CN108140126A - High security key scanning system - Google Patents

High security key scanning system Download PDF

Info

Publication number
CN108140126A
CN108140126A CN201680057803.8A CN201680057803A CN108140126A CN 108140126 A CN108140126 A CN 108140126A CN 201680057803 A CN201680057803 A CN 201680057803A CN 108140126 A CN108140126 A CN 108140126A
Authority
CN
China
Prior art keywords
key
high security
master key
sword
angle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201680057803.8A
Other languages
Chinese (zh)
Inventor
威廉·R·马奇
托马斯·F·菲奥里
兰德尔·A·波拉斯
切斯特·O·D·汤普森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sea Ke Products Co
Hy Ko Products Co
Original Assignee
Sea Ke Products Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sea Ke Products Co filed Critical Sea Ke Products Co
Priority claimed from PCT/US2016/045367 external-priority patent/WO2017024043A1/en
Publication of CN108140126A publication Critical patent/CN108140126A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/66Trinkets, e.g. shirt buttons or jewellery items
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C3/00Milling particular work; Special milling operations; Machines therefor
    • B23C3/28Grooving workpieces
    • B23C3/35Milling grooves in keys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/141Control of illumination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/145Illumination specially adapted for pattern recognition, e.g. using gratings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/56Cameras or camera modules comprising electronic image sensors; Control thereof provided with illuminating means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C2235/00Details of milling keys
    • B23C2235/41Scanning systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23PMETAL-WORKING NOT OTHERWISE PROVIDED FOR; COMBINED OPERATIONS; UNIVERSAL MACHINE TOOLS
    • B23P15/00Making specific metal objects by operations not covered by a single other subclass or a group in this subclass
    • B23P15/005Making specific metal objects by operations not covered by a single other subclass or a group in this subclass keys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/16Image acquisition using multiple overlapping images; Image stitching

Abstract

Provide a kind of high safety key scanning system and method.The scanning system can include being configured to determine that the information of main high security key and the sensing device further of feature and analyze the information of master key and the Digital Logic of feature.Sensing device further can be configured as the information for the geometry for capturing the feature about incision in master key surface.Logic can analyze the information in relation to the geometry, and its known feature with the high security key pattern is compared, to determine that the data needed for this feature are replicated on new high security key billet.The system can be configured as carrys out catch surface geometry using camera or other imaging devices.The system can capture desired feature using object coating technology, irradiation technique, filtering technique, image processing techniques and Feature Extraction Technology.

