒鎖的密碼變換時之作用的橫 剖視圖(第1〇圖的A-A剖面),(b)— (c)是順向密碼變 換(其2),(c)^ (b)— (a)是逆向密碼變換(其丨)。 第8圖是用來說明該圓筒鎖的一般時之作用的橫剖視 圖(第11圖的A-A剖面),(a)是抽出鑰匙後的狀態,(b)是 插入一般输匙後的狀態,以及(c)是對於一般鑰匙進行轉動 操作後的狀態。 第9圖是用來說明該圓筒鎖的一般時之作用的橫剖視 圖(第1 2圖的A-A剖面),(a)是抽出錄匙後的狀恶’(b)是 插入一般鑰匙後的狀態,以及(c)是對於,般输匙進行轉動 才喿作後的狀態。 第1 0圖是用來說明該圓筒鎖的密譌變換時之作用的 縱剖視圖(第6、7圖的Χ-χ剖面)’(a)是抽出錄迷後的狀態, (b) 是插入舊密碼之變更用鑰匙後的狀態’以及(C)疋插入新 18 31464] 1227299 密瑪之變更用鑰匙後的狀態。 第1 1圖是用來說明該圓筒鎖的〆锻時之作用的縱剖 祝圖(第8圖的剖面),且是順向密碼變更後的(a)抽出 鑰逃後的狀態,(b)插入異常之一般錄聲後的狀悲,以及(C) 插入正常之一般鑰匙後的狀態。 第1 2圖是用來說明該圓筒鎖的/般時之作用的縱剖 祝圖(第9圖的咅1】面)’且是逆向密碼變更後的(a)抽出 擒匙後的狀態,(b)插入異常之一般鑰匙後的狀態,以及(c) 插入正常之一般鑰匙後的狀態。 第1 3圖是習知可變鎖碼塑圓筒鎖的橫剖視圖,(a)是 抽出鑰匙後的狀態,(b-1至3)是一般時的狀態,以及(c-1 I 3)是密碼變更時的狀態。 1 外筒 2 内筒 2a 餘匙孔 2b、2c轉動控制凹槽 3 可變密碼生成部 4 固有密碼生成部 5a、5b 轉動限制鎖 6 可變銷收容孔 31、41 内筒側滑動孔 32、42密碼銷 33 可變銷 34 ' 37 ' 43、46外筒側滑動孔 35、38 、44、47彈簧 36、39、45、48 傳動銷 CK 變更用鑰匙 NK ~般鑰匙 X 基準位置 Y 欲碼變更位置 3]4641 19As shown in Fig. 4 (b) 11 314641 1227299 and Fig. 5 (b), the rotation restricting pin 5a is formed to be left temporarily in a notch position corresponding to the general key Nκ. On the other hand, the 'restriction pin' of the rotation-restricted son-in-law is formed as shown in Fig. 4 (c) and (a). Set the clockwise direction to the universal key Nκ, and it will not be subject to the rotation restriction when the key is turned on. LtThe mattress can be turned clockwise to perform the rotation operation. Extend without turning (refer to Figure 5 (b)). Another +] I good system and the other-in the counterclockwise direction, the keys CK1 to 8 are used for the Korean gate. When the rotation is delayed, the rotation is not restricted by the pin 5b, but it can be turned toward t The system will be restricted by the rotation restriction pin 5 & when the m-order rotation is known, '...' is restricted without rotation (see Fig. 5 (a)). In the same figure as in Fig. 4 ", there are two rotation restriction grooves 2b and 2c. The rotation restriction grooves are formed at positions corresponding to the above-mentioned pin 5a. Decide on the rotation range of NK from the limit of the special movement. On the one hand, the rotation limit groove 2c is different from the one on the other side. &Amp; The other monks and 疋 are formed at the position corresponding to the rotation limit, and the change path ef_ π ' J pin 5b uses the rotation range of key CK and the range up to Y. 'To the code is as described above' By setting the rotation control on the outer cylinder i and the rotation control on the inner cylinder 2 2c, a 5b, and key CK for password change Wide change position ..., code change position ¥ range, and can be in the base: This rotation range does not precess with the use of a general key: direction, so that the rotation range of 2 is repeated Therefore, it can be correct and correct: the operation of changing the inner cylinder density of ¥ and ¥ can also ensure safety. Λ quickly grasps the following description of the cylinder lock structure described above In addition, the following said 314641 12 1227299 The password conversion of the password numbers # i and # ~ and # 2 will be described. The password conversion of other combinations of password numbers (such as Μ β 4. jin ', and # 8, # 5, and # 6 寺) is also the same as the following. Moreover, u 土, 土 本 一 疋 for all keys The unique cryptographic sections are all in a normal state, and the rotation of the inner cymbal 2 caused by the unique cryptographic generating section 4 will be explained below. If the unique cryptographic section is abnormal, the rotation restriction is It will work, and the inner ring 2 will not be able to rotate due to the restriction of the transmission pin 45 inherent in the code generating unit 4. (Forward password change) When changing the password for forward direction (## 2), the fifth paragraph The role of the variable password generation unit 3 will be described. When the inner cylinder 2 is in a normal state, that is, the password pin 32 is located at the reference position X 蚪 (see FIG. 6 (a) and FIG. 10 (a)), The change key CK1 is inserted into the key hole 2a (refer to FIG. 6 (b) and FIG. 10 (b)). At this time, the variable pin 3 3g is housed on the inner cylinder side and slides along the spring pin of the transmission pin 36. In the state of the hole 3 1, the abutting surface of the variable pin 33 and the cipher pin 32 is formed on the outer peripheral surface of the inner cylinder 2. State, so the inner cylinder 2 can be turned counterclockwise. Next, when the change key C K1 is inserted into the remaining key hole 2 a, it is turned counterclockwise 45. The pin 32 is moved to the password change position. Y 'and communicate the inner cylinder side slide hole 3 1 with the outer cylinder side slide hole 3 7 (tea ft ?, Fig. 6 (c)). At this time, the variable pin 33 is accommodated in the inner cylinder side slide hole 3 In the state of 1, it is moved to the password change position γ, and the password change position Υ is in contact with the transmission lock 39. Next, after the change key CK1 孓 is pulled out from the keyhole 2a (refer to FIG. 7 (a )) 'Insert the key cK2 for change into the keyhole 2a of the wheel (refer to Section 7 13 31464] 1227299 back ^)) On this day, the variable pin 3 3 will be formed to resist the spring pressure of the transmission pin 3 9. The side sliding hole 37 is in a state where the contact surface of the variable pin 3 3 and the dense and some abutment surface comes to the outer peripheral surface of the inner tube 2, so the inner tube 2 can be rotated clockwise. Next, with the change key CK2 inserted into the key hole 