Theft-proof electronic cipher lock
An electronic password and anti-theft lock technology, applied in the field of electronic password anti-theft locks, can solve the problems of poor anti-theft performance, unsatisfactory anti-theft effect, and unsturdy and durable locks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] An electronic password anti-theft lock, such as figure 1 As shown: the structure includes: the lock housing and the lock cylinder that match it. The lock cylinder is composed of four metal discs with the same diameter and two insulating discs with the same diameter as the above metal disc. The first metal disc 1. A second insulating disc 2 is arranged between the third metal discs. The structures of the above three discs are exactly the same, and at least two series of mutually symmetrical three-through holes 101, 201 are arranged on the radii of the three discs. 301, the lower layer of the third metal disc 3 is the fourth insulating disc 4, the fourth insulating disc 4 is provided with a through hole 401 and the above-mentioned first metal disc, the third metal disc 1, 3 and the second insulating disc The holes in the middle of the series of holes on the disk 2 correspond to each other and have the same diameter; the bottom of the fourth insulating disk 4 is provided w...
Embodiment 2
[0047] Its structure is basically the same as that of Embodiment 1, the difference is that: the first metal disc 1, the second insulating disc 2 and the third metal disc 3 adopt 8-20 string holes, and the long Use 1 pin, use 1-18 short pins, and use 4-16 N-shaped pins, such as Figure 15 Shown, its setting password and assembly locking and unlocking mode are the same as above, and will not go into details here.
[0048] Experiments have proved that the password range of the present invention is very wide, and the user can set up a virtual password by himself, thereby being safe and reliable, and convenient for the user.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 