Description

High security key scanning system
Cross reference to related applications
Entitled " the High Security Key Scanning System " that this application requirement was submitted on the 3rd in August in 2016 American invention application number 15/227,619 and entitled " the High Security Key that are submitted for 3rd in August in 2015 The priority of the U.S. Provisional Patent Application No. 62/200208 of Scanning System " is incorporated into this by whole reference Text.
Technical field
The invention is generally directed to the instrument and method replicated to key, and more specifically, the invention relates to And for reading the specific characteristic in the surface for the sword for being cut into key (such as high security key) simultaneously using electronic device The data are optionally provided to the instrument and method of key duplication machines.
Background technology
Key reproduction technology for standard single sided key and double-sided key is well-known.In general, utilize this field In known any number of different system key (master key) to be copied is replicated on the key billet suitably identified.So And there are broad range of high security lockset and key type, wherein, lockset, which is specifically designed, to be difficult to disclose out, and key Spoon, which is specifically designed, to be difficult to replicate.It is usually considerably complicated for replicating the process of high security key as a result, and need high Expensive and complicated key-cut equipment.In addition, being successfully, reproduced for high security key usually requires that pinpoint accuracy, so as to correctly Operate lockset.Because all these are constrained, high security key is successfully, reproduced usually that also requirement is done some training very often and experience is rich Rich personnel such as locksmith.
There are many different types of high security locksets and keys.For example, some require the tooth in sword to cut with difference Compound angle is cut.These angled cuttings are so that replicating the duplication on equipment in standard key is less likely.High safety Property key the other types unique surface feature for not fully penetrating key blade that includes being cut into key blade it is (such as internal Cutting, rattle snake (sidewinder, also referred to as laser cutting), scrobicula) and side lever key.Again, such cutting is so that marking The duplication that quasi- key is replicated on equipment is less likely.The high security key of other types verifies key using electronic responder Spoon.Such electronic device requires equipment special to read and duplicate acknowledgement device function.Also exist and utilize non-standard sword geometry The high security key of (such as cross or tubulose) and other unique sword style types.The geometry of these keys and cutting Pattern all requires dedicated replicate to equip.There are being permitted for all these types and other kinds of high security lockset and key Multiple changing type, because it is by many different lockset manufacturer productions for many years.Some even with more than one type high safety Property feature, to declare the safety of higher level.
Due to complexity, broad range of expensive duplication equipment and need to go deep into all these of experience and knowledge, it is high The duplication of security key is mainly limited to locksmith market.Due to these are similary, retail key-cut clothes are provided Other shops (such as hardware store, house fitting-up shop and auto-parts shop) of business can not provide these services.Drop It is next that the cost of low equipment and the system for reducing level of skill needed for duplication high security key replicate industry for retail key Saying will be very valuable.
Invention content
Provide a kind of high security key scanning system.The scanning system includes being configured to determine that main high security key The Digital Logic (logic) of the information and feature of the information of spoon and the sensing device further of feature and analysis master key.Sensing device further can To be configured as capturing the information of the geometry about the feature being cut into master key surface.The logic can have been analyzed It closes the information of the geometry and is compared the known feature of its pattern with the high security key, to determine new High security key billet on replicate this feature needed for data.
In embodiment, which can be configured as is surveyed using imaging system (such as camera or other imaging devices) Measure morphology.The system can utilize object coating technology, irradiation technique, filtering technique, image processing techniques and Feature Extraction Technology measures desired feature.
In one embodiment, as shown in the figure, a kind of high security key scanning system is provided, including being configured as Capture the imaging device of at least one image of the part of the first side of the sword of high security master key.First light source can be by It is positioned as guiding first side of the light towards the sword of the high security master key at image space with first angle.Second light Source can be positioned as guiding light towards the first side of the sword of the high security master key at image space with second angle Face, wherein, the image being captured discloses the surface characteristics being formed in at least part of face of the sword.Logic Analysis at least one image being captured is can be configured as, the characteristics of to determine the surface characteristics.Logic can be with The feature of the surface characteristics and the cutting code data of known lockset pattern are compared.The cutting code data can To include at least one of the size of space and cutting position.The logic can determine at least the one of the high security master key A cutting position or at least one cutting code.Cutting position or the cutting code can be used to copy height from key billet Security key.High security master key can be rattle snake key.First light source and second light source can be controlled as individually It is turned on and off, to direct light on the surface of high security master key.Imaging device can be captured each from difference Irradiate the multiple images of the high security master key of scene.
Backlight can be positioned as guiding light towards the second side opposite with the first side of the sword of high security key Face, the backlight can be configured for being used together with logic, and the logic is one or more of following for determining:Identification The orientation of master key is fixed and determined to master key type, verification master key whether.In first light source and second light source at least One can guide collimated light towards image space.High security key can include being formed on the high security master key The sword on lines (pathway).The logic can analyze the feature of the surface characteristics, to determine described The lines formed on master key surface.Lines through determining formation can be used to replicate the main key of high security on key billet Spoon.
In one embodiment, third light source can be positioned as guiding light towards the height at image space with third angle The first side of the sword of safety master key, and the 4th light source can be positioned as with fourth angle guiding light towards into The first side of the sword of high security master key at image position.First angle, second angle, third angle and fourth angle Degree can be differed relative to the horizontal axis of image space.
In another embodiment as depicted, a kind of method for scanning high security master key is provided, it is described Method is included from the surface characteristics in the first side of sword that first angle irradiation is formed on the high security master key.It can With from second angle irradiation be formed on the high security master key the first side of the sword on surface characteristics, first Angle and second angle can be differed relative to horizontal imaging position axis.The sword of the high security master key can be captured Illuminated surface a part at least one image.The characteristics of can determining the surface characteristics.It can be by the surface The characteristics of feature and the cutting code data of known lockset pattern are compared.It can determine at least the one of the master key A cutting code.The master key can be replicated using at least one cutting code.
