WO1983000179A1 - Agencement de verrouillage et de deverrouillage pour des objets, des recipients et des locaux - Google Patents

Agencement de verrouillage et de deverrouillage pour des objets, des recipients et des locaux Download PDF

Info

Publication number
WO1983000179A1
WO1983000179A1 PCT/DE1982/000135 DE8200135W WO8300179A1 WO 1983000179 A1 WO1983000179 A1 WO 1983000179A1 DE 8200135 W DE8200135 W DE 8200135W WO 8300179 A1 WO8300179 A1 WO 8300179A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
securing
containers
safes
immobile
Prior art date
Application number
PCT/DE1982/000135
Other languages
German (de)
English (en)
Inventor
Hans-Guenther Stadelmayr
Original Assignee
STADELMAYR, Hans-Günther
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by STADELMAYR, Hans-Günther filed Critical STADELMAYR, Hans-Günther
Priority to AU86858/82A priority Critical patent/AU8685882A/en
Publication of WO1983000179A1 publication Critical patent/WO1983000179A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/16Security signalling or alarm systems, e.g. redundant systems
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • E05B45/06Electric alarm locks
    • E05B45/061Electric alarm locks for combination locks

Definitions

  • the object and purpose of this invention is now to give the hostages, who at the same time have to open the vaults, safes, etc. on the orders of the lawbreakers, an opportunity to silently alarm the perpetrators in the apparently normal process of opening safes, etc. trigger.
  • the triggering of this alarm must be completely unnoticeable to an outsider in the normal opening process of safe doors, safe doors etc. (for which purpose or the (apparent) disarming process of alarm heard) insert, ie this process must not differ from a normal opening process, even for a knowledgeable lawbreaker, in order not to unnecessarily endanger the hostages or the blackmailed.
  • the extorted booty should be marked in the event of a robbery so that it can be easily identified in the course of a search. This should not only be possible with a long warning period, such as kidnapping with subsequent blackmail.
  • the solution consists in a device according to claim 1 and according to the following claims.
  • each security-unlocking system or device and device is understood as a functional / operational fabric or switching fabric or grid which has arisen from a field by heterogenization or has arisen from the assembly of elements.
  • This tissue with intensive knot connections as switching elements and extensive connection paths between these knots forms and contains the functional and operational field, the information content of which also presents itself as a weave, which in a special case unites Code represents or contains.
  • the dynamic field is the security area to be monitored, the security field. This provides e.g. information about its status is constantly on an alarm system.
  • instrumental case is a key bit, for the procedural case the electrical current flow in an alarm system.
  • the safety / unlocking device as an inverse controller
  • 3ever security-unlocking device equal (on the part of the user) mental or instrumental adjustability of the code memory - e.g. unlocking setpoint and / or operability of the unlocking function as a malfunctioning device represents a directionally reversed (“inverse") controller, insofar as the process direction is interchanged in such a way that it leads from the steep value to the actual value, - or it is to be understood as a control section. Respectively.
  • inverse directionally reversed
  • an inverted controller or a controlled system represents itself as an efferent part (or subcontroller) of a complex controller, whereby the manipulated variable output of the afferent part is to be understood as actual value input in the efferent part, while the setpoint value of the efferent part as Reference value is called, and the manipulated variable of the efferent part also forms the manipulated variable of the entire controller.
  • This reverse, inverse control requires an operator who operates the device or device (see tables and overviews).
  • Such security / unlocking devices also include the mental input of the code or the instrumental introduction of a Code influence carrier with code memory. The mental input of the code or the instrumental introduction of a code carrier thus means the exogenous induction of the manipulated variable.
  • each safety releasing device contains an internal code memory, in particular for mentally entered codes, or an internal code carrier as a reference or (unlocking) target value, whether this can be adjusted mentally or instrumentally.
  • each safety releasing device contains a manipulated value / setpoint comparator or an influence / reference comparator, which determines the actual value, ie by means of comparison, comparison of the steep value and setpoint or of influence and reference, of induction and deduction, of
  • the key bit now forms the induced Steliwert-Influenz code carrier (scanner body), while the set of tumblers represents the internal setpoint reference code carrier (scanner, scanning template), and also the locking pin in connection with
  • the tumbler guide slots form the manipulated variable (Influenz -) / SoIlwert (reference) comparator, the setting of which also decides whether unlocked, ie e.g. can be opened or not.
  • Manufacturer-fixed, program-fixed codes are instruments such as the beard of keys or the code in magnetic cards. On the user side, the securing or unlocking process is then carried out manually and instrumentally.
  • connection paths are acc. the state of the art is usually fixed.
  • control values and / or setpoints are now integrative or separated (but cooperative), e.g. Coupled by the shift fabric, partial match pairs, versions can result that are functionally usable, as in this case e.g. especially for triggering silent (camouflaged) alarm and / or protection goods marking.
  • passive and reactive safety devices include e.g. simple armored cabinets. But even with armored cabinets, the reactive safety type is achieved by installing fusible and tensioning wires, which lock the cabinet in the event of thermal and / or mechanical damage. Like a reactive controller, this device already has a sensor (fuse or 5-wire) and effector (emergency locking).
  • a purely reactive controller type fuse arrangement is an alarm system with a sensor, actual value / setpoint comparator, afference / efference transformer, ordinator, afference / command value comparator, efference coordinator and effector.
  • Vexier lock There are also combinations of mental and instrumental manipulated variable input by the user.
  • An example of this is the so-called Vexier lock.
  • Vexier lock Here we have a sequence of code and subcode; alternating the use of mental and instrumental programs. The latter is through represents the key bit and its scanning devices.
  • the operation algorithm for a combination with regard to manipulated variable input is: mental input of the manipulated variable made by the user, instrumental transmission, instrumental sampling and evaluation according to the setpoint set mentally by the user.
