OBJECT OF THE INVENTION
[0001] The object of the present description is a pin lock and a method that allows it to
be coded and master keyed in a fast and easy way, without the use of tools, leading
to a significant reduction in cost and time.
[0002] It has a particular application in the industrial field relating to locks.
TECHNICAL PROBLEM TO BE RESOLVED AND BACKGROUND OF THE INVENTION
[0003] Of the different types of locks that exist, one of the most popular is the one known
as a cylinder or keyhole lock.
[0004] Cylinder locks are characterised in that they are made up of a body formed by a cylindrical
component and an attachment forming a transverse cross section in the form of a circle
with a projection. Inside the attachment a series of channels are located that run
perpendicularly into the cylindrical component of the body, in which a rotating tumbler
that incorporates a slot is housed into which a key is inserted. The channels continue
through the tumbler, passing through it until reaching the slot. Thus, the tumbler
also contains channels, an extension of the channels of the attachment.
[0005] A spring is housed in each one of these channels of the attachment, located in contact
with the blind end of the channels in the attachment and a top pin, located in the
channels of the attachment, in contact with the springs, which can extend beyond the
attachment area, through the channels of the tumbler.
[0006] In the same way, a bottom pin is located in each one of the channels of the tumbler,
located in contact with the slot.
[0007] The top pins and the bottom pins have a specific length and are in charge of configuring
the coding of the key that activates the lock. In a state of rest, without the key,
the springs push the pins, such that the bottom pins reach the slot and part of the
top pins are in the channels of the tumbler, blocking the rotational movement of the
tumbler in the cylindrical component of the lock.
[0008] The unlocking of the lock is done by inserting a key with a specific geometry into
the tumbler, configured according to a prior coding of the lengths of the bottom pins
and of the type of top pin used, and depending on whether or not there is a master
key for the lock, different types of top pins are used. In its movement through the
slot, the key comes into contact with the free ends of the bottom pins, pushes them
through the respective channels thereof, along with the top pins, overcoming the force
of the spring to be able to place each one of the bottom pins, and therefore the top
pins as well, in a predetermined position. Once the key is completely inserted, and
if it is the right key, it causes the geometry of the key to make it so that, on the
one hand, the bottom pins become aligned with the surface of the tumbler and, on the
other hand, the top pins become aligned with the surface of the attachment. This way,
both the top pins and the bottom pins are flush and not interfering with the movement
of the tumbler with respect to the cylindrical component of the body of the lock,
thereby achieving that the rotation of the tumbler is not blocked and the lock is
activated.
[0009] Thus, the different heights of each one of the bottom pins form the code to be able
to activate the lock. The configuration of the relief by means of holes or teeth of
the key will result in a design of the bottom pins with different lengths that create
different codes.
[0010] Once the functioning of the cylindrical lock is known, the most commonly used manufacturing
method in the current state of the art will be described, which can be divided into
three phases.
[0011] In a first phase, the most standardised of them all, the springs and the top pins
are inserted in the attachment. The tumbler is then introduced in the cylindrical
component of the body of the lock.
[0012] In a second phase, the coding of the lock is done. For this second phase, it is necessary
to know where and how the installation of the locks is going to be done, meaning how
many locks are going to be installed, how many master keys will be made, etc. Based
on the parameters of the installation, the codes for the configuration of the locks
are generated. This way, the top pins used, the lengths of the springs and the length
and position of the bottom pins in the channels of the tumbler are configured according
to the code of the lock, since each code has a different key associated with the same.
[0013] Lastly, in a third phase, the locks are coded by inserting the bottom pins in the
channels of the tumbler.
[0014] To perform the installation of the bottom pins in the channels of the tumbler, it
is necessary, by means of systems known in the state of the art, to extract the tumbler.
However, it must be taken into consideration that, prior to the extraction, the top
pins must be fastened so that they do not come out of the channels of the attachment
and fall into the hole left by the tumbler. To do so, one of the systems used is the
use of a fastener that is inserted in the cylindrical component of the body of the
lock and which prevents the top pins from coming out of the attachment. Another system
used is to introduce cylindrical elements through the opposite end of the tumbler
as the tumbler is being extracted, which block the top pins inside the attachment
of the body of the lock.
