ES2799936A1 - Manufacturing procedure in detail of a physical key from a digital key without the need for the original key or vice versa (Machine-translation by Google Translate, not legally binding) - Google Patents
Manufacturing procedure in detail of a physical key from a digital key without the need for the original key or vice versa (Machine-translation by Google Translate, not legally binding) Download PDFInfo
- Publication number
- ES2799936A1 ES2799936A1 ES201900100A ES201900100A ES2799936A1 ES 2799936 A1 ES2799936 A1 ES 2799936A1 ES 201900100 A ES201900100 A ES 201900100A ES 201900100 A ES201900100 A ES 201900100A ES 2799936 A1 ES2799936 A1 ES 2799936A1
- Authority
- ES
- Spain
- Prior art keywords
- key
- digital
- physical
- keys
- digital key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B23—MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
- B23C—MILLING
- B23C3/00—Milling particular work; Special milling operations; Machines therefor
- B23C3/28—Grooving workpieces
- B23C3/35—Milling grooves in keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Life Sciences & Earth Sciences (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Mechanical Engineering (AREA)
- Storage Device Security (AREA)
Abstract
Description
DESCRIPCIÓNDESCRIPTION
Procedimiento de fabricación al detalle de una llave física a partir de una llave digital sin necesidad de la presencia de la llave original y viceversaManufacturing procedure in detail of a physical key from a digital key without the need for the original key and vice versa
Objeto de la invenciónObject of the invention
La presente invención, según expresa el enunciado de esta memoria, se refiere a un procedimiento de fabricación al detalle de la llave de una residencia o cualquier vehículo donde no sería necesario que el cliente tuviera la llave original para realizar la copia de la misma, nosotros desde la llamada "llave digital" que se genera en un software a partir de una serie de datos como modelo de la llave y código de corte esta información permanecerá en un lugar encriptado en la nube o base de datos donde la información de la llave se asocia únicamente a una clave que se genera exclusivamente en el móvil del cliente, impidiendo que nadie que pudiera acceder ilegalmente o legalmente a la zona encriptada, no podría averiguar jamás a que persona o edificio pertenece una llave digital con la información sensible para poder realizar una copia mecánica de una llave física, y además se puede almacenar miles y miles de llaves digitales en un mínimo espacio a forma de guardería como grandes empresas que contratan este servicio, cadenas, hoteles, etc., pero conlleva grandes naves llenas de llaves físicas para poder reponerlas en cualquier momento porque la empresa cada vez que entrega una copia del almacén la repone inmediatamente de manera física, de esta manera con la llave digital no hay que tener stock de llaves a copiar, sino crear llaves digitales de todas ellas y solo hacer físicamente las que se vayan perdiendo y no tener mínimo 3 llaves físicas por cada unidad.The present invention, as expressed in the wording of this report, refers to a detailed manufacturing procedure of the key to a residence or any vehicle where it would not be necessary for the client to have the original key to make a copy of it, we From the so-called "digital key" that is generated in a software from a series of data such as the key model and cutting code, this information will remain in an encrypted place in the cloud or database where the key information is stored. It only associates a key that is generated exclusively on the client's mobile phone, preventing anyone who could illegally or legally access the encrypted area from ever finding out to which person or building a digital key with sensitive information belongs to be able to carry out a mechanical copy of a physical key, and in addition thousands and thousands of digital keys can be stored in a minimum space as a nursery like large companies that contract this service, chains, hotels, etc., but it involves large warehouses full of physical keys to be able to replace them at any time because the company every time it delivers a copy of the warehouse, it immediately replaces it physically, in this way with the key digital you do not have to have a stock of keys to copy, but create digital keys from all of them and only physically make the ones that are lost and not have at least 3 physical keys for each unit.
Otro objeto de esta invención es poder llevar el negocio del duplicado de llaves que tradicionalmente se realiza de forma presencial en la tienda pues el cliente tiene que llevar una copia física para copiarla. Con el procedimiento de la llave digital se podría realizar el servicio online sin necesidad que el cliente se mueva de su casa. Ni de tener la llave original con cual hacer la copia.Another object of this invention is to be able to carry out the business of duplicating keys that is traditionally carried out in person at the store, since the customer has to carry a physical copy to copy it. With the digital key procedure, the online service could be performed without the need for the client to move from home. Nor to have the original key with which to make the copy.