  • the difference between the four-color set of topology in the two-dimensional plane and the uniqueness color set of topology in three-dimensional space is in the practical technical implementation that only a single body of a single quality of a genus can simultaneously touch an infinite number of other bodies, of which in total (ie including the base body) no two have the same quality of the same genus (eg color).
  • This weighting logic implies the construction of a controller fabric
  • Meta controllers setpoint adjusters and correctors, whose actual value forms the setpoint of the corresponding sub-controller
  • a controller fabric which in its entirety may also act as, for example, an adaptive controller, expediently it has serial and / or overlapping, coupled or separate (separate convergence-divergence circuit and / or Conversely, this corresponds to a sequential or integrative, dependent or independent (servo-autogenous) contribution distribution operation / function or (domino-autogenous synonymous with servo-autogenic) collection / dissipation operation / function.
  • a normal controller as a reactor or functor, with sensory actual value input more follows the order of the convergence / divergence circuit principle or the servo-autogenous contribution-dissipation function principle or domino-autogenous or servo-allogeneic collection distribution function principle , while an inverted, inverse controller, ie actuator, operator or the efferent (sub) controller part of a complex controller mi t Efficient steep value input will tend to follow the order of the divergence-Z-convergence circuit principle or the distribution-collection principle, or operation principle or the dissipation-contribution-operation principle.
  • a single handle which again corresponds to the servo sequence or set principle or the domino servo fabric principle.
  • Several grinding wheel combinations can also be operated using a single offset shaft. Some of them, for example, via additional gear ratios, be it parallel gear ratios, angular drives etc. or cardan shafts or the like. This corresponds to the divergence switching principle or the dissipation / distribution operation principle.
  • the convergence principle corresponds to the summary of all sensor information, alarm messages etc. in an alarm center, the divergence principle the distribution of the central evaluation across several effectors, ie alarm transmitters.
  • the convergence-divergence principle has so far only been used in a purely serial / sequential manner.
  • the above-mentioned, overlapping, integrative convergence-divergence circuit now makes it possible to use meaningful weighting logic, in particular since it combines all the series and parallel, diagonal and lateral circuit principles.
  • the criteria of the weighting logic in particular, for example, according to affect enter, perceptive (intensive) sensitivity and presence and appeceptive probability, as well as according to eff er enter evaluation and effective (intensive) penetrance and security (robustness), are applied and designed.
  • the institutional or constitutional servo series sequence corresponds to the autogenous-functionally transcendent phase transition sequence, as well as the allogeneically operationally transcendent phase transduction sequence at the same operational / functional level.
  • the functionally inductive, operationally lateral phase transformation network also corresponds to the institutional, constitutional servo parallel set at the same operational level, - (but here graphically in three-dimensional representation).
  • the institutionally hierarchical afferent servo-domino sequence and the institutional hierarchical (efferent) domino-servo sequence corresponds to the autogenous functional or allogenically operational hierarchical phase transformation network with (symmetrical structure) or - Transformation matrix (in the case of the symmetrical structure.
  • the institutional constitutional hierarchical afferent servo domino sequence set and the constitutional hierarchical efferent domino sequence set correspond to the autogenous, functional or allogeneic operationally active and inductive reactive and reductive diagrammatically three-dimensional representable phase transformation tissue with asymmetrical or. Lattice with symmetrical structure.
  • This fabric or network which was created by disorganizing the whole into parts or sub-structuring the whole into hierarchically ordered subsets, or vice versa by structuring the elements into structures or superstructuring the elements into hierarchically ordered classes, has hierarchically equal rank Main operators / functors and secondary operators / functors (para-operators / functors) and / or hierarchically different basic operators / functors and sub-operators / functors (sub-operators / functors); or hierarchically different basic operators / functors and Uber operators / functors.
  • super-operators are subdivided into super-operators / functors and meta-operators / functors.
  • the difference in operators / functors between super operators / functors and meta operators / functors is that
  • the periphery i.e. primarily the
  • Influence and effluence (input / output) and / or the head office is superior to the base operators, while
  • the memories (reference) and / or the control centers (in particular comparators) are primarily superordinate, i.e. e.g. that the memories of the base operators / functors form influenza and effluence, i.e. e.g. in particular the control path or external control loop, of the meta operator / functor or meta control, whose control path, as mentioned in the case of control hierarchies, forms the setpoint or command value of the basic controller or subregier. All of this concerns, in particular, as already indicated above, regular directional controllers as well as inverse or vice versa directional controllers as components or construction elements.
  • connection paths and links between the components and switching elements can also be established by means of partial communication, i.e. e.g. in particular without a mechanically visible solid-state connection, in particular wiring.
  • This multichannel device should not be limited to a purely parallel connection, but should expediently also contain a convergence-divergence circuit.
  • the para-structuring in secondary functions or additional functions is missing, as is the automatic servo sub-structuring or hierarchical domino servo sub-structuring, which enables automatic if / then links on the part of the facilities and facilities, i.e. allows automatic logical conclusions - be they causal (afferent) or final (efferent).
  • this telecommunication must be encoded, which can be done in the simplest case by simple undlinks.
  • the longitudinal coordinate for operations is e.g. represented by the so-called socket locks and socket keys as well as the BRAHMA keys with longitudinal code scanning.
  • a combination of longitudinal and transverse code scanning is e.g. represented by the BRAHMA-CHUBB locks.
  • the operation is sequential in that the BRAHMA code is scanned longitudinally before the CHUBB code is scanned transversely circularly.
