Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
LOCK MECHANISM AND PROCEDURE FOR THE APPLICATION THEREOF
Document Type and Number:
WIPO Patent Application WO/2016/142740
Kind Code:
A1
Abstract:
The invention is a lock mechanism with one or more keyholes, key fitting into the keyhole, spring, axis, pusher or cogwheels turning the axis, and at least one stud. It is characterized in that a slice block (5) and a true track (16) allowing the opening of the lock is associated with the stud (12), each slice block (5) is connected to a push-bar (13), and the slice block (5) is fitted with a false track (17) that allows the stud (12) to turn sideways partially, as well as a true track (16) that allows the stud (12) to turn sideways entirely. The subject of the invention also includes the procedure for the application of the lock.

Inventors:
BERENYI GABOR (HU)
Application Number:
PCT/IB2015/051708
Publication Date:
September 15, 2016
Filing Date:
March 09, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
BERENYI GABOR (HU)
International Classes:
E05B27/00; E05B27/08
Domestic Patent References:
WO1993001382A11993-01-21
Foreign References:
CH636669A51983-06-15
EP2292879A22011-03-09
US3992907A1976-11-23
FR2560915A11985-09-13
CN2093883U1992-01-22
CN2125635U1992-12-23
CN2125636U1992-12-23
CN2806681Y2006-08-16
CN2929084Y2007-08-01
CN202831846U2013-03-27
GB2266119A1993-10-20
US4062211A1977-12-13
EP0022233A11981-01-14
Attorney, Agent or Firm:
PINTZ, Gyorgy (Pf. 590, Budapest, HU)
Download PDF:
Claims:
CLAIMS

1. Lock mechanism with one or more keyholes, key fitting into the keyhole, spring, axis, pusher or cogwheels turning the axis, and at least one stud, characterized in that a slice block (5) and a true track (16) allowing the opening of the lock is associated with the stud (12), each slice block (5) is connected to a push-bar (13), and the slice block (5) is fitted with a false track (17) that allows the stud (12) to turn sideways partially, as well as a true track (16) that allows the stud (12) to turn sideways entirely.

2. The device according to claim 1, characterized in that the slice block (5) includes the true track (16), a false track (17), and a main track (25) that is fit for moving the stud (12), the direction of which is the same as the axis track (36).

3. Any of the devices according to claims 1 to 2, characterized in that it is fitted with at least one cylinder lock (26), and the cylinder lock (26) is connected to the input unit (24).

4. Any of the devices according to claims 1 to 3, characterized in that the keyhole (1) is fitted with a pin (2) that leads the key (20) inserted into the keyhole (1).

5. Any of the devices according to claims 1 to 4, characterized in that the key (20) has a cylinder lock feather (30) and/or bore (29) and/or key track (23) and/or key cog (22).

6. Any of the devices according to claims 1 to 5, characterized in that it has spring rods (9) that move the slice block (5), rotating rod (7) that turn the slice block (5), as well as moving shield (3) and stationary shield (4).

7. Any of the devices according to claims 1 to 5, characterized in that it is fitted with a bumper bolt (19) limiting the path of the spring (28), the axis (8) has an axis track (36), the push-bar (13) and the spring (28) is placed into the axis track (36), and the stud (12) is fixed onto the stud-rod (18).

8. Any of the devices according to claims 1 to 7, characterized in that it has a lock body (10), and the input unit (24) of the axis (8), the keyhole (1), the spring (28), the axis (8), and the push- bar is located in the lock body (10).

9. Any of the devices according to claims 1 to 8, characterized in that the pusher (38) is installed so that in holds together the entire lock body (10).

10. Any of the devices according to claims 1 to 9, characterized in that the push-bar (13) has a weakened push-bar section (35).

11. Procedure for using the lock mechanism according to claim 1, characterized in that one or more slice block (5) or one or more stud (12) is turned by a key (20) into a position where the stud (12) is placed into the true track (16) of the slice block (5), and then it is moved sideways by the turn of the key (20) and the cogwheel (6) or pusher (38), and, when using a foreign key to gain access, the false track (17) gives a similar sense as the true track (16), and, in case of using a foreign key and/or forced entry, the weakened push-bar section (35) is allowed to break or the rotating rod (7) is placed into a blind hole (15), thereby preventing the burglary.