[0015] Once the tumbler is outside the lock, the bottom pins of different lengths are inserted
in the predetermined positions, meaning with the coding of the lock already specified,
in the channels of the tumbler.
[0016] The tumbler loaded with the bottom pins is then introduced back into the body of
the lock and the retention element is extracted, being either the fastener or the
cylindrical elements.
[0017] Lastly, the tumbler is fastened to the body of the lock by means of the use of retaining
washers, for example, thereby preventing the tumbler from being extracted from the
body of the lock.
[0018] However, this third phase has a series of drawbacks.
[0019] On the one hand, a certain degree of skill is necessary to position the fastener
or the cylindrical elements that prevent the top pins from coming out.
[0020] On the other hand, it takes a long time to perform this third phase due to the manipulation
required in each phase, such as the mounting and dismounting of the retention elements,
the extraction of the tumbler, and the coding and fastening of the tumbler to the
body of the lock.
[0021] In addition to all of these drawbacks, it is also necessary to use a series of additional
tools, such as fasteners or retention elements or a machine for fastening the tumbler
to the body of the lock.
[0022] All of this means that in situations where there is a high number of locks to master
key or code, there are high extra costs due to the time needed to perform all of these
changes.
[0023] The present invention solves these problems, which are not solved in the present
state of the art, by means of a lock that substitutes this third mounting phase with
a method that is very simple, saving time, effort and the need for additional tools.
DESCRIPTION OF THE INVENTION
[0024] With the aim of achieving the objectives and avoiding the previously mentioned drawbacks,
the present invention describes a pin lock that comprises a body formed by an attachment
and a cylindrical component that incorporates a rotating tumbler, wherein the attachment
comprises channels that extend through the tumbler until reaching a slot for the insertion
of a key, each one of the channels accommodating a spring, a top pin and a bottom
pin.
[0025] A first object of the present invention consists of the fact that the body of the
lock comprises side openings located in the cylindrical component and in line with
the channels of the tumbler, such that when the tumbler is rotated, the channels of
the tumbler become aligned with the side openings and direct access is provided to
them from the outside.
[0026] A second object of the invention consists of the coding method of the pin lock, which
comprises the following steps:
- a) Opening the cover of the attachment, located on the end, to insert a configuration
pin, a top pin and a spring through each one of the channels of the attachment;
- b) Closing the cover of the attachment;
- c) Inserting a configuration key into the slot, in line with the configuration pins;
- d) Turning the configuration key to align the channels of the tumbler, which accommodate
the configuration pins, with the side openings of the cylindrical component of the
lock;
- e) Extracting the configuration pins through the side openings;
- f) Inserting the bottom pins through the side openings with the length and in the
order corresponding to the predetermined coding;
- g) Closing the side openings with a cover;
- h) Turning the configuration key to the initial position and extracting it.
[0027] Lastly, it must be taken into consideration that the configuration pins that are
inserted have a greater length than any of the bottom pins, and therefore when they
are extracted and the bottom pins are inserted, they do not interfere with the rotation
of the tumbler.
[0028] The bottom pins have a length that is equal to or shorter than the length of the
configuration pins. Thus, the greater the length of the configuration pins, the greater
the number of possible combinations. By way of example, having 4 channels for the
insertion of the pins, if the configuration pin has a size 5, it will be possible
to have combinations with bottom pins of sizes 1, 2, 3, 4 and 5, the total number
of combinations being 4
5 = 1,024 combinations. In turn, if the configuration pin has a size 2, the bottom
pins that can be combined will only be size 1 and 2, the total number of combinations
being 4
2 = 16 combinations.
BRIEF DESCRIPTION OF THE FIGURES
[0029] To complete the description of the invention, and for the purpose of helping to make
the features thereof more readily understandable, according to a preferred exemplary
embodiment thereof, a set of drawings is included where, by way of illustration and
not limitation, the following figures have been represented:
- Figure 1 represents a perspective view of the lock of the invention with a flat key
inserted.