  • a similar operation sequence from longitudinal and transversal also arises with the so-called Vexier locks. However, all of these locks leave
  • the lateral or multidimetric logic devices are also missing with regard to triggering and transmission of the arm.
  • Lateral AND circuits are known, but not the general principle of lateral inhibition, let alone that of multi-parameter weighting.
  • a longitudinal weighting is also not known. Both principles are only known in the majority logic of the applicant (application no. P2815 183.9-35 and no. P3001 452.9). There is also a weighting here with regard to all operation dimensions and intermediate vectors (linearly dependent vectors), in particular diagonals / laterals and colateria. Both the mechanical security options as well as all other physical security options, in particular alarm security options, can be simulated using an arrangement of so-called learning grids or adaptation grids.
  • the longitudinal direct intensive action corresponds to the opening of the safe. This induces a transverse deviative extensive induction which triggers a silent alarm.
  • This in turn means a laterally indirect intensive reduction, i.e. in this specific case, a protracted effective reduction of the opening process, a partial withdrawal of the opening, since the lawbreaker is indirectly prevented from exploiting the loot despite opening the safe and handing it over.
  • the lateral reduction also means a (reflexive) longitudinal (auto) reaction.
  • the principle of operation of the lateral inhibition is now not limited to a two-valued yes-or-no or all-it-or-nothing logic and extends beyond that to a simple individual-majority logic, in which the protagonistic and antagonistic individuals are only counted and then the respective majority is calculated according to the number of individuals, but also extends to the possibility of a "competence" majority logic, in which the individual individuals of the total amount with regard to certain qualification criteria such as their "competence" or sensitivity and reliability (expression) are nuanced or graded (i.e. according to points) in relation to each other, weighed and weighed against each other.
  • the bivalent logic ultimately results, which amounts to a yes or no decision, but in this case not based on a purely individual majority or minority decision, but in which the enforcement dominance is based on the majority (here: with regard to the total number of Evaluation or weighting points) based, ie the weighing criteria according to which the individual individuals are weighed are included in this yes or no decision: i.e. the pure "body count democracy” becomes a qualification-graded "democracy".
  • the pure "body count democracy” becomes a qualification-graded "democracy”.
  • This grading can now be done in a variety of ways.
  • One possibility for the current instantaneous graduation arises, for example, from an extreme value determination.
  • Respects e.g.
  • the three-dimensional diagram shows the iterative optimization process with regard to a setting or control setting or control complex setting.
  • the limitation for this iterative scanning optimization process is a bell mound, the cross-section of which is similar to the normal distribution of probability theory.
  • qualification grading the compromise between these criteria must now be formed and weighted.
  • the criteria components must also be weighted against each other, since each weighting and weighing is relative and needs a reference, this reference being in particular a competitive quantity, i.e. a restrictive other parameter which, however, is important in turn.
  • the competitive parameters have to be weighed against each other in order to achieve a compromise as a result: an optimization process (interval nesting of the surgical procedures).
  • the majority of the extensive capacity eg spatial detection bandwidth of a sensor or temporal reliability
  • intensive "strength" ie spatial sensitivity or temporal robustness or security and reliability
  • a mechanically acting time lock can lead technically unaware "greedy" perpetrators to even more excessive criminal short-circuit acts against the hostages. It is therefore often sensible to initially satisfy the perpetrators with at least one prey (a prey prey on banknotes) and leave the rest to the alarmed police.
  • a time lock does not provide protection in the event of a robbery during business hours (opening times for the safes), which do not always overlap with the general customer opening times, where the risk for the lawbreaker is greater.
  • arming / disarming control elements and panic switches are always functional and usually also spatially separated.
  • marking devices are not variably adjustable, so that afterwards it is no longer possible to assign the looted goods to the relevant violation of the law. Such an assignment also requires markings that are currently unrecognizable for the lawbreaker.
  • This pressure or drop pin (pressure pin) driver is however too weak for the actuation of larger bolt works on larger doors.
  • the aim of the invention is once to create a locking and locking system including a lock or combination lock with several settings that lead to the actuation of the opening and closing mechanism or several such locking mechanisms, of which one or some are designed for normal functions, while others have one or some special additional function (s), e.g. a special operator (impedance change) switch, actuate contact - such as alarm contact -, send a special message, which in turn (beyond the normal alarm conditions) to mark the , content to be protected, resp. even the criminal himself.
  • a special operator impedance change
  • the aim of the invention is an alarm arming / disarming and an access gate, which also each have several similar functions for outsiders or uninitiated, but one or some of which are used for silent monovalent or differentiated signaling or alarming and protection goods treatment.
  • the offender marking can e.g. through floor mats or floor coverings that act like a stamp pad. This soaking device is e.g. triggered along with the silent alarm.
  • the combat incapacity facility will of course also include the victims in most cases.
  • the action e.g. of chemicals, especially euphoric or sedative chemicals, is reversible and not necessarily harmful, in particular less harmful than a successful hostage situation.
  • a multivek ⁇ orieil stereotactically scannable lock should be created and integrated into the device or device. This can cause the lock to no longer be scanned, tapped, etc. from the surface of the protective container or room.
  • simplification of operation is required in the case of such complex devices or facilities, which is to be achieved in particular via domino servo networks or servo sequences.
  • two-dimensional operative and three-dimensional operative, in particular stereological, devices are divided into two-dimensional operative and three-dimensional operative, in particular stereological, devices.