12. The procedure according to claim 11, characterized in that at least one push-bar (13) is moved into the proper position by the bore (29) and/or key cog (22) and/or key track (23) of the key (20), and it bumps into the stud-rod (18), and the spring (28) is pressed, so the stud (12) is pushed to the true track (16), and then the key (20), the stud (12), and the axis (8) is turned.

Description:
Lock mechanism and procedure for the application thereof

The subject of the invention is a lock mechanism that has one or more keyholes, a key fitting into the keyhole, spring, axis, a slider or cogwheel rotating the axis, and at least one stud. The subject of the invention also includes the procedure for the application of the lock.

The state of the art includes the following solutions.

French publication document No. FR2560915 Al describes a cylinder lock using a special key. It consists of numerous parts that rotate on each other. The key has a pipe shaped section the complete surface of which is covered by pins.

Chinese utility model No. CN2093883 U describes a lock that is a secure cylinder lock with a spring. It provides protection against burglary using optoelectronic technology.

Chinese utility model No. CN2125635 U also provides protection against burglary. The lock has a spring. The internal device consists of two parts, two cylinders, which do not move simultaneously and open the lock unless the appropriate key is used.

Chinese utility model No. CN2125636 U also describes a lock providing protection against theft. The invention is simple, has a channel shaped section, and does not have a spiral inside. Chinese utility model No. CN2806681 Y is also secure against theft, which security is ensured by fake tracks.

Depth is of high importance for the operation of the device described by Chinese utility model No. CN2929084 Y. The lock operates as follows: the key is inserted halfway into the lock and then it is rotated until the external part of the device is moved in the correct position. The key is then inserted deeper and is turned again. At the end of the process, the external and internal components of the lock turn together. This solution extends the period required for opening the lock, thereby making the lock harder to break.

The solution described by Chinese utility model No. CN202831846 U renders the lock protected against breaking by using false tracks.

Locks consisting of rotating plates are also hard to crack; such solutions are described in British patent document No. GB2266119 A and American patent document No. US4062211 A. In the case of these inventions, each and every component must be rotated into the appropriate position to open the lock.

European patent document No. EP0022233 Al describes a cylinder lock with a key having a channel section. The lock also has a spring a two inside cylinders. A disadvantage of the above-mentioned inventions, and of traditional and cylinder locks in general, is that continuous tension is required for opening. The pins are moved to the proper place by the tension.

A common disadvantage of the locks forming part of the state of the art is that the use of continuous tension may be used for all of them, meaning that the pins may be pressed to the proper locations and the lock may be opened with relative ease. Another disadvantage is that there is physical friction between the parts connected to each other in all mechanic locks forming part of the state of the art. The purpose of the invention is to eliminate the faults of known solutions and to implement a lock mechanism, and a procedure for its use, the structure and design of which prevents cracking attempts. Thus, the purpose of the invention is to implement a device that is far safer than the known devices. The inventive step is based on the recognition that it is advantageous to make both true and false tracks on the slice blocks. This recognition allows the false tracks to deceive an intruder and prevents the use of tension. After trying a possibility, the intruder needs to reset the device to its default position and start all over again; if the intruder uses excessive force, the push-bar may even break, meaning that the attempt to crack the lock is prevented.

According to the above purpose, the most general implementation form of the solution according to the invention is described in claim 1. The most general form of the procedure of use is described claim 11. The individual implementation forms are described in the subclaims.

In general, the solution is a lock mechanism that has one or more keyholes, a key fitting into the keyhole, spring, axis, a pusher or cogwheel rotating the axis, and at least one stud. It is a feature of the invention that a slice block and a true track allowing the opening of the lock is assigned to the stud, that each slice block has a push-bar, and the slice block has a false track that allows the stud to turn partially sideways, as well as a true track that allows the stud to turn sideways all the way.

Another implementation form may be where the slice block includes the true track, the false track, and a main track that is suitable for moving the stud and has the same direction as the axis track. Another implementation form may be where there is at least one cylinder lock and the cylinder lock is connected to the input unit.

It may be another feature that the keyhole has at least one pin inside the keyhole that leads the key.

