Security turnkey and lock system

Abstract
The security reversible key with an assigned cylinder Z has a blocking groove BN with a coded blocking depth (B1, B2, B3), which runs parallel to the axis of the key (x) from the tip of the key to at least the first position (P1) of a row of tumbler pins (A2) on the key. In the assigned cylinder at least at the rearmost coding position (P1) a pair of tumbler pins corresponding to the blocking groove BN with a blocking tumbler pin BZ and an extended blocking counter pin BG are foreseen, whereby the blocking counter pin BG impinges on the cylinder housing (10), if the blocking groove is insufficiently deep and with this the complete insertion of a key with an insufficiently deep blocking groove is blocked by the pair of blocking tumbler pins. Simultaneously the blocking tumbler pin BZ with the counter pin BG at the position (P1) also serves as coding tumbler pin. In the case of the locking system with security reversible keys for locking installations at least two areas are defined, whereby in a first area G1 several additional security elements and a blocking code function and in the second area G2 a more simple basic coding are foreseen. With the first area G1, an unequivocal segmentation into independent market areas (M1, M2, M3) is defined and with this a world-wide unique locking system with enhanced security and applicability is created.
Description


BACKGROUND OF THE INVENTION

[0001] The invention concerns a security reversible key with an assigned cylinder, a locking system with security reversible keys for locking systems, and a method for their manufacture. Such keys and locking systems are known, where the keys with a high degree of security and a correspondingly high number of possible coding permutations. The keys have at least three, and preferably at least four coding tumbler pin rows. The tumbler row pins are located on the flat sides of the key in order to make the best possible use of the available key surface, as well as the corresponding space requirement for the tumbler pin rows in the cylinder. Keys with additional security elements are also known, which once again require a certain amount of space.


[0002] From U.S. Pat. No. 5,438,857, such a key is known, with an insertion blocking system as an additional security element. In the '857 key an additional control face is located on the key that, by means of an assigned control pin at the cylinder entrance, prevents the insertion of a wrong key. This control pin is longer than a coding pin and extends beyond the central bisecting plane of the key. The control face is arranged at the tip of the key and rising, and it correspondingly also extends beyond the central bisecting plane of the key and lifts the control pin and pushes the control pin out of the way. As a result of this, the control pin prevents the insertion of keys without a correct control face. The control faces can already be affixed to the key blank and with this enable a protection of the blank.


[0003] These known high-security keys and systems with high-security keys are also always limited by the space available for the coding and security functions on the key and in the cylinder. Their manufacture calls for a central production, which limits, renders more difficult, and delays the world-wide universal application of such systems. Also, an optimum design for installations and applications of any kind is severely restricted by this.



SUMMARY OF THE INVENTION

[0004] It is an objective of the present invention to create a security reversible key with an assigned cylinder. More specifically, it is an objective of the invention to provide a locking system with security reversible keys and assigned cylinders, which can be utilized as a world-wide unique locking system, with higher permutation capacities for any kind of application, with enhanced security and copy protection as well as with new possibilities of being in a position to separate any kind of market area and application world-wide, and whereby, without any additional space requirement on keys and cylinders, a higher security and a greater number of permutations is achieved. A further objective of the present invention is a manufacturing method for a system of this kind, which can rapidly and universally be brought into use and applied world-wide.


[0005] In accordance with the present invention, a security reversible key has an assigned cylinder, a locking system has security reversible keys with assigned cylinders, and a method is provided to manufacture such keys in accordance with claim 19. With the new additional security element “blocking code”, which comprises a coded blocking groove and an assigned pair of blocking tumbler pins, without any additional space requirement on the key and in the cylinder, i.e., with the existing coding positions on the key and the existing pin rows and positions in the cylinder, an additional insertion blocking system as well as a higher number of permutations and applications are achieved. With the division into areas on the key, whereby the first area with additional security elements defines an unequivocal segmentation into independent market areas, a system is created that corresponds to the above named objective and which can be realized with the new, multi-step manufacturing process.


