EP2336462A1 - Lock pin configuration device and method, computer program product and computer program therefor - Google Patents
Lock pin configuration device and method, computer program product and computer program therefor Download PDFInfo
- Publication number
- EP2336462A1 EP2336462A1 EP20100195383 EP10195383A EP2336462A1 EP 2336462 A1 EP2336462 A1 EP 2336462A1 EP 20100195383 EP20100195383 EP 20100195383 EP 10195383 A EP10195383 A EP 10195383A EP 2336462 A1 EP2336462 A1 EP 2336462A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- key
- pins
- computer program
- lock
- types
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000004590 computer program Methods 0.000 title claims description 25
- 238000005259 measurement Methods 0.000 claims description 22
- 238000004891 communication Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000010276 construction Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000003908 quality control method Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B17/00—Accessories in connection with locks
- E05B17/0004—Lock assembling or manufacturing
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B15/00—Other details of locks; Parts for engagement by bolts of fastening devices
- E05B15/08—Key guides; Key pins ; Keyholes; Keyhole finders
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B17/00—Accessories in connection with locks
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
- E05B19/0011—Key decoders
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B27/00—Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B27/00—Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
- E05B27/0003—Details
Definitions
- the present invention relates generally to lock assembly, and more particularly to lock assembly based on a given key.
- a method for obtaining a lock configuration matching a key comprises the steps, executed in a lock configuration device, of: capturing an image of the key; obtaining geometric characteristics of the key using the captured image; determining, using the geometric characteristics, order and types of pins for the lock configuration matching the key; and presenting the determined types of pins in the determined order.
- This configuration can be used to assemble a lock which matches a particular key.
- this method allows for quality control of key production, where the method provides a pin sequence which can be checked against an expected pin sequence.
- the step of determining may comprise determining each pin separately using a subset of the geometric characteristics.
- the step of determining order and types of pins may comprise using a lookup table.
- the step of determining order and types of pins may comprise using a rule bases pin determination.
- the step of obtaining geometric characteristics may comprise obtaining geometric characteristics for two or more separate rows of teeth of the key.
- the step of obtaining geometric measurements may comprise using a coordinate system which is fixed in relation to an identifiable point of the key.
- the step of obtaining geometric measurements may comprise converting a measurement of pixels of the captured image into a unit of length.
- a second aspect of the invention is a lock configuration device for obtaining a lock configuration, said lock configuration matching a key.
- the lock configuration device comprises: a key scanner arranged to capture an image of the key; a controller arranged to obtain geometric characteristics of the key using the captured image; determining, using the geometric characteristics, order and types of pins for a lock matching the key; presenting the determined types of pins in the determined order.
- the key scanner and controller may be provided in separate entities with a communication channel for communication between the key scanner and the controller.
- a third aspect of the invention is a computer program (101) for a lock configuration device, the computer program (101) comprising computer program code which, when run on the lock configuration device, causes the lock configuration device to perform the steps of: capturing an image of the key; obtaining geometric characteristics of the key using the captured image; determining, using the geometric characteristics, order and types of pins for a lock matching the key; presenting the determined types of pins in the determined order.
- a fourth aspect of the invention is a computer program product comprising a computer program according to the third aspect and a computer readable means on which the computer program is stored.
- Embodiments of the invention provide an elegant and convenient solution to the problem of assembling a lock fitting a given key.
- the user simply scans the key using the key scanner and is provided with information to unambiguously select the correct pins for a fitting lock. This reduces the time such an operation takes and increases reliability compared to the prior art.
- Fig 1 is a schematic diagram of an environment where the present invention can be embodied.
- the arrangement is used to provide a scheme of pin types 17 to a user so the user can assemble a lock 18 matching a given key 12.
- the key 12 is thus the key to be used as a base for the assembly of the lock 18.
- the key 12 is any key 12 where its geometric construction determines whether it can open and close a lock or not.
- the key is read by a key scanner 10.
- the key scanner 10 captures an image of the key 12 to allow the geometric construction of the key 12 to be analysed.
- the key scanner 10 can comprise a camera, a flatbed scanner or any other suitable device for capturing an image of the key 12.
- the key scanner is connected via a communication channel to a computer 11.
- This communication channel can for example be a wired connection such as USB (Universal Serial Bus), FireWire, serial RS-232, Ethernet, or a wireless connection such as BlueTooth, ZigBee, wireless USB, wireless local area network (IEEE 802.11), etc.