  • the latter in particular should be differentiated into orthogonal operative resp. sequential operative and any vectorial operative (see also tables).
  • a differentiated message can also be transmitted or different functions can be triggered. Depending on which code was entered during the current operation, one or the other differentiated message or alarm statement or function trigger results.
  • the different coding systems or locks have to be operated one after the other.
  • the order in which the coding devices or locks are selected also determines the character of the triggered signal or the triggered function.
  • both the operational elements and the transmission channels for each functional unit must be present several times and e.g. by a lateral inhibition circuit, e.g. according to the patent application No. P 2S15 183.9-35 of the inventor and / or a multivalued-probability-logical majority (and) circuit (whose weighting criteria with regard to (weighting), (weighing), (decision), (direction) e.g.
  • This method of switching is also to be used in all further exemplary embodiments for alarm signal or function triggering and transmission.
  • resistance, capacitance or impedance change switching elements can also be used for differential quiescent current which, for example, are not so easy to sense with regard to their current position.
  • the code memory at least the code memory that contains the opening code without a secret alarm, must either be housed in an unlockable and unbreakable housing, or the code memory can also be attached outside the safe door or the area in which the evaluation units are normally located, So that a lawbreaker cannot retrospectively check the code or the correct code with and without triggering the alarm.
  • the transmission path between the evaluation unit (safe door) and the external memory can either be permanently installed (e.g. by wiring or optical fiber) or telecommunications ((radio, infrared, ultrasound or the like). Of course, this (weighted or weighting) majority circuit with lateral inhibition.
  • an apparent memory is also attached to the location where the evaluation unit is normally located, which identifies the code that leads to the release in connection with a silent alarm.
  • variable adjustable coding instruments formed to open a corresponding lock or serve to trigger a signal or initiate a function, for example disarming an alarm system.
  • the contact actuation or impedance change function can e.g. axially and / or radially and / or tangentially (circularly) for signal transmission.
  • a multiple option for setting a combination setting lock can basically be achieved in two different ways: 1. By several Aus.ssparnuten in the edges of the combination disc or the combination disc and / or
  • Fig. La On. Embodiment with several grooves (2, 3) on a shim (1) is shown in Fig. La.
  • FIG. Lb An embodiment with several grooves (2, 3) on several shims (1) is shown in Fig. Lb.
  • This example requires a small servo disk, in the recesses of which the radial driver falls or is pressed.
  • a construction with two or more pressure pins or surface pins (6, 7) or driver pins, which ensure the mechanical opening of the lock at two or more different setting positions of the disk set (8), is a simpler technical implementation option.
  • the bolt work is actuated in the open position by means of a pressure or drop hammer (16).
  • the second pressure or fail hammer (18) of the second pressure or fail pin (7) is held peripherally on the disc set (8), i.e. it cannot operate the contact (switch) (19) assigned to it to trigger the alarm, i.e. "close” with normal current, "open” with quiescent current or differential current.
  • the contact or switch is not switched on or not connected.
  • the alarm position is shown, in which the pressure pin or drop pin (7) has penetrated into the groove notch (13) of the disk set (8) and the lowered pressure pin or drop hammer ( 18) thus actuates the alarm contact (19) ".
  • This setting also fully guarantees the mechanical opening or actuation of the lock.
  • the contacts (17, 19) are here in or under the pressure or drop hammers (16, 18)
  • the desired contact (17) or (19) is armed, for example, via the switches (21, 22), with Fig. 2a the external and Fig. 2b the internal arrangement of the contacts (17, 19) to the pressure or Show drop hammers (16, 18).
  • Both or all of the slave pins or pressure or fail pins (6, 7) have corresponding contacts (17, 19), the contacts can be set in or out of function (21, 22) by the user of the lock or the person authorized to operate the lock You can determine which of the two or more (driver) pressure or drop pins or (pressure or drop) drive pins you want to use for alarm signal transmission. Thus, a blackmailer who breaks the law cannot determine which of the two (or more) divisions is "safe” for him, even if he has carefully studied the type of this lock beforehand. There are now several options for designing this mechanically-radial or peripheral-operated contact.
  • a "normal” contact e.g. a sliding contact that remains closed even when the pressure pin or fail pin (6,7) and the pressure or drop hammer are moved laterally by the rotation of the lock.
  • several such (sliding) contacts (24) can be actuated by a single mechanical process of this type, but at the same time in a well-graded order.
  • a single contact or a series contact (25) is provided within the pressure pin or drop pin (6, 7) itself, the contact plates (or interrupter insulation plates in the case of quiescent current and differential current application) on the bottom of the recess grooves (13) in the periphery the discs (10-12) are (Fig. 4).
  • this is achieved either by equal distances between the locally peripheral, directionally radial slots in all disks, or by different distances of these disk edge slots - precisely according to the design of the respective driver mechanism, which has one or more latches and / or drivers can.
  • the respective driver mechanism which has one or more latches and / or drivers can.
  • the combination wheel set there are one or more "blind”, ie opening effect-function-free pressure grinding pins, which grind on the round edge of the combination wheel set without being able to fall into the driver notches of the combination wheels with the correct setting. This makes it very difficult to scan or "listen" to the combination.
  • each of these blind pressure pins is provided with a time-controlled return device so that in this case the room, door and cabinet are not opened got to.
  • the general (potential) function setting of the disc set of these locks i.e. the choice of the number, letter or character setting occurs e.g. in a known manner by setting keys from the owner or authorized person of the castle.
  • the alarm activation or switching from pressure or fail pin to pressure or drop pin or pressure or drop hammer to pressure or drop pin, pressure or drop hammer to pressure or drop pin etc. or recess groove to recess groove can, for example by an ordinary changeover switch such as shown at (21,22) in Fig. 2b or at (26) in Fig. 4 with fixed wiring.
