The present invention pertains to a cylinder lock comprising a housing and rotatably provided therein a cylinder having a first end and a second end, the cylinder extending in a longitudinal direction between the first end and the second end, the cylinder comprising an internal keyway for placing a key corresponding to the lock in the cylinder, the lock further comprising a locking mechanism that prevents rotation of the cylinder with respect to the housing when the key is not present in the keyway. The invention also pertains to a combination of such a lock and a corresponding key.
A cylinder lock is a lock constructed with a cylinder that is able to rotate with respect to a housing along a so-called shear line, however in principal only when a corresponding key (or at least the blade thereof) is placed in the keyway. The housing is stationary with respect to the door or other item that can be locked. The cylinder by rotating, optionally by actuating a cam, is used to change the position of the actual locking element such as a bar of metal that actually secures the position of the element to be locked (typically a door). A locksmith can easily unscrew the cylinder to facilitate rekeying. The cylinder may contain any of a variety of locking mechanisms, including commonly known mechanisms such as the pin tumbler lock, the wafer tumbler lock and the disc tumbler lock. Any of these locks may be designed for any known type of key such as a cut key (having saw tooth like bitings), a dimple-key, tubular key (for so called radial locks), skeleton key, Zeiss key (also known as cruciform key), Abloy key, magnetic key etc. These keys may be single- or multiple sided as known in the art.
The first main advantage to a cylinder lock, also described as a profile cylinder lock, is that the cylinder may be changed without altering the boltwork hardware. Removing the cylinder typically requires only loosening a set screw, then unscrewing the cylinder from the boltwork. The second is that it is usually possible to obtain, from various lock manufacturers, cylinders in different formats that can all be used with the same type of key. This allows the user to have keyed-alike, and master-keyed systems that incorporate a wide variety of different types of lock, such as night latches, deadbolts and roller door locks. Typically, padlocks can also be included, although these rarely have removable cylinders. Standardised types of cylinder include key-in-knobset cylinders, rim (also known as night latch) cylinders, Ingersoll format cylinders, American, and Scandinavian round mortise cylinders, and Scandinavian oval cylinders. There are also standardised cross-sectional profiles for lock cylinders that may vary in length—for example to suit different door thicknesses. These profiles include the europrofile (or DIN standard), the British oval profile and the Swiss profile.
Cylinder locks however are vulnerable to forced entry by various techniques used in the art of burglary and law enforcement. Conventional cylinders can be easily drilled to create another shear line to allow the cylinder to turn freely without a key or to totally remove the internal components of the cylinder, whereafter a screwdriver can be used to rotate the cam. Another technique aims at pulling a cylinder from its housing. In this technique a special hardened screw is inserted into the keyway, and then an extreme pulling force is applied with a tool to exert reverse pressure against the door. This is a simple technique for which even commercial sets are available. Yet another technique is commonly referred to as a twisting attack. This technique relies on torsion and twisting forces that can be applied to a screwdriver or alike that is inserted deep enough into the keyway. A torque as great as 600 pound-inches can be easily applied by using a common adjustable wrench. This way, the lock can be broken allowing removal of the cylinder.
Yet another commonly applied technique uses a co-called bumpkey to bump a lock. When bumping a lock, a key that mechanically fits the key way such that it can at least be inserted in the cylinder, is initially inserted into the keyway one pin short of full insertion. Bumping the key inward forces it deeper into the keyway. The specially designed teeth of the bump key transmit a slight impact force to all of the bottom pins in the lock. The key pins transmit this force to the driver pins; the key pins stay in place. Because the pin movements are highly elastic, the driver pins “jump” from the key pins for a fraction of a second, moving higher than the cylinder (i.e. the shear line), then are pushed normally back by the spring to sit against the key pins once again. Even though this separation only lasts a split second, if a light rotational force is continuously applied to the key during the slight impact, the cylinder will turn during the short separation time of the key and driver pins, and the lock can be opened while the driver pins are elevated above the keyway. Lock bumping takes only an instant to open the lock and the lock is usually not visibly damaged.
Impressioning is yet another non-destructive, covert method of creating a working key for a lock without picking or disassembly. Impressioning is one of the most useful skills in locksmithing, and is divided between copying and manipulation techniques. Copying focuses on making negative-image moulds of a source key, while manipulation uses various techniques to determine the proper heights of internal components without the source key being available. For the latter method, it is needed that a blank key is slided into the key. Impressioning via manipulation is closely related to decoding. Many high profile crimes have been accomplished through the use of impressioning techniques.