[0006] Especially with the new additional security element “blocking code”, which comprises a coded blocking groove and an assigned pair of blocking tumbler pins, without any additional space requirement on the key and in the cylinder, i.e., with the existing coding positions on the key and the existing pin rows and positions in the cylinder, an additional insertion blocking system as well as a higher number of permutations and applications are achieved.







BRIEF DESCRIPTION OF THE DRAWINGS

[0007] These and further features of the invention are apparent with reference to the following description and drawings, wherein:


[0008]
FIG. 1

a
shows coding rows with coding positions for two bore patterns on one key;


[0009]
FIG. 1

b
shows on a key a division into areas, with a first area with additional security elements;


[0010]
FIG. 1

c
shows a further example of a division into areas;


[0011]
FIG. 1

d
shows a segmentation of market areas and distributor areas on a key;


[0012]
FIG. 1

e
shows a connection between division into areas and segmentation of market areas;


[0013]
FIG. 2 shows the principle of the blocking code with blocking groove and blocking tumbler pin pair;


[0014]
FIG. 3 shows examples of coding steps and blocking steps;


[0015]
FIG. 4 shows examples of different tumbler pin shapes;


[0016]
FIG. 5 shows blocking groove shapes corresponding to FIG. 4;


[0017]
FIG. 6 shows coding shapes corresponding to FIG. 4;


[0018]
FIG. 7 shows a blocking groove extending over four positions with differing sectors;


[0019]
FIG. 8 shows, in a three-dimensional representation, a blocking groove with a blocking tumbler pin pair;


[0020]
FIG. 9 shows, in a three-dimensional representation, different examples of blocking grooves with coding positions (corresponding to the example of FIG. 14);


[0021]
FIG. 10 shows a security element “insertion block” by means of a control face and a control pin;


[0022]
FIG. 11 shows a security element “flat pin” for the flank control of codings;


[0023]
FIG. 12 shows a key with four rows of tumbler pins and with blocking pins in the cylinder;


[0024]
FIG. 13 shows examples of keys with five and with eight coding or tumbler pin rows;


[0025]
FIG. 14 shows a schematic locking function diagram with two bore patterns and tow market areas;


[0026]
FIG. 15 shows a schematic locking function diagram with two positions and four market areas;


[0027]
FIG. 16 shows a schematic locking function diagram with two positions and one market area;


[0028]
FIG. 17 shows a schematic locking function diagram with one position each in two tumbler pin rows and with three market areas;


[0029]
FIG. 18 shows an organization diagram of a locking system with segmented market areas and applications; and,


[0030]
FIG. 19 shows a schematic manufacturing diagram for keys of a locking system in accordance with the invention.







DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0031]
FIG. 1

a,
as an example, illustrates a safety turning-key S with four pin rows A1 to A4 and with 22 coding positions Pi, each one for a bore pattern left (L) and a bore pattern right (R). The coding row A2 on the key S here has the positions R1 to R5 for the bore pattern R and the positions L6 to L11 for the bore pattern L. On the keys, all positions of both bore patterns can be coded. For example, there are keys with bore pattern left, keys with bore pattern right and also keys with the two bore patterns R+L. In the assigned cylinder Z, however, for reasons of space for the pins, only every second position and, with this, only either a bore pattern R or a bore pattern L can be equipped with tumbler pins (in the same area). The first coding position P1 (=L11) on the tip of the key here corresponds to the rearmost tumbler pin position P1 in the cylinder with respect to the direction of insertion x of the key S.


[0032]
FIG. 1

b
illustrates the locking system in accordance with the invention on a key S, whereby on the key at least two areas are defined with a first area G1, in which at least two additional security elements with a higher degree of difficulty to manufacture are foreseen, and with a second area G2, in which a simple basic coding Cod1 is foreseen. With the first area G1 an unequivocal segmentation into independent market areas Mi=M1, M2, etc. is defined.


[0033] Also illustrated here are additional security elements, which in the following are more accurately defined: a blocking code BC, a second coding Cod2, preferably with a narrow milling, an insertion blocking system by means of a control face and control pin KF/KS and a flank control of Cod2 by means of a flat pin 23. The simple basic coding Cod1 is, for example, a coding by means of bores, which is relatively easily implementable anywhere decentralized.


