1. Field of the Invention
The present invention relates to cylinder locks, and more particularly to an improved cylinder security lock having conventional locking tumblers and secondary locking structure that operates independently of the tumblers. The secondary locking structure prevents operation of the cylinder lock until a properly configured key is placed in the keyway of the cylinder lock. The invention also relates to a novel key for operating the cylinder lock of the present invention.
2. Description of the Prior Art
Cylinder locks for locking doors, cabinets and other structures are well known in the art. These prior art cylinder locks typically include a cylinder shell, a cylinder plug rotatably received within the shell, and a plurality of tumblers reciprocally mounted in chambers extending through the shell and plug. The cylinder plug is typically coupled with a lock actuator that rotates with the plug for unlocking a locking mechanism such as a dead bolt upon rotation of the plug.
In more detail, cylinder plugs include a keyway for receiving a key blade. The tumblers are configured for preventing rotation of the cylinder plug until a properly configured key blade is inserted in the keyway. A properly configured key displaces the tumblers to a position that permits the rotation of the cylinder plug in the shell.
Although prior art cylinder locks effectively provide security when first installed, they can be circumvented shortly thereafter by unauthorized key duplication. Although it is common for companies to attempt to control access to a locked area by distributing only one key to each of their selected employees, the employees often have their keys copied by a locksmith. Thus, it is virtually impossible to control the distribution of keys that fit a particular lock since many extra keys can be cut without the knowledge or permission of the employer.
In an attempt to prevent unauthorized key duplication, many lock manufacturers repeatedly create new key blank designs and regulate the manufacture and distribution of the key blanks. However, due to the strong demand for key duplication services, locksmiths and key blank manufacturers usually gain access to these new blank designs and introduce copies of the blanks within a short time of their creation.
Another concern of lock manufacturers are the limitations in the amount of different key combinations available with any particular lock design. A common method of increasing key combinations is to produce locks and keys with different key blade shapes that are non-interchangeable thus increasing the number of useable different keys with essentially the same basic lock design. However, these keys still offer no protection against unauthorized duplication.
In view of the limitations of prior art cylinder locks discussed above, it is an object of the present invention to provide an improved cylinder lock that cannot be easily circumvented by unauthorized key duplication.
It is a more particular object of the present invention to provide a cylinder lock with secondary locking structure that operates independently of the lock's tumblers for preventing operation of the cylinder lock until a properly configured key is placed in the keyway of the cylinder lock.
It is another object of the present invention to provide a cylinder lock with secondary locking structure that is simple and inexpensive to manufacture.
It is another object of the present invention to provide a cylinder lock having a secondary locking structure that can be easily formed in various sizes and shapes to accommodate a plurality of key blanks in a single keyway, thus substantially increasing the key combination per keyway.
It is another object of the present invention to provide a novel key having utilitarian structure for operating the cylinder lock of the present invention.
In view of these objects and other objects that become evident from the following description of the preferred embodiments of the invention, an improved cylinder lock and key for operating the cylinder lock are provided. The preferred cylinder lock broadly includes a lock shell, a cylinder plug rotatably positioned in the lock shell, and a secondary locking structure including a locking bar positioned in the cylinder plug that operates independently of the lock's tumblers.
The secondary locking structure prevents rotation of the cylinder plug relative to the cylinder shell until a properly configured key is fully inserted in the keyway. If a key is cut by conventional means so that it operates the tumblers of the cylinder lock but does not properly operate the secondary locking structure, it will not open the cylinder lock.
The preferred secondary locking structure broadly includes a locking bar that is reciprocally mounted in a hollow slot formed in the cylinder plug parallel to the keyway. The locking bar includes a finger portion that is normally engaged within a notch formed in the rear face of the cylinder shell. When a properly configured key is placed in the keyway, it engages the locking bar and shifts it rearward so that the finger portion is shifted out of the notch formed in the shell, thus permitting rotation of the cylinder plug relative to the shell.
The key of the present invention includes structure for operating the cylinder lock described herein. In preferred forms, the key includes a stamped lug protruding from one side thereof for engaging the locking bar and shifting the finger portion out of the notch formed in the cylinder shell when the key is fully inserted in the keyway.
By constructing a cylinder lock and associated key as described above, numerous advantages are realized. For example, by constructing a cylinder lock that includes secondary locking structure that operates independently of the lock's tumblers, a key blank that is merely copied to fit the lock's tumblers will not open the lock. Thus, the cylinder lock cannot be easily circumvented by unauthorized key duplication.
Additionally, since the secondary locking structure includes only a slot formed in the plug of the lock and a locking bar that is positioned in the slot, it is simple and inexpensive to manufacture. Moreover, existing cylinder lock designs can be easily modified to include the secondary locking structure of the present invention.
Another advantage of the present invention is that since the key itself includes novel utilitarian structure for operating the cylinder lock of the present invention, it provides a second layer of protection against unauthorized key duplication.
Another advantage of the present invention is that the locking bar can be varied in size to cooperate with a plurality of novel key blanks without changing the shape of the keyway. This reduces the cost associated with forming new keyways for various cylinder locks and significantly increases the number of keying combinations per keyway.
A preferred embodiment of the present invention is described in detail below with reference to the attached drawing figures, wherein:
Turning now to the drawing figures, and particularly
In more detail, the lock shell 12 is best illustrated in
As best illustrated in
Returning to
The cylinder plug 14 is preferably cylindrical in shape and is rotatably received within the plug-receiving chamber 22 of the shell 12. As best illustrated in
The cylinder plug 14 also includes a retainer cap 38 secured to its rear end 34 for retaining the cylinder plug 14 in the chamber 22. The retainer cap 38 has a diameter slightly greater than the diameter of the plug-receiving chamber 22 and includes a notch 39 formed along its circumference for permitting the locking bar 16 to slide thereby as described below.