Pin tumbler locks are vulnerable to lockpicking. This technique involves a pick, which is a thin piece of hard steel with a small hook at its end, and some other tool (typically a tension wrench) that can be inserted into the keyhole alongside the pick and used to rotate the cylinder. The technique relies on small imperfections in the cylinder, that lead to a single pin holding the cylinder from rotating. The burglar applies a constant (though weak) torque on the cylinder with a wrench, and tries the pick at each pin.
When the pick fiddles with the pin that actually holds the cylinder, the cylinder will rotate minutely, until another pin will stop it. Now the first pin is held in open position by the cylinder itself, and the burglar can proceed to pick the other keypin. Though these principals are easy to understand, in practice a great deal of experience and patience is required in order to master this technique. Very high quality cylinders are less prone to this attack, requiring more time as well as superior skill, however, electronic locks are far cheaper and robust just as well.
Manual and electronic pick guns are a popular method used today for quick and easy ways of opening doors. The higher-end electric pick guns are usually made of aircraft aluminum and hard steel. The pick is operated by simply pressing a button that vibrates while the normal tension wrench is being used. A manual pick gun (or Snap gun) is used in a similar way but usually has a trigger that creates a movement which (like bump keys) operates on the same principle as Newton's cradle. It transfers sudden energy to the key pins which communicate this to the driver pins causing those pins only to jump, allowing the cylinder to turn freely for a brief moment, until the pin springs return the pins to their locking position. A pick gun is used in conjunction with a tension tool and the only skill required here is learning the timing.
Various locks with additional means to protect the lock against forced entry have been described in the art.
GB 775,098 shows a pin tumbler lock with an additional security feature in the form of a plunger normally resiliently loaded to an unlocking position where it is housed within the cylinder but axially movable from said unlocking position to a locking position bridging the housing and the cylinder, by plunger operating formations on the side of the key. This includes a bevelled side face on the leading end of the key adapted to engage the plunger and move it to a locking position.
U.S. Pat. No. 4,490,998 describes a tamper resistant cylinder lock including a pair of cooperating keyway guard plates, each of which has a keyway formed therethrough. The guard plates are laterally displaceable relative to one another for movement between an open position in which the keyways of the guard plates are aligned to allow for passage of a key, and a blocked position in which the keyway of one of the guard plates is at least partially blocked by the other one of the plates. A uniquely configured key is needed for use in combination with such guard plates.
Likewise, FR 2785322 discloses a tamper resistant cylinder lock including a pair of cooperating keyway guard plates, each of which has a keyway formed therethrough. The configuration of one of the guard plates is controlled using a configuration mechanism that is controllable by wireless communication between the lock and a remote control unit.
U.S. Pat. No. 7,673,484 discloses a pin tumbler lock which in addition to the pin tumbler locking means, is provided with a block assembly to prevent the cylinder from rotating with respect to the housing. This provides additional means for preventing the lock to be tampered.
DE 10 2004 055979 discloses a cylinder lock which in addition to the commonly known multiple locking pins to prevent rotation of the cylinder in the housing, which elements can be controlled by inserting a fitting key, has an extra locking pin to prevent rotation of the cylinder in the housing. This additional pin can be controlled via wireless communication. This way, the insertion of a (mechanical) fitting key alone in the keyway is not sufficient to allow rotation of the cylinder in the housing, a further actuation is needed to retract the additional element from its blocking position into a position where rotation of the cylinder is allowed. This way, although the entry of a non-allowed key cannot be prevented, even if this non-allowed key is fully inserted in the keyway, the rotation of the cylinder will still be blocked if the required further actuation of the additional locking pin is not provided.
It is an object of the invention to provide a cylinder lock that is better resistant against unwanted unlocking (forced entry) and optionally vandalism. To this end, a lock as mentioned above under “Field of the invention” is devised, characterised in that the lock comprises a blocking element positioned between the first and second end, which blocking element is configurable to take a first position wherein the keyway is blocked (such that the key cannot be placed in the keyway) and a second position wherein the keyway is unblocked (such that the key can be placed therein), wherein the lock comprises a configuration means to configure the blocking element in the first or second position, wherein the configuration means is (optionally) controllable by wireless communication between the lock and a remote control unit. The invention is also embodied in a combination of such a cylinder lock and a key that corresponds to the said lock, wherein the key is provided with a transmitter and the lock is provided with a receiver, the said transmitter and receiver enable the wireless communication. The invention also pertains to a key provided with a transmitter for use in combination with a cylinder lock as described here above.
