The present disclosure relates to keys and locks, and more specifically, to locks that can detect when they are being tampered with.
Keys and locks have been around for years. They are often used in combination with each other to secure property. To unlock the lock, the key is inserted into the lock and then turned. This causes a cam or lever on the end of the lock to rotate from a locked to an unlocked position and allowing access to the area or space which the lock was protecting. The lock will open if the correct key is inserted. If an incorrect key is inserted the lock will not open as the key cannot be turned. However, locks are often the targets of lock pickers. Lock pickers use a number of tools or picks to push the pins in the lock to the correct position to permit the plug in the lock to rotate. There have been numerous attempts to make locks that are more difficult or impossible to pick. However, each of these approaches to making a more secure lock give evidence to the picker of their enhanced capabilities. For example, magnetic locks require keys that have magnets on them which are obvious to the casual observer. Thus, tipping the lock picker to what tools and what approaches are needed to pick the particular lock. Further, a lock picker is often able to return to a lock on many different times in an attempt to pick the lock. They may do this over a period of time to avoid being detected.
Disclosed herein is a lock system for alerting a user or other entity that a lock has been or is being tampered with. The lock includes at least one enhanced security pin that is electrically isolated from the rest of the lock. When the lock picker attempts to pick the lock a portion of the enhanced security pin contacts either the plug or the outer casing of the lock to complete a circuit with an alert component. The completion of the circuit causes the alert component to generate an alert signal that can be observed by the user or other entity.
According to embodiments of the present disclosure a lock comprising a plug and an outer casing is disclosed. The plug has a keyway and a first plurality of shafts. The outer casing has a plug hole disposed in a center portion of the outer casing. The plug hole is shaped to accept the plug into the outer casing. The outer casing further includes a second plurality of shafts. A plurality of springs is disposed within the second plurality of shafts, each of the second plurality of shafts has a single spring. A plurality of driver pins are connected to a corresponding one of the plurality of springs. A plurality of key pins are connected to a corresponding one of the plurality of driver pins. At least one of the driver pins is an enhanced security pin. The enhanced security pin has a top portion and a bottom portion comprised of a non-conductive material and a center portion comprised of an electrically conductive material. A wire is disposed in the center portion of the security pin and a second wire is disposed in either the plug or the outer casing. An alert component is connected to both of the wires such that when the center portion contacts a portion of either the plug or the outer casing an electrical circuit is completed between the first wire, the second wire and the alert component causing the alert component to generate an alert signal.
According to embodiments of the present disclosure a method of detecting an attempted tampering with a lock is disclosed. The method begins by inserting a tool other than a key into a keyway of the lock. Next a plurality of key pins and a plurality of driver pins within the lock are displaced by the tool. At least one of the plurality of driver pins is an enhanced security pin. Next the plug of the lock is rotated, however, full rotation of the plug is prevented by the enhanced security pin contacting a portion of the plug or a portion of an outer casing of the lock. This occurs because the enhanced security pin does not align with the shear line. This completes a circuit between the enhanced security pin and an alert component. As a result of the completed circuit the alert component generates an alert.
The above summary is not intended to describe each illustrated embodiment or every implementation of the present disclosure.
The drawings included in the present application are incorporated into, and form part of, the specification. They illustrate embodiments of the present disclosure and, along with the description, serve to explain the principles of the disclosure. The drawings are only illustrative of certain embodiments and do not limit the disclosure.
While the invention is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the invention to the particular embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.
Aspects of the present disclosure relate keys and locks, more particular aspects relate to tamper or pick resistant pin type locks. While the present disclosure is not necessarily limited to such applications, various aspects of the disclosure may be appreciated through a discussion of various examples using this context.
Lock 150 is a component of the system 100 that provides the physical protection by securing and unsecuring the item or items locked by the lock. In one embodiment the lock is a pin tumbler lock. However, the lock can be any type of lock that typically has key pins that are moved by springs, such as a wafer tumbler lock or tubular lock. In a pin tumbler lock the lock includes an outer casing 160 and a plug 190. The outer casing 160 has a cylindrical hole 161 in which the plug 190 can be inserted. The outer casing 160 also has a number of vertical shafts 162 that hold the driver pins 168, 170 and the springs 164, 166.