También este procedimiento se puede convertir en un seguro de prevención, para no perder completamente más las llaves nunca, pudiendo acceder a la llave física extraviada en el momento que quieras con solo una clave que puedes solicitar sin límite a el móvil del propietario de la misma.This procedure can also be converted into a prevention insurance, so as not to lose the keys completely anymore, being able to access the lost physical key at any time you want with only one key that you can request without limit from the mobile phone of the owner of the same .
Campo de aplicaciónScope
Este procedimiento de la llave digital se puede aplicar en multitud de campos como:This digital key procedure can be applied in a multitude of fields such as:
1. En el almacenamiento de grandes cantidades de llaves para grandes empresas (guarderías de llaves etc.)1. In the storage of large quantities of keys for large companies (key stores etc.)
2. En la posibilidad de poder desarrollar el tradicional comercio de duplicado de llaves de forma online sin necesidad de la presencia del cliente ni de la llave física que se ha de copiar.2. In the possibility of being able to carry out the traditional key duplication trade online without the need for the customer or the physical key to be copied.
3. En el campo de las aseguradoras o en la de prevención de pérdidas, porque con el sistema de la llave digital nunca se pierde definitivamente y es una solución para proteger tus llaves más importantes, que en causa de perdida nos suelen causar mayor trastornos de lo esperado tanto económicamente como vitalmente. 3. In the field of insurance or loss prevention, because with the digital key system it is never lost definitively and it is a solution to protect your most important keys, which due to loss usually cause us greater disturbances of what is expected both economically and vitally.
Antecedentes de la invenciónBackground of the invention
Las utilidades que ofrece el procedimiento de fabricación de una llave (residencial o vehículo) a partir de una llave digital son muchísimas, puedes ofrecer dentro del oficio tradicional de duplicados de llaves la posibilidad de desarrollarlo vía online, pues el sistema de llave digital consiste en vectorizar una llave y extraer su código de corte tanto en llaves residenciales como automóvil que junto a otra serie de datos configurarían una llave digital capaz de servir de matriz para realizar a través de una máquina electrónica su duplicado original, sin necesidad de la presencia del cliente, ni de la llave física pues el código de corte se puede descifrar además de con la llave física con el método del palpeo o con un modo de escaneo 3D (a través del software y la aplicación que genera las claves) a tamaño real de la llave.The utilities offered by the procedure of manufacturing a key (residential or vehicle) from a digital key are many, you can offer within the traditional trade of duplicating keys the possibility of developing it online, since the digital key system consists of vectorize a key and extract its cutting code in both residential and automobile keys that together with another series of data would configure a digital key capable of serving as a matrix to make its original duplicate through an electronic machine, without the need for the customer's presence , nor the physical key since the cutting code can be deciphered in addition to the physical key with the probing method or with a 3D scanning mode (through the software and the application that generates the keys) at the real size of the key.
Descripción de la invenciónDescription of the invention
El procedimiento de fabricación de una copia de llave física al detalle a partir de una llave digital donde se encuentran todos los datos necesarios como código de corte y modelo en residencial y código de corte modelo de coche PIN y número de bastidor en vehículos, estos datos podemos conseguirlos por dos métodos 1- el método de palpeo a través de una máquina electrónica que vectoriza la llave original (con este método es necesaria la presencia física de la llave original, pero esa sería la única vez después su llave digital quedaría almacenada en una base de datos de alta seguridad con sistema encriptado, con la tranquilidad que lo único que se encuentra en esa base de datos son códigos de corte asociados a claves imposibles de relacionar con personas, pudiendo almacenar con facilidad grandes cantidades de llaves. 2- el método de escaneo 3D a través de la aplicación que genera la clave personal tantas veces quiera en el móvil del dueño, este método no requiere la presencia física de la llave pues el modo de escaneo 3D y la tecnología 5G nos facilita el código de corte volviendo a vectorizar la llave digitalmente de esta manera quedaría la posibilidad de abrir el comercio online a este gremio tan tradicional, de tal manera que todo cliente podría tener una llave digital, de sus llaves más importantes y en caso de pérdida solicitar un duplicado al coste del duplicado, evitando cerrajeros y costes mayores, la comodidad del cliente ordinario de poder pedir copias de su llave sin moverse de casa, o los grandes almacenes que actúan a modo de guardería por perdida almacenando tres llaves de cada clase que han de guardar utilizando grandes cantidades de espacio físico y material.The procedure of manufacturing a copy of a physical key in detail from a digital key where all the necessary data are found such as cut code and model in residential and cut code car model PIN and chassis number in vehicles, these data We can achieve them by two methods 1- the probing method through an electronic machine that vectorizes the original key (with this method the physical presence of the original key is necessary, but that would be the only time afterwards your digital key would be stored in a High security database with an encrypted system, with the peace of mind that the only thing found in this database are cut codes associated with keys that are impossible to relate to people, being able to easily store large amounts of keys. 2- the method of 3D scanning through the application that generates the personal key as many times as you want on the owner's mobile, this method does not require the physical presence of the key because the 3D scanning mode and 5G technology provide us with the cutting code by re-vectorizing the key digitally in this way would be the possibility of opening online commerce to this very traditional union, in such a way that every client could have a digital key, of your most important keys and in case of loss request a duplicate at the cost of the duplicate, avoiding locksmiths and higher costs, the convenience of the ordinary customer of being able to request copies of their key without leaving home, or the department stores that operate as a lost nursery by storing three keys of each class that must be kept using large amounts of physical space and material.