- the key scanner 10 has captured an image of the key 12, as will be explained in more detail below, geometric characteristics are obtained from the key. This can be performed in the key scanner 10 or a computer 11 connected to the key scanner 10.
- the computer 11 can be any suitable computer with capability of executing computer programs, communicating with the key scanner 10 and which has a user interface allowing the user 14 to be provided with information on what types of pins to use and in what order to assemble them.
- the user 14 thus gets information from the computer 11 on how to assemble a lock 18 which matches the key 12. This is schematically shown by the pins 17 of lock 18 which have been arranged in an order corresponding to the measurements obtained from the image of the key 12.
- the key scanner 10 and the computer 11 can in conjunction be called a lock configuration device 19.
- the key scanner 10 and the computer 11 can be separate, as depicted in Fig 1 , or they can be combined in a single lock configuration device 19.
- Fig 2 is a schematic diagram of how key characteristics are obtained from an image 5 of a key according to an embodiment of the present invention.
- the notches 13a-f are measured to obtain the characteristics of the key.
- a reference point is found on the image 5 of the key 12. This can for example be at a reference point 15 corresponding to where the lower part of a collar of the key 12 transitions to the blade of the key 12.
- a horizontal reference is found, such as the upper part of the blade 16.
- the horizontal reference can be a ridge of the profile of the key.
- a coordinate system can be fixed in relation to the key.
- measurements 13a-f can be obtained in relation to the horizontal reference.
- the measurements 13a-f can be obtained at predetermined horizontal distances from the reference point 15.
- the measurements 13a-f are obtained according to the rules, for example, in a notch or on a tooth.
- the system can be configured to be applicable to several different key types.
- the key types can be identifies by the geometrics of the key 12 or by the user 14 entering key type to the computer 11.
- the key type can affect how many pins are to be used, what set of pins to use (in other words selecting and appropriate look-up table or rule set), and/or the horizontal distances between measurements 13a-f.
- the key 12 may assume other shapes, including more square shaped keys. Furthermore, the key could have two or more separate rows of teeth on the same key. As long as all teeth and/or notches are captured on the image 5 from the key scanner 10, the measurements can be obtained from the image 5 and serve as a base for the determination of pins.
- Fig 3 is a schematic diagram of how pin types can be presented to a user. This can for example be shown on a screen of the computer 11 of Fig 1 .
- a graphical output 32 is shown, indicating the visually how the pins should be arranged. For example, for some locks, every pin can be rotatably arranged in two ways, whereby the graphical output assists the user to assemble the lock correctly.
- a second section 30 of the display shows part numbers for the user. In this way, the user can unambiguously assemble a lock which fits a given key.
- the part numbers shown in Fig 3 are only examples, any unambiguous identification of pins is possible.
- the second section 30 can present measurements of pins, if all pins have the same profile and only differ in length.
- Fig 4 is a flowchart illustrating a method according to an embodiment of the present invention. The method assists a user in assembling a lock for a given key, as illustrated e.g. in Fig 1 . References will also be made to Fig 1 to further clarify the various entities used in the method.
- an image of the key 12 is obtained using the key scanner 10.
- the computer 11 or the key scanner 10 obtains the geometric characteristics of the key 12, as explained in with reference to Fig 2 above.
- a determine order and type of pins step 42 the order and types of pins are determined. Processing for each pin is performed separately. For each pin, one, two or even more measurements can be required to determine its type. In this example, each pin determination corresponds to one measurement (13a-f in Fig 2 ). To find a pin, the measurement (or measurements) first need to be converted to a unit of length, such as millimetres. Once the length is used, this can be used to determine an appropriate pin, either using a look-up table, from measurement ranges to pins, or a determination rule.
- a measurement is found to be 4.2 millimetres, this can correspond to a pin with part number 111, if there is a rule that measurements between 4.05 and 4.35 matches a pin with part number 111.
- the two measurements are used together to find a matching pin type number. This process is repeated until all pins are determined.
- a present pins step 43 the pins determined in the previous step are presented to the user. This allows the user to assemble a lock which fits the given key 12. Alternatively, in key production, the presented pins are checked against expected pins to verify that the key has been produced with characteristics as expected.
- Fig 5 shows one example of a computer program product 100 comprising computer readable means.
- a computer program 101 can be stored, which computer program can cause a controller to execute the method according to embodiments described herein.
- the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc).
- the computer program product could also be embodied as a memory of a device, such as a memory of the computer 11.
- the computer program 101 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product.