As best illustrated in
A second embodiment of the cylinder lock 10a with a modified slot 40a is illustrated in
Referring again to
Referring to
As best illustrated in
A plurality of conventional spring-biased tumblers 28 are positioned within the tumbler-receiving chambers 26 and 48. The tumblers 28 are configured for permitting rotation of the cylinder plug 14 within the cylinder shell 12 only when a properly configured key 100 is placed in the keyway 36 of the cylinder plug 14.
The locking bar 16 is reciprocally mounted in the hollow slot 40 of the cylinder plug 14 as depicted in FIG. 4 and provides a secondary locking structure that operates independently of the above-described tumblers 28. A first embodiment of the locking bar 16 is depicted in FIG. 19 and is configured for use with the cylinder lock 10 depicted in
Returning to
The shoulder portion 56/56a is provided for engaging the inside face of the cylinder plug retainer cap 38/38a when the locking bar 16/16a is shifted rearward by a properly configured keyblade 104/104a. This limits the travel of the locking bar 16/16a out of the slot 40/40a and prevents the locking bar 16/16a from sliding completely out of the cylinder plug 14/14a.
Returning to
Referring again to
The
The keys 100 of the present invention are best illustrated in
Each key 100 broadly includes a bow or head 102, an elongated key blade 104 extending from one side of the bow 102, and a protruding surface 106 extending a distance from one side of the blade 104 for engaging the front end 50 of the locking bar 16 when the key 100 is inserted in the keyway 36 of the cylinder lock 10. In the
In the
It is important to note that the length of the locking bar 16 must correspond with the precise position of the protruding surface 106 on the key 100 to open the cylinder lock 10. If the protruding surface 106 is too close to the tip of the key 100, it will prematurely engage the locking bar 16 and push it rearward until it stops on the retainer cap 38 before the key 100 properly registers at the tip-stop. This will cause the tumblers to be incorrectly aligned within the tumbler chambers and prevent key rotation. Similarly, if the protruding surface 106 is too far from the tip of the key 100, it will not engage the front end 50/50a of the locking bar 16, and the rear finger portion 54 of the locking bar 16 will remain in the cylinder shell notch 24, thus preventing cylinder plug 14 rotation.
In operation, the secondary locking structure prevents rotation of the cylinder plug 14 relative to the cylinder shell until a properly configured key 100 is fully inserted in the keyway 36. If a key 100 is cut by conventional means so that it operates the tumblers 28 of the cylinder lock 10, it will still not open the lock 10 since the locking bar 16 provides a second locking function that is independent of the tumblers 28. Additionally, since the key 100 includes novel structure for operating the cylinder lock 10, it provides a second layer of protection against unauthorized key duplication. Thus, the invention provides an increased measure of security not found in conventional cylinder locks 10.
As illustrated in
Although the invention has been described with reference to the preferred embodiment illustrated in the attached drawing figures, it is noted that equivalents may be employed and substitutions made herein without departing from the scope of the invention as recited in the claims. For example, although the invention described herein generally relates to an improvement for a standard pin tumbler cylinder, the description and illustrations of this invention are depicted in the embodiment of a special type of pin tumbler cylinder commonly known to those skilled in the art as an interchangeable core cylinder. This interchangeable core is designed with a second shear line and respectively requires a second key to turn the cylinder plug and control sleeve simultaneously, thus retracting a portion of what is known as the control sleeve allowing easy installation and removal of the cylinder in a variety of cylinder housing designs for various applications. Since this interchangeable core type of cylinder is described in the prior art, the special details of operation will not be covered here. This improvement may also be applied to conventional pin tumbler mechanisms as well as other types of tumbler mechanisms.
Number | Name | Date | Kind |
---|---|---|---|
1093817 | Williams | Apr 1914 | A |
1965889 | Fitz | Jul 1934 | A |
2013730 | Jacobi | Sep 1935 | A |
2047966 | Jacobi | Jul 1936 | A |
2690070 | Spain | Sep 1954 | A |
3216230 | Falk | Nov 1965 | A |
3425248 | Duyal | Feb 1969 | A |
3492843 | Slaybaugh et al. | Feb 1970 | A |
3575024 | Schlage | Apr 1971 | A |
4114411 | Schlage | Sep 1978 | A |
4194379 | Dice, Sr. | Mar 1980 | A |
4341102 | Ku et al. | Jul 1982 | A |
4635455 | Oliver | Jan 1987 | A |
4732022 | Oliver | Mar 1988 | A |
4756177 | Widen | Jul 1988 | A |
4823575 | Florian et al. | Apr 1989 | A |
5016455 | Hennessy | May 1991 | A |
5101648 | Kuster | Apr 1992 | A |
6301942 | Shvarts | Oct 2001 | B1 |
D462004 | Jenks | Aug 2002 | S |
6477875 | Field et al. | Nov 2002 | B1 |
Number | Date | Country |
---|---|---|
2341659 | Feb 1975 | DE |
2800374 | Jul 1979 | DE |
2800398 | Jul 1979 | DE |
2828343 | Jan 1980 | DE |
504473 | Jul 1920 | FR |
1533953 | Jun 1968 | FR |
2388966 | Dec 1978 | FR |
546711 | Jul 1942 | GB |
2249127 | Apr 1992 | GB |
Number | Date | Country | |
---|---|---|---|
Parent | 08529903 | Sep 1995 | US |
Child | 10721019 | US |