(19)
(11) EP 3 708 744 A1

(12) EUROPEAN PATENT APPLICATION
published in accordance with Art. 153(4) EPC

(43) Date of publication:
16.09.2020 Bulletin 2020/38

(21) Application number: 18876558.0

(22) Date of filing: 10.10.2018
(51) International Patent Classification (IPC): 
E05B 27/00(2006.01)
E05B 27/04(2006.01)
(86) International application number:
PCT/ES2018/070657
(87) International publication number:
WO 2019/092293 (16.05.2019 Gazette 2019/20)
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
KH MA MD TN

(30) Priority: 07.11.2017 ES 201731298

(71) Applicant: IFAM Seguridad, S.L.U.
20500 Arrasate/Mondragón (Guipúzcoa) (ES)

(72) Inventors:
  • FOLGUEIRA LATAS, Rodrigo
    20500 Arrasate/Mondragón (Guipúzcoa) (ES)
  • BEITIA UGARTE, Santiago
    20500 Arrasate/Mondragón (Guipúzcoa) (ES)

(74) Representative: Ungria López, Javier 
Avda. Ramón y Cajal, 78
28043 Madrid
28043 Madrid (ES)

   


(54) PIN LOCK AND CODING METHOD


(57) The pin lock comprises side openings (8) located in the cylindrical component (1) in line with the channels (4) of the tumbler (3) which are closed by means of a cover (10). In the coding method, a configuration key is inserted into the slot (11), in line with configuration pins, the configuration key is turned to align the channels (4) of the tumbler (3), which include the configuration pins, with the side openings (8), the configuration pins are extracted via the side openings (8), the bottom pins (7) are inserted through the side openings (8) with the length and in the order corresponding to the predetermined coding, the side openings (8) are closed with the cover (10), and the configuration key is turned to the initial position in order to extract it, leaving the lock coded.




Description

OBJECT OF THE INVENTION



[0001] The object of the present description is a pin lock and a method that allows it to be coded and master keyed in a fast and easy way, without the use of tools, leading to a significant reduction in cost and time.

[0002] It has a particular application in the industrial field relating to locks.

TECHNICAL PROBLEM TO BE RESOLVED AND BACKGROUND OF THE INVENTION



[0003] Of the different types of locks that exist, one of the most popular is the one known as a cylinder or keyhole lock.

[0004] Cylinder locks are characterised in that they are made up of a body formed by a cylindrical component and an attachment forming a transverse cross section in the form of a circle with a projection. Inside the attachment a series of channels are located that run perpendicularly into the cylindrical component of the body, in which a rotating tumbler that incorporates a slot is housed into which a key is inserted. The channels continue through the tumbler, passing through it until reaching the slot. Thus, the tumbler also contains channels, an extension of the channels of the attachment.

[0005] A spring is housed in each one of these channels of the attachment, located in contact with the blind end of the channels in the attachment and a top pin, located in the channels of the attachment, in contact with the springs, which can extend beyond the attachment area, through the channels of the tumbler.

[0006] In the same way, a bottom pin is located in each one of the channels of the tumbler, located in contact with the slot.

[0007] The top pins and the bottom pins have a specific length and are in charge of configuring the coding of the key that activates the lock. In a state of rest, without the key, the springs push the pins, such that the bottom pins reach the slot and part of the top pins are in the channels of the tumbler, blocking the rotational movement of the tumbler in the cylindrical component of the lock.

[0008] The unlocking of the lock is done by inserting a key with a specific geometry into the tumbler, configured according to a prior coding of the lengths of the bottom pins and of the type of top pin used, and depending on whether or not there is a master key for the lock, different types of top pins are used. In its movement through the slot, the key comes into contact with the free ends of the bottom pins, pushes them through the respective channels thereof, along with the top pins, overcoming the force of the spring to be able to place each one of the bottom pins, and therefore the top pins as well, in a predetermined position. Once the key is completely inserted, and if it is the right key, it causes the geometry of the key to make it so that, on the one hand, the bottom pins become aligned with the surface of the tumbler and, on the other hand, the top pins become aligned with the surface of the attachment. This way, both the top pins and the bottom pins are flush and not interfering with the movement of the tumbler with respect to the cylindrical component of the body of the lock, thereby achieving that the rotation of the tumbler is not blocked and the lock is activated.

