Patent classifications
E05B19/00
Lock cylinder and key with multiple, supplemental locking elements
A lock assembly includes a plug with a keyway, primary pins aligned with the keyway, a sidebar, secondary pins adjacent the keyway, and at least one supplemental sidebar control element for controlling movement of the sidebar. A key blank has a key blade with a primary top edge to receive primary bittings for controlling the primary pins, a rib to receive secondary bittings for controlling the secondary pins, and at least one shuttle pin. The shuttle pin engages a multi-level ridge within the keyway to move the shuttle pin from a retracted position to an extended position in which an end of the shuttle pin actuates the supplemental sidebar control element.
ELECTRONIC LOCK SYSTEM, METHOD PERFORMED USING ELECTRONIC LOCK SYSTEM, PORTABLE TERMINAL, METHOD PERFORMED USING PORTABLE TERMINAL, AND COMPUTER PROGRAM
To suppress costs when an electronic lock is used, when key information held by an electronic lock and a server is “K//n” (“n” is an integer), key information “K//n” and new key information “K//n+1” are supplied from a server to a portable terminal of a user who wants to unlock the electronic lock. The key information and new key information are transferred from the portable terminal to the electronic lock, and when the key information transferred from the portable terminal to the electronic lock matches the key information recorded in the electronic lock, the electronic lock is unlocked. When the key information expires, the key information recorded in both the electronic lock and the server are overwritten with “K//n+1.”
ELECTRONIC LOCK SYSTEM, METHOD PERFORMED USING ELECTRONIC LOCK SYSTEM, PORTABLE TERMINAL, METHOD PERFORMED USING PORTABLE TERMINAL, AND COMPUTER PROGRAM
To suppress costs when an electronic lock is used, when key information held by an electronic lock and a server is “K//n” (“n” is an integer), key information “K//n” and new key information “K//n+1” are supplied from a server to a portable terminal of a user who wants to unlock the electronic lock. The key information and new key information are transferred from the portable terminal to the electronic lock, and when the key information transferred from the portable terminal to the electronic lock matches the key information recorded in the electronic lock, the electronic lock is unlocked. When the key information expires, the key information recorded in both the electronic lock and the server are overwritten with “K//n+1.”
Access control system and method
A lock for securing a door is provided, the lock includes a housing configured to be mounted on a door, a locking member movable between locked and unlocked positions, a core with a keyway and configured to turn relative to the housing to cause the locking member to move between the locked and unlocked positions, at least one optical source configured to emit an electromagnetic radiation signal at an object in the keyway, at least one optical detector configured to detect at least a portion of the electromagnetic radiation signal, a memory configured to store at least one authorized key characteristic, a motor configured to control movement of the locking member between locked and unlocked positions, and a processor that determines at least one sensed characteristic of the object in the keyway based at least in part on the electromagnetic radiation signal.
INTERLOCK MECHANISM FOR VEHICLE CONTROL DEVICE
In an interlock system, locking of a second locking mechanism is enabled only when a first key holding part holds a first key and a control device is in a state in which a residual voltage of the control device is not discharged. Application of a power supply voltage to the control device is enabled by switching of a ground switch only when a second key holding part holds a second key. Removal of the second key from the second key holding part is enabled only when the ground switch is in the grounded position and the control device is in a grounded state. Removal of the first key from the first key holding part is enabled only when the control device is in a state in which residual voltage is discharged.
High Security Locking System Which Forms a Deviating Picking Path and Associated Deviated Key
A high security locking system comprising a deviated key and a lock housing. The lock housing may further comprise a face plate with a keyhole for receiving the deviated key and first pin slots disposed within the lock housing. The high security locking system may comprise a lock cylinder disposed within the lock housing and include second pin slots disposed within the lock cylinder. An idler block may be disposed within the lock cylinder and may be rotatable, which may allow the deviated key to align with one or more of the second pin slots in the lock cylinder. Additionally, a stationary block may be disposed within the lock cylinder and the deviated key may rotate around the lock without interfering with the stationary block.
ELECTRONIC LOCKBOX
An electronic lockbox uses a rotary actuator with multiple positions to achieve multiple locking states. Multiple positions of the actuator are detected, using optical sensors. The locking mechanism includes an outer sleeve and an inner cylindrical barrel that are coupled with torsion springs. The lockbox has a shackle and a key bin that are retained by the inner barrel when in the locked state, and the barrel can be rotated to either release the shackle or to release the key bin that typically holds a building's key.
Electronic key
An electronic key having the following features. The electronic key has a key housing and a switch housing in the key housing. The switch housing has an inherently rigid frame having at least one first breakout, and a flexibly deformable membrane which is arranged on the frame in order to close the at least one breakout and to forward a force having effect from the outside on the membrane in the region of the breakout to an electrical switch element arranged within the frame. An electronic key having the required amount of stiffness is thus created, in which sensitive electronic components located therein are also protected from environmental influences. If the deformable membrane is not only used for button-related functions, but also for forming an ejection section for an emergency key or as a rattle protection for the emergency key, a multifunctional switch housing can thus be created simply.
KEY, LOCKING SYSTEM, AND METHOD FOR OPENING OR CLOSING THE LOCKING SYSTEM
The invention relates to a closing system having a key (1.1) coded in a quantum-physical manner, which withstands very high mechanical forces, wear, or temperatures. The key consists, for example, of a solid stainless-steel bar having, for example, a diameter of 8 mm and, for example, a length of 120 mm. The coding of the key (1.1) is based on a quantum-physical solid body cryptography. The matter of the solid main body is partially changed in such a way that this change can be read out by means of read-out methods suitable therefor. The coding occurs into the depth of the main body such that external influences such as damage to the surface do not impair the function of the key. The quantum key processed in such a way has no visible or perceptible features of the coding. More than 500 billion different codings are accommodated on a length of approximately 50 mm. The locking system comprises a decoding unit on the lock for decoding the codings, which have been introduced into the solid metal of the key in a quantum-physical manner. The arrangement according to the invention offers a locking system that is extremely resistant to forgery and manipulation, on the basis of quantum-physical solid body cryptography.
Banknote handling system for automated casino accounting
A banknote handling system includes an unlocking system. The unlocking system includes a camera, a first mechanical arm to which one or a plurality of keys are affixed, and a controller that determines a position of a keyhole based on an image from the camera, and controls the first arm to insert one of the one or the plurality of keys into the keyhole and turn the inserted key for unlocking. In many examples, the unlocking system is configured to unlock a banknote cashbox.