It may be another feature that the key has a cylinder lock feather and/or bore and/or key track and/or key cog.

Another implementation form may be where there are spring rods that move the slice block, a rotating rod that rotates the slice block, and a moving shield and a stationary shield. Another implementation form may be where the spring is fitted with a bumper bolt, the axis has an axis track, the push-bar and the spring are located in the axis track, and the stud is fixed to a stud-rod.

It may be another feature that the device has a lock body, and the input unit of the axis, the keyhole, the spring, the axis, and the push-bar is located in the lock body.

It may be another feature that the pusher is installed in a manner that it holds the entire lock body together.

It may be another feature that the push-bar has a weakened push-bar section.

During the general use of the invention, one or more slice blocks or one or more studs are moved in a position using a key where the stud is in the true track of the slice block, and then it is moved sideways by turning the key and the cogwheel or pusher, and a sense similar to the one given by the true track is given by the false track when a foreign key is inserted, and in case of using a foreign key and/or forced entry, the weakened push-bar section breaks or the rotating rod is driven into a blind hole, thereby preventing burglary.

The use of the invention may be also characterized by the situation where at least one push- bar is moved into a proper position by the bore of the key and/or key cog and/or key track, then bumps into the stud-rod, the spring is pressed, and then the stud is pushed to the true track, and then key, the stud, and the axis is rotated.

The invention is presented in more detail by examples of implementation, using drawings. On the following drawings,

Figure 1 shows a spatial section of the single-sided lock,

Figure 2 shows a spatial section of the two-sided lock,

Figure 3 shows a spatial section of the two-sided lock with a key,

Figure 4 shows an axonometric view of the lock body and the key, Figure 5 shows a spatial section of the inside of the two-sided lock with cylinder lock, Figure 6 shows a spatial section of the two-sided lock with cylinder lock and key,

Figure 7 shows an axonometric view of the inside of the two-sided lock with cylinder lock, Figure 8 shows the spatial drawing of one type of the key,

Figure 9 shows a spatial drawing of the key belonging to the lock mechanism supplemented by the cylinder lock,

Figure 10 shows a spatial drawing of the lock body,

Figure 11 shows a spatial section of the two-sided lock with short lock body supplemented by the cylinder lock,

Figure 12 shows an axonometric drawing of the internal part of the lock mechanism, Figure 13 shows an axonometric image of the push-bar and the stud-rod,

Figure 14/a shows the spatial section of one kind of implementation of the stud-rod,

Figure 14/b shows the axonometric image of one kind of implementation of the stud-rod, Figure 15/a shows the spatial section of another kind of implementation of the stud-rod, Figure 15/b shows the axonometric image of another kind of implementation of the stud-rod, Figure 16 shows the axonometric image of the axis,

Figure 17 shows the axonometric image of the slice block,

Figure 18 shows the axonometric image of the weakened push-bar section,

Figure 19 shows the axonometric image of one kind of implementation of the axis,

Figure 20 shows the axonometric image of a segment of the slice block,

Figure 21 shows the spatial section of the two-sided lock with cylinder lock and a modified keyhole,

Figure 22 shows also the spatial section of the two-sided lock with cylinder lock and a modified keyhole,

Figure 23 shows the spatial view of the lock body of the two-sided lock with a cylinder lock,