[0009] Thus, the different heights of each one of the bottom pins form the code to be able to activate the lock. The configuration of the relief by means of holes or teeth of the key will result in a design of the bottom pins with different lengths that create different codes.

[0010] Once the functioning of the cylindrical lock is known, the most commonly used manufacturing method in the current state of the art will be described, which can be divided into three phases.

[0011] In a first phase, the most standardised of them all, the springs and the top pins are inserted in the attachment. The tumbler is then introduced in the cylindrical component of the body of the lock.

[0012] In a second phase, the coding of the lock is done. For this second phase, it is necessary to know where and how the installation of the locks is going to be done, meaning how many locks are going to be installed, how many master keys will be made, etc. Based on the parameters of the installation, the codes for the configuration of the locks are generated. This way, the top pins used, the lengths of the springs and the length and position of the bottom pins in the channels of the tumbler are configured according to the code of the lock, since each code has a different key associated with the same.

[0013] Lastly, in a third phase, the locks are coded by inserting the bottom pins in the channels of the tumbler.

[0014] To perform the installation of the bottom pins in the channels of the tumbler, it is necessary, by means of systems known in the state of the art, to extract the tumbler. However, it must be taken into consideration that, prior to the extraction, the top pins must be fastened so that they do not come out of the channels of the attachment and fall into the hole left by the tumbler. To do so, one of the systems used is the use of a fastener that is inserted in the cylindrical component of the body of the lock and which prevents the top pins from coming out of the attachment. Another system used is to introduce cylindrical elements through the opposite end of the tumbler as the tumbler is being extracted, which block the top pins inside the attachment of the body of the lock.

[0015] Once the tumbler is outside the lock, the bottom pins of different lengths are inserted in the predetermined positions, meaning with the coding of the lock already specified, in the channels of the tumbler.

[0016] The tumbler loaded with the bottom pins is then introduced back into the body of the lock and the retention element is extracted, being either the fastener or the cylindrical elements.

[0017] Lastly, the tumbler is fastened to the body of the lock by means of the use of retaining washers, for example, thereby preventing the tumbler from being extracted from the body of the lock.

[0018] However, this third phase has a series of drawbacks.

[0019] On the one hand, a certain degree of skill is necessary to position the fastener or the cylindrical elements that prevent the top pins from coming out.

[0020] On the other hand, it takes a long time to perform this third phase due to the manipulation required in each phase, such as the mounting and dismounting of the retention elements, the extraction of the tumbler, and the coding and fastening of the tumbler to the body of the lock.

[0021] In addition to all of these drawbacks, it is also necessary to use a series of additional tools, such as fasteners or retention elements or a machine for fastening the tumbler to the body of the lock.

[0022] All of this means that in situations where there is a high number of locks to master key or code, there are high extra costs due to the time needed to perform all of these changes.

[0023] The present invention solves these problems, which are not solved in the present state of the art, by means of a lock that substitutes this third mounting phase with a method that is very simple, saving time, effort and the need for additional tools.

DESCRIPTION OF THE INVENTION



[0024] With the aim of achieving the objectives and avoiding the previously mentioned drawbacks, the present invention describes a pin lock that comprises a body formed by an attachment and a cylindrical component that incorporates a rotating tumbler, wherein the attachment comprises channels that extend through the tumbler until reaching a slot for the insertion of a key, each one of the channels accommodating a spring, a top pin and a bottom pin.