Descripción de los dibujosDescription of the drawings
Para complementar la descripción que se está realizando se acompañan como parte integrante de dicha descripción esquema donde con carácter ilustrativo y no limitativo se representan los elementos que participan en el objeto de la presente invención mediante el modo de escaneo 3D a través del móvil.To complement the description that is being made, a diagram is attached as an integral part of said description where, for illustrative and non-limiting purposes, the elements that participate in the object of the present invention are represented by means of the 3D scanning mode through the mobile.
La figura número 1, muestra un diagrama del procedimiento de fabricación de una llave física a partir de una llave digital, en primer lugar tenemos la llave (1) que queremos copiar y se encuentra en Madrid mediante el software de la aplicación móvil (2) o mediante la web acondicionada puedes escanear en 3D la llave original vectorizarla y conseguir el código de corte más el modelo de espada y a esa información que contiene toda lo necesario para realizar una copia física al detalle le denominamos "llave digital" (3) esa llave digital (3) será automáticamente mandada a una base de datos encriptada (5) y se le asociará un numero de clave que únicamente se generará en el móvil (1) del cliente, a la vez que introduciendo el número de corte y el modelo de la llave digital (3) en una máquina electrónica de copia de llaves como puede ser la (C9) te realizará la llave original en Valencia o donde sea en cuestión de minutos. Figure number 1 shows a diagram of the procedure for manufacturing a physical key from a digital key, first we have the key (1) that we want to copy and it is found in Madrid using the mobile application software (2) or through the conditioned web you can scan the original key in 3D, vectorize it and get the cutting code plus the sword model and that information that contains all the necessary to make a physical copy in detail we call it "digital key" (3) that key digital (3) will be automatically sent to an encrypted database (5) and will be associated with a key number that will only be generated on the client's mobile (1), while entering the court number and the model of the digital key (3) in an electronic key copy machine such as (C9) will give you the original key in Valencia or wherever in a matter of minutes.