Figure 24/a shows the spatial view of one type of the stud-rod,

Figure 24/b shows the spatial view of one type of the stud-rod,

Figure 24/c shows the spatial view of one type of the stud-rod,

Figure 24/d shows the spatial view of one type of the stud-rod,

Figure 25 shows the axonometric view of the pusher,

Figure 26 shows the longitudinal section of the pusher,

Figure 27 shows the spatial view of one type of the key. Figure 1 shows a spatial section drawing of the design of the one-sided lock mechanism. The lock mechanism is opened by the movement of the cogwheel 6. There are cogwheel bores 37 on the cogwheel 6, which play a role in driving the cogwheel 6. There are pins 2 in variable places and variable number in the keyhole 1. The pins 2 are responsible for leading the key. When a key is inserted into the keyhole 1, it is pressed forward until it reaches and then presses forward the moving shield 3. As the moving shield 3 is moving backward, the push- bars 13 hook into the various key bores, depending on the depth of the bores. In accord with the movement of the moving shield 3 moved by springs, the push-bars 13 are also pressed backward, and arrange the slice blocks 5 in proper position for opening. One push-bar 13 is assigned to each slice block 5. The push-bars 13 press the slice blocks 5 backward until their rotating rods 7 go into the cogwheel bores 37 and become capable of driving the cogwheel 6. At this point, the key can turn the cogwheel 6 both to the left and to the right, so the lock can be opened easily. The bearing 11 serves as support for the rotating movement. The lock mechanism is rendered secure and nearly unbreakable by the design of the slice blocks 5. There is a stationary shield 4 behind the moving shield 3, which includes four slice blocks 5. The slice blocks 5 are held by spring rods 9. The spring rods 9 are in fixed position in the stationary shield 4, and the slice block 5 slide on them. The slice block 5 can be pressed forward by the key, but it is returned to the default position by the spring rods 9 when the key is removed. The slice blocks 5 are placed around an axis 8 with studs 12. Four studs 12 are also associated with the given slice blocks 5, since the proper slice block 5 must turn around the stud 12. The entire lock mechanism is located in a lock body 10. There are blind holes 15 in the end of the lock body 10 that serve security purposes. If the push-bars 13, as well as the rotating rods 7 that turn the slice blocks 5 are forced beyond the cogwheel bores 37, the rotating rods 7 slide into these blind holes 15 and break, thereby preventing the opening of the lock.

Figure 2 shows that the secure lock mechanism is capable of functioning as a two-sided lock that is used in real life multiple times. It has the same operating principles. In this implementation form, support is provided on both sides by a support ring 21. There are two keyholes 1 on the lock body 10, so the lock mechanism can be opened on two sides. The axis 8 turns with the key, since it is supported by the support ring 21 on both sides. The cogwheel 6 rotates freely on the lock body 10. There are four axis tracks 36 on the axis 8. The slice blocks 5 are located between the support rings 21, which are accompanied by push-bars 13. In other words, if there are four slice blocks 5, then there are four push-bars 13 as well. These push-bars 13 are located in the axis tracks 36, which are connected to stud-rods 18. After inserting the key, the key is first met by the push-bar 13, and then the push-bar 13 bumps into the stud-rod 18. The stud-rod 18 is associated with a stud 12, which needs to be moved to the true track 16 of the given slice block 5. The slice block 5— in contrast with the operation of the lock mechanism— does not move, but the studs 12 are turned below the fixed slice block 5 as the push-bars 13 are pushed into the proper positions. In this case, the push-bars 13 are pushed deeper by the teeth of different length of the key. As the key is pressed forward, the push-bars 13 push the stud-rods 18 with the studs 12, which are pushed to the proper places below the true tracks 16, and the turn. The ends of the stud-rods 18 start the driving process as they are moved into the bores of the cogwheel 6. There is a spring on the solid stud-rod 18, and when the stud-rod 18 is pushed back by the push-bar 13, the spring on it is pushed against the bumper bolt 19. The bumper bolt 19 is open enough for the spring to get stuck by the end of the bolt until the end of the push-bar 13 is moved until the end of the cogwheel 6. Thus, the movement of the spring is limited, restricted by the bumper bolt 19. The slice blocks 5 are designed so that they have a main track 25, a true track 16 and false tracks 17. There is only one true track 16, but, in case of an attempted burglary, the intruder does not know if he has found a false track 17 or a true track 16. On the other hand, opening the lock is prevented even if only one stud 12 is moved into a false track 17. The difference is undetectable, the user does not know how many studs 12 are in a false track 17 or the true track 16.