[0025] A first object of the present invention consists of the fact that the body of the lock comprises side openings located in the cylindrical component and in line with the channels of the tumbler, such that when the tumbler is rotated, the channels of the tumbler become aligned with the side openings and direct access is provided to them from the outside.

[0026] A second object of the invention consists of the coding method of the pin lock, which comprises the following steps:
  1. a) Opening the cover of the attachment, located on the end, to insert a configuration pin, a top pin and a spring through each one of the channels of the attachment;
  2. b) Closing the cover of the attachment;
  3. c) Inserting a configuration key into the slot, in line with the configuration pins;
  4. d) Turning the configuration key to align the channels of the tumbler, which accommodate the configuration pins, with the side openings of the cylindrical component of the lock;
  5. e) Extracting the configuration pins through the side openings;
  6. f) Inserting the bottom pins through the side openings with the length and in the order corresponding to the predetermined coding;
  7. g) Closing the side openings with a cover;
  8. h) Turning the configuration key to the initial position and extracting it.


[0027] Lastly, it must be taken into consideration that the configuration pins that are inserted have a greater length than any of the bottom pins, and therefore when they are extracted and the bottom pins are inserted, they do not interfere with the rotation of the tumbler.

[0028] The bottom pins have a length that is equal to or shorter than the length of the configuration pins. Thus, the greater the length of the configuration pins, the greater the number of possible combinations. By way of example, having 4 channels for the insertion of the pins, if the configuration pin has a size 5, it will be possible to have combinations with bottom pins of sizes 1, 2, 3, 4 and 5, the total number of combinations being 45 = 1,024 combinations. In turn, if the configuration pin has a size 2, the bottom pins that can be combined will only be size 1 and 2, the total number of combinations being 42 = 16 combinations.

BRIEF DESCRIPTION OF THE FIGURES



[0029] To complete the description of the invention, and for the purpose of helping to make the features thereof more readily understandable, according to a preferred exemplary embodiment thereof, a set of drawings is included where, by way of illustration and not limitation, the following figures have been represented:
  • Figure 1 represents a perspective view of the lock of the invention with a flat key inserted.
  • Figure 2 represents a perspective view of the lock of the invention without a key, wherein the cover has been removed to be able to see the side openings.
  • Figure 3 represents a perspective view of the lock of the invention, wherein the body has been removed to be able to see the tumbler and the internal components.
  • Figure 4 represents a perspective view of the lock of the invention, wherein to be able to see the internal components, the body as well as the tumbler have been removed.
  • Figure 5 represents a longitudinal cross-sectional view of the lock of the invention with a flat key inserted, showing all of the internal elements.


[0030] A list of the references used in the figures is provided below:
  1. 1. Cylindrical component.
  2. 2. Attachment.
  3. 3. Tumbler.
  4. 4. Channel.
  5. 5. Spring.
  6. 6. Top pin.
  7. 7. Bottom pin.
  8. 8. Side openings.
  9. 9. Attachment cover.
  10. 10. Cover.
  11. 11. Slot.

DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION



[0031] Considering the numbering used in the figures, before describing the coding method of the pin lock of the invention, the lock will be described in detail with all of the components thereof, so that the operating mode of the same can be clearly understood.

[0032] The lock represented in the figures and considered for the embodiment is a lock for a flat key, although the application to a key lock with bittings is immediate.

[0033] As shown in figure 1, the lock is made up of a body formed by a cylindrical component (1) and an attachment (2). In the figures it can be seen how there is a lock with two bodies: this is due to the fact that locks must be accessible through both sides of the door in which they are placed, so that the door can be opened on both sides, but the description will be of a single body.

[0034] The internal components of the lock are shown in figures 3-5. Thus, in these figures one can see that the attachment (2) is made of a series of channels (4), aligned according to the longitudinal axis of the circular component (1) of the body of the lock. These channels (4) extend through the attachment (2) to the cylindrical component (1) and pass through the tumbler (3) to the central area, where the slot (11) for the insertion of the key is located.