In one embodiment, the step of irradiating surface characteristics from first angle can be provided by first light source, and The step of irradiating surface characteristics from second angle can be provided by second light source, wherein, the first light source and second light source It is controlled as being turned on and off before at least one image is captured, to create different irradiating angles.Respective tool can be captured There are the multiple images of different irradiation scenes.Surface characteristics can be determined with logic, which is configured as analysis with described The multiple images of difference irradiation scene.Surface characteristics can include the lines being formed on the sword of master key.It can incite somebody to action The characteristics of surface characteristics and the cutting position data of known lockset pattern are compared.At least one cutting position can be by It determines for the master key.Cutting position can be represented that the measured value is determined by logic by physical measurements values.It can lead to It crosses and replicates high security master key using the measured value.It is the characteristics of surface characteristics can be analyzed, described to measure The lines formed on the surface of high security master key.The main key of the high security can be replicated by using the measured value Spoon.Back lighting can be used to irradiate high security master key, and can identify associated with high security master key Suitable key billet.
Description of the drawings
By reference to combine be illustrated below understand below detailed description, may be better understood the purpose of the present invention and The operation of advantage and the present invention, wherein:
Fig. 1 shows the example for the standard cutting key that equipment is replicated using traditional keys;
Fig. 2 shows the examples for utilizing the high security key for being cut into the feature in sword surface;
Fig. 3 shows the example of the high security key of typical internal cutting, and has highlighted geometry to be measured;
Fig. 4 A are the rear perspective views of the decomposition of the embodiment of scanning system, which, which is configured as capturing, is cut into height The image of the shape of feature in security key sword surface;
Fig. 4 B are the exploded front perspective views of the scanning system of Fig. 4 A, which, which is configured as capturing, is cut into high safety The image of the shape of feature in property key blade surface;
Fig. 5 is the perspective view of the embodiment of scanning system, wherein it is possible to reduce high security using object coating technology Spectral reflectance (spectral reflection) on key blade surface;
Fig. 6 A show the vertical view of high security key blade being imaged with the irradiation technique that collimated illumination is not used;
Fig. 6 B show the vertical view of the high security key blade of Fig. 6 A, have been utilized using from being used to make to cut Enter the irradiation technique imaging of the collimated illumination of first angle highlighted to the shape of the feature in high security key blade surface;
Fig. 6 C show the vertical view of the high security key blade of Fig. 6 A and Fig. 6 B, be utilized using come from by with In the irradiation technique of the collimated illumination of second angle that the shape for the feature for making to be cut into high security key blade surface highlights Imaging;
Fig. 7 A are the perspective views of scanning system, wherein multigroup illuminated image can be collected using multiple light sources;
Fig. 7 B are the schematic diagrames of the scanning system of Fig. 7 A, and it illustrates the multiple light sources relative to common axis;
Fig. 8 is the decomposition perspective view of scanning system, wherein can be cut into using the filtering technique such as polarized to highlight The shape of feature in key blade surface;
The vertical view of high security key blade that Fig. 9 A show non-application image treatment technology and are imaged;
Fig. 9 B show the vertical view of the high security key blade for Fig. 9 A being imaged with image processing techniques, wherein, it utilizes Threshold level (threshold level) highlights the character shape on the surface for being cut into sword;
Figure 10 shows the vertical view of high security key blade being imaged with the Feature Extraction Technology of such as edge detection, can To be cut into the shape of the feature in the surface of sword using this feature extractive technique to highlight;
Figure 11 is the perspective view of the embodiment of key scanning machine, which, which is configured as capturing, is cut into sword Surface in feature shape image;
Figure 12 A show the perspective view of the key duplication machines with integrated scanning system, the integrated scanning system It is configured as capturing the image for the shape for being formed on the feature in high security key blade surface, and is replicated on key billet The key shape;
Figure 12 B show the local perspective view of the key duplication machines with integrated scanning system, the integrated scanning System is configured as capturing the image for the shape for being formed on the feature in high security key blade surface, and on key billet Replicate the key shape;
Figure 12 C show the perspective view of the key duplication machines with integrated scanning system, the integrated scanning system It is configured as capturing the image for the shape for being formed on the feature in high security key blade surface, and is replicated on key billet The key shape;And
Figure 13 is to show to be cut into the sword table of key (such as high security key) using electronic device to read Specific characteristic in face and the data are supplied to key duplication machines method embodiment flow chart.
Specific embodiment
Now with detailed reference to exemplary embodiment of the present invention, its example is shown in the drawings.It is to be understood that can To utilize other embodiments, and it can carry out structure and function in the case of the respective range for not departing from the present invention Change.
A kind of system 100 and method of the surface characteristics of the high security type key provided for scanning are provided. Network analysis high security master key to be copied (such as, high security house key, high security car key or other height Security key), and determine to copy to the feature of the key into appropriate number required on high security key billet (blank) According to.Systems and methods described herein can be used alone to scan high security key or can be with other systems It is used in combination to replicate high security key.
Fig. 1 shows the tooth formed with the outer profile (profile) around key blade (key blade) (bitting) standard key 50.Fig. 2 shows the various embodiments of high security type key 200, wherein, this system It can scan, be imaged and replicate with method.Obviously, which may be utilized for the surface of scanning standard key. In preferred embodiment, scanning system analyzes the surface characteristics 202 in the face 204 of sword 206 for being formed on master key 200 Feature (Fig. 2).Surface characteristics 202 can be included in sword face centre be formed down lines (pathway), in the face of sword Single lines that one adjacent edges in portion are formed, in the opposite lines of a pair for being formed of adjacent edges of the face of sword, in sword Face in the scrobicula (dimple) formed, the recess (notch) that is formed in the face of sword or formed in the face of sword Or other geometric properties engaged with the component of corresponding lockset in addition shaped." lines of formation " can be included in the face of sword Lines that the centre in portion is formed down, the single lines formed on the face of sword are formed in the adjacent edges of the face of sword A pair of opposite lines.These features can reside on the only one side of sword or can reside in two sides of sword On.The shape for the profile (contour) being formed in one face of high security key blade or two faces be configured to Can be that the security component of the association lockset of unique construction matches.Once the security features of high security key and lockset It engages, then key bit can be rotated to the security features of retraction such as bolt (bolt).Fig. 3 shows geometric shape 230 embodiment, geometric shape 230 have that be formed on will be by the sword 206 of the master key of disclosed systematic survey/scanning Surface characteristics 202 in face 204.