Similarly to the previous figure, Figure 3 shows a spatial section of the two-sided lock, with a key 20 inserted. Support is provided by a support ring 21 on both sides. The slice blocks 5 are located between the support rings 21. There can be any number of slice blocks 5. The slice blocks 5 are designed to have false tracks 17 as well, in addition to the true track 16. There is only one true track 16, but, in case of an attempted burglary, the intruder does not know if he has found a false track 17 or a true track 16. On the other hand, opening the lock is prevented even if only one stud 12 is moved into a false track 17. The axis 8 turns along with the key 20, since it is supported on both sides by a support ring 21. In this implementation form, there are four axis tracks 36 on the axis 8, and the push-bars are located in these axis tracks 36. The push-bars 13 are connected to a stud-rod 18. The stud-rod 18 has a stud 12, which need to be moved to the true track 16 of the given slice block 5. As the push-bars 13 are pressed to the proper position, the studs 12 turn under the fixed slice blocks 5. The push-bars 13 are pushed deeper by the teeth of different length of the key 20. The ends of the stud-rods 18 start the driving process as they are moved into the bores of the cogwheel 6. The movement of the sprig is limited by the bumper bolt 19. The cogwheel 6 turns freely on the stationary lock body 10. Figure 4 shows the axonometric image of the lock body 10 and the inserted key 20. There are key cogs 22 of varying length inside the key 20, which can push the push-bars inside the lock body 10 into the proper positions. There are key tracks 23 on the outside of the key 20, according to the pins 2 that lead the key 20 inside the keyhole 1.

Figure 5 shows a spatial section of the two-sided lock combined with a traditional cylinder lock 26 for more safety. Thus, the components of the cylinder lock 26 are shown on the two external surfaces of the lock mechanism, including the cylinder lock pin 32, the cylinder lock closing pin 33, and the cylinder lock spring 27. The core of the cylinder lock 26 is fixed to the axis 8. In the course of opening the lock, the core of the cylinder lock 26 turns with the axis 8, and the movement is supported by supporting rings 21. The input unit 24 of the axis 8 is inside the cylinder lock 26. There are axis tracks 36 on the axis 8, which include push-bars 13. The push-bars 13 are connected to stud-rods 18. In this form, the stud-rods 18 are hollow and are operated by a spring 28. The spring 28 is pressed together inside the stud-rod 18 and is limited by the bumper bolt 19 on the other side. The slice blocks 5 are located around the axis 8, which have a main track 25, a true track 16, and false tracks 17. The true track 16 is the only one where the stud 12 can turn and which can open the lock. The combination with a cylinder lock 26 and the use of false tracks 17 make the device highly secure. The bolt of the lock is turned by the pusher 38, which is located between the support rings 21. The pusher 38 is turned by the key and the axis 8 is turning along.

Figure 6 presents the spatial section of the two-sided lock combined with a traditional cylinder lock 26 and shows the key 20 with cylinder lock feather 30 and the lock mechanism. The key is connected to the input unit 24. The cylinder lock feather 30 operates the cylinder lock pin 32, the cylinder lock closing pin 33, and the cylinder lock spring 27, and it moves the studs 12 into the proper positions as well. The studs 12 have different designs, so they can be turned to one given track only, but cannot turn into the tracks of each other. This makes the device even more secure, and the length of the device may be shorter this way. There are axis tracks 36 on the axis 8, which include push-bars 13. The push-bars 13 are connected to stud-rods 18. The stud-rods 18 are hollow and are operated by a spring 28. The spring 28 is pressed together inside the stud-rod 18. In this implementation form, support is provided by a support ring 21 on both sides. The key 20 and the turns the axis 8 and the pusher 38, this is how the lock is opened.

Figure 7 shows the inside of the two-sided lock mechanism with a traditional cylinder lock 26. The components of the cylinder lock 26 are shown on the two external surfaces of the lock mechanism, including the cylinder lock pin 32, the cylinder lock closing pin 33, and the cylinder lock spring 27. The core of the cylinder lock 26 is fixed to the axis 8. In the course of opening the lock, the core of the cylinder lock 26 turns with the axis 8, and the movement is supported by supporting rings 21. The input unit 24 of the axis 8 is inside the cylinder lock 26. There are axis tracks 36 on the axis 8, which include push-bars 13. The push-bars 13 are connected to stud-rods 18. There are studs 12 on the stud-rod 18. The spring 28, which helps the proper positioning of the stud 12, is pressed together inside the hollow stud-rod 18. The key rotates the axis and the pusher 38, the axis of which is identical to the axis 8, thereby opening the bolt of the lock.

Figure 8 shows one type of the key 20. There are key tracks 23 of varying length on the external and internal surfaces of the key 20, and there are bores 29 of varying depth inside. These all help the key to fit into the proper opening.