[0035] Each channel (4) accommodates a spring (5), a top pin (6) and a bottom pin (7) which, in a state of rest, in other words, without a key, occupy the entire length of the channel (4), from the attachment cover (9), where the spring (5) is supported, to the slot (11) located in the tumbler (3), where the bottom pin (7) is supported, the top pin (6) being between the spring (5) and the bottom pin (7).

[0036] As the tip of the key is inserted into the slot (11), the pins (6, 7) are pushed, overcoming the force of the spring (5) and moving them until, once the key has completely entered the slot (11), the free ends of each one of the bottom pins (7) are resting on the holes that make up the corresponding relief of the key. This implies that the bottom pins (7), and therefore the top pins (6) in contact with the same, are in a predetermined position in the channels (4).

[0037] If the key is the proper key for activating the lock, the bottom pins (7), and therefore the top pins (6), will be aligned at the ends thereof which are in contact, such that the bottom pins (7) are inside the tumbler (3) and the top pins (6) are inside the attachment (2), without any one of them protruding. This allows the tumbler (3), housing the bottom pins (7), to be able to rotate, to activate the lock.

[0038] However, if the key is not the proper key, the pins (6, 7) will not be aligned with the surfaces of the attachment (2) and of the tumbler (3), such that part of the top pins (6) will be in the channels (4) of the tumbler (3) and part of the bottom pins (7) will be in the channels (4) of the attachment (2). This will create an interference that will prevent the tumbler from being able to rotate and the lock from being activated.

[0039] A lock for a key with bittings has the same operating principle. The difference is that the lock for a flat key can incorporate holes to configure a relief not only on one face, but on both of the flat faces, and even on one or the two side faces. This implies that the locks for these types of keys do not incorporate a single row of channels (4) with the corresponding springs (5) and pins (6, 7), but rather several, each one in line with the face with the relief, such that they serve as additional security means.

[0040] Once the lock has been described with enough clarity to be able to understand the operation and configuration thereof, the coding method of the invention will be described, which is based in part on the method currently used in the aforementioned state of the art.

[0041] Thus, by means of the method of the present invention, the third manufacturing phase of the lock, consisting of the incorporation of the bottom pins (7), is done in a fast and simple way, without using any tools.

[0042] The method of the present invention is according to the following description.

[0043] In a first phase, side openings (8) are made in the cylindrical component (1) of the body of the lock, as shown in figure 2. These side openings (8) are located in line with the channels (4) of the tumbler (3) and, in spite of the fact that they may be in any position, they are preferably positioned at ninety degrees with respect to the attachment (2).

[0044] Then, with the attachment cover (9) dismounted, a configuration pin, a top pin (6) and a spring (5), in that order, are inserted in each one of the channels (4) of the attachment (2), proceeding to close the attachment cover (9).

[0045] The configuration pins are in accordance with the holes of a configuration key, such that it is able to open the lock when it contains the configuration pins inside the same.

[0046] The configuration pins have two particular features. First, all of them have the same length. Second, they must all be as long as possible, and the configuration key will have holes on the surface thereof with the maximum possible depth.

[0047] In the second manufacturing phase, the codes of the lock are generated. This method is carried out as is done in the state of the art, with no differences, such that the length of the bottom pins (7) and the position they must occupy in the channels (4) of the tumbler (3) are defined.

[0048] In a third phase, the coding of the lock is done.

[0049] To describe the method, we will initially consider that the flat key that activates the lock contains relief on a single face, such that it only incorporates a row of channels (4) with the corresponding springs (5) and pins (6, 7) thereof. The extrapolation of keys with relief on both flat faces and even on the side faces does not lead to greater complication and can be deduced in light of the present specification.

[0050] Thus, to carry out this third phase, the configuration key is initially inserted, which is in line with the configuration pins inserted, and therefore, is able to activate the lock.