With this invention a lock is provided having an internal blocking element to prevent a key or other key-shaped element to be placed in the cylinder, which blocking element is configurable using a remote control unit. So even a key that mechanically corresponds to the locking mechanism itself (for example a true mechanical copy of the original key), cannot by placed in the cylinder if the blocking element is configured in the first (blocking) position. Since the blocking element is not positioned in front of the cylinder (i.e. externally of the cylinder) it is far less prone to tampering therewith. Prior art blocking elements such as guard plates known from U.S. Pat. No. 4,490,998 and FR 2785322 cannot be positioned internally of the cylinder (at a position corresponding to the locking mechanism) since the presence of such a plate would prevent the key from being able to turn around. Such guard plates can only be used if the complete blade is to pass the guard plate, i.e. by positioning them in front of the cylinder. This positioning makes them inherently vulnerable for tampering therewith. Other blocking elements, such as the blocking element known from DE 10 2004 055979 cannot prevent that a non-allowed key or other object is positioned completely in the keyway. Therefore, such a blocking element cannot prevent that common burglar means that rely on entry of an object into the keyway, such as for example the twisting attack, can still successfully be used.
It is noted that for additional security, the present invention could be used in conjunction with a further means that is used to control the blocking means such as for example a biometric scanner, a card reader etc. Depending on the required level of security, in order to configure the blocking means it could for example be required that the original key with a chip is used to wirelessly contact the configuration means and that additionally, the user of the key is identified as a registered user via a scan of his or her iris and/or fingerprint.
Definitions
Placing a key providing the key to take a position that enables unlocking of the locking mechanism of the lock. In other words, the terms describe fully entering the key (i.e. at least the relevant part of its blade) in the cylinder to an unlocking position.
To block: to stop or impede the passage of or movement through, to obstruct.
Configurable: to bring in a predetermined position in space.
Wireless communication: is transmittal of data between a transmitter and a receiver involving for at least part of the track between the transmitter and receiver a transmission without using a wire to guide the data. Typical wireless communication involves radio, light or sound signals.
To control: to exercise substantial influence over
To extend in a direction: to at least partly extend in that direction. That is, when a line A crosses a line B, line A extends in a direction perpendicular to line B.
In an embodiment the blocking element in the first position prevents rotation of the cylinder with respect to the housing. In this embodiment the blocking element, together with the locking mechanism may prevent rotation of the cylinder with respect to the housing. This way, the blocking element does not only provide protection against an element (such as a false key) being driven into the keyway of the lock, it also provides additional strength against the cylinder being forced to turn into its housing while being in the blocked position.
In another embodiment the blocking element is peg-shaped. A peg-shaped element has found to be less prone to mechanical tampering than for example plate-shaped blocking elements. A peg, in particular when made of a hardened material, can hardly be drilled trough or otherwise be mechanically worked. In a preferred embodiment the peg-shaped blocking element extends in a direction perpendicular to the longitudinal direction in which the cylinder extends, which will further increase the difficulty to mechanically impact the blocking element from a position outside of the lock.
In an embodiment wherein the locking mechanism comprises multiple pins, the blocking element and each of the pins are of congruent shape. This embodiment advantageously recognises that the current invention can easily be conformed in existing type of pin tumbler locks when the blocking element simply takes the place of any (or more) of the original pins. A position adjacent the entry of the keyway provides optimal protection against any unwanted object being put in the keyway. A position more towards the middle portion of the cylinder reduces the risk of the blocking element being mechanically tampered with. Depending on the type of object to be locked, the techniques of the regional burglars and other things, an optimum type of position can be chosen.
In yet another embodiment the blocking element is configurable by translation in a direction perpendicular to the longitudinal direction in which the cylinder extends. In this embodiment, the blocking element is translated to reach any of the blocked and open positions. A translation can be provided simply by using common technical means such as for example screw thread, a toothed bar, electro-magnetic means etc. This embodiment is particularly useful for the type of locks having a housing for the locking mechanism that extends substantially over the same length as the cylinder itself. The blocking element can then be placed inside that part of the housing that keeps the locking mechanism. Then, the blocking element even when being in the second (open) position, thus translated out of the actual cylinder, is still within a mechanically strong housing and thus protected from mechanical violence.