Figure 9 shows a key 20 with cylinder lock feather 30, which is used with lock mechanisms fitted with a traditional lock.

Figure 10 shows the lock body 10 in an open position. The support ring 31 pocket is clearly visible. A two-sided lock mechanism fitted with a traditional cylinder lock can be placed into this lock body 10 implementation, such as the implementation shown on Figure 6.

Figure 11 shows the shortest two-sided implementation of the lock mechanism. Shortness is allowed by the implementation of the device, as it is fitted with a secure lock mechanism according to this invention from the outside only; from the inside, only a traditional cylinder lock 26 is available, since a traditional lock is sufficient for the inside of a door. There is a pin 2 in the keyhole, which leads the key to be inserted into the lock. The lock is combined with a cylinder lock 26 from the outside to provide enhanced security. Components of the cylinder lock 26 are shown on the two external surfaces of the lock mechanism, including the cylinder lock pin 32, the cylinder lock closing pin 33, and the cylinder lock spring 27. Support is provided on both sides by a support ring 21 in this implementation form as well. The studs 12 of varying form are moved to the proper points of the slice block 5 by the push-bars 13, stud- rod 18, and spring 28. The input unit 24 is located inside the cylinder lock 26. The lock is opened by the pusher 38, which turns with the axis 8.

Figure 12 shows an axonometric image of the inside of the lock mechanism, where the relationship between the push-bars 13 and support rings 21 and the connected components is made visible. The input unit 24 is on the external surface of the support rings 21, which forms part of the axis, and there are axis tracks 36 on it. The stud-rod 18 is connected to the push- bars 13 in the axis tracks 36, which is hollow. The spring 28 can be pressed into this hole, which is stopped by the bumper bolt 19 on the other side. The bumper bolt 19 is pressed into the axis. As the spring 28 is pressed onto the bumper bolt 19, the stud-rod 18 bumps. There are two ratchet-wheels 14 present, which ratchet-wheels 14 encompass a butterfly 34 from two sides. The butterfly 34 can be moved back and forth using the push-bar 13, depending on the direction the key is inserted from. In this example, there are two butterflies 34 in the device, and one of them is already covered inside the input unit 24 of the axis.

Figure 13 shows the push-bar 13 and the stud-rod 18. There are studs 12 on the stud-rod 18. Figure 14/a shows the spatial section of one implementation of the stud-rod 18 and the stud 12 on it, where the stud-rod 18 is shaped as a hollow prism. The stud-rod 18 may have any shape, its function does not change due to the minor external differences.

Figure 14/b shows the axonometric image of the stud-rod 18 and the stud 12 thereon with the same implementation form shown on Figure 14/a.

Figure 15/a shows the spatial section of another implementation of the stud-rod 18 and the stud 12 on it, where the stud-rod 18 is shaped as a hollow prism.

Figure 15/b shows the axonometric image of the stud-rod 18 and the stud 12 thereon with the same implementation form shown on Figure 15/a.

Figure 16 shows the axis 8. There are axis tracks 36 on the axis 8, which include the push-bars 13. The push-bars 13 are connected to the stud-rods 18, which include the studs 12. The stud- rods 18 are operated by spring 28, which spring 28, in this example, is pressed into the hollow stud-rod 18. On the left side of the figure, butterflies 34 are show, surrounded by ratchet- wheels 14. There are two ratchet-wheels 14, which ratchet-wheels 14 surround two butterflies 34 from two sides. The butterfly 34 can be moved back and forth using the push-bar 13, depending on the direction the key is inserted from.

Figure 17 shows the slice block 5, which is held and (in the implementation form where the slice block 5 moves) supported in moving by the spring rods 9. The slice block 5 has a main track 25, a true track 16, and numerous false tracks 17. The false tracks 17 confuse any intruder and make finding the true track 16 and opening the lock rather difficult.

Figure 18 shows the weakened push-bar section 35. The weakened section is made of plastic or other similar material that allows the part to break in case of forced entry, thereby preventing the lock from opening. The drawing also shows the springs 28 and studs 12.

Figure 19 shows the axonometric drawing of one type of implementation of the axis 8, where there are six axis tracks 36 on the axis 8.