In a preferred embodiment, system 100 can utilize 2D imaging techniques.For example, scanning system 100 can utilize pair As some combinations in coating technology, irradiation technique, filtering technique, image processing techniques and Feature Extraction Technology, with scanning With the physical characteristics of analysis master key.Other embodiment includes the 3D imaging technique of such as three-dimensional imaging;Such as laser point, laser Item, structure light, the triangulation technique of modulation light;Or the use of any other imaging technique, so as to scanning of a surface geometric form Shape.The imaging system can also be based on unglazed, such as by using ultrasonic technology or x-ray technique.Such as Fig. 4 A and figure Shown in 4B, picture system 100 can include image capture device 110, and can include at least one mirror 120, wherein, figure Picture trap setting can be aligned with mirror, so that light path 112 is aligned at image space 125 with master key 200.
In one embodiment, optical imaging device 110 is camera, and the image captured is photographs. In embodiment, camera is digital camera, and the image captured is digital picture.Digital picture can be with document form Or it is stored with data mode, and can be by logic analysis.Although scanning system is described herein as including imaging system, It is to be understood that other systems as known in the art can be used to analyze the parameter of master key.For example, scanning system can To use clearance gauge, capacitance type sensor, probe or other electromechanical measuring devices.Scanning system can also be with reading high security key The antenna of transponder on spoon integrates.
As it is used herein, term " logic " includes but not limited to hardware, firmware, software and/or respective combination, with It performs (one or more) function or (one or more) action and/or causes the work(from another logic, method and/or system It can or act.For example, based on desired application or demand, logic can include the microprocessor of software control, as special integrated The discrete logic of circuit (ASIC), analog circuit, digital circuit, logic device by programming, storage device containing instruction etc.. Logic can include one or more doors, the combination of door or other circuit blocks.Logic can also be fully embodied as software. In the case of describing multiple logicality logics, multiple logicality logic can be incorporated into a physical logic.Similarly, In the case where describing single logicality logic, which can be distributed between multiple physical logics.This Outside, as it is used herein, physical and/or logicality entity of the term " database " including data can be stored.For example, number Can be traditional database, table, file, list, queue, heap, memory, register etc. according to library.Database can reside in In one logicality and/or physical entity and/or two or more logicalities and/or physical reality can be distributed on Between body.Processing logic can be assembled using technology, algorithm, encapsulation and other abilities as known in the art.
Scanning system can include the database for the relevant information of storing keys (" key data ").The key data The characteristics of can including known high security key, such as key length, key shape, morphology and other spies Point.Database can be with specified key blanks or associated with the type of key or group by key data.For example, database can To store the key data of different key manufacturers.Scanning system can access the database, by the master key scanned Feature is compared with the key data stored in database.Such comparison may be used to determine whether main high security key Unique geometry is correctly copied into data required on new high security key billet.
In embodiment, the code dependent key data of cutting that database purchase is used together with known lockset pattern. For standard cutting key 50, cutting code data is referred to as number of teeth evidence, and by with matching dowel pin (mating in lockset Pin) associated interval and depth dimensions composition.For high security key 200, such cutting code data is referred to as Cutting position data, and by interval associated with the component of high security lockset and cutting position size composition.It is right For any specific lockset pattern, the interval between component can not change.After this manner, each master key can be Only change at each interval location in cutting position.It is used to record each known spacings for the cutting code of specific master key Cutting position at position.Traditionally, cutting code is represented as number or alpha-numeric code, and it includes will about key The information how cut by code cutting machines.In general, cutting code is one group of letter and/or integer (for example, " K263 "), It can interpret or decode according to key code figure or cutting code listing.The code can also be by one group of cutting position come table Show, this group of cutting position defines the shape of the cutting at the interval location on each side of key to operate lockset.This A little cutting positions can be represented or can be by physical measurements values by integer code (for example, " 331351 " and " 266431 ") (for example, " 0.285,0.285,0.313,0.285,0.256,0.313 inch " and " 0.299,0.242,0.242,0.270, 0.285th, 0.313 inch ") it represents.
It will be appreciated that the database is not limited to key data and cutting code data.In addition, the database can store With the relevant information of other identification parameters of key.Other key parameters can be combined utilization by measuring system with cutting information, To reduce the range of possible key billet.
In a preferred embodiment, imaging system 100 can be used to analyze main high security key 200, and determine Replicate the data needed for the key.Imaging system 100 can utilize combined imaging technology correctly to analyze the physics of master key Feature.Such imaging technique includes object coating technology, irradiation technique, filtering technique, image processing techniques and feature extraction Technology.
As shown in figure 5, imaging system 100 can be included in applying for coating 145 on the surface of main high security key 200 Add, to eliminate various spectral reflectances.This can improve the quality for the data for extracting from the image.This type coating can include powder Last shape or fluent material, and such as spraying, electrochemical deposition or Kun can be used to apply the painting for applying (roll application) Layer process applies.Coating 145 can also be to be cooled down sword and induces and be applied to high security surfaces of keys by using refrigerant Layer material.
In addition, as shown in Fig. 4 A, Fig. 4 B, Fig. 7 A and Fig. 7 B, imaging system 100 can be waited to sweep using irradiation technique to highlight The morphology of the sword 206 for the high security key 200 retouched.Especially it is possible to utilize various types of light sources and light Source relative to picture position 125 various positions.For example, various color light sources can be used to highlight on master key sword 200 Certain features.Master key can be positioned at image space 125, wherein, first light source 130A and second light source 135A also may be used To be positioned as light is directed at image space 125, with when high security key 200 is positioned at image space 125 Allow various light types and the first side 155 of angular illumination high security key 200.In addition, third light source 130B and the 4th Light source 135B can also be positioned as guiding first side 155 of the light towards the high security key 200 at image space 125, To allow the first side 155 of various light types and angular illumination high security key 200.First light source 130A can be light field Illumination, and second light source 135A can be dark-ground illumination.In addition, third light source 130B can be bright field illumination, and the 4th light source 135B can be dark-ground illumination.However, it is possible to the arbitrary combination by first light source, second light source, third light source and the 4th light source To provide the arbitrary combination of bright field illumination and dark-ground illumination, and the displosure is without being limited thereto.First light source 130A can be included extremely Few first ceiling light 132, can include a bank light.First ceiling light 132 can be adjacent to the first side of image space 125 Face 150 positions, to guide light towards the first side 155 of the high security master key 200 at image space 125.Third light source 130B can include at least one second ceiling light 134, can include a bank light.Second ceiling light 134 can be adjacent to imaging The opposite second side 160 of position 125 positions, to guide light towards the high security master key 200 at image space 125 First side 155.