The plug 190 has a keyway 186 at one end and a lever or cam at the other end. The keyway 186 is a straight-shaped slot that allows the key to enter the plug 190. In some embodiments the keyway 186 has protruding ledges that prevent the key pins from falling into the plug 190. The lever and/or cam activates a mechanism that retracts a locking bolt (not illustrated) when the plug 190 is rotated by the key.
The plug 190 also includes a number of holes 162 that contain the key pins 182, 184. The number of holes corresponds to the number of key pins used in the lock. A lock can have any number of key pins 182, 184 present in it. The key pins 182, 184 are of various lengths. The ends of the key pins 182, 184 can be rounded to permit the key to slide more easily past them. Above each key pin 182, 184 is a corresponding driver pin 168, 170. The driver pins 168 are spring loaded by push springs 164. In one embodiment there is only one driver pin for each key pin. However, in other embodiments there are spacer pins (not illustrated) associated with each driver pin. The spacer pins are present in systems where the lock allows for multiple different keys to open the lock, such as a master key. The lock 150 can have any number of spacer pins to allow for multiple different keys to open the lock. For example, in an apartment building where the main door can be opened by all of the keys for the building, but each apartment has its own key. In some embodiments, to further enhance the security of the lock one or more of the holes may not have an associated key pin with it. In some embodiments the hole may have a driver pin without a key pin.
The key pins present in the system 100 include at least one magnetic key pin 184. The magnetic key pin 184 operates differently from the standard key pin/driver pin approach. The magnetic key pin 184 and its corresponding driver pin 170 do not push down into the keyway 186 when a key 110 is not present. In contrast, the associated spring 166 acts to pull the magnetic key pin away from the keyway 186 when the key 110 is not present, and may be referred to as a pull spring. When the key 110 is present the magnetic key pin 184 is attracted to the key 110 such that the magnetic key pin 184 contacts the key 110 at the appropriate point on the key. The connection between the magnetic key pin 184 and the corresponding driver pin 170 can also be achieved through magnetic attraction. In some embodiments the magnetic key pin 184 is a permanent magnet. However, in other embodiments a permanent magnet is attached to one or both ends of the magnetic key pin 184, and the remainder of the key pin is made of another material. In some embodiments the entire key pin 184 is a magnet. The pull spring 166 associated with the magnetic key pin 184 is sized such that it can pull the driver pin/key pin to a point where the magnetic key pin 184 is partially blocking the shear point 180, but not so strong that it can overcome the attractive force between the magnetic key pin 184 and the key 110.
When the plug 190 and outer casing 160 are assembled (and a key is not inserted), the key pins 182 and the driver pins 168 are pushed down into the plug 190 by the springs 164. However, the magnetic key pin 184 is not pushed down into the plug 190, but is kept in place by spring 166. The point where the plug 190 and cylinder meet is called the shear point or shear line 180. When a properly cut key 110 is inserted into the keyway 186 the key pins 182 will rise causing the point between the driver pin 168 and the key 110 to align exactly at the shear point 110. The magnetic key pin 184 is at this point attracted to the key 110 such that the point between the driver pin 170 and the magnetic pin 184 also align with the shear point 180. This allows the plug 190 to rotate, thus opening the lock 150. In embodiments where there are spacer pins, the lock 150 may have a number of shear points that correspond to the keys that are permitted to open the lock. When the key 110 is not in the lock, the driver pins 168 associated with the push springs 164, and the magnetic key pins 184 straddle the shear point 180, preventing the plug 190 from rotating.
The key 110 is a component of the system 100 that is configured to permit and/or cause the lock 150 to rotate, and unlock the lock 150 such that a person or other user can access an area that is locked by the lock. In some embodiments the key 110 is pin tumbler lock key. The pin tumble lock key is commonly found on homes. In some embodiments, the key 110 includes series of grooves on either side of the key that limits the type of lock the key can slide into. As the key slides into the lock, the grooves on the blade of the key align with the wards in the keyway 186 allowing or denying entry to the cylinder. Then a series of bittings 115 (e.g., pointed teeth and notches) on the blade allow pins or wafers to move up and down until they align with the shear line of the inner and outer cylinder. The key is made of a ferromagnetic material. For example, the key can be made of iron, steel (such as KS steel, MKM steel, etc), cobalt, nickel, or any other material to which a magnet is attracted. To the observer of the key there is nothing different with the key that identifies the key as being different from other keys used with a pin tumbler lock. Presuming the correct key is inserted, the key is rotated in the lock allowing the cylinder or cam to rotate freely inside the lock, which opens the lock. In some embodiments, the key 110 is only ferromagnetic in the portions of the blade where the magnetic key pin 184 would contact the key. This embodiment allows for the key to be made primarily of a different substance, such as plastic, to reduce the overall cost of the key or to permit the key to be customized for the system (such as having a picture or other design on the key).