2a, it is turned 45 clockwise. Then, the cipher pin 32 is moved to the reference position, and the inner cylinder-side sliding hole 31 is communicated with the outer cylinder-side sliding hole 34 (see FIG. 7 (c) and FIG. 7 (c)). At this time, the variable pin 33 is still accommodated in the outer cylinder moon moving hole 3 7 ', thereby completing the password change in the forward direction (# 1-># 2) (refer to FIG. 8 (a) and FIG. 11 (a )). The following is a description of the normal function of the code generation unit 3 after the above-mentioned forward password change (password number # 2), the fifth I can be delivered to the code generation unit 3. In the state where the key is pulled out, all the transmission pins 36 are located on the outer peripheral surface of the inner cylinder 2, so the inner cylinder 2 does not rotate (refer to FIG. 8 (a) and iJ (a)). The key NK1 is inserted into the key hole 2a, and the transmission pin 36 of the fifth stage is still located on the outer peripheral surface of the inner cylinder 2, so the inner cylinder 2 does not rotate (see FIG. 11 (b)). In contrast, when the general key NK2 is inserted into the key hole 2a, the contact surface of the transmission pin 36 and the cipher pin 32 of the fifth stage is located on the outer peripheral surface of the inner cylinder 2 (refer to FIG. 8 (b) and 11). Figure (c)). Therefore, the rotation operation of the inner cylinder 2 can be performed in a state where the general recording key NK2 is inserted into the key hole 2a, and the inner cylinder 2 can be performed in a clockwise direction by 45. The predetermined opening and closing mechanism is activated by the turning operation (see Fig. 8 (c)). (Reverse password change) 31464] 1227299 The following describes the role of the fifth-stage variable password generating unit 3 when the password change is reversed (# 2— # 1). When the inner cylinder 2 is in the normal state, that is, when the password pin 32 is at the reference position X (refer to FIG. 8 (a)), insert the change key CK2 into the key hole 2a (see FIG. 7 (c)) ^ At this time, a state in which the contact surface of the combination lock 32 and the transmission pin 36 comes to the outer peripheral surface of the inner cylinder 2 is formed, so the inner cylinder 2 can be rotated counterclockwise. Next, turn the recording key CK2 for change into the keyhole 2a, and turn it counterclockwise 4 5. , The password pin 3 2 is moved to the password change position Y ′, and the inner cylinder side slide hole 31 is communicated with the outer cylinder side slide hole 3 7 (see FIG. 7 (b)). At this time, the variable pin 33 is accommodated in the outer cylinder-side slide hole 37. Next, after removing the change key CK2 from the key hole 2a (refer to FIG. 7 (a)), insert the change key CK1 into the key hole 2a (refer to FIG. 6 (0).) At this time, the variable pin 33 will be smoothly inserted. A state in which the transmission pin 39 is accommodated in the inner cylinder-side sliding hole 31 is formed by the elasticity of the transmission pin 39, and a contact surface between the variable pin 33 and the cipher pin 32 is brought to the outer peripheral surface of the inner cylinder 2. Next ' With the change key CK1 inserted into the key hole 2a, turn it clockwise 45. Move the PIN 32 to the reference position X and connect the inner same-side slide hole 3 1 to the outer cylinder-side slide hole 3 4 (see (6) (b)). At this time, the variable pin 33 is moved to the reference position X while being accommodated in the slide hole 3 j on the inner cylinder side, and is formed at the reference position χ to abut the transmission pin 36. State, to complete the password change in reverse # 丨) (refer to Figure 6 (a) and Figure 12 (a)). In addition, the above-mentioned series of functions are related to the functions of the fifth paragraph of the variable password generation 314641! 227299 Part 3, but in parallel with these, the fourth paragraph of the variable password generation section 3 also performs the same change as the above-mentioned forward password change. Acceptance of Pin 3 3. On the other hand, as long as the variable code generating unit 3 of the first to third stages is about the above-mentioned fork code conversion (# 1 — # 2 or # 2 — # 1), the variable pin 33 is not granted. & The following is a description of the general role of the 4th to 5th stage variable password generation unit 3 after the reverse password change (password number # 丨). In the state where the key is pulled out, all the transmission pins 36 are located on the outer peripheral surface of the inner cylinder 2, so the inner cylinder 2 does not rotate (refer to Figs. 9 (a) and 12 (a)). NK2 is inserted into the keyhole 2a, and the driving pin 36 of the fourth stage is still located on the outer peripheral surface of the inner cylinder 2, so the inner cylinder 2 does not rotate (see Fig. 12 (b)). In contrast, when the general key NK1 is inserted into the key hole 2a, the abutting surface of the driving pin 36 and the cipher pin 32 of the fourth stage is located on the outer peripheral surface of the inner cylinder 2, and the driving pin 36 of the fifth stage and the variable The contact surface of the pin 33 is also positioned on the outer peripheral surface of the inner tube 2 (see FIG. 9 (b) and FIG. 12 (c)). Therefore, when the general key NK1 is inserted into the remaining keyhole 2a, the inner 2 can be rotated, and the inner cylinder 2 can be clockwise 4 $. The turning operation is performed by a predetermined opening and