[0051] The configuration key is then turned and, therefore, the tumbler (3) as well, until the channels (4) are aligned and, therefore, the configuration pins as well, with the side openings (8).

[0052] Once the channels (4) are aligned with the side openings (8), the configuration pins are extracted and the bottom pins (7), which define the lock, are inserted, each one with its own length, considering the predetermined position of each one of them to create the correct coding of the lock in accordance with a key. Once the bottom pins (7) are introduced, the side openings (8) are closed with a cover (10).

[0053] The extraction of the configuration pins is done simply by gravity, although a strike to the body of the lock may be necessary to force them out.

[0054] Lastly, the tumbler (3) is rotated to the initial position and the configuration key is extracted, locking the bottom pins (7) with the top pins (6) and the springs (5) in the channels (4).

[0055] The length of any one of the bottom pins (7) is always going to be less than or equal to the length of the configuration pins which, as indicated, have the maximum length possible. This way, the rotation of the tumbler (3) will never lead to problems due to the fact that the bottom pins (7) with unspecified lengths are inserted that may cause interference in the rotation, since the configuration key has holes that correspond to pins with a maximum length, and as such a pin with a smaller length, when inserted in the hole of the key, will not impede the rotation of the tumbler (3).

[0056] Once the channels (4) of the attachment (2) and of the tumbler (3) are aligned, it is possible to extract the configuration key, and thus the lock is coded for the key that is in correspondence with the set of bottom pins (7) introduced.

[0057] In the case of inserting the configuration key in the lock again, the tumbler (3) would not rotate, given that the bottom pins (7), which in that moment are inserted in the channels (4), are no longer in correspondence with the holes of the configuration key, but rather with the specific key of that set of bottom pins (7) and, therefore, due to the different lengths of the bottom pins (7), they would create interference with the tumbler (3), which would prevent it from rotating.

[0058] In the case of having a lock for a key with holes in more than one face, the method is similar, and only requires using different configuration keys that will incorporate the relief of the line of pins (6, 7) already configured instead of a flat relief as a function of the different configuration pins.

[0059] It must be noted that the present invention must not be limited to the embodiment herein described. Other configurations may be carried out by those skilled in the art based on the present description. Accordingly, the scope of the invention is defined by the following claims.


Claims

1. A pin lock comprising a body formed by an attachment (2) and a cylindrical component (1) which incorporates a rotating tumbler (3), wherein the attachment (2) comprises channels (4) that extend through the tumbler (3) until reaching a slot (11) for the insertion of a key, the channels (4) accommodating a spring (5), a top pin (6) and a bottom pin (7), such that the pin lock is characterised in that it comprises side openings (8) located in the cylindrical component (1) and in line with the channels (4) of the tumbler (3).
 
2. The pin lock, according to claim 1, characterised in that both the side openings (8) and the channels (4) are aligned in the direction of the axis of the tumbler (3).
 
3. A coding method for a pin lock, according to claim 1, characterised in that it comprises the following steps:

a) Opening the cover of the attachment (9) to insert a configuration pin, a top pin (6) and a spring (5) through each one of the channels (4) of the attachment (2);

b) Closing the cover of the attachment (9);

c) Inserting a configuration key into the slot (11), in line with the configuration pins;

d) Turning the configuration key to rotate the tumbler (3) until the channels (4) of the tumbler (3), which include the configuration pins, are aligned with the side openings (8);

e) Extracting the configuration pins through the side openings (8);

f) Inserting the bottom pins (7) through the side openings (8) with the length and in the order corresponding to the predetermined coding;

g) Closing the side openings (8) with a cover (10);

h) Turning the configuration key to the initial position and extracting it.


 
4. The coding method of a pin lock, according to claim 1, characterised in that the bottom pins (7) that are introduced have a length that is equal to or less than the length of the configuration pins, such that the greater the length of the configuration pins, the greater the number of possible combinations for the coding of the key.
 




Drawing













Search report