[0034]
FIG. 1

c
depicts a different division into areas, whereby the area G1 can be divided into several part areas G1.1, G1.2, etc. Depending on the application and on the desired system design, the area G1 can, for example, encompass a whole coding row A1. In doing so, also all security elements are affixed in this one coding row. In a different advantageous variant, for example, also parts of areas with positions at the very front of the key of two coding rows (A1, A2) can form the area G1, whereby both parts of areas G1.1, G1.2 can each respectively have a blocking code BC.


[0035]
FIG. 1

d
illustrates the division into several independent market areas Mi=M1, M2, etc., as well as the possible further sub-division of each market area into parts of market areas Mmi, which are, for example, independent distributor areas or fields of application for installations and objects, etc. The market areas Mi are defined with the area G1. The parts of areas MMi can be defined with parts of the area G1 or also with parts of the area G2 or they can equally encompass parts of the areas G1 and G2.


[0036]
FIG. 1

e
illustrates, for example, a connection between the areas G1, G2 on the key and the unequivocal separation in the market area Mi, parts of market areas MMi as well as the further subdivisions for objects MMi.i. This is further explained hereinafter with reference to FIG. 18.


[0037] Advantageously, the area G1 contains at least three security elements Vi. Particularly important and advantageous is the new additional security element “Blocking Code”. In the case of the blocking code BC, as an additional coding and security function in accordance with the invention explained in FIG. 2, the coding position P1 and its function on the key S and in the cylinder Z are maintained.


[0038]
FIG. 2 schematically illustrates the method of operation of the blocking code BC in accordance with the invention on a key S and in an assigned cylinder Z. The directions in space are in the following designated with x, y, z, with x being the axis of the key and cylinder. The key has a blocking groove BN milled therein. The blocking groove BN runs parallel to the key axis x and extends at least up to the first coding position P1. In the assigned cylinder, correspondingly at least at the rearmost coding position P1, a pair of blocking tumbler pins is disposed. The blocking pins include a spring loaded blocking tumbler pin BZ and an extended blocking counter pin BG. The blocking groove has a coded blocking depth B1, B2, B3 and, in correspondence with this, the length lb of the pair of blocking tumbler pins (BZ+BG) is coded such that the length lb corresponds to the distance db of the blocking groove BN from the cylinder housing 10. In other words, the pair of blocking tumbler pins (or pair of blocking pins) fits in the blocking groove BN with little play. When inserting the key, the following sequence results (a-b-c): The blocking tumbler pin BZ is lifted at a beveled lead-in face 6 of the key up to the level of the blocking groove BN and with little play with the cylinder housing 10 passes through the blocking groove up to the corresponding coding position P1, whereby the blocking tumbler pin BZ is lowered into this first coding position with a certain coding step, here, e.g., C2. In this position PI the pair of blocking tumbler pins BZ, BG operates as normal coding position with respect to turning of the cylinder, which in case of a correct coding has to release the shear line 9. If the blocking groove BN is not deep enough, such as when it has a wrong coding Bi, then the blocking counter pin BG impinges on the cylinder housing 10 and the further insertion of the key is blocked at the beveled lead-in face (if lb is larger than db, refer to FIG. 8a). The blocking code therefore results in an additional security function, in that the complete insertion can be prevented with additional coding steps (Bi) of the blocking groove, whereby the coding function up until now at the position P1 is maintained. Over and above this, neither the key, (i.e., on the key positions) nor the cylinder requires additional space for the blocking code. In the cylinder simply an up until now the normal coding tumbler pin is replaced by the special blocking tumbler pin.