closing mechanism (see FIG. 9 (c)). (Others) In the above embodiment, the 5-segment variable cipher generation unit 3 and the 4-segment i code generation unit 4 are provided, but the present invention is not limited to this. For example, the variable-density T generation unit 3 and the unique cipher generation unit 4 may be used. The numbers are each doubled, or the number of these decreases. In addition, there may be two or more lines of variable 314641] 6 1227299 Mountain code generating unit 3 and a variable password generating unit 3, a unique password generating unit 4, or only a variable with the [invention effect] The reversible variable pin two-cylinder lock has the above-mentioned structure, so the cylinder lock can only have pp ... so it is not like the conventional variable lock code type, and it can permanently change the password repeatedly to change the password. As soon as I run out, I can quickly and safely make changes before I change my habits: two =. In addition, this cylinder lock does not require a low-cost structure for manufacturing a horse lock, but can be constructed with a simple structure. Specifically, the handle-type cylinder lock according to the present invention does not require Because the cylinder lock is replaced after using a limited number of variable lock codes, the fork code can be changed until the life of the cylinder lock, so it is more economical. In addition, even if the remaining key is lost, you do not need to pay attention to the number of password changes that have been made, and you can import a new password. Moreover, even if the key is temporarily lost due to misunderstanding of the user, but the key is found immediately, the original password can be quickly restored. Furthermore, when a manager entrusts maintenance work to a plurality of workers, even when the order of each work is changed or the organization of the work is changed, 'the cylinder lock does not need to be replaced, and it is quick and economical. Cope with. [Brief description of the drawings] Fig. 1 is a cross-sectional view of a variable lock cylinder lock of one embodiment of the present invention (section A-A in Fig. 2). Figure 2 is a longitudinal sectional view of the cylinder lock (X1 section in Figure 1). 314641 17 1227299 Figure 3 is a top view of (a) a recording key used for changing the cylinder lock, and (b) a top view of a general key. Fig. 4 illustrates (a) a front view, (b) a ^ B sectional view, and (c) a C-C sectional view to explain the structure of the rotation restricting mechanism of the cylinder lock. Fig. 5 is an explanatory diagram using the cylinder lock (a) with respect to the rotation restriction of the change key, and β) the rotation restriction with respect to the general key. Fig. 6 is a cross-sectional view (a cross section AA in Fig. 10) for explaining the function of the cylinder lock when the cipher conversion is performed, and (a) to (b)-> (c) is a forward cipher conversion (the 1), (c) ^ (a) are inverse cryptographic transformations (2). Fig. 7 is a cross-sectional view (section AA in Fig. 10) for explaining the function of the cylinder lock when the code is changed, (b)-(c) are forward code conversion (the second), (c) ^ (b) — (a) is the reverse cipher transformation (its 丨). Fig. 8 is a cross-sectional view for explaining the general function of the cylinder lock (section AA in Fig. 11), (a) is a state after the key is pulled out, and (b) is a state after being inserted into a general key, And (c) is the state after turning operation with respect to a general key. Fig. 9 is a cross-sectional view for explaining the general function of the cylinder lock (section AA in Fig. 12), (a) is the state after extracting the recording key, and (b) is after inserting the general key. The state, and (c), are the states after the key is turned to operate. Fig. 10 is a vertical cross-sectional view (X-χ section of Figs. 6 and 7) for explaining the function of the cylinder lock when it is densely transformed. (A) is a state after the video recording is extracted, (b) is State after inserting the change key for the old password 'and (C) 疋 Insert the new 18 31464] 1227299 State after changing the key for Mimar. Fig. 11 is a longitudinal sectional view (a cross-section of Fig. 8) for explaining the function of the cylinder lock during upsetting, and the state of the forward password is changed (a) after the key is escaped, ( b) Sadness after inserting abnormal general recordings, and (C) State after inserting normal general keys. Fig. 12 is a vertical cross-sectional diagram (】 1] surface of Fig. 9) for explaining the function of the cylinder lock in a normal state (a) The state after reverse password change (a) Withdrawing the key (B) The state after inserting the abnormal general key, and (c) The state after inserting the normal general key. Figure 13 is a cross-sectional view of a conventional variable lock plastic cylinder lock. (A) is the state after the key is pulled out, (b-1 to 3) are the general state, and (c-1 I 3) This is the status when the password is changed. 1 Outer cylinder 2 Inner cylinder 2a Residual keyhole 2b, 2c Rotation control groove 3 Variable password generator 4 Unique password generator 5a, 5b Rotation restriction lock 6 Variable pin receiving hole 31, 41 Inner cylinder side slide hole 32, 42 Password pin 33 Variable pin 34 '37' 43, 46 Outer cylinder side sliding hole 35, 38, 44, 47 Spring 36, 39, 45, 48 Transmission pin CK Change key NK ~ Normal key X Reference position Y For code Change position 3] 4641 19