- Figure 2 represents a perspective view of the lock of the invention without a key,
wherein the cover has been removed to be able to see the side openings.
- Figure 3 represents a perspective view of the lock of the invention, wherein the body
has been removed to be able to see the tumbler and the internal components.
- Figure 4 represents a perspective view of the lock of the invention, wherein to be
able to see the internal components, the body as well as the tumbler have been removed.
- Figure 5 represents a longitudinal cross-sectional view of the lock of the invention
with a flat key inserted, showing all of the internal elements.
[0030] A list of the references used in the figures is provided below:
- 1. Cylindrical component.
- 2. Attachment.
- 3. Tumbler.
- 4. Channel.
- 5. Spring.
- 6. Top pin.
- 7. Bottom pin.
- 8. Side openings.
- 9. Attachment cover.
- 10. Cover.
- 11. Slot.
DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION
[0031] Considering the numbering used in the figures, before describing the coding method
of the pin lock of the invention, the lock will be described in detail with all of
the components thereof, so that the operating mode of the same can be clearly understood.
[0032] The lock represented in the figures and considered for the embodiment is a lock for
a flat key, although the application to a key lock with bittings is immediate.
[0033] As shown in figure 1, the lock is made up of a body formed by a cylindrical component
(1) and an attachment (2). In the figures it can be seen how there is a lock with
two bodies: this is due to the fact that locks must be accessible through both sides
of the door in which they are placed, so that the door can be opened on both sides,
but the description will be of a single body.
[0034] The internal components of the lock are shown in figures 3-5. Thus, in these figures
one can see that the attachment (2) is made of a series of channels (4), aligned according
to the longitudinal axis of the circular component (1) of the body of the lock. These
channels (4) extend through the attachment (2) to the cylindrical component (1) and
pass through the tumbler (3) to the central area, where the slot (11) for the insertion
of the key is located.
[0035] Each channel (4) accommodates a spring (5), a top pin (6) and a bottom pin (7) which,
in a state of rest, in other words, without a key, occupy the entire length of the
channel (4), from the attachment cover (9), where the spring (5) is supported, to
the slot (11) located in the tumbler (3), where the bottom pin (7) is supported, the
top pin (6) being between the spring (5) and the bottom pin (7).
[0036] As the tip of the key is inserted into the slot (11), the pins (6, 7) are pushed,
overcoming the force of the spring (5) and moving them until, once the key has completely
entered the slot (11), the free ends of each one of the bottom pins (7) are resting
on the holes that make up the corresponding relief of the key. This implies that the
bottom pins (7), and therefore the top pins (6) in contact with the same, are in a
predetermined position in the channels (4).
[0037] If the key is the proper key for activating the lock, the bottom pins (7), and therefore
the top pins (6), will be aligned at the ends thereof which are in contact, such that
the bottom pins (7) are inside the tumbler (3) and the top pins (6) are inside the
attachment (2), without any one of them protruding. This allows the tumbler (3), housing
the bottom pins (7), to be able to rotate, to activate the lock.
[0038] However, if the key is not the proper key, the pins (6, 7) will not be aligned with
the surfaces of the attachment (2) and of the tumbler (3), such that part of the top
pins (6) will be in the channels (4) of the tumbler (3) and part of the bottom pins
(7) will be in the channels (4) of the attachment (2). This will create an interference
that will prevent the tumbler from being able to rotate and the lock from being activated.
[0039] A lock for a key with bittings has the same operating principle. The difference is
that the lock for a flat key can incorporate holes to configure a relief not only
on one face, but on both of the flat faces, and even on one or the two side faces.
This implies that the locks for these types of keys do not incorporate a single row
of channels (4) with the corresponding springs (5) and pins (6, 7), but rather several,
each one in line with the face with the relief, such that they serve as additional
security means.
[0040] Once the lock has been described with enough clarity to be able to understand the
operation and configuration thereof, the coding method of the invention will be described,
which is based in part on the method currently used in the aforementioned state of
the art.