[0039]
FIG. 3 illustrates possible blocking steps Bi with a depth tb in comparison with the coding steps Ci with the coding depths tc relative to the key surface. In the following examples, here coding steps C1 to C4 (e.g., steps of 0.35 mm) as well as three blocking steps B1, B2, B3 with blocking depths of, e.g., 1.05, 0.55 and 0 mm are utilized, whereby a blocking step B3 with a depth of 0 mm cannot exert a blocking function anymore. The blocking depths Bi can also correspond to the coding depths Ci, therefore, e.g., C1 to C4 and B1 to B4. In a further example, five coding steps C1 to C5 are represented in combination with four blocking steps B1 to B4, e.g., with step distances of 0.3 mm of the Ci and of 0.4 mm of the Bi. In accordance with the combination rule for the blocking steps Bi with the coding steps Ci, the coding depth tc of the coding steps Ci must not be smaller than the blocking depth tb of the preceding blocking groove Bi. In this example, therefore the blocking step B3 can be combined with the subsequent coding steps C3, C2 or C1.


[0040]
FIGS. 4, 5 and 6 illustrate various possible tumbler pin shapes (FIGS. 4a, b, c), assigned forms of the blocking grooves BN (FIGS. 5a, b, c) as well as the coding shapes assigned to the tumbler pins (FIGS. 6a, b, c). FIG. 4a illustrates a conventional conical tumbler pin shape 21, such as for a basic coding Cod1, which can be manufactured by means of simple bores (FIG. 6a). FIG. 4b depicts a narrow, cylindrical tumbler pin shape 22 with correspondingly narrow coding grooves (FIG. 6b), the manufacturing of which calls for a difficult to copy, elaborate milling process and which, for example, can be utilized as a second coding Cod2. FIG. 4c illustrates a flat pin 23, which, e.g., can be utilized for the flank control of a narrow milled coding (FIG. 6b), as will be explained in more detail later on. Further tumbler pin shapes are possible and known, which in principle are a combination of cylindrical and conical sections. The blocking groove shapes and the coding shapes can be implemented differently and as a result make any copying more difficult and also have the effect of additionally obscuring the coding shapes.


[0041] The FIGS. 7a, b, c illustrate an example of a blocking groove, which extends over the four most forward coding positions Pi=L11, R5, L10 and R4 of two bore patterns R, L and which correspondingly have several differently coded sectors BN1 to BN4. In doing so, as a rule attention must be paid, that the depth tb of the blocking grooves remains the same from one position to the next position or else becomes smaller (i.e., cannot become bigger) and that equally the width bb of the blocking grooves remains the same from one position to the next one or else becomes smaller. This in conjunction with three blocking steps B1 to B3 and with two blocking groove widths bb1 and bb2 results in the illustrated blocking steps Bi, bbi of the four blocking groove sectors BN1 to BN4.


[0042]
FIG. 8 illustrates the function of the blocking code in a three-dimensional depiction and FIG. 9 blocking groove shapes and the adjacent coding indentations, which correspond to the example of FIG. 14. In FIGS. 8a, b a key S1a is illustrated, with a blocking groove, which has a blocking step B2 and with adjacent coding positions L11 and R5, which have the codings C1 and C2 (corresponding to the key S1a of FIG. 14).


[0043]
FIG. 8

a
illustrates a pair of blocking tumbler pins BZ, BG with blocking code B1, the length lb of which is greater than the distance db of the blocking groove from the cylinder housing 10. With this, the complete insertion of the key S1a into this cylinder is blocked. FIG. 8b in contrast illustrates a pair of blocking tumbler pins BZ, BG with a blocking code B2, which corresponds to the blocking code B2 of the blocking groove BN and which, therefore, can be completely inserted. This in the schematic diagram of FIG. 14 corresponds to the key S1a, which opens the cylinder Z1 (with coding C1 at the position R5).


[0044] The FIGS. 9a to 9d illustrate the keys S1, S2, S3 and S1a, with differently coded blocking grooves and positions L11 and R5. This also corresponds to the schematic locking function diagram of FIG. 14, which indicates, which key-cylinder combinations open and which ones block.