The driver pins 168, 620, 640 of the lock 150 are divided into at least two different types of driver pins. The first type of driver pins are traditional driver pins 168. These driver pins 168 occupy the full space of the corresponding hole 162 for which they are associated with. The second type of driver pins are security driver pins 620, 640. The lock 150 according to the embodiments of
A security pin is a modified version of the driver pin that makes manipulation more difficult. Security pins are commonly designed to prevent lock picking, but are also designed to resist decoding, impressioning, key bumping, and other compromise techniques. Security pins are designed so that use of a tool other than a key will trigger the pins, and lock one or more pins at the shear line. This can be due to individual manipulation of components or tension on the plug 190. When triggered, security pins bind between the plug 190 and cylinder, blocking the rotation of the plug 190 until tension on the plug 190 is released and pins are dropped back to their resting position. The security pin can be a mushroom, a spool, a serrated, or hybrid pin. A mushroom security pin is a security pin with a beveled cut around its circumference, resembling a mushroom shape. In a spool security pin a portion of the center removed, resembling a spool or barbell shape. A serrated security pin has light serrations around the circumference of the pin. A hybrid security pin has features that combine the features of the mushroom, spool, and/or serrated security pins.
Illustrated in
To enable the detection of an attempt to breach the lock, at least one of the enhanced security pins is modified to react, electrically, when the lock picker manipulates the pin. Illustrated in
The wire 646 and the second wire 648 connect to an alert component 690 disposed away from the lock 150. The location of the alert component 690 can be anywhere the user of the lock wishes to have it. However, in some embodiments the alert component 690 can be part of the lock 150. Additional the alert component 690 can be further connected to other systems 695 that permit a notification of the attempted breach to be received. For example, the alert component 690 may connect to an alarm, a siren, a light, a computer system, a camera, etc. Further, the alert component 690 can be, in some embodiments, connected to two or more devices or alarms.
When the lock 150 is opened by inserting a correct key and then turning the plug 190 the center portion 644 of the spool pins (enhanced security pins) will not make contact with anything and remain electrically isolated. However, when the lock is attempted to be forced open the plug 190 will be turned before the pins are aligned and the center of the spool 644 will make contact with the a portion 660, 661 of the corresponding pin hole (either in the plug 190 or the outer casing 160). This causes a circuit between the lock 150 and the alert component 690 to close, and create an electrical signal. This is illustrated in
In some embodiments, to prevent false positives at least one of the driver pins is a traditional driver pin 168. The traditional pin 168 will prevent the plug 190 from turning until it has been aligned with the shear line 180. Once a traditional pin 168 has been manipulated (in a picking attempt) to the shear line 180 the lock will get extra loose, and the additional play will allow the enhanced security pins 640 to make contact. When the enhanced security pins are tripped, a security action can be executed based on the alert signal from the alarm component such as triggering an alarm, jamming the lock, etc.
In summary, according to embodiments of the present disclosure a lock comprising a plug and an outer casing is disclosed. The plug has a keyway and a first plurality of shafts. The outer casing has a plug hole disposed in a center portion of the outer casing. The plug hole is shaped to accept the plug into the outer casing. The outer casing further includes a second plurality of shafts. A plurality of springs is disposed within the second plurality of shafts, each of the second plurality of shafts has a single spring. A plurality of driver pins are connected to a corresponding one of the plurality of springs. A plurality of key pins are connected to a corresponding one of the plurality of driver pins. At least one of the driver pins is an enhanced security pin. The enhanced security pin has a top portion and a bottom portion comprised of a non-conductive material and a center portion comprised of an electrically conductive material. A wire is disposed in the center portion of the security pin and a second wire is disposed in either the plug or the outer casing. An alert component is connected to both of the wires such that when the center portion contacts a portion of either the plug or the outer casing an electrical circuit is completed between the first wire, the second wire and the alert component causing the alert component to generate an alert signal.