In an alternative embodiment the blocking element is configurable by rotation about an axis that extends in a direction perpendicular to the longitudinal direction in which the cylinder extends. This embodiment is particularly useful for so called Swiss-type locks where the part of the housing that keeps the locking mechanism extends only along a middle portion of the cylinder. In order to keep the blocking element protected from mechanical tampering therewith, even when positioned near the entry of the keyway, it is be placed rotatably in the cylinder. By rotating, an open passage present in the blocking element can either be configured in line with the keyway (in which case a key can pass the blocking element) or transverse thereto (in which case a key cannot pass the blocking element).
In an embodiment the lock comprises a power source to provide the power to actuate the configuration means. Such a power source can be as simply as a built-in Li-ion battery, but any type of power source, being for example electrically, mechanically or a combination thereof may be appropriate. In a further embodiment the blocking element takes a default position when the power source has a power to actuate the configuration means below a predetermined minimum level. In this embodiment, it is prevented that the lock cannot be opened anymore since the power has reached a level that is no longer sufficient to configure the blocking element to take the default position. At the minimum predetermined amount of power, the level should be such that there is at least sufficient power to re-configure the blocking element one more time, i.e. to take the default position. In yet a further embodiment the default position is the second position. In this embodiment the lock will be available for opening with a suitable key, even when the power source is empty, and thus the blocking mechanism can no longer be configured.
In an embodiment the remote control unit is operatively connected to the key. In this embodiment the key may be a so-called transponder key or chip key, or use is made of a separate remote control that is kept together with the key. In principal, any kind of wireless communication signals may be used in the present invention. Common signals make use of light, sound or radio-waves. It is preferable that the signals are so weak that they will not travel significantly further than 4 or 5 centimeters such that unwanted picking up of the signals is practically prevented.
In another embodiment the key is provided with a transmitter that is able to send a signal to provide said communication. In particular, the transmitter is an RFID (radio frequency identification) chip. The RFID chip is also known as an “electronic label,” “transponder” or “code plate,” and is commonly attached to an antenna. Transmitting in the kilohertz, megahertz and gigahertz ranges, the chip may be battery-powered or derive its power from the RF waves coming from the reader, present in conjunction with the lock. Like bar codes, RFID tags identify items. However, unlike bar codes, which must be in close proximity and line of sight to the scanner for reading, RFID tags do not require line of sight and can be embedded within packages such as the handle of the key.
It is noted that the invention also pertains to a cylinder lock comprising a housing and rotatably provided therein a cylinder that comprises an internal keyway for placing a key corresponding to the lock in the cylinder, the lock further comprising a locking mechanism that prevents rotation of the cylinder with respect to the housing when the key is not present in the keyway, the locking mechanism comprising multiple separate locking elements wherein the lock comprises a blocking element positioned in lieu of one of the said locking elements, which blocking element is configurable to take a first position wherein the keyway is blocked and a second position wherein the keyway is unblocked, wherein the lock comprises a configuration means to configure the blocking element in the first or second position. In this embodiment, a classical type of cylinder lock is used as a basis for the application of the invention, viz. a cylinder lock which has multiple separate locking elements, typically locking pins. One of the multiple separate locking elements is replaced by the blocking means of the invention to provide a cylinder lock according to the invention. This way, the cylinder lock according to the invention can be used in the corresponding existing configuration of the lock that was used to apply the invention in.
In a further embodiment the blocking element is positioned in lieu of the locking element that is situated adjacent an entrance of the keyway, i.e. at a position most near to the entrance of the keyway for any of the locking element positions. This way, the keyway can be blocked at the entrance site which minimizes the risk of unwanted entrance of an object or (fluid or gaseous) material in the keyway. It is noted that any of the above described embodiments (which relate to dependent claims 2 to 12) can also be applied in the lock according to these two embodiments of the invention.
The invention also pertains to a key for use with a cylinder lock according to the invention, wherein the key is made of a synthetic material (thus not of metal, or a metal alloy) and comprises a chip for enabling the wireless communication, the chip being embedded in the material. Synthetic materials such as plastics, (UV curable) resins and other materials that are able to be moulded at temperatures below 250° C., in particular below 200° C., below 190° C., below 180° C., below 170° C., below 160° C. or below 150° C., have the advantage that the chip can be easily embedded in the material of the key itself (currently, chips are available that can withstand temperatures as high as 250° C.; RFID chips typically can withstand temperatures up to 200° C.). With a traditional key which has a metal blade, the chip has to be positioned adjacent the handle of the key and is thereafter enclosed by a plastic or rubber enclosure. Such keys are often relatively thick, heavy and are prone to easy damage to the enclosure. A key made of a synthetic material can be very flat and light and still enclose a chip, preferably completely embedded in the material. In an embodiment the chip is provided in the blade of the key, preferably near the distal end of the blade. Being present near the distal end of the blade, thus near the key tip, means the chip will be able to communicate wireless with a lock, a fraction of a second earlier then in a situation where the chip is present in the handle of the key. Even during everyday use, a fraction of a second may be noticeable when opening the lock.