Figure 20 shows the axonometric image of one section of the slice block 5. The overarching main track 25, the fully open true track 16, and the false track 17 is clearly visible. Figure 21 shows a two-sided lock mechanism fitted with another type of keyhole 1 than the previous ones and with a cylinder lock 26. The installed pusher 38 rotates the bolt of the lock and is turned by the key. Thus, only the axis 8, the bars in the axis track 36, the studs 12, and the pusher 38 are turned during opening and closing. The spring 28 is also shown in the axis track 36. In this implementation form, support is provided on both sides by a support ring 21. The cylinder lock 26 is located in the same end of the lock body 10 as the input unit 24. The components of the cylinder lock 26, i.e. the cylinder lock closing pins 33 and the cylinder lock springs 27 are located higher, as shown on Figures 5 to 7.

Figure 22 shows the two-sided lock mechanism with a keyhole 1 and a cylinder lock 26 shown on Figure 21, fitted with a pusher 38 implemented in a new form. The pusher 38 holds together the entire lock body 10. This drawing also shows the slice block 5, in which the studs 12 need to be moved to the proper place to open the lock. The push-bars 13 in the axis track 36 of the axis 8 push the studs 12 to the proper place with the help of the spring 28. There is a cylinder lock 26 built into the lock body 10. In the end, the bolt of the lock is turned by the pusher 38, which is located between the support rings 21. The built-in pusher 38 holds the entire lock body 10 together. The components of the cylinder lock 26 include the cylinder lock closing pins 33 and the cylinder lock springs 27. The special keyhole 1 is located in the input unit 24 of the axis 8. This implementation is one of the most secure lock mechanism from the ones described above. The trade-off in this implementation is the fact that the lock is approximately 100 millimeter long, so there is a minimum door thickness required for using this lock mechanism.

Figure 23 shows a spatial image of the lock body 10 and the pusher 38. The pusher 38 holds together the entire lock body 10. The drawing shows the pusher 38 and the accordingly designed lock body 10 that was shown on Figures 25 and 26.

Figures 24/a to /d show the implementation of the stud-rod 18. The studs 12 on the stud-rod 18 are in varying positions.

Figure 25 shows a spatial image of the pusher 38. The structure of the pusher 38 holds together the entire lock body. The design of the pusher 38 prevents the breaking of the lock, and may be also used in existing traditional lock, as it can make such lock unbreakable as well.

Figure 26 shows a section of the pusher 38 shown on the previous figure.

Figure 27 shows a key 20 of normal size and type, which is nevertheless special and fit for being used with the invention. In this implementation form, the key 20 with a cylinder lock feather 30 has four key cogs 22 and is capable of opening the lock mechanism shown on Figures 21 and 22.

The presented devices have numerous advantages. The most important advantage of the invention is that, due to its structural implementation, it prevents burglary and unauthorized intrusions. This is because false tracks are implemented in the slice blocks that mislead burglars easily. Unauthorized intrusion without any damage would only be possible if the attempts would follow each other in a conscious serial order. The meaning of conscious serial order is that there are approximately 800 possibilities for each lock and the 125 th variation opens the lock. If the intruder skips this 125 th position for any reason, trying the other 800 possibilities would be useless, because the lock would not open due to missing the 125 th position. It is easy to have 800 variations for a single lock; this figure may be even doubled or tripled, as the true tracks may have any arbitrary position. If only a single stud is turned into a false track, the intrusion is already prevented. As all four slice blocks need to be tried simultaneously, the intruder does not know which stud is turned into a false track, and he does not known the number of studs in the right and in a false track, either. Another advantage of the device is its simple mechanism. Its security and excellent opening and closing mechanism is not due to any elaborate or complicated manufacturing and technical procedures, but they are due to the simple form and structure of the lock itself. It is a significant advantage that the lock mechanism may be used as a one-sided or two-sided lock, may be fitted with various keyholes, and even may be used in combination with a traditional cylinder lock. A pusher or a cogwheel may be used in the lock, according to the type and kind of the stamping lock holding the insert, of the cylinder lock, etc. Another advantage of the secure lock mechanism is that an unauthorized intruder cannot use pressure, but needs to return to the default position after trying a possibility and needs to find a new possibility.

In addition to the above examples, the invention may be implemented within the scope of protection in other forms and with other manufacturing procedures.