  • the pressure or drop pins (6, 7) are each attached to the links of a hammer chain, which in turn are strung together with hinges. In the case of mutual independence, each individual proof is available or drop pin (6,7) with its own, separate pressure or drop hammer (Fig. 2).
  • the one or more alarm contacts or switches or some of these alarm contacts (switches) are linked to a spray device inside the vault or safe, which sprays a marking substance into this interior, which marks all objects within this area, ideally one for the perpetrator - at least for the moment - unrecognizable, ie invisible shape, e.g. Colorless, viscosity-preserving varnishes containing isotopes.
  • marking substances, or their containers and / or application devices are interchangeable, so that the possibilities for protecting goods and perpetrators are variable in terms of location and time, which enables the assignment of the looted goods to the specific event.
  • the opening setting in which no alarm is triggered within the lock or the locking lock, is provided with an alarm cycle which is connected to a time lock, i.e. at certain times (silent) alarm is triggered when the safe is opened, regardless of which setting has been selected for opening.
  • the time lock does not (or only alternatively) serve to lock the armored locker, but to trigger the alarm, or it can be connected to both functions - mechanical, electrical or electromagnetic.
  • the axial displacements of the direct as well as the offset (indirect) combination drive shaft can also be used to open and close the safe door or to operate the bolt work or others Combination locks are used especially in connection with further rotary movements.
  • a coaxial implementation of the shafts makes it difficult to attach locking rings etc. to the inner shaft or the corresponding recesses in the outer shaft tube.
  • the housing (43) In the closed position, the housing (43) in turn engages in a recess (44) in the safe inner wall (45). In the closed position, the pressure or drop pins (6,7) are at the top. With regard to their pressing or falling movement after they have been transmitted to a joint (31), they are guided by a guide (32) fastened to the combination housing, in which a coupling member (45) is guided, which runs via slot (46) on the drive shaft (42 ).
  • a rotary slide coupling (50) transmits the transverse movement between coupling element (45) and ratchet shaft (30).
  • the locking position must be guaranteed by a separate lock and kept constant. During the opening process, this unlocking can already be carried out via a shaft ring due to the axial pressure movements
  • FIG. 7 shows an embodiment in which the housing of the combination remains stationary, but also the locking tab (30) can only move in the radial direction, but not in the circular direction (tangential direction) with respect to the axis (42), that is to say only the combination shaft (51) with its set of discs (10, 11, 12) and the pressure or drop pin (6,7) together with the driver (52) can rotate, while the locking tab (30) does not follow this rotary movement.
  • the entrainers (53) or entrainment troughs (50) of the rotary slide coupling (50/53) are attached to the pressure or drop pin extension (52) or to the locking tab.
  • the distance between the pressure or drop pin crank (54) and the locking tab (30) must be sufficiently large, or the distance between the respective drive pins (53) or drive troughs of the rotary slide coupling (50/53) and the other mounting part be large enough, and at the same time these drivers must be long enough to be able to remain in engagement with the axial pushing or pulling movement of the shaft (42) to allow axial movement relative to each other.
  • each pressure pin or fail pin (6,7) (together with holder and driver also) is designed as a crank (54).
  • the crank axis lies in line with the direct axis (51) or shaft of the combination disks (10, 11, 12).
  • this pressure or drop crank (54) also transfers the pressure or fall movement to the locking slide (30).
  • this locking tab does not lock the direct shaft (51) of the combination against axial pressure movement, but rather the indirect, offset shaft (42) via (36,49,33).
  • the combination lock including the housing and locking flap, does not rotate around the (offset) shaft (42), but remains fixed in its position on the safe. Only the combination disks and the pressure or drop cranks join in the movement of the offset shaft, since they remain in engagement with the offset shaft (42) via the gearwheels (55, 56, 57). All other functions correspond to the example with the direct wave.
  • the locking tab lift via the curved return lever (38), which is actuated when the offset shaft (42) is pulled out axially.
  • the pressure or drop cranks (54) they are guided to the outer edge of the combination disks by a housing guide with respect to their position in the closed position, analogous to the example with the direct while.
  • the outer control rosette of this combination thus serves as a locking lever or handwheel. It is expediently designed to be correspondingly large, which also complies with the simplicity of the setting process.
  • This handwheel, to which the combination button has been extended, is usefully provided with return-spring-shaped small crank legs at certain intervals, which considerably simplifies the opening process or combination setting process.
  • the small cranks can also be retractable or withdrawable so that they do not interfere with one another.
  • a small crank handle can also be used as an accessory, the rotating base of which is provided with a suction cup or adhesive holder or the like, which is placed on the rosette disc where the initially adjustable characters (numbers) are. 2.
  • a second or third etc. tour can be connected to trigger the alarm.
  • the lock can be opened mechanically or hydraulically without e.g. an uninitiated person may notice the silent alarm triggering.
  • a third or further setting option can of course serve the manipulation alarm.
  • FIG. 1 An exemplary embodiment for a combination of two or more locks of the same or different types in a switchable one (from a not necessarily exclusive alternative-or-function combination to a sequential forced-and-switching) is shown in FIG.
  • an electronic character combination is connected to a mechanical disk-character combination to form an alternafiv-OR function combination which has an exclusivity function that can be switched on and off or a switch from the alternative-OR circuit to the sequentially inevitably coupling AND circuit.
  • effector bolt (58) of the electronic character combination (59) acts colinearly on the drive rod ((62) through the two stop bolts (60) and (61) the guide roller (63) is guided against lateral pressure, this driver rod (62) in turn acts on the bolt system of the locking system (64) .
  • a second effector (65) of a mechanical combination lock (66) also acts via a template setting circuit (67) on the two stop bolts (60) and (61) and thus also on this effector driving rod (62).
  • the mechanical combination lock (66) acts on the stencil link circuit (67) via the coupling (68).
  • This stencil backdrop circuit (67) first lifts the effector block (65) in order to then also pull it to the right.