Claims (1)

12272991227299 申請專利範圍修正本 , … (93年10月18曰) 1· 一種可變鎖碼型圓筒鎖,其特徵為具有: :筒;:筒;穿設於前述内筒的内筒側滑動孔;收 谷於鈾述内筒側滑動孔的宓 心石馬銷’從雨述外筒側抵接於 則述::鎖:延長該密碼銷之長度的可變銷; 牙又於月)述外筒,且當前述密碼銷位於 時可與前述内筒侧滑動孔 ...l/r ^ ^ _ 相運通的第1外筒側滑動 η側彈二述第1外筒側滑動孔,並由彈簧朝前述内 同側弹壓的弟1傳動銷; γ 盥/之外同且當可述密碼銷位於密碼變更位 述内筒側滑動孔相連通的第2外筒側滑動 ί内前述第2外筒側滑動孔,並由彈菁朝前 述内同側弹壓的第2傳動銷, 當前述密碼銷位於宓 可變銷抵抗前述第更位置W,選擇使前述 筒側滑動孔、戍選擇使:f的彈壓而收容於前述第2外 的彈壓而收容於一+、:述可變銷順著前述第2傳動銷 回到基準位置X 内::f動孔,然後使前述密碼銷 更來逆向進行密碼=可利用前述密碼銷之長度的變 2·如申請專利範圍第 有用夹脾〜 可變鎖碼型圓筒鎖,其中,具 置X到密碼變更位置广之轉動乾圍限定於基準位 又位置Y,同時使該轉動範圍不與一 3】464〗修正本 1 1227299 作時的内筒之轉動範圍重複 構。 而加以限制的轉動限制機 2 314641修正本Amendment of the scope of patent application, ... (October 18, 1993) 1. A variable lock cylinder lock, which is characterized by having:: a cylinder; a cylinder; an inner cylinder side sliding hole passing through the inner cylinder. ; The core stone pin that is received in the sliding hole on the inner cylinder side of the uranium alloy is abutted from the outer cylinder side of the rain cylinder and is described on the lock: lock: a variable pin that extends the length of the password pin; The outer cylinder, and when the password pin is located, can be connected with the inner cylinder side sliding hole ... l / r ^ ^ _ Phase 1 of the first outer cylinder side sliding η side of the second spring, and the first outer cylinder side sliding hole, and The first transmission pin springed by the spring toward the same inner side; γ The outer / outer side slides on the second outer cylinder side communicating with the inner cylinder side sliding hole when the cipher pin is located at the password change position 2 The second transmission pin on the outer cylinder side sliding hole, which is pressed by the elastic spring toward the inner same side. When the password pin is located at the 宓 variable pin to resist the first change position W, choose to make the cylinder side sliding hole, 戍 select Let: the spring pressure of f be stored in the second outer spring pressure and be stored in a +, the variable pin returns to the reference position X along the second transmission pin.内 :: f to move the hole, and then make the aforementioned password pin reverse to carry out the password = the length of the aforementioned password pin can be changed 2. If the scope of the patent application is useful, the spleen ~ variable lock cylinder lock, where Set X to the password to change the wide range of the rotation limit to the reference position and position Y, and make the rotation range not the same as that of the inner cylinder. While restricting the rotation limiter 2 314641
TW092112807A 2002-06-06 2003-05-12 Variable code type cylinder lock TWI227299B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2002165317A JP2004011233A (en) 2002-06-06 2002-06-06 Variable code type cylinder lock

