Latching theft design intentions and ideas

The latch is forbidden - there is no mechanical lock that is technically open. Adopting the latest scientific research achievements of Tsinghua University, the invention has become the forefront of the international lock industry in the field of restraint technology opening. The functional features of the various technical structures are detailed below:
Technological innovation one:
   A key latch (hereinafter referred to as a latch) covering the key slot is provided at the top end of the lock cylinder, and the front end is always in the position of the cover key slot, and the rear end is kept flush with the outer peripheral wall surface of the lock cylinder; the lock sleeve is provided with a convenient latch The sheet retracts the displacement of the latch pin hole and ambushes the lock function. The key is provided with a perforation that facilitates the latching of the latch.
   When opened, the key pushes the latch and the lock cylinder into the key slot in turn. During the process, the latch is forced to retreat and the tail enters the latch pin hole (while giving way, a weight is added between the lock cylinder and the lock sleeve) The latch is locked. When the key reaches the positioning point, the latch is retracted and the key hole is inserted (the latch is released immediately), and the key teeth are engaged with the marble. Turn the key to drive the lock cylinder and open the dial to rotate and open the lock.
Design Intent: To effectively prevent the insertion of foreign bodies and the empty play of marbles.
   A key latch that always covers the key slot is provided between the key inlet and the lock cylinder to effectively prevent the foreign matter from being inserted. Set a theoretical obstacle to the technical opening of locks. The latch is usually only responsible for covering the closed key slot. When there is a foreign object that wants to enter the key slot to contact the pin, the latch that closes the key slot must be pushed first. In design, the slight displacement of the latch will cause the tail to enter. The lock covers its hidden locking function. That is to say: the lock itself is usually only in the state of the bullet lock, and once a foreign object enters the key slot, it will add a re-locking of the latch on the basis of the original pin lock, which makes the pinball become futile.
   The latch locking gap is designed to be smaller than the pin lock clearance, that is, once the latch lock is embodied, the ball is unstressed and is in a "empty dial" state. The two locks are mutually compatible and can coexist at the same time, but cannot be released synchronously, which is enough to restrain the technical opening of the lock.

Technological innovation two:
   Add a tower spring to the inner core of the inner lock cylinder. Always open the lock wheel clutch inside the lock head, so that the outer lock cylinder and the open dial are separated at the moment.
Design intent: to achieve the lock core idle function.
   At the same time as the technology opens a new layer of obstacles, it eliminates the worries of consumers who are afraid of locks and suicide locks.
   First, even if there is a possibility that the plucking marble forces the lock cylinder to move, the opening of the dial does not activate the lock tongue on the mortise lock body, and the lock cylinder is idling. The opening action is invalid. Second, if the outer lock core is suicidally locked, the design can also insert the key from the lock core of the door, smoothly rotate the lock core, and open the lock body.

Technological innovation three:
   In the inner wall of the lock core sleeve, a set of shaped marble holes are added to the necessary path of the layer of marbles during the movement of the lock core, and the T-type suicide marble is filled (ambushed). This setting only allows the lock core with the key to pass through the suicide bomb group safely. Otherwise, the suicide bomb group will forcibly squeeze a layer of marble into the lock core bullet hole before the lock cylinder rotates to affect the lock tongue action, in the lock cylinder and lock Suicide credit sales were carried out between the core sets. Suicide bombs are designed to go back. The lock is exchanged for its own sacrifice (suicide) in exchange for the owner's life and property, and the anti-theft performance of the lock is maximized.
Design Intent: This device strongly prohibits the technical opening of the lock.
   The so-called technical opening, that is, the lock is opened without the key and without damaging the lock. Usually, firstly, a driving force is applied to the lock cylinder of the exposed lock head in the direction of its opening rotation, and then the special key tool such as a tweezers is used to enter the key cylinder of the lock cylinder, and the marbles are sequentially pressed to find the “match”. "When the "coordination" is completed, the external force will be activated at any time, and the lock cylinder will be rotated to open the lock.
   The design combines a set of suicide bombs that are only reversible with one layer of marbles, which are placed in the lock sleeve and on the necessary path of the lock cylinder. Only the key cylinder from which the key is engaged (ie, all the marble holes of the lock cylinder) They are all filled with a layer of marbles to fill the suicide bomber group safely; and the technical opening is impossible to level all the marbles at the same time. However, if you move the marbles one by one to find "coordination", when the last marble is also completed under the foreign object, the lock cylinder starts to rotate, and the suicide bomb will forcefully enter the other under the top bias spring. There is no lock core bullet hole held by the foreign object, and the suicide-type credit of the lock core sleeve for the lock cylinder is completed. The device aims to form a powerful and effective "prohibition of piracy", strengthen the concept of "forbidden piracy", and finally achieve "the war without the war."

Invented innovative ideas:
   The combination of the key technology and the piracy technology has achieved the functional effect of the new technology 1+1>2. Breaking the passive defense of traditional locks, it has the functions of “defensive, counterattack and shock” and successfully changed the result of technical unlocking.
   All human actions are governed by purpose, and the same is true of theft. The purpose is to harm others and benefit others. That is, the result of theft (can be opened) is to harm others and gain profits (theft of property), so some people do; in other words, if the lock is not opened or dialed and the lock is suicide-locked, the lock-up behavior becomes No work, no purpose (to steal property), the result of theft lock becomes a disadvantage to others, and generally no one will do it.
   However, if you encounter a lock-and-lock, the result of the lock will be full of variables, which is extremely dramatic.
The first result: it is also the current general result. It can't cross the "telesphere technology" defense line, and the "dial-locking and ban-proof technology" will keep the bottom line and the locks will be futile;
Another result: it is also the result that may occur in the future. The key line of defense is broken, and the anti-theft lock function is forced to start, that is, suicide lock-up occurs. The result at this time is not only as simple as "futility, failure", but even worse, the lock tool will be trapped in the key slot and cannot be removed. At this point, all efforts to lock the lock are not only useless, but also at the expense of the loss of the lock tool, the result of theft lock becomes a harm to the person, that is, stealing the chicken does not erode the rice, lose the wife and lose the soldiers. This kind of lock seems to be shunned by thieves and will not be touched. The design is powerful and effective against piracy .
   The idea of ​​forbidding theft is not limited to the simplicity of "resistance technology," but changes the result of traditional theft. At the end of the layer of restraint technology is set up an insurmountable "death".
   In fact, no matter whether it is “name” or “profit”, there will always be many people who are willing to work hard to unlock the technical skills without any hard work; but no one would rather sacrifice their time, labor, wisdom, or even unlock tools. Go to the state of putting a good lock to desperate (suicide lock-up).

3020 LED Chip

3020 Led Chip,3020 Light Strips Led Chips,White Color Led Grow Light Bar,3020 Smd Led Chip

Shenzhen Huangtai Photoelectric Co.,Ltd. , https://www.huangtailightstrip.com