[0045]
FIG. 10 as possible additional security element illustrates an as such known insertion blocking system by means of a control face KF at the tip of the key and an assigned control pin KS in the cylinder. This control face KF extends beyond the central bisecting plane 5 of the key, the same as the control pin KS, which impinges on the rising control face KF and has to be pushed out of the way by it in order for the key to be able to be inserted. A key without the right control face, resp., with only normal lead-in faces 6, with its tip encounters this control pin KS, so that the latter prevents the insertion of the key. This is a completely different arrangement and action than according to the blocking code in accordance with the invention, which does not require any special control faces, but works rather more with any existing key lead-in face 6. Advantageously, however, the new blocking code with the blocking tumbler pins BZ can be combined with this known insertion block by means of control faces KF and control pin KS and in particular even be assigned in the same tumbler pin row (e.g., A2), whereby the control pin KS is positioned anywhere in front of the pair of blocking tumbler pins BZ, BG in the cylinder.


[0046] A further important additional security element, which can also be assigned in the same tumbler pin row, is illustrated in FIGS. 11a, 11b. These illustrate a flank control at a narrow coding milling Cod2, which is implemented by a flat tumbler pin 23. The flat tumbler pin 23 (refer to, e.g., FIG. 4c) has a diameter d2, which is greater than the width d1 of the coding milling, so that the flat tumbler pin lies on the key surface 7, as is depicted in FIG. 11a. In contrast, in the case of a basic coding Cod1, e.g., in accordance with FIG. 6a, with necessarily wide bores d3 the flat tumbler pin 23 will sink into these indentations in accordance with FIG. 11b, whereby the shear line 9 of the cylinder is blocked. With this, e.g., a simple forged bore instead of the authorized, much more elaborate narrow coding milling Cod2 can be detected and the functioning of a key forged in this manner be prevented.


[0047] Advantageously therefore in a tight space and in a single tumbler pin row the following very effective security elements can be combined: in addition to the blocking code BC in accordance with the invention, a second coding Cod2 with a narrow milling, an insertion control by means of control pin KS and control face KF as well as a flank control of the narrow coding Cod2 by means of a flat tumbler pin 23.


[0048]
FIG. 12 illustrates a cross section through a safety turning-key with four rows of tumbler pins A1 to A4 in a cylinder in accordance with the example of FIG. 1. The row A1 here is implemented with a narrow coding milling Cod2 and with a pair of blocking tumbler pins BZ, BG. The rows A3 and A4 (and optionally also the row A2) here are implemented with a simpler basic coding Cod1. Important is to exploit the given key surface and the space inside the cylinder in the best possible way for coding positions and security elements. To achieve this, of necessity (at least two) rows of tumbler pins also have to be located on the flat sides of the key.


[0049] In the case of somewhat bigger keys, it is also possible to foresee more than four rows of tumbler pins.


[0050]
FIG. 13

a
for this purpose illustrates an example with five rows of tumbler pins A1 to A5 and FIG. 13b an example with eight rows of tumbler pins A1 to A8, which, however, can only be equipped with tumbler pins in the cylinder to such an extent as space is available. Thanks to the utilization of narrow codings, however, it is also possible to code all eight rows on the key here. This results in a great number of possible permutations as well as in further security reserves. In principle, here too at the beginning of every row of tumbler pins Ai, a blocking coding can be provided.


[0051] In the FIGS. 14 to 17, schematic locking function diagrams with different combinations of blocking codes Bi and codings Ci of the adjacent positions Pi are illustrated. In the left-hand column, the codings Bi, Ci of the keys Si are indicated and in the row on top the codings of the cylinders Zi. The keys can have the bore patterns R or L, or R+L (both), while the cylinders can only contain one bore pattern R or L. The schematic diagram indicates with an “X”, whether a combination key/cylinder fits, i.e., whether the key opens the corresponding cylinder. All other combinations block. The FIGS. 14 to 17 illustrate how, with few blocking codings Bi and adjacent position codings Ci, different market areas Mi can be unequivocally differentiated between, and how within a market area several derivations, i.e., hierarchic differentiations, of keys can be implemented within an installation.