  • This effector block (65) now lifts the stop boizen (60) against its spring pressure (69), to the extent that the effector bolt (60) is lifted axially above the effector bolt (58), ie can slide laterally over it. Then the effector block (65) takes the stop bolt (61) to the right and thus pulls the driving rod (62) to the right.
  • the entire driver rod (62) is raised until the driver pin (60) moves over the effector pin (58).
  • the effector block (65) is mounted accordingly.
  • the electronic character combination will be left on, since it is much faster and easier to use. Only in emergencies, if this electronic character combination "does not work, is the mechanical character combination used with regard to its additional opening function. These emergency locks are of course also provided with the hold-up alarm devices specified above.
  • the function of the emergency lock (66) can be switched over to a normal function, i.e. the emergency OR circuit results in a normal case AND circuit with sequential or parallel positive coupling.
  • the mechanical character combination (66) is decoupled from the stencil gate circuit (67) via the coupling (68), at the same time this character combination shot (66) is locked on the driving rod (62) via the locking bolt (72).
  • this decoupling of the driving rod (71) from the driving rod (70) takes place by lateral displacement of one of the two rods, so that the coupling (68) is no longer in engagement; at the same time, the locking bolt (72) is coupled to the locking disc (73) either by pushing the locking bolt (72) axially in the driving rod (62) or by axially withdrawing the locking disc (73).
  • Both the coupling (68) and the decoupling (72/73) (75) can be connected by a mechanism, so that they can be operated with a single movement.
  • Each of the two coupling / decoupling combinations snaps into their opposite positions, so that there can be no shifts that endanger the function of the locking mechanism. This snap can be done, for example, by spring buttons.
  • the coupling / decoupling between two or more such effectors can of course also take place via a rocker or other (deflection) lever mechanisms instead of via a template link circuit. Instead of a temporally determined operation sequence with a fixed order of the operator, there are design options in which the order of the operator is not fixed.
  • An embodiment with two locks and bolts can be represented, for example, by a locking disk with two radial slots (Fig. ).
  • This mechanical switchover which converts the combination of the two (or more) locks from a non-exclusive OR circuit into a positively linked AND circuit, can now also be connected to a contact switch or impedance change switch (see above), which switches the hold-up alarm circuit of the connects a lock, for example by means of an inevitable AND circuit, to that of the other lock, which, for example, provides protection against incorrect operation that triggers a false alarm.
  • This signaling or alarming device can of course be coupled with an access control device or access gate to the safe or to the safe door (safe room. This is to be described in some exemplary embodiments.
  • the anteroom to the protective door can only be entered if the person who enters this room has a device with him, which is, for example, inductively or via radio coupled to a receiver in the room and permanently knocked out dated information that shows the recipient the right to enter. If a person enters the room without this transmitter, which is easy to hide in clothing, the system issues a silent alarm or pre-alarm.
  • a computer / processor compares the total number of people entering the vault and those authorized to do so.
  • the deviation values are used for notification (alarming) or function triggering (e.g. blocking goods marking).
  • a (double) mechanical barrier e.g. Door or a light barrier is provided.
  • This mechanical or light barrier or its switching interval is matched to the length of a person's step or person's thickness.
  • a recessed step bar or a step that cannot be climbed over or a skippable footboard which is designed, for example, in an angular arrangement of the lock chamber, can be installed, the sensitivity of which is set to the maximum weight of the authorized person with the greatest weight.
  • the position of the tread bar is only apparent to the initiated from the pattern of the floor.
  • the mechanical double barrier insofar as it is formed by two stable doors, can also be designed as a right-wing trap. If someone is in this lock chamber without an authorization order (e.g. transmitter), it will no longer open without external remote intervention.
  • authorization order e.g. transmitter
  • the combination of different devices e.g. Photo eye, foot step and multiple doors possible for data improvement.
  • Stereotactic locking device with three-dimensional stereotactile scanning of a three-dimensionally arranged code of a mental or instrumental type
  • FIG. 9 An exemplary embodiment of a mechanical operation set with three-dimensional coding and decoding is shown in the following example (FIG. 9).
  • the so-called Rubik cube, Hungarian patent application No. 170062 (A63F9 / 12) is given as an example as a code carrier. This example is limited to opening and closing a safe door. Of course, other operations, such as Arming / disarming of alarm systems etc. possible.
  • the safe door can only be opened if this Rubik cube is in a certain position. That is, when its six surface squares have reached a very specific constellation.
  • a manual control device e.g. the control knob of a normal combination of discs can be used, or the knurled discs of a digital combination of characters etc.
  • a jig key can be used as an instrumental servo device.
  • the mental operation then consists in the correct use of the puzzle key.
  • the probe holder Carrier and the stencils and holders respectively. Stands, for example, coaxially, - but each can be operated separately in the (driver) effector baskets of the rotary manipulators.
  • the advantage of this system is that it can no longer be eavesdropped on, since the safe surface is only two-dimensional.
  • the adjustment of a disc lock has only a two-dimensional operation level (rotation level), so that every right-wing breaker only has to think more or less two-dimensionally.
  • a key also has only a two-dimensional operation level, namely a rotation or longitudinal insertion in the case of so-called plug-in locks.
  • this functional principle can also be applied to an entire vault or safe room, in that it itself, or its inner structure, is designed as a three-dimensional, topologically dynamic, mobile labyrinth, the current configuration of which is set via opening / closing, quiet / alarm, keeping / marking, etc decides.
  • the exemplary embodiment of a perpetrator marking device with an absorbent floor covering is shown in FIG. 10 (stamp principle).
  • the impregnation device consists of the secured pressure vessel (52) (e.g. also with a pressure pump), an opening valve and / or barrier membrane or control device (53), as well as a tube network or capillary network, the tube (capillaries) (54) of which soak the floor covering from below .