Landscapes
- Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Lock And Its Accessories (AREA)
Abstract
It is presented a method for obtaining a lock configuration matching a key. The method comprises the steps, executed in a lock configuration device, of: capturing an image of the key; obtaining geometric characteristics of the key using the captured image; determining, using the geometric characteristics, order and types of pins for a lock matching the key; presenting the determined types of pins in the determined order.
Description
- The present invention relates generally to lock assembly, and more particularly to lock assembly based on a given key.
- In most cases, keys and locks are manufactured at the same time, whereby it is ensured that the keys that are supplied fit the lock or locks.
- However, there are situations where it is desired to obtain a new lock which fits a certain key. For example, consider the situation of a residential house having multiple doors, such as a front door and a kitchen entrance. In such circumstances it is common to have the locks configured in the same way such that a single key can be used to unlock any of the doors to the house. If an addition is built to the house, there may be a new door, e.g. a new garden door. In this situation, it is desirable to install a lock in the garden door which could also be opened using the same key that is used for the other doors of the house.
- There are several more or less automated systems for producing a copy of a given key. However, the prior art fails to provide
- On the contrary, in the prior art, assembling a lock to fit a given key is an art performed by an experienced locksmith. The locksmith examines the key and attempts, at least partly by trial and error, to configure a lock which matches the key.
- While, in many cases, an experienced locksmith is able to obtain a lock which matches a given key, it can sometimes take a significant amount of time to produce a fitting lock. Moreover, it would be beneficial to allow persons with less experience to be able to create a lock from a key.
- It is therefore an object of the invention to provide a method and system which allows an automated key analysis and pin selection.
- According to the invention there is provided a method for obtaining a lock configuration matching a key. The method comprises the steps, executed in a lock configuration device, of: capturing an image of the key; obtaining geometric characteristics of the key using the captured image; determining, using the geometric characteristics, order and types of pins for the lock configuration matching the key; and presenting the determined types of pins in the determined order.
- This enables an efficient and consistent way of determining a lock configuration matching a key. This configuration can be used to assemble a lock which matches a particular key. Furthermore, this method allows for quality control of key production, where the method provides a pin sequence which can be checked against an expected pin sequence.
- The step of determining may comprise determining each pin separately using a subset of the geometric characteristics.
- The step of determining order and types of pins may comprise using a lookup table.
- The step of determining order and types of pins may comprise using a rule bases pin determination.
- The step of obtaining geometric characteristics may comprise obtaining geometric characteristics for two or more separate rows of teeth of the key.
- The step of obtaining geometric measurements may comprise using a coordinate system which is fixed in relation to an identifiable point of the key.
- The step of obtaining geometric measurements may comprise converting a measurement of pixels of the captured image into a unit of length.
- A second aspect of the invention is a lock configuration device for obtaining a lock configuration, said lock configuration matching a key. The lock configuration device comprises: a key scanner arranged to capture an image of the key; a controller arranged to obtain geometric characteristics of the key using the captured image; determining, using the geometric characteristics, order and types of pins for a lock matching the key; presenting the determined types of pins in the determined order.
- The key scanner and controller may be provided in separate entities with a communication channel for communication between the key scanner and the controller.
- A third aspect of the invention is a computer program (101) for a lock configuration device, the computer program (101) comprising computer program code which, when run on the lock configuration device, causes the lock configuration device to perform the steps of: capturing an image of the key; obtaining geometric characteristics of the key using the captured image; determining, using the geometric characteristics, order and types of pins for a lock matching the key; presenting the determined types of pins in the determined order.
- A fourth aspect of the invention is a computer program product comprising a computer program according to the third aspect and a computer readable means on which the computer program is stored.
- It is to be noted that all aspects of the first, second third, fourth aspects can be applied, where applicable, to any other of these aspects.
- Embodiments of the invention provide an elegant and convenient solution to the problem of assembling a lock fitting a given key. The user simply scans the key using the key scanner and is provided with information to unambiguously select the correct pins for a fitting lock. This reduces the time such an operation takes and increases reliability compared to the prior art.
- Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the element, device, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, device, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
- The invention is now described, by way of example, with reference to the accompanying drawings, in which:
-
Fig 1 is a schematic diagram of an environment where the present invention can be embodied, -
Fig 2 is a schematic diagram of how key characteristics are obtained from an image of a key according to an embodiment of the present invention, -
Fig 3 is a schematic diagram of how pin types can be presented to a user, -
Fig 4 is a flowchart illustrating a method according to an embodiment of the present invention, and -
Fig 5 shows one example of a computer program product comprising computer readable means and a computer program thereon. - The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout the description.