[0052] The schematic diagram of FIG. 14 (which corresponds to the FIGS. 8 and 9) illustrates codings Ci with two bore patterns and with two positions


[0053] P1=L11 and P2=R5 with 5 equipping alternatives with blocking steps Bi=B1, B2, B3 of the blocking grooves and coding steps Ci=C1 and C2.


[0054] Defined with this are two independent market areas M1, M2 With three, resp., two derivations. The key S3, e.g., opens the cylinders Z1 and Z3.


[0055]
FIG. 15 illustrates only one bore pattern L with blocking code over two positions P1=L11 and P2=L10 with blocking steps B1, B2, B3 and with coding steps C1, Cb2.


[0056] Defined with this are four independent market areas M1 to M4, each with three derivations.


[0057] For example, the key S11abc opens the cylinders Z11a, Z11b, Z11c.


[0058]
FIG. 16 illustrates a bore pattern L with two positions P1=L11 and P2=L10 with blocking code B1, B2, B3 and coding steps L11=C1 and L10=C1, whereby with the blocking steps within a market area five derivations are created. For example, the key S11abcde opens the five cylinders Z11a to Z11e and the key S11a only opens the cylinder Z11a.


[0059]
FIG. 17 illustrates an example with only one position P1 each, however, in two rows of tumbler pins A1, A2. Both positions P1 are coded with C1, while with the blocking steps B1, B2, B3 of the blocking grooves three independent market areas M1, M2 and M3 are defined.


[0060] The key S1 only opens the cylinder Z1, S2 only opens Z2, and S3 only opens Z3.


[0061]
FIG. 18 illustrates an organization of the locking system in accordance with the invention with security reversible keys in a hierarchic schematic diagram. The system owner SS (e.g., a manufacturing company) represents the highest hierarchic level, which defines and authorizes the market areas Mi=M1, M2, etc., whereby a market area may be a country or a general distributor. In the market areas, further parts of areas Mmi are defined and separated and may be, for example, for different distributors or installations within this area. A further level MMi.i can define individual objects. This is defined by the codings of the areas G1 and G2.


[0062]
FIG. 19 schematically illustrates a manufacturing method for keys of a system in accordance with the invention with manufacturing steps H, areas G on the key and with the manufactured variables Vi in the areas G. On principle the manufacturing H with reducing degree of difficulty HS takes place on lower levels, respectively, decentralized.


[0063] The variables Vi and security elements manufactured in the various areas Gi and in the corresponding manufacturing steps Hi, for example, are also indicated in the table.


[0064] With the manufacturing of keys and cylinders of a locking system with at least two areas G1 G2 on the keys, first the first area on the keys is manufactured (controlled and authorized) at a central place of manufacture H1 and the coding Cod1 of the keys of the second area G2 and the equipping of the cylinders with corresponding pins can subsequently take place at a local representative: H2.


[0065] The manufacturing can take place in at least two steps in different places, whereby first variables with a higher degree of difficulty HS of the area G1 are manufactured in a central location and subsequently variables with a lower degree of difficulty of the area G2 are manufactured decentralized or locally.


[0066] The manufacturing of the keys can also take place in three steps, whereby first the first area G1 with variables Vi of the highest degree of difficulty is manufactured centrally HI; thereupon a further area G½ with variables with a lower degree of difficulty is manufactured regionally: H½ and finally the coding G2 with the lowest degree of difficulty of the area G2 is manufactured locally at the place of use H2.


[0067] In a further development of the system, the manufacturing of the area G1 can also take place decentralized. To implement this, manufacturing programs and the authorization “aut” can be controlled and checked from the central location SS (system owner).


[0068] With the system in accordance with the invention and the manufacturing methods a universal differentiation of market areas and parts of market areas as well as a rapid local manufacturing are made possible.