  • the absorbent floor covering then releases the impregnating substance or marking substance to the persons standing on it, in particular their shoe soles, like a stamp pad.
  • the tubes or capillaries can also lead to the surface of the — for example also hard — floor covering so that its surface is wetted directly.
  • a side sprinkler system (spray system) is also possible, which, for example, wets the floor laterally from above and thus possibly also hits the feet of the lawbreakers from above, without them noticing if the aerosol is fine enough.
  • Both or more executions Riants can of course also be combined with one another.
  • the same tube networks can also be used again as drainage devices, for example by connecting them to a suction pump or a suction tank, or by switching pressure devices (tanks and pumps) generally to suction devices.
  • the controls can be in so-called studs such as Clamp cabinets of normal furniture, which in turn have sliding sleeves, so that the controls are completely covered when not in use and the safe e.g. what a completely normal piece of furniture looks like (in which, for example, the hinges are designed as studs - such as in old corner iron cupboards), which can even be veneered with wood - without any disturbing visible fittings.
  • Figure 11 An exemplary embodiment of a knurled disk fitting for a combination (with gear transmission (55) through slots (56), which is integrated in a stud (57), is shown in Figure 11.
  • Figure 12 shows the integration of a turning handle (59) with hinge (60 ) in such a tunnel (57) with cover sleeve (58).
  • FIG. 1b shows the combination of a plurality of peripheral slots (13) in a plurality of scanning disks (8) with a plurality of scanning pins (6,7) or scanning needles, each of which is connected to its own scanning hammer (16,18) or driver (16a) . It is essential that the tracer pins (6, 7) are at a very small angle to each other.
  • This model example combines the advantages of the example shown in Figure la with that shown in Figure 2a. It has maximum variability.
  • Figure 5b shows an example in which two styli (6,7) are arranged in series and are mechanically connected.
  • the control armature (62) for the combination lock is connected to the same peripheral axis (61) which also carries the combination disks (8) and runs over the inner profit wave (61a).
  • This axis can be moved from the area of the one stylus to the area of the next stylus.
  • Each (of the two) stylus pins is connected to its stylus hammer (16, 18) and the respective driver (16a, 18a), which run on their respective locking disc (16b, 18b).
  • Each stylus-stylus combination is connected to an electrical switch or electronic switching mechanism or the like, in order to enable silent alarming, protection goods marking, offender marking, etc.
  • This Kofunkt ⁇ on is switchable from one scanning set to the other, analogous to how the scanning disc set can be moved on the internal axis with an external profile, from one scanning set to another. Accordingly, we have the function "open” in one position of the scanning disks, in the other when the button e.g. is pressed and the panes are moved, we can achieve the "open” and “silent alarm” functions or vice versa. Even if the criminal knows the principle of this order, he still doesn't know how it works in this particular case.
  • FIG. 9 shows a simplified mechanical example for a three-dimensional code carrier body and decoder for stereotactic envelope scanning with a plurality of scanning templates (51) connected in series for each scanning direction.
  • These scanning devices (baskets, stencils etc.) can be moved coaxially. They are framed by the rotating devices (48, 49), which can be moved separately, both tangentially and coaxially.
  • a (servo) series (sequence) of such devices can, for example, be like a zipper function.
  • Figure 10 shows an example of the culprit marking by means of a pressure vessel (52) which contains the marking substances (solutions) which are released by a valve (53) in a tube and capillary system (54), which is also used as a drainage system for retrieving the Marking solution serves
  • FIG 11 shows a combination lock, or grid disc combination lock (63), as it is installed in number boxes.
  • This grid disc combination lock (63) can be operated from two sides from the periphery, the e.g. two peripheral operating arms can engage the lock by pressing a button (64) on the respective operating side, so that the person on one side of the door cannot see what number a person is currently setting on the other side of the door. This is important for the application and installation in front doors etc., which must be operable from two sides.
  • This construction of the mutual coupling and decoupling between the control valve and the locking system (the control valve serving as a servo) requires a reset mechanism (65) both for the inner combination lock and for the control devices (servo devices). This device can of course also be connected to a silent alarm, etc.
  • the knurled disks of the control valve itself can be designed as simple gearwheels, the flank sides of the individual teeth each bearing the symbol (e.g. twice). The transmission and receiving gears on the castle itself are then designed accordingly.
  • FIG. 12 shows an exemplary embodiment of how the control armature (consisting of knurled disks) is accommodated in a peripheral cylinder, and how the button transmission from the operator proceeds inwards to the inner lock.
  • This peripheral operating device is covered by an axially displaceable external hollow cylinder that leads over the adjoining decorative studs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Un système de fermeture et de verrouillage incluant une serrure, respectivement une serrure à combinaison, avec plusieurs possibilités d'actionnement est proposé. Ces actionnements mettent en marche le mécanisme d'ouverture et de fermeture ou plusieurs de ces mécanismes de verrouillage. Une ou plusieurs de ces possiblités sont faites pour une fonction normale, tandis que d'autres sont faites pour une ou plusieurs fonctions additionnelles, p.ex. celle d'actionner un commutateur-opérateur particulier (relais à impédance), d'actionner un organe de contact, comme p.ex. un contact d'alarme (4), ou encore celle de transmettre un message particulier qui pous sa part (en plus de l'alarme normale) mène à un marquage du contenu à protéger, respectivement de l'auteur criminel lui-même. Même avec un verrouillage mécanique et aussi avec de gros mécanismes de verrouillage, ce système est réalisable avec un minimum de perçages ou de fentes étroits, resp. avec un seul perçage ou fente, pratiqués dans la plaque frontale de la porte.
PCT/DE1982/000135 1981-06-30 1982-06-30 Agencement de verrouillage et de deverrouillage pour des objets, des recipients et des locaux WO1983000179A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU86858/82A AU8685882A (en) 1981-06-30 1982-06-30 Locking and unlocking device for objects, containers and premises