-
Fig 1 is a schematic diagram of an environment where the present invention can be embodied. The arrangement is used to provide a scheme ofpin types 17 to a user so the user can assemble alock 18 matching a givenkey 12. Thekey 12 is thus the key to be used as a base for the assembly of thelock 18. Thekey 12 is anykey 12 where its geometric construction determines whether it can open and close a lock or not. - The key is read by a
key scanner 10. Thekey scanner 10 captures an image of thekey 12 to allow the geometric construction of thekey 12 to be analysed. Thekey scanner 10 can comprise a camera, a flatbed scanner or any other suitable device for capturing an image of thekey 12. The key scanner is connected via a communication channel to acomputer 11. This communication channel can for example be a wired connection such as USB (Universal Serial Bus), FireWire, serial RS-232, Ethernet, or a wireless connection such as BlueTooth, ZigBee, wireless USB, wireless local area network (IEEE 802.11), etc. - Once the
key scanner 10 has captured an image of thekey 12, as will be explained in more detail below, geometric characteristics are obtained from the key. This can be performed in thekey scanner 10 or acomputer 11 connected to thekey scanner 10. Thecomputer 11 can be any suitable computer with capability of executing computer programs, communicating with thekey scanner 10 and which has a user interface allowing theuser 14 to be provided with information on what types of pins to use and in what order to assemble them. - The
user 14 thus gets information from thecomputer 11 on how to assemble alock 18 which matches thekey 12. This is schematically shown by thepins 17 oflock 18 which have been arranged in an order corresponding to the measurements obtained from the image of thekey 12. - The
key scanner 10 and thecomputer 11 can in conjunction be called alock configuration device 19. Thekey scanner 10 and thecomputer 11 can be separate, as depicted inFig 1 , or they can be combined in a singlelock configuration device 19. -
Fig 2 is a schematic diagram of how key characteristics are obtained from an image 5 of a key according to an embodiment of the present invention. In this example, thenotches 13a-f are measured to obtain the characteristics of the key. Firstly, a reference point is found on the image 5 of the key 12. This can for example be at areference point 15 corresponding to where the lower part of a collar of the key 12 transitions to the blade of the key 12. Furthermore, a horizontal reference is found, such as the upper part of theblade 16. Alternatively, the horizontal reference can be a ridge of the profile of the key. With thereference point 15 and the horizontal reference established, a coordinate system can be fixed in relation to the key. Once the horizontal reference is found,measurements 13a-f can be obtained in relation to the horizontal reference. Themeasurements 13a-f can be obtained at predetermined horizontal distances from thereference point 15. Optionally, themeasurements 13a-f are obtained according to the rules, for example, in a notch or on a tooth. - It is to be noted that the system can be configured to be applicable to several different key types. The key types can be identifies by the geometrics of the key 12 or by the
user 14 entering key type to thecomputer 11. The key type can affect how many pins are to be used, what set of pins to use (in other words selecting and appropriate look-up table or rule set), and/or the horizontal distances betweenmeasurements 13a-f. - It is to be noted that the key 12 may assume other shapes, including more square shaped keys. Furthermore, the key could have two or more separate rows of teeth on the same key. As long as all teeth and/or notches are captured on the image 5 from the
key scanner 10, the measurements can be obtained from the image 5 and serve as a base for the determination of pins. -
Fig 3 is a schematic diagram of how pin types can be presented to a user. This can for example be shown on a screen of thecomputer 11 ofFig 1 . Agraphical output 32 is shown, indicating the visually how the pins should be arranged. For example, for some locks, every pin can be rotatably arranged in two ways, whereby the graphical output assists the user to assemble the lock correctly. Furthermore, asecond section 30 of the display shows part numbers for the user. In this way, the user can unambiguously assemble a lock which fits a given key. The part numbers shown inFig 3 are only examples, any unambiguous identification of pins is possible. For example, in one example, thesecond section 30 can present measurements of pins, if all pins have the same profile and only differ in length. -
Fig 4 is a flowchart illustrating a method according to an embodiment of the present invention. The method assists a user in assembling a lock for a given key, as illustrated e.g. inFig 1 . References will also be made toFig 1 to further clarify the various entities used in the method. - In an initial capture