[0069] Within the framework of this description, the following designations are used:
1x, y, zDirections in spacexKey axisS, SiKeyZ, ZiCylinderPiCoding positionsR, LRight-hand-, left-hand bore patternRi, LiRight-hand-, left-hand coding positionsAiCoding rows, pin rowsBiCoded blocking stepsCiCoding stepsBCBlocking codeBNBlocking grooveBZBlocking tumbler pinBGBlocking counter pinBZ + BGPair of blocking tumbler pins, pair of blocking pinslbLength of BZ + BGdbDistance from BN to 10tbDepth of BNbbWidth of BNtcDepth of the coding steps Cid1, d2, d3DiametersCod1Basic codingCod2Second (different) codingKFControl faceKSControl pinMiMarket areasMMiParts of market areasSSSystem ownerautAuthorizationH1, H2Manufacturing stepsHSDegree of manufacturing difficultyG1, G2Areas on SViVariables, security elements5Central bisecting plane of S6Beveled tip of S, lead-in face of S8Surface of S9Shear line in Z10Cylinder housing11, 12Supporting surfaces at tumbler pins15Beveled face at tumbler pins21-23Various shapes of tumbler pins23Flat pin


Claims
  • 1. Security reversible-key with at least three coding—/tumbler pin rows (A1, A2, A3), which are also located on the flat sides of the key (S), with an assigned cylinder (Z) with pin rows of pairs of tumbler pins, consisting of tumbler pins and counter pins at the positions of the tumbler pin rows of a given bore pattern, characterized in that the key has a blocking groove BN, which runs parallel to the key axis (x) from the tip of the key to at least the first position (P1) of a tumbler pin row on the key, that the blocking groove has a coded blocking depth (B1, B2, B3), that in the assigned cylinder at least at the rearmost coding position (P1) a pair of tumbler pins corresponding to the blocking groove BN with a blocking tumbler pin BZ and an extended blocking counter pin BG is foreseen, so that the blocking counter pin impinges on the cylinder housing (10) if the blocking groove is not deep enough and with this the complete insertion of a key with an insufficiently deep blocking groove is blocked by the pair of blocking tumbler pins and whereby the blocking tumbler pin BZ with the blocking counter pin BG following the insertion of the key at the position (P1) is also utilized as a coding tumbler pin with coding steps (C1, C2, C3, C4) with respect to the turning of the cylinder.
  • 2. Key in accordance with claim 1, characterized in that at least four rows of tumbler pins (A1-A4) are foreseen.
  • 3. Key in accordance with claim 1, characterized in that at least two different codings (Cod1, Cod2) are foreseen.
  • 4. Key in accordance with claim 1, characterized in that coding positions (Pi) from two different bore patterns (R, L) are foreseen.
  • 5. Key in accordance with claim 1, characterized by a blocking groove, which runs to at least the two positions (P1, P2) at the very front of a coding row (A2) and by blocking tumbler pins BZ1, BZ2 and blocking counter pins BG1, BG2 corresponding to these positions, with coded step depths of these at least two positions at the very front.
  • 6. Key in accordance with claim 5, characterized in that the blocking groove has at least two differently shaped sectors BN1, BN2.
  • 7. Key in accordance with claim 1, characterized in that the blocking groove extends over more than one coding position and whereby the depth (tb) of the blocking groove remains the same from one position (P1) to the next position (P2) or gets smaller.
  • 8. Key in accordance with claim 1, characterized in that the blocking groove extends over more than one coding position and whereby the width (bb) of the blocking groove remains the same from one position (P1) to the next position (P2) or gets smaller.
  • 9. Key in accordance with claim 1, characterized in that at more than one row of tumbler pins (A1, A2) respectively one blocking groove each with assigned pairs of blocking tumbler pins is foreseen.
  • 10. Key in accordance with claim 1, characterized in that as an additional security element at the tip of the key a rising control face KF is located, which pushes an assigned control pin KS out of the way, whereby the control pin KS prevents the insertion of a key without a control face KF.
  • 11. Key in accordance with claim 10, characterized in that the control pin KS is implemented as a flat pin (23), which additionally carries out a flank control at a narrow coding milling (Cod2).
  • 12. Key in accordance with claim 1, characterized in that in a row of tumbler pins (A2) the following security elements are located: Blocking code (BC), second coding (Cod2), insertion blocking system by means of control face (KF) and control pin (KS) as well as flank control by means of a flat pin (23).