According to embodiments of the present disclosure a method of detecting an attempted tampering with a lock is disclosed. The method begins by inserting a tool other than a key into a keyway of the lock. Next a plurality of key pins and a plurality of driver pins within the lock are displaced by the tool. At least one of the plurality of driver pins is an enhanced security pin. Next the plug of the lock is rotated, however, full rotation of the plug is prevented by the enhanced security pin contacting a portion of the plug or a portion of an outer casing of the lock. This occurs because the enhanced security pin does not align with the shear line. This completes a circuit between the enhanced security pin and an alert component. As a result of the completed circuit the alert component generates an alert.
The descriptions of the various embodiments of the present disclosure have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Number | Name | Date | Kind |
---|---|---|---|
1172203 | Fuller | Feb 1916 | A |
2059129 | Maxwell | Oct 1936 | A |
2095819 | Lefebvre | Oct 1937 | A |
3416336 | Felson | Dec 1968 | A |
3494157 | Coker, Jr. | Feb 1970 | A |
3512382 | Check et al. | May 1970 | A |
3518855 | Wake | Jul 1970 | A |
3654782 | Heimann | Apr 1972 | A |
3656328 | Hughes | Apr 1972 | A |
3660999 | Janzen | May 1972 | A |
3665740 | Taniyama | May 1972 | A |
3764859 | Wood | Oct 1973 | A |
3967481 | Schlage | Jul 1976 | A |
4026134 | Woolfson | May 1977 | A |
4186578 | Sommer | Feb 1980 | A |
4328691 | Scherbing | May 1982 | A |
4380162 | Woolfson | Apr 1983 | A |
4403486 | Miyake | Sep 1983 | A |
4656851 | Leek | Apr 1987 | A |
5074136 | Kim | Dec 1991 | A |
6367297 | Mottura | Apr 2002 | B1 |
6441735 | Marko et al. | Aug 2002 | B1 |
6481254 | Zheng et al. | Nov 2002 | B1 |
7272965 | Dolev | Sep 2007 | B2 |
7421870 | Wu et al. | Sep 2008 | B1 |
7958647 | Gerner | Jul 2011 | B2 |
8312749 | Tong | Nov 2012 | B2 |
9567770 | Ginos | Feb 2017 | B1 |
10030416 | Albertson | Jul 2018 | B1 |
20030140668 | Chao | Jul 2003 | A1 |
20050022568 | Dolev | Feb 2005 | A1 |
20050186027 | Kang | Aug 2005 | A1 |
20050275535 | Hsieh | Dec 2005 | A1 |
20080127694 | Wong et al. | Jun 2008 | A1 |
20090173121 | Cheng | Jul 2009 | A1 |
20090178451 | Wu et al. | Jul 2009 | A1 |
20100050715 | Hu et al. | Mar 2010 | A1 |
20100139340 | Gerner | Jun 2010 | A1 |
20120192603 | Liu | Aug 2012 | A1 |
20130061643 | Chen | Mar 2013 | A1 |
20160017636 | Charnley et al. | Jan 2016 | A1 |
Number | Date | Country |
---|---|---|
201169985 | Dec 2008 | CN |
203348708 | Dec 2013 | CN |
205189531 | Apr 2016 | CN |
3912760 | Oct 1990 | DE |
2345783 | Jul 2011 | EP |
4711799 | Jun 2011 | JP |
Entry |
---|
Albertson et al., “Lock Bypass Detection,” U.S. Appl. No. 15/685,934, filed Aug. 24, 2017. |
List of IBM Patents or Patent Applications Treated as Related, Signed Aug. 24, 2017, 2 pages. |
“Chubb detector lock,” Wikipedia, the free encyclopedia, (printed: Oct. 10, 2016, last updated: Aug. 3, 2016), 2 pages, https://en.wikipedia.org/w/index.php?title=Chubb_detector_lock&printable=yes. |
Anonymous, “Method and Apparatus for Physical Lock Security Enhancement Via Magnetorheological Fluid Collaboration,” IP.com Prior Art Database Technical Disclosure, IP.com No. IPCOM000220600D, Aug. 8, 2012, pp. 1-5, http://ip.com/IPCOM/000220600. |
Albertson et al., “Enhanced Locking Mechanism,” U.S. Appl. No. 15/414,876, filed Jan. 25, 2017. |
List of IBM Patents or Patent Applications Treated as Related, signed Jan. 25, 2017, 2 pages. |
Number | Date | Country | |
---|---|---|---|
20180209172 A1 | Jul 2018 | US |