key image step 40, an image of the key 12 is obtained using thekey scanner 10. - In an obtain geometric characteristics step 41, the
computer 11 or thekey scanner 10 obtains the geometric characteristics of the key 12, as explained in with reference toFig 2 above. - In a determine order and type of pins step 42, the order and types of pins are determined. Processing for each pin is performed separately. For each pin, one, two or even more measurements can be required to determine its type. In this example, each pin determination corresponds to one measurement (13a-f in
Fig 2 ). To find a pin, the measurement (or measurements) first need to be converted to a unit of length, such as millimetres. Once the length is used, this can be used to determine an appropriate pin, either using a look-up table, from measurement ranges to pins, or a determination rule. For example, if a measurement is found to be 4.2 millimetres, this can correspond to a pin withpart number 111, if there is a rule that measurements between 4.05 and 4.35 matches a pin withpart number 111. Similarly, if two measurements are needed to determine a pin, the two measurements are used together to find a matching pin type number. This process is repeated until all pins are determined. - In a present pins step 43, the pins determined in the previous step are presented to the user. This allows the user to assemble a lock which fits the given
key 12. Alternatively, in key production, the presented pins are checked against expected pins to verify that the key has been produced with characteristics as expected. -
Fig 5 shows one example of acomputer program product 100 comprising computer readable means. On this computer readable means acomputer program 101 can be stored, which computer program can cause a controller to execute the method according to embodiments described herein. In this example, the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc). The computer program product could also be embodied as a memory of a device, such as a memory of thecomputer 11. While thecomputer program 101 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product. - The invention has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.
Claims (11)
- A method for obtaining a lock configuration matching a key (12), the method, comprising the steps, executed in a lock configuration device (19), of:capturing (40) an image of the key;obtaining (41) geometric characteristics of the key using the captured image;determining (41), using the geometric characteristics, order and types of pins for the lock configuration matching the key (12); andpresenting (43) the determined types of pins in the determined order.
- The method according to claim 1, wherein the step (42) of determining comprises determining each pin separately using a subset of the geometric characteristics.
- The method according to claim 1 or 2, wherein the step (42) of determining order and types of pins comprises using a lookup table.
- The method according to claim 1 or 2, wherein the step (42) of determining order and types of pins comprises using a rule based pin determination.
- The method according to any one of the preceding claims, wherein the step (41) of obtaining geometric characteristics comprises obtaining geometric characteristics for two or more separate rows of teeth of the key (12).
- The method according to any one of the preceding claims, wherein the step (41) of obtaining geometric measurements comprises using a coordinate system which is fixed in relation to an identifiable point (15) of the key (12).
- The method according to any one of the preceding claims, wherein the step (41) of obtaining geometric measurements comprises converting a measurement of pixels of the captured image into a unit of length.
- A lock configuration device (19) for obtaining a lock configuration, said lock configuration matching a key, wherein the lock configuration device (19) comprises:a key scanner (10) arranged to capture an image of the key;a controller arranged to obtain geometric characteristics of the key using the captured image;determining, using the geometric characteristics, order and types of pins for a lock matching the key;presenting the determined types of pins in the determined order.
- The lock configuration device (19) according to claim 8, wherein the key scanner (10) and controller are provided in separate entities with a communication channel for communication between the key scanner (10) and the controller.
- A computer program (101) for a lock configuration device (19), the computer program (101) comprising computer program code which, when run on the lock configuration device (19), causes the lock configuration device (19) to perform the steps of:capturing an image of the key;obtaining geometric characteristics of the key using the captured image;determining, using the geometric characteristics, order and types of pins for a lock matching the key;presenting the determined types of pins in the determined order.