  • 13. Locking system with security reversible keys for locking systems with at least three coding—/tumbler pin rows (A1, A2, A3), which are also located on the flat sides of the keys (S), with assigned cylinders (Z) with pin rows of pairs of tumbler pins, consisting of tumbler pins and counter pins at the positions of a given bore pattern and with at least two additional safety elements, characterized in that at least two areas on the keys are defined, whereby in a first area G1 at least two additional security elements with a higher degree of manufacturing difficulty are foreseen and in the second area G2 a more simple basic coding (Cod1) is foreseen, and whereby with the first area G1 an unequivocal segmentation into independent market areas (M1, M2, . . . ) is defined and whereby the first area G1 as an additional security element has a blocking code (BC), i.e., the keys have a blocking groove BN, which runs parallel to the axis of the key (x) from the tip of the key to at least the first position (P1) of a tumbler pin row on the key, the blocking groove has a coded blocking depth (B1, B2, B3), in the assigned cylinder at least at the rearmost coding position (P1) a pair of tumbler pins with a blocking tumbler pin BZ and an extended blocking counter pin BG corresponding to the blocking groove BN are foreseen, so that the blocking counter pin BG impinges on the cylinder housing (10), if the blocking groove is not deep enough and therefore the complete insertion of a key with an insufficiently deep blocking groove is blocked by the pair of blocking tumbler pins, and whereby the blocking tumbler pin BZ with the blocking counter pin BG after the insertion of the key at the position (P1) is also utilized as a coding tumbler pin with coding steps (C1, C2, C3, C4) with respect to the turning of the cylinder.
  • 14. Locking system in accordance with claim 13, characterized in that as security elements in the first area G1 a second coding (Cod2), an insertion blocking by means of control faces (KF) on the key and assigned control pin (KS) in the cylinder, a flank control by means of a flat tumbler pin (23) and a blocking code (BC) are foreseen.
  • 15. Locking system in accordance with claim 13, characterized in that on the keys in areas different bore patterns (R, L) are foreseen.
  • 16. Locking system in accordance with claim 13, characterized in that at least three security elements are foreseen in the first area G1.
  • 17. Locking system in accordance with claim 13, characterized in that as security elements a second coding (Cod2) with a narrow milling is foreseen.
  • 18. Locking system in accordance with claim 13, characterized in that all security elements of the area G1 are affixed in one coding row (A2).
  • 19. Method for the manufacturing of keys and cylinders of a locking system with at least two areas (G1, G2) on the keys (S) in accordance with claim 13, characterized in that first the first area G1 on the keys is manufactured, resp., controlled and authorized in a central place of manufacture (H1), and that the coding (Cod1) of the keys of the second area G2 and the equipping of the cylinders with corresponding pins subsequently is able to take place decentralized at a local representative (H2).
  • 20. Method in accordance with claim 19, characterized in that the manufacturing takes place in at least two steps, resp., at different locations, whereby first variables (Vi) with a higher degree of difficulty (HS) of the area G1 are manufactured at a central location and subsequently variables with a lower degree of difficulty of the area G2 are manufactured decentralized or locally.
  • 21. Method in accordance with claim 19, characterized in that the manufacturing of the keys takes place in at least three steps, whereby first the first area G1 with variables (Vi) of the highest degree of difficulty is manufactured centrally (H1), thereupon a further area (G½) with variables with a lower degree of difficulty is manufactured regionally (H½) and finally the coding with the lowest degree of difficulty of the area G2 is manufactured locally at the place of application (H2).
  • 22. Method in accordance with claim 19, characterized in that the manufacturing of the area G1 is also able to take place decentralized, whereby the manufacturing programmes and the authorization (aut) for this are controlled and checked from a central location SS (system owner).
Priority Claims (2)
Number Date Country Kind
719/00 Apr 2000 CH
720/00 Apr 2000 CH
PCT Information
Filing Document Filing Date Country Kind
PCT/CH01/00207 4/2/2001 WO