SE535288C2 - Lock schema device, method, computer program product and computer program - Google Patents
Lock schema device, method, computer program product and computer program Download PDFInfo
- Publication number
- SE535288C2 SE535288C2 SE0950984A SE0950984A SE535288C2 SE 535288 C2 SE535288 C2 SE 535288C2 SE 0950984 A SE0950984 A SE 0950984A SE 0950984 A SE0950984 A SE 0950984A SE 535288 C2 SE535288 C2 SE 535288C2
- Authority
- SE
- Sweden
- Prior art keywords
- key
- lock
- pins
- types
- obtaining
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000004590 computer program Methods 0.000 title claims description 22
- 238000005259 measurement Methods 0.000 claims description 19
- 238000004891 communication Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 2
- 102100027069 Odontogenic ameloblast-associated protein Human genes 0.000 description 1
- 101710091533 Odontogenic ameloblast-associated protein Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003908 quality control method Methods 0.000 description 1
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B17/00—Accessories in connection with locks
- E05B17/0004—Lock assembling or manufacturing
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B15/00—Other details of locks; Parts for engagement by bolts of fastening devices
- E05B15/08—Key guides; Key pins ; Keyholes; Keyhole finders
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B17/00—Accessories in connection with locks
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
- E05B19/0011—Key decoders
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B27/00—Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B27/00—Cylinder locks or other locks with tumbler pins or balls that are set by pushing the key in
- E05B27/0003—Details
Abstract
ABSTRACT It is presented a method for obtaining a lockconfiguration matching a key. The method comprises thesteps, executed in a lock configuration device, of:capturing an image of the key; obtaining geometriccharacteristics of the key using the captured image;determining, using the geometric characteristics, orderand types of pins for a lock matching the key;presenting the determined types of pins in the determined order. (FIG. 1)
Description
LOCK CONFIGURATION DEVICE, METHOD, COMPUTER PROGRAMPRODUCT AND COMPUTER PROGRAM FIELD OF INVENTION The present invention relates generally to lockassembly, and more particularly to lock assembly based on a given key.
BACKGROUND In most cases, keys and locks are manufactured at thesame time, whereby it is ensured that the keys that are supplied fit the lock or locks.
However, there are situations where it is desired toobtain a new lock which fits a certain key. For example,consider the situation of a residential house havingmultiple doors, such as a front door and a kitchenentrance. In such circumstances it is common to have thelocks configured in the same way such that a single keycan be used to unlock any of the doors to the house. Ifan