Second light source 135A can include at least one first bottom lamp 142, can include a bank light.It can be by the first bottom The first side 150 that lamp 142 is adjacent to image space 125 positions, to guide light towards the high security master at image space 125 The first side 155 of key 200.4th light source 135B can include at least one second bottom lamp 144, can include a row Lamp.The opposite second side 160 that second bottom lamp 144 can be adjacent to image space 125 positions, to guide light towards imaging The first side 155 of high security master key 200 at position 125.
First ceiling light 132 and the second ceiling light 134 and the first bottom lamp 142 and the second bottom lamp 144 can be configured as permission Light path 112 passes through system 100 and is reflected from mirror 120, to be captured when master key 200 is positioned at image space 125 The image of master key 200.The position of lamp and lamp allows light path 112 uninterrupted for 125 visual angle of image space.In addition, one In a embodiment, lamp or a bank light can be positioned as providing the first side with various angles towards high security master key 200 The collimated light in face 155.
First light source 130A can with relative to the first angle A of horizontal imaging position axis 172 towards image space 125 It is angled.Image space axis 172 can be relative to image space 125 center be horizontal axis.Referring to Fig. 7 B.Second Light source 135A can be with angled towards image space 125 relative to the second angle B of horizontal imaging position axis 172.Third Light source 130B can be with angled towards image space 125 relative to the third angle C of image space axis 172.4th light source 135B can be with angled towards image space 125 relative to the fourth angle D of image space axis 125.Relative to level into Image position axis 172, fourth angle D can be more than third angle C, and third angle C can be more than second angle B, second angle B First angle A can be more than.First ceiling light 132 and the second ceiling light 134 can be positioned so that than the first bottom lamp 142 and the second bottom lamp 144 further from image space 125.
First light source, second light source, third light source and the 4th light can also be identified with reference to vertical image space axis 170 The position in source and angle.In one embodiment, the first ceiling light 132 and the second ceiling light 134 can be generally relative to axis 170 It is mutually symmetrical.Moreover, the first bottom lamp 142 and the second bottom lamp 144 can generally be mutually symmetrical relative to axis 170.Another In embodiment, the first ceiling light 132 and the second ceiling light 134 can be generally asymmetrical relative to one another relative to axis 170.Moreover, first 142 and second bottom lamp 144 of bottom lamp can be generally asymmetrical relative to one another relative to axis 170.In another embodiment, which can To include multiple levels of light source, top, in, bottom etc..The displosure considers various cloth of the light source relative to image space 125 It puts and constructs, and is unrestricted in this regard.
In some cases, scattering light can be used to eliminate the face 204 of the sword 206 by being formed on master key 200 In surface characteristics 202 caused by shade.In other cases, can pass through from special angle using non-scattered or collimated light Shade is created to highlight certain surface characteristics 202.By using the collimated light irradiation object from many different angles, many differences The surface characteristics of type can be highlighted with respect to its shade.Image can then be directed to each different irradiating angle and be collected And it is handled, correctly to analyze all surface characteristics and geometry.Axial scattering light can be used to protrude certain A little characteristic types.Infrared light can also be used as light source, to eliminate reflection and to reduce aberration.Can operate light source 130A, 130B, 135A, 135B are with from relative to image space 125 and being positioned in the different irradiating angles of key herein and create collimation Light.Lamp can be controlled as providing a variety of colors towards image space into each in bank light 132,134,142,144 With the light of intensity, to manipulate the image of master key 200.
In addition, backlight 175 can be provided within system 100.Backlight 175 can guide light towards image space 125 The second side 156 of the high security master key 200 at place.The second side 156 of key 200 can be opposite with first side 155. Backlight 175 can be adjacent to opposite side positioning of the image space 125 relative to light source 130A, 130B, 135A and 135B.It can Backlight 175 is positioned to opposite relative to the direction of master key 200 with light path 112.Backlight 175 can be provided in main key The irradiation at the spoon back side, and can be turned on and off.Backlight light irradiation can with for identifying master key type, the main key of verification Whether spoon fixes and determines that the logic of the orientation of master key is used together.
It is understood that multiple images can be collected with different irradiation scenes.For example, light source can be moved or Person's key can be moved to create desired angle.It in addition, can be by multiple light sources by operating various lamps by expectation mode For creating multiple irradiation scenes.Furthermore it is possible to using various types of light source (lamps of such as different colours), from not With the light field of angle and half-light field, to collect multigroup illuminated image from the image-capturing apparatus positioned at static position. Such method can represent each individually one group of image of irradiating angle using the chromatic filter in logic to create.It is this more Color technology reduces the complexity of system, and creates the Absolute matching (registration) in this group of image.
Fig. 6 A, Fig. 6 B and Fig. 6 C show the high security key in the case of taking collimation angle and not taking collimation angle 200 various images.Fig. 6 A are shown with the particular surface feature 202 being imaged with the irradiation technique that collimated illumination is not used The vertical view of the sword 206 of high security key 200.Fig. 6 B show the high security key of Fig. 6 A, and it makes use of use to come from It is used for the first angle that the shape of the surface characteristics for making to be cut into the face 204 of high security key blade 206 202 highlights The irradiation technique imaging of collimated illumination.This image is shown along the hatching effect of the bottom 220 of surface characteristics 202 and along table The brighter radiation response at the top 210 of region feature 202.In one embodiment, the image of Fig. 6 B is construed as having The light of the first ceiling light 132 from first light source 130A is provided, and the first bottom lamp 142, the second ceiling light 134 and the second bottom lamp 144 are not Light is provided.
Fig. 6 C show the high security key of Fig. 6 A, and it makes use of use to come to be used to make to be cut into high security key The irradiation technique of the collimated illumination of the second angle imaging that the shape of surface characteristics 202 in the face 204 of spoon sword 206 highlights. This image shows the hatching effect along the top 210 of surface characteristics 202 and the bottom 220 along surface characteristics 202 more Bright radiation response.In one embodiment, the image of Fig. 6 C be construed as with provide from third light source 130B the The light of two ceiling lights 134, and the second bottom lamp 144, the first ceiling light 134 and the first bottom lamp 144 do not provide light.
The method is to capture master key using the light from the various directions of the various angles towards image space 125 The example of 200 various images.It may then pass through flogic system to handle the image, to identify surface characteristics 202 Signal portion.These processing allow to improve Efficiency and accuracy in relation to related with the geometrical pattern of surface characteristics 202 to capture Data.