[0041] Thus, by means of the method of the present invention, the third manufacturing phase
of the lock, consisting of the incorporation of the bottom pins (7), is done in a
fast and simple way, without using any tools.
[0042] The method of the present invention is according to the following description.
[0043] In a first phase, side openings (8) are made in the cylindrical component (1) of
the body of the lock, as shown in figure 2. These side openings (8) are located in
line with the channels (4) of the tumbler (3) and, in spite of the fact that they
may be in any position, they are preferably positioned at ninety degrees with respect
to the attachment (2).
[0044] Then, with the attachment cover (9) dismounted, a configuration pin, a top pin (6)
and a spring (5), in that order, are inserted in each one of the channels (4) of the
attachment (2), proceeding to close the attachment cover (9).
[0045] The configuration pins are in accordance with the holes of a configuration key, such
that it is able to open the lock when it contains the configuration pins inside the
same.
[0046] The configuration pins have two particular features. First, all of them have the
same length. Second, they must all be as long as possible, and the configuration key
will have holes on the surface thereof with the maximum possible depth.
[0047] In the second manufacturing phase, the codes of the lock are generated. This method
is carried out as is done in the state of the art, with no differences, such that
the length of the bottom pins (7) and the position they must occupy in the channels
(4) of the tumbler (3) are defined.
[0048] In a third phase, the coding of the lock is done.
[0049] To describe the method, we will initially consider that the flat key that activates
the lock contains relief on a single face, such that it only incorporates a row of
channels (4) with the corresponding springs (5) and pins (6, 7) thereof. The extrapolation
of keys with relief on both flat faces and even on the side faces does not lead to
greater complication and can be deduced in light of the present specification.
[0050] Thus, to carry out this third phase, the configuration key is initially inserted,
which is in line with the configuration pins inserted, and therefore, is able to activate
the lock.
[0051] The configuration key is then turned and, therefore, the tumbler (3) as well, until
the channels (4) are aligned and, therefore, the configuration pins as well, with
the side openings (8).
[0052] Once the channels (4) are aligned with the side openings (8), the configuration pins
are extracted and the bottom pins (7), which define the lock, are inserted, each one
with its own length, considering the predetermined position of each one of them to
create the correct coding of the lock in accordance with a key. Once the bottom pins
(7) are introduced, the side openings (8) are closed with a cover (10).
[0053] The extraction of the configuration pins is done simply by gravity, although a strike
to the body of the lock may be necessary to force them out.
[0054] Lastly, the tumbler (3) is rotated to the initial position and the configuration
key is extracted, locking the bottom pins (7) with the top pins (6) and the springs
(5) in the channels (4).
[0055] The length of any one of the bottom pins (7) is always going to be less than or equal
to the length of the configuration pins which, as indicated, have the maximum length
possible. This way, the rotation of the tumbler (3) will never lead to problems due
to the fact that the bottom pins (7) with unspecified lengths are inserted that may
cause interference in the rotation, since the configuration key has holes that correspond
to pins with a maximum length, and as such a pin with a smaller length, when inserted
in the hole of the key, will not impede the rotation of the tumbler (3).
[0056] Once the channels (4) of the attachment (2) and of the tumbler (3) are aligned, it
is possible to extract the configuration key, and thus the lock is coded for the key
that is in correspondence with the set of bottom pins (7) introduced.
[0057] In the case of inserting the configuration key in the lock again, the tumbler (3)
would not rotate, given that the bottom pins (7), which in that moment are inserted
in the channels (4), are no longer in correspondence with the holes of the configuration
key, but rather with the specific key of that set of bottom pins (7) and, therefore,
due to the different lengths of the bottom pins (7), they would create interference
with the tumbler (3), which would prevent it from rotating.
[0058] In the case of having a lock for a key with holes in more than one face, the method
is similar, and only requires using different configuration keys that will incorporate
the relief of the line of pins (6, 7) already configured instead of a flat relief
as a function of the different configuration pins.
[0059] It must be noted that the present invention must not be limited to the embodiment
herein described. Other configurations may be carried out by those skilled in the
art based on the present description. Accordingly, the scope of the invention is defined
by the following claims.