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19813125745 DE3125745A1 (de) 1981-06-30 1981-06-30 Verfahren- und einrichtung zur sicherung und entsicherung von raeumen, tresoren, tresoranlagen
DEP3125745.3810630 1981-06-30

Publications (1)

Publication Number Publication Date
WO1983000179A1 true WO1983000179A1 (fr) 1983-01-20

Family

ID=6135751

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DE1982/000135 WO1983000179A1 (fr) 1981-06-30 1982-06-30 Agencement de verrouillage et de deverrouillage pour des objets, des recipients et des locaux

Country Status (4)

Country Link
EP (1) EP0090880A1 (fr)
DE (1) DE3125745A1 (fr)
WO (1) WO1983000179A1 (fr)
ZA (1) ZA824665B (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3915068C1 (en) * 1989-05-09 1990-08-09 Thomas 7316 Koengen De Matouschek Safe with alarm and monitor - has narrow lead(s) broken by rod-shaped locking elements in retention region if forced open

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL136551C (fr) * 1900-01-01

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL136551C (fr) * 1900-01-01

Also Published As

Publication number Publication date
DE3125745A1 (de) 1983-05-05
EP0090880A1 (fr) 1983-10-12
ZA824665B (en) 1984-05-30

Similar Documents

Publication Publication Date Title
EP0809743B2 (fr) Cle electronique
DE4438832A1 (de) Schloß mit Identträger-Aktivierung
WO2017157761A1 (fr) Antivol de bicyclette comprenant une bande textile, kit et procédé de fonctionnement d'un antivol de bicyclette
DE102004013369A1 (de) Elektronisches Kontroll-System
DE19527801C2 (de) Schließsystem
DE2922262A1 (de) Vexiervorrichtung
CH647576A5 (de) Schliessvorrichtung.
DE102012009624A1 (de) Elektronische Anzeige im Drehknauf
EP3027827B1 (fr) Poignée de fenêtre, verrouillable de façon électromagnétique
DE102008059291A1 (de) Zugangskontroll- und steuersystem
WO1983000179A1 (fr) Agencement de verrouillage et de deverrouillage pour des objets, des recipients et des locaux
DE102006002310B4 (de) Gebäudetürbetätigungsvorrichtung
DE3538786C2 (fr)
DE10152349B4 (de) Sicherheitseinrichtung
AT510349A1 (de) Schlüsseldepot
DE3224473A1 (de) Vorrichtung und einrichtung zur sicherung und entsicherung und zugangsberechtigungskontrollvorrichtung fuer gegenstaende, behaeltnisse und raeumlichkeiten
DE3711501A1 (de) Sicherheitsschloss
DE20320720U1 (de) Schließzylinder
DE10062466B4 (de) Elektronisches Schloss, Schließanlage und Verfahren zum Öffnen und/oder Schließen eines elektronischen Schlosses
DE3503933C2 (fr)
EP0238577A1 (fr) Systeme anti-effraction ou anti-vol
DE4438471A1 (de) Zugangskontrollanlage
DE29521095U1 (de) Vorrichtung zum Scharf-/Unscharfschalten einer Alarmanlage
DE202022106787U1 (de) System zur elektronischen Zugriffskontrolle, insbesondere für Möbelstücke
DE102012105084A1 (de) Mechanisches Sicherheitsschloss

Legal Events

Date Code Title Description
AK Designated states

Designated state(s): AU BR FI HU JP KP NO SU US

Kind code of ref document: A1

Designated state(s): AU BR FI HU JP KP NO SU US