As shown in figure 8, in one embodiment, imaging system 100 can include first filter 260 and second filter 265.Wave filter can be aligned along the light path 112 of imaging device 110.The filtering technique of logic can enhance master key 200 The contrast of surface characteristics 204.Wave filter 260,265 can include lens, and it is close can to include colored shape, interference-type, neutrality Degree type and polarization-type.Chromatic filter can enhance the contrast of certain colors, and reduce the contrast of other colors.May be used also Enhance certain light belts to use interference filter.Neutral density filters can be used to reduce overall brightness, if figure As if.Polarization filter can be used to reduce mirror-reflection.In some cases, from the first light field 130 or the second light 135 light source of field and the lens of imaging device 110 may have Polarization filter 260,265.Although filtering technique usually relates to And physical lens, it is to be understood that filter effect in logic can also be generated using digital technology.In one embodiment In, first filter can be adjacent to imaging device 110 and positioned, and second filter 265 can be adjacent to mirror 120 or Image space 125 positions.
In addition, image processing techniques can be used to highlight morphology to be scanned.As shown in fig. 9 a and fig. 9b, Such technology can include Digital Image Processing function, to adjust such as exposure, brightness, contrast, form and aspect, saturation degree, height Pass filter, low-pass filtering, threshold level adjustment and more images including image screen, covering and other functions pixel-by-pixel compare. These technologies are commonly applied to either whole image or selected area-of-interest.Fig. 9 A show the sword of master key 200 206 vertical view, the master key have what is be imaged with irradiation technique and do not handled by using various image processing techniques Particular surface feature 202.Fig. 9 B show the high security key of Fig. 9 A, have been utilized and have wherein applied threshold process skill Art is to capture the irradiation of the accurate geometry of the surface characteristics being cut into the face 204 of high security key blade 206 202 Technology is imaged.This image shows the threshold effect at the top 210 and bottom 220 along surface characteristics 202.In one embodiment In, the image of Fig. 9 B is the result to the image application treatment technology of Fig. 9 A.
The feature extraction treatment technology of such as edge detection, spot-analysis and pattern-recognition can be used in imaging system 100, with It analyzes the geometry being highlighted and determines the geometry of desired feature.It in one embodiment, as shown in Figure 10, can be with The edge 220 of surface characteristics 202 is highlighted using edge detection.In another embodiment, the ladder of individual element can be used Degree detects to identify the edge for being highlighted feature along surface characteristics 202.In a preferred embodiment, spot can be utilized The form of analysis represents the marginal point of the profile of surface characteristics that is highlighted to be isolated.Then these points can be handled has sequence Table, to generate position registration and edge data.Such as spline curve, Fourier analysis, neural network, Hadamard can be utilized to become Change enhances data analysis with the mathematical abstractions such as Hough transformation.
Scanning system 100 is used as key data trap setting, is configured as measurement and is cut into high security key The shape of feature in the surface of spoon sword, and determine to make the required data of duplicate of the master key.Such key data Trap setting can be a part for key identification machine or key scanning system machine 300 as shown in Figure 11.This machine 300 It can include the housing with the multiple light sources 310 being at an angle of towards image space 125.Machine 300 can be equipped with multiple light Source, multiple light sources can include bright field illumination and dark-ground illumination, and can be configured as the surface characteristics for measuring master key Shape.Machine 300 can be configured as the data needed for the duplicate for identifying suitable key billet and the determining making master key. This data then can optionally be used to cut high security key by the key-cut machine or key duplication machines detached Base, to replicate the master key.
Scanning system 100 can also be integrated into key scanning and copy machine as shown in Figure 12 A, Figure 12 B and Figure 12 C In 400.For example, scanning system 100 can be used in combination with key dubbing system, such as in U.S. Patent number 7,891,919 Disclosed key duplication machines are incorporated into herein herein by whole reference.It is suitable that such system will help to identify Key billet determines to make the data needed for the duplicate of master key and cuts high security key billet, to replicate the main key Spoon.In addition, scanning system 100 can be with U.S. Patent number 8,644,619;8,634,655;7,890,878;And 9,101, System disclosed in 990 is used in combination, and is incorporated into herein by whole reference herein.
As described above, provide a kind of method for scanning master key 500.The flow of this method as shown in Figure 13 illustrates. This method includes irradiating the step of being formed on the surface characteristics on the sword of the master key from first angle A.It can be from second Angle B irradiation is formed on the surface characteristics on the sword of the master key.First angle A and second angle B is relative into image position Putting axis 175 can be different.Capture at least one image of the part of the sword of the master key.Determine the spy of the surface characteristics Point.Logic can be used to determine the characteristics of surface characteristics, and the image captured for analyzing sword.The logic can by with It is compared with the cutting code data of known lockset pattern in by the surface characteristics the characteristics of.The logic can be utilized to Determine at least one cutting code for the master key.At least one cutting code can be used to replicate the main key Spoon.Surface characteristics 202 includes the lines 230 being formed on the sword of master key 200.It can be carried from by first light source 130A The first angle A of confession irradiates surface characteristics.Surface spy can be irradiated from the second angle B provided by second light source 135A Sign.First light source 130A and second light source 135A can be controlled as being turned on and off before imaging device 110 captures image, To create different irradiating angles.Imaging device 110 can capture multiple images, wherein each image include by light source 130A, The different irradiation scenes that at least one of 130B, 135A and 135B and backlight 175 are provided.It can be with being configured as analyzing The logics of multiple images of each image including different irradiation scenes determines surface characteristics.
Furthermore it is possible to by the characteristics of the surface characteristics compared with the cutting position of known lockset pattern.This compares can be with The logic that can be represented by wherein described cutting position by physical measurements values performs.The measured value can also by the logic Lai It determines.Can master key be replicated by using the measured value.Alternatively, logic can analyze the institute of the surface characteristics Feature is stated, to measure the lines 230 formed on the surface of the master key.The lines 230 formed can be surveyed by physics Magnitude represents.
Furthermore it is possible to capture backlight image.Logic can analyze the backlight image, and by itself and known key billet Database compares.Suitable key billet associated with master key can be gone out by logic identification and be passed to user or by with To identify the suitable cutting code data for the associated master key.
Although being scanned for describing the present invention in terms of the surface characteristics of high security on the key, never office is used It is limited to only surface characteristics or only high security key.Many in present inventive concept can be used in outer ledge feature and standard , edge cutting household key and automobile key on.
Above, invention has been described, and it is apparent that for read and understand this specification other It will be able to contemplate modifications and changes for people.Following claims is intended to include all modifications and changes, as long as it is in right It is required that and its within the scope of equivalent.