Publications (2)

Publication Number Publication Date
TW200307782A TW200307782A (en) 2003-12-16
TWI227299B true TWI227299B (en) 2005-02-01

Family

ID=30433183

Family Applications (1)

Application Number Title Priority Date Filing Date
TW092112807A TWI227299B (en) 2002-06-06 2003-05-12 Variable code type cylinder lock

Country Status (3)

Country Link
JP (1) JP2004011233A (en)
KR (1) KR20030095225A (en)
TW (1) TWI227299B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4648085B2 (en) * 2005-05-17 2011-03-09 美和ロック株式会社 Cylinder lock and first key, second key, reset key, master key used for cylinder lock
CN102535970B (en) * 2011-11-23 2014-12-17 徐钜祥 Improved lock cylinder mechanism

Also Published As

Publication number Publication date
KR20030095225A (en) 2003-12-18
TW200307782A (en) 2003-12-16
JP2004011233A (en) 2004-01-15

Similar Documents

Publication Publication Date Title
TW591630B (en) Data security device of storage medium and data security method
CN101013943B (en) Method for binding/recovering key using fingerprint details
CN102364018B (en) Springless cylinder lock
TWI227299B (en) Variable code type cylinder lock
Blaze Rights amplification in master-keyed mechanical locks
CN201474399U (en) Anti-theft coded pin tumbler lock and key matching with same
CN102171701B (en) SID management for access to encrypted drives
CN101545333B (en) Marble anti-theft cipher lock and its key
JP4648085B2 (en) Cylinder lock and first key, second key, reset key, master key used for cylinder lock
CN102359312B (en) Spring-free pin tumbler lock
CN203701750U (en) Changeable tooth-shaped combination lock cylinder system
CN104563619B (en) Isolated anti-theft lock structure
JP4644529B2 (en) Cylinder lock
TWI308190B (en)
JP4657380B2 (en) Cylinder lock
JP2020111962A (en) Changeable pin cylinder lock
US1081808A (en) Padlock.
JP3628656B2 (en) Cylinder lock
TWI841445B (en) Memory Number Lock
JP3620460B2 (en) Cylinder locking device
US860940A (en) Multiple-key lock.
CN209620854U (en) A kind of coded lock
CN106401319A (en) Mechanical padlock unlocked by key
CN102708328A (en) Authenticity code input-type password coding-decoding system
TW436567B (en) Structure of electronic lock and method of setting secret code thereof

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees