A common design of mechanical locks operated with a physical key involves using movable tumblers supported by springs or spring-loaded. The common types of tumblers are pin tumblers and lever tumblers shown in
A set of movable spring-loaded parts—tumblers—is a core part of the vast majority of mechanical locks operated with a physical key. The tumblers differ in shape, and the locks depending on the shape are called pin tumblers locks, lever tumblers locks, etc. These types of locks are currently in wide use. The tumblers are the pieces that interact directly with a key in the process of opening a lock; the key sets them in the positions according to the key's coded portion. Depending on the configuration of tumblers set by the key, the tumblers either keep the bolt in the locked position or release the bolt. The bolt is released only if the configuration of the tumblers is set by a key intended for the lock. The tumblers are in tight contact with the coded portions of the key's blade, thus the tumblers are aligned in their configuration according to the shape of the key's blade. Therefore, the key creates an imprint of its blade on the set of tumblers. In currently used locks the key's imprint, i.e. the configuration of tumblers, is not stable, it is destroyed as soon as the tumblers lose their contact with the key because the tumblers are spring-loaded and under their springs' pressure the tumblers return immediately back to their initial positions. To effectuate the opening process, the key has to be in the keyhole in contact with tumblers during the entire opening process; therefore, the keyhole cannot be blocked at this time. This makes current locks very vulnerable to picking through the keyhole. Many types of pick tools exist now for this purpose.
Embodiments of the invention include a method of opening a lock with a key, comprising inserting the key into a keyhole in the lock; bringing the key in contact with tumblers to make the configuration of the tumblers match the shape of the contacted portion of the key; removing the key so that the configuration of the tumblers is maintained; blocking the keyhole; and if and only if the configuration of the tumblers matches the lock's configuration, opening the lock.
In some embodiments, the tumblers are pin tumblers.
In some embodiments, wherein the tumblers are lever tumblers.
In some embodiments, wherein the configuration of the tumblers is maintained by friction.
The above and other features of the invention including various novel details of construction and combinations of parts, and other advantages, will now be more particularly described with reference to the accompanying drawings and pointed out in the claims. It will be understood that the particular method and device embodying the invention are shown by way of illustration and not as a limitation of the invention. The principles and features of this invention may be employed in various and numerous embodiments without departing from the scope of the invention.
In the accompanying drawings, reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale; emphasis has instead been placed upon illustrating the principles of the invention.
Unlike the methods of using the tumblers described hereinabove, the disclosed methods allow the tumblers to maintain their positions set by their contact with a key after the key is removed from the lock. The disclosed method implements well-known principles of functioning of contour gauge, where its parts maintain the contour of the surface against which they had been pressed before. Unlike the opening process for the locks currently in use performed with a key continuously inside the lock, under the disclosed method the entire opening process is divided in two stages, where the key is used only the first stage.
The first stage is the preparation for the opening. A key is inserted into a keyhole pushes the tumblers and aligns the tumblers according to the key's blade contour coded for the specific lock. After this the key is removed from the lock, and, as described above, the key has made a stable imprint by its blade; the positions of the tumblers remain stable in their configuration. The key, after being removed from the lock, leaves within the lock a stable imprint or duplicate for subsequent using in the next step when the actual lock opening will take place.
The second stage is the actual lock opening. In the process of opening a mechanical lock a key participates in the process. The lock's mechanism tests whether the set configuration of the tumblers matches the correct configuration for the lock. The key sets the tumblers in the position matching the coded contour of the key blade. In the disclosed method of tumblers' functioning, the actual opening proceeds in the same way: the lock's mechanism tests whether the set configuration of the tumblers matches the correct configuration for the lock, but there is no necessity to hold the tumblers in the position by the key after the key set the positions of the tumblers; tumblers by themselves, without the key present, stay in their positions set in the first stage. The disclosed method allows accomplishing the actual lock opening with no key in the keyhole. The process of the actual lock opening is shown in
In locks shown in
In
The disclosed method uses a contour/profile gauge principle giving the tumblers the ability to remain in their position after the key has been removed from the lock after interacting with the tumblers.
In the disclosed embodiment the tumblers are located in a clamp without individual springs forcing them back into their initial position; instead the tumblers are pressed to each other in the clamp which by a friction force between the tumblers necessary to keep them together and prevent them from changing their position after they are no longer in contact with a key. At the same time, the friction allows tumblers to move easily under the pressure from the key. That tension from the clamp can be provided in the same way as in clamps generally: by a spring, by a screw, or by another design of the clamp.
The disclosed embodiment, the key, inserted into a lock, interacts with tumblers like with a contour gauge and aligns them in a steady configuration that represents the key's coded portion. The key, after being removed from the lock, leaves its imprint as a stable configuration of tumblers.