The invention will now be explained in more detail using the following non-limiting examples.
As depicted in
This lock according to the invention has a blocking element 20 positioned between the first and second end 11 and 12 of the cylinder 1. This cylinder corresponds to the outside of the house-door and is thus prone to unwanted opening by burglars or the like. In the configuration shown, the element 20 has a peg-shape that is congruent to the shape of any of the sub-pin combinations (and therefore fits a hole drilled like any of the holes that are provided with these pins). In the configuration shown, the blocking element blocks the keyway (see
The motor 22 is actuated by receiving a control pulse from central processing unit 23. This processing unit 23 on its turn is provided with a chip (receiver) that is able to receive a radio pulse 600 sent by a remote control unit 505, which unit is provided with an RFID chip in this embodiment. In this specific embodiment, only a transmitter chip that is programmed to correspond to this lock is able to transmit the proper signal 600 whereupon the CPU 23 acts to configure blocking element 20 in its “open” position. This way, the configuration means is controllable by wireless communication between the lock and the remote control unit
In this embodiment the lock is provided with a contact (not shown) that corresponds to an element of the key (such as a dimple, contact, biting, chip etc.). When the contact is activated, thus when the key is placed in the keyway, this de-activates the configuration means in order to prevent that the blocking mechanism is activated when the key is placed in the lock.
In an advantageous embodiment, a key for use with the lock according to the present invention is a key is made from durable polyamide. The integration of a (RFID) chip is easy provide in this material, by introducing the chip in the key when being injection moulded at 120° C. (Nylon 66). Against the traditional positioning of a chip in a key (viz. the chip being present in the handle/pad of the key), the chip is present in the blade, in particular near the distal end (opposite the handle) of the blade.
Number | Date | Country | Kind |
---|---|---|---|
12199314 | Dec 2012 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2013/077876 | 12/23/2013 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2014/096442 | 6/26/2014 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
3889501 | Fort | Jun 1975 | A |
4277962 | Lipschutz | Jul 1981 | A |
4490998 | Wellekens | Jan 1985 | A |
4789859 | Clarkson | Dec 1988 | A |
4848115 | Clarkson | Jul 1989 | A |
4854146 | O'Connell | Aug 1989 | A |
5083362 | Edgar | Jan 1992 | A |
5469727 | Spahn | Nov 1995 | A |
5507162 | Chhatwal | Apr 1996 | A |
5691711 | Jorgensen | Nov 1997 | A |
5836187 | Janssen | Nov 1998 | A |
6035677 | Janssen et al. | Mar 2000 | A |
6318137 | Chaum | Nov 2001 | B1 |
6363762 | Kueng | Apr 2002 | B1 |
6442986 | Russell | Sep 2002 | B1 |
6526791 | Shvarts | Mar 2003 | B2 |
6840072 | Russell | Jan 2005 | B2 |
7640773 | Bellamy | Jan 2010 | B2 |
7673484 | Crepinsek | Mar 2010 | B1 |
7696878 | Cable | Apr 2010 | B2 |
8581690 | Lappalainen | Nov 2013 | B2 |
8720238 | Davis | May 2014 | B1 |
8866066 | Fuse | Oct 2014 | B2 |
8899081 | Pukari | Dec 2014 | B2 |
8928453 | Sprenger | Jan 2015 | B2 |
20020116968 | Shvarts | Aug 2002 | A1 |
20060156771 | Hauri | Jul 2006 | A1 |
20060230796 | Keller | Oct 2006 | A1 |
20080053174 | Amir | Mar 2008 | A1 |
Number | Date | Country |
---|---|---|
202359889 | Aug 2012 | CN |
10045631 | Jan 2002 | DE |
102004055979 | May 2006 | DE |
102011014797 | Mar 2012 | DE |
0709533 | May 1996 | EP |
1013856 | Jun 2000 | EP |
2785322 | May 2000 | FR |
775098 | May 1957 | GB |
Number | Date | Country | |
---|---|---|---|
20150300043 A1 | Oct 2015 | US |