Realización preferente de la invenciónPreferred embodiment of the invention
A la vista de las figuras reseñadas puede observarse que "el procedimiento de fabricación de llave física al detalle" está compuesta de los siguientes elementos un software (2) que cualquier usuario puede descargarse en el móvil o mediante nuestra web con las características de escanear en 3D y vectorizar la llave y descifrar modelo y código de corte dando lugar a lo que denominamos "llave digital" (3) o matriz digital mandando esta información a una zona digitalmente segura (5) y asociando cada llave digital (3) a una clave que únicamente se genera en el móvil del propietario de la llave (2) con la llave digital (3) se puede fabricar una copia al detalle en una máquina electrónica (5) de copiado de llaves dando igual donde se encuentre esa máquina. In view of the figures outlined, it can be seen that "the physical key manufacturing procedure in detail" is composed of the following elements, a software (2) that any user can download on the mobile or through our website with the characteristics of scanning in 3D and vectorize the key and decipher the model and cutting code giving rise to what we call "digital key" (3) or digital matrix sending this information to a digitally secure area (5) and associating each digital key (3) with a key that is only generated on the key owner's mobile phone (2) with the digital key (3), a detail copy can be made in an electronic key copy machine (5) regardless of where that machine is located.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ES201900100A ES2799936A1 (en) | 2019-06-19 | 2019-06-19 | Manufacturing procedure in detail of a physical key from a digital key without the need for the original key or vice versa (Machine-translation by Google Translate, not legally binding) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ES201900100A ES2799936A1 (en) | 2019-06-19 | 2019-06-19 | Manufacturing procedure in detail of a physical key from a digital key without the need for the original key or vice versa (Machine-translation by Google Translate, not legally binding) |
Publications (1)
Publication Number | Publication Date |
---|---|
ES2799936A1 true ES2799936A1 (en) | 2020-12-22 |
Family
ID=73835272
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ES201900100A Withdrawn ES2799936A1 (en) | 2019-06-19 | 2019-06-19 | Manufacturing procedure in detail of a physical key from a digital key without the need for the original key or vice versa (Machine-translation by Google Translate, not legally binding) |
Country Status (1)
Country | Link |
---|---|
ES (1) | ES2799936A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4899391A (en) * | 1988-06-24 | 1990-02-06 | Cimino William J | Automatic key identification system |
US20020022901A1 (en) * | 2000-06-02 | 2002-02-21 | Machine Magic, Llc | Key identification code and manufacturing method |
US6647308B1 (en) * | 1997-07-29 | 2003-11-11 | Ronald Martin Prejean | Key manufacturing method |
US20070003388A1 (en) * | 2005-07-01 | 2007-01-04 | Shing-Hwa Doong | Method to make a copy of a key from stored data |
-
2019
- 2019-06-19 ES ES201900100A patent/ES2799936A1/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4899391A (en) * | 1988-06-24 | 1990-02-06 | Cimino William J | Automatic key identification system |
US6647308B1 (en) * | 1997-07-29 | 2003-11-11 | Ronald Martin Prejean | Key manufacturing method |
US20020022901A1 (en) * | 2000-06-02 | 2002-02-21 | Machine Magic, Llc | Key identification code and manufacturing method |
US20070003388A1 (en) * | 2005-07-01 | 2007-01-04 | Shing-Hwa Doong | Method to make a copy of a key from stored data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2267251T3 (en) | METHOD TO GUARANTEE THE SECURITY OF ELECTRONIC INFORMATION. | |
CN111130808B (en) | Cross-chain asset mapping method and system for block chain | |
JP4897704B2 (en) | Controlling data exchange | |
CN108519981B (en) | Cross-chain intelligent contract cooperation possibility evaluation method | |
Middleton | A history of cyber security attacks: 1980 to present | |
JP6498123B2 (en) | Digitally protected electronic titles for supply chain products | |
CN104408485A (en) | Identity card and reading-writing device thereof | |
US20140137260A1 (en) | Privacy Preserving Statistical Analysis for Distributed Databases | |
JPH0299984A (en) | Certifying device and certifying method | |
IL161943A0 (en) | Portable device and method for accessing data key actuated devices | |
CN101676923A (en) | Biometric processing using random projection transforms | |
CN105225314A (en) | A kind of dynamic two-dimension code door control system based on pseudo-random sequence | |
CN110225000A (en) | A kind of data processing and Transmission system based on block chain technology | |
ES2692435T3 (en) | Security token and system and procedure for generating and decoding the security token | |
ES2799936A1 (en) | Manufacturing procedure in detail of a physical key from a digital key without the need for the original key or vice versa (Machine-translation by Google Translate, not legally binding) | |
Sundari et al. | Secure multi-party computation in differential private data with Data Integrity Protection | |
US8601606B2 (en) | Computer recovery or return | |
Monday et al. | Security and safety planning in slum areas of Jimeta, Adamawa State, Nigeria | |
US20160205292A1 (en) | Fingerprint Emulator | |
CN115967497A (en) | Electronic voting verification method and device and electronic voting system | |
Kadam | Personal business continuity planning | |
WO1996008793A2 (en) | Identifier | |
ES2530211A1 (en) | Automated system for storing personal items (Machine-translation by Google Translate, not legally binding) | |
Blumenthal | Thinking like a lawyer: why you or your IT team needs to keep your software systems up-to-date | |
Vanderose et al. | Privacy by design and administrative efficiency in e-governance: a case study |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
BA2A | Patent application published |
Ref document number: 2799936 Country of ref document: ES Kind code of ref document: A1 Effective date: 20201222 |
|
FA2A | Application withdrawn |
Effective date: 20210406 |