After the key leaves its imprint, the key is removed from the lock and the lock's mechanism is ready to use that key's imprint for the actual opening of the lock.
In the disclosed embodiment, the lock opening process runs in two stages: at first, a person inserts a key into the keyhole all the way and then removes the key from the lock. As the result, the key's coded part pushes the tumblers and configures them in the position corresponding to the coded profile of the key's edge. That composition of tumblers remains unchanged after the user removes the key from the lock.
After the first stage is finished, the key has formed an imprint of its coded part on the set of tumblers ready to be used for the actual lock opening.
At the second stage, the actual opening takes place. The user twists the lock's handle or knob, and the lock mechanism verifies whether the configuration of the tumblers is the configuration necessary to open the lock. The lock mechanism uses the same method of the verification as other mechanical locks.
The actual opening takes place with the keyhole blocked to prevent any object entering the keyhole. The keyhole is closed during the actual opening.
The disclosed embodiment creates inside the lock an imprint of the key. The actual opening uses the key's imprint so that the keyhole does not need to be open. Otherwise, the open keyhole during the actual opening would make the lock vulnerable to pick tools.
The tumblers holding power may be adjusted by changing the strength of the spring or by changing the friction or smoothness of the rubbing surfaces of the tumblers.
The actual opening is when the lock's mechanism verifies if the position of tumblers formed by the key is correct. That operation in the present disclosure differs from the operation for the locks shown in
This is the fundamental change in comparison with the opening used in the lock shown in
In the beginning of the actual opening, the user twists the lock's handle to move the bolt in the open position. The flap of the fence blocks the keyhole. As the lock's handle keeps rotating, the actual opening proceeds without a key using the key's imprint while the keyhole is blocked.
The actual opening in the disclosed embodiment uses the principle as the locks shown in
The shown embodiment requires an additional operation after the lock is open: the composition of the tumblers formed with a key at the preparation phase, the imprint of the key, has to be eliminated by bringing the tumblers to their initial shape. This prepares the lock's mechanism for the next cycle of opening. This can be easy done with a combination of cams and levers propelled by the opening movement of the bolt or handle shaft.
The present invention makes it impossible to use pick tools even when the keyhole is open (before the actual opening, for example): one can reach the tumblers with a pick and change their position, but it is impossible to check simultaneously whether the new position, just set with a pick, is the correct position for the lock's opening; because as soon as the lock's handle is turned in an attempt to retract the bolt, the flap of the fence 9, that is connected with the handle shaft, jams the pick in the keyhole. So, the lock picker is forced after every change of the tumblers' positions to remove the pick tool from the lock and then to move the lock's handle, which would take an unacceptable amount time: months of continuous attempts of lock picking, because the set of even 5 tumblers, pins, or levers can form hundreds of thousands of combinations of the tumblers' positions.
The springs act on the tumblers right transversely to their movement under the key's pressure, so, if the key does not push the tumblers, —the whole tumbler's package stays pressed to the side base—B as a solid piece. The diaphragms isolate the tumblers from each other—so, the movement of one of them is not transmitted to the adjacent ones.
In contrast with the locks described in the Background section, the present invention allows the tumblers to preserve their position or configuration after their contact with the key, and to maintain their configuration after the key is removed from the lock and after the keyhole is blocked. The tumblers function similarly to a contour gauge. The tumblers preserve the shape of the surface of the key, to which they were pressed.
Unlike the locks that require the key to stay in the keyhole for the entire duration of the opening process, some embodiments of the present invention split the opening process into two phases; only the first phase requires the key to be present in the keyhole.
The Preparatory Phase
A key is inserted into a keyhole. The key pushes the tumblers and aligns them in accordance with the key's blade contour. Then the key is removed from the lock.
The tumblers interact with the key similarly to a contour gauge, and maintain their alignment, for example, by friction. Therefore, the key leaves an imprint as the configuration or alignment of the tumblers.
The Actual Opening Phase
The user rotates the lock's handle. First, the keyhole is blocked by a flap of the fence 9, regardless of the key or tumblers' configuration; this prevents access to the lock mechanism via the keyhole.
The user continues rotating the lock's handle. This tests whether the key imprint, as the configuration of the tumblers matches the lock configuration.
The lock is configured so that its opening requires that the notches 17 align along a straight line. Only when the notches are aligned, a flap of the fence 9 moves to the right far enough to move the latch to open the lock.
While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.
This application is a continuation of U.S. application Ser. No. 15/629,734, filed Jun. 21, 2017, which claimed the benefit under 35 USC 119(e) of U.S. Provisional Application No. 62/493,164, filed on Jun. 23, 2016, all of which are incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
62493164 | Jun 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15629734 | Jun 2017 | US |
Child | 17191693 | US |