Claims (30)

1. a kind of high security key scanning system, including:
Imaging device is configured as capturing at least one image of the part of the first side of the sword of high security master key;
First light source is positioned as with institute of the first angle guiding light towards the high security master key at image space State the first side of sword;
Second light source is positioned as guiding light towards the high security master key at the image space with second angle The sword first side, wherein, the image announcement being captured is formed on face at least part of the sword Surface characteristics in portion;And
Logic is configured as analyzing at least one image being captured, with determine the surface characteristics the characteristics of.
2. key scanning system according to claim 1, wherein, the logic is also by the feature of the surface characteristics It is compared with the cutting code data of known lockset pattern.
3. key scanning system according to claim 2, wherein, the cutting code data includes the size of space and cutting At least one of position.
4. key scanning system according to claim 2, wherein, the logic determines the high security master key extremely A few cutting position or at least one cutting code.
5. key scanning system according to claim 4, wherein, the cutting position or the cutting code be used for from Key billet copies high security key.
6. key scanning system according to claim 1, wherein, the high security master key is rattle snake key.
7. key scanning system according to claim 1, wherein, the first light source and second light source are controlled as coverlet It solely opens and closes, to direct light on the surface of the high security master key.
8. key scanning system according to claim 7, wherein, the imaging device is captured each from different exposure fields The multiple images of the high security master key of scape.
9. key scanning system according to claim 1, further includes backlight, be positioned as guiding light towards with it is described The opposite second side of the first side of the sword of high security key, the backlight are configured as being used together with logic, institute State logic for determine the identification master key type, verify the orientation of the master key is fixed and determined to the master key whether One or more of.
10. key scanning system according to claim 1, wherein, in the first light source and the second light source extremely Few one guides collimated light towards the image space.
11. key scanning system according to claim 1, wherein, the high security key includes being formed on described Lines on the sword of high security master key.
12. key scanning system according to claim 11, wherein, the spy of surface characteristics described in the logic analysis Point, to determine the lines of the formation on the surface of the master key.
13. key scanning system according to claim 12, wherein, the lines through the determining formation is used in key The high security master key is replicated on spoon base.
14. key scanning system according to claim 1, further includes third light source, it is positioned as drawing with third angle Leaded light is towards the first side of the sword of the high security master key at the image space;With the 4th light source, quilt It is positioned as guiding light towards the first side of the sword of the high security master key at the image space with fourth angle Face, wherein, the first angle, second angle, third angle and fourth angle relative to the image space horizontal axis It is different.
15. a kind of method for scanning high security master key, the method includes:
The surface characteristics in the first side of sword for being formed on the high security master key from first angle irradiation;
The surface in the first side of the sword for being formed on the high security master key from second angle irradiation is special Sign, the first angle and the second angle are different relative to horizontal imaging position axis;
Capture at least one image of the part on the illuminated surface of the sword of the high security master key;And
The characteristics of determining the surface characteristics.
16. it according to the method for claim 15, further includes the feature of the surface characteristics and known lockset pattern Cutting code data be compared.
17. according to the method for claim 15, further include at least one cutting code determined for the master key.
18. according to the method for claim 17, further including the main key is replicated using at least one cutting code Spoon.
19. according to the method for claim 15, wherein, the step from first angle irradiation surface characteristics is by first Light source is provided to provide from the step of second angle irradiation surface characteristics by second light source, wherein, institute State first light source and the second light source be controlled as being turned on and off before at least one image is captured it is different to create Irradiating angle.
20. according to the method for claim 19, wherein, capture the multiple images respectively with different irradiation scenes.
21. according to the method for claim 20, wherein, the surface characteristics is determined with logic, the logic is configured To analyze with the different multiple images for irradiating scene.
22. it according to the method for claim 21, further includes the feature of the surface characteristics and known lockset pattern Cutting position data be compared.
23. according to the method for claim 22, further include at least one cutting position determined for the master key.
24. according to the method for claim 23, wherein, the cutting position is represented by physical measurements values, the measurement Value is determined by the logic.
25. it according to the method for claim 24, further includes and the high security master is replicated by using the measured value Key.
26. according to the method for claim 15, wherein, the surface characteristics includes being formed on the sword of master key Lines.
27. the feature for analyzing the surface characteristics according to the method for claim 26, is further included, it is described to measure The lines formed on the surface of high security master key.
28. it according to the method for claim 27, further includes and the high security master is replicated by using the measured value Key.
29. according to the method for claim 15, further include high security master key described in backlight illumination.
30. it is associated with the high security master key suitable according to the method for claim 29, to further include identification Key billet.
CN201680057803.8A 2015-08-03 2016-08-03 High security key scanning system Pending CN108140126A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201562200208P 2015-08-03 2015-08-03
US62/200,208 2015-08-03
PCT/US2016/045367 WO2017024043A1 (en) 2015-08-03 2016-08-03 High security key scanning system