- A computer program product (100) comprising a computer program (101) according to claim 10 and a computer readable means on which the computer program is stored.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0950984A SE535288C2 (en) | 2009-12-18 | 2009-12-18 | Lock schema device, method, computer program product and computer program |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2336462A1 true EP2336462A1 (en) | 2011-06-22 |
Family
ID=43709038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20100195383 Ceased EP2336462A1 (en) | 2009-12-18 | 2010-12-16 | Lock pin configuration device and method, computer program product and computer program therefor |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2336462A1 (en) |
SE (1) | SE535288C2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103453840A (en) * | 2013-09-23 | 2013-12-18 | 董仲伟 | Automatic detection method for lock core precision of cylinder lock |
CN103499305A (en) * | 2013-09-23 | 2014-01-08 | 董仲伟 | Automatic detection method for spring lock body accuracy |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3226811A (en) * | 1964-06-26 | 1966-01-04 | Maromatic Co Inc | Tumbler lock pin setting machine |
US3264742A (en) * | 1965-04-12 | 1966-08-09 | Maromatic Co Inc | Tumbler identifying key reader |
FR2255140A1 (en) * | 1973-12-20 | 1975-07-18 | Neiman Exploitation Brevets | Automatic assembler for safety lock type mechanisms - has sensor for reading lock key code for controlling assembling sequences |
EP1298574A2 (en) * | 2001-09-26 | 2003-04-02 | The Hillman Group, Inc. | Key identification system |
US20070224008A1 (en) * | 2006-01-23 | 2007-09-27 | Bass Michael A | Key duplication machine |
-
2009
- 2009-12-18 SE SE0950984A patent/SE535288C2/en not_active IP Right Cessation
-
2010
- 2010-12-16 EP EP20100195383 patent/EP2336462A1/en not_active Ceased
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3226811A (en) * | 1964-06-26 | 1966-01-04 | Maromatic Co Inc | Tumbler lock pin setting machine |
US3264742A (en) * | 1965-04-12 | 1966-08-09 | Maromatic Co Inc | Tumbler identifying key reader |
FR2255140A1 (en) * | 1973-12-20 | 1975-07-18 | Neiman Exploitation Brevets | Automatic assembler for safety lock type mechanisms - has sensor for reading lock key code for controlling assembling sequences |
EP1298574A2 (en) * | 2001-09-26 | 2003-04-02 | The Hillman Group, Inc. | Key identification system |
US20070224008A1 (en) * | 2006-01-23 | 2007-09-27 | Bass Michael A | Key duplication machine |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103453840A (en) * | 2013-09-23 | 2013-12-18 | 董仲伟 | Automatic detection method for lock core precision of cylinder lock |
CN103499305A (en) * | 2013-09-23 | 2014-01-08 | 董仲伟 | Automatic detection method for spring lock body accuracy |
CN103499305B (en) * | 2013-09-23 | 2015-11-04 | 董仲伟 | The automatic testing method of spring lock lock body precision |
CN103453840B (en) * | 2013-09-23 | 2015-12-23 | 董仲伟 | The automatic testing method of lock core precision of cylinder lock |
Also Published As
Publication number | Publication date |
---|---|
SE535288C2 (en) | 2012-06-19 |
SE0950984A1 (en) | 2011-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113168171B (en) | Abnormality detection device and abnormality detection method | |
EP2336462A1 (en) | Lock pin configuration device and method, computer program product and computer program therefor | |
KR102568996B1 (en) | Surveillance camera setting method, method and system for surveillance camera management | |
SG192567A1 (en) | Information processing apparatus, information processing method, and program | |
JPWO2006006533A1 (en) | Personal authentication system, personal authentication method, personal authentication program and recording medium | |
CN111930054B (en) | Computer room management method, computer room management device, storage medium and equipment | |
JP2019016079A (en) | Maintenance support device for power apparatus, system and program | |
US20140335796A1 (en) | Monitoring activities of daily living using radio frequency emissions | |
US20090049377A1 (en) | Systematic surface review | |
CN104126154B (en) | The automatic planning of the control technology of technical equipment | |
JP4728867B2 (en) | Time management system and time management program | |
US20210194423A1 (en) | Electronic apparatus, method, and electronic system | |
US11869293B2 (en) | Building control systems | |
US7890522B2 (en) | Record media written with data structure for recognizing a user and method for recognizing a user | |
KR20190108937A (en) | Verification system for typical architecture and method thereof | |
KR20060122072A (en) | Method for providing resident management service, system for using resident management service, and computer readable medium processing the method | |
CN104160413A (en) | Method for constructing control system for controlling energy-consuming equipment and control system for controlling energy-consuming equipment | |
JP2020129287A (en) | Process information acquisition system, process information acquisition method, and process information acquisition program | |
JP2005122378A (en) | Quality control system for housing construction | |
Gonzalez et al. | Data mining-based localisation of spatial low-resolution sensors in commercial buildings | |
US20130039530A1 (en) | System and Method for Replacing a Key | |
CN107038330A (en) | A kind of compensation method of shortage of data and device | |
CN201465114U (en) | Multi-person synchronous fingerprint verification system | |
CN104615922A (en) | Identity authentication device and method based on user software behavior mode | |
CN113933263B (en) | Near infrared spectrum model building method based on index fitting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
17P | Request for examination filed |
Effective date: 20111221 |
|
17Q | First examination report despatched |
Effective date: 20150504 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20160426 |