Publications (1)

Publication Number Publication Date
CN108140126A true CN108140126A (en) 2018-06-08

Family

ID=62079092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680057803.8A Pending CN108140126A (en) 2015-08-03 2016-08-03 High security key scanning system

Country Status (2)

Country Link
EP (1) EP3332353A1 (en)
CN (1) CN108140126A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021143146A1 (en) * 2020-01-18 2021-07-22 深圳数马电子技术有限公司 Method and apparatus for recognizing bitting code of key, and storage medium and image collection device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5807042A (en) * 1995-06-07 1998-09-15 Almblad; Robert Method and apparatus for automatically making keys
US6588995B2 (en) * 1997-05-13 2003-07-08 The Hillman Group, Inc. Method and apparatus for aligning keys for cutting
CN101405104A (en) * 2006-01-23 2009-04-08 海-科产品公司 Key duplication machine
CN102448636A (en) * 2009-05-01 2012-05-09 海高制品有限公司 Key blank identification system with bitting analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5807042A (en) * 1995-06-07 1998-09-15 Almblad; Robert Method and apparatus for automatically making keys
US6588995B2 (en) * 1997-05-13 2003-07-08 The Hillman Group, Inc. Method and apparatus for aligning keys for cutting
CN101405104A (en) * 2006-01-23 2009-04-08 海-科产品公司 Key duplication machine
CN102448636A (en) * 2009-05-01 2012-05-09 海高制品有限公司 Key blank identification system with bitting analysis

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021143146A1 (en) * 2020-01-18 2021-07-22 深圳数马电子技术有限公司 Method and apparatus for recognizing bitting code of key, and storage medium and image collection device
US11790626B2 (en) 2020-01-18 2023-10-17 Shenzhen Xhorse Electronics Co., Ltd Method and apparatus for recognizing bitting code of key, and storage medium and image collection device
EP4092569A4 (en) * 2020-01-18 2024-03-13 Shenzhen Xhorse Electronics Co Ltd Method and apparatus for recognizing bitting code of key, and storage medium and image collection device

Also Published As

Publication number Publication date
EP3332353A1 (en) 2018-06-13

Similar Documents

Publication Publication Date Title
US11842554B2 (en) High security key scanning system
US9058533B2 (en) Method for encoding information in illumination patterns
US20210200777A1 (en) Computerized technical authentication and grading system for collectible objects
US10740994B2 (en) Tool training for automated tool control systems
US8630481B2 (en) Encoding information in illumination patterns
US20090161925A1 (en) Method for acquiring the shape of the iris of an eye
CN110226137A (en) It is manufactured by image trace
US11176651B2 (en) Computer-controlled 3D analysis of collectible objects
KR20050096187A (en) Unauthorized person detection device and unauthorized person detection method
Christlein et al. A study on features for the detection of copy-move forgeries
EP3776339A1 (en) Method and system for optical product authentication
CN108292457A (en) Identification device, recognition methods, recognizer and the computer-readable medium comprising recognizer
WO2015044051A1 (en) Positioning method for positioning a mobile device in relation to a security feature of a document
CN108140126A (en) High security key scanning system
DE102007033835B4 (en) Imaging technique for direct object segmentation in images
Funka-Lea The visual recognition of shadows by an active observer
JP7069627B2 (en) Information recording medium reading method and authenticity judgment method
EP3069295B1 (en) Image analysis for authenticating a product
RU2533319C2 (en) Method of analysing and identifying cultural art paintings
Maričević et al. Recognition model of counterfeiting digital records of biometric photographic image
JP7024250B2 (en) Anti-counterfeiting medium sticker and authenticity determination method
Pangre et al. Identification of Illegally Modified Part in Digital Images
NZ723812B2 (en) Method for characterizing material by analysis of speckles
Mahalakshmy et al. Survey on Illumination Based Digital Image Forgery Detection Techniques
CA2831846A1 (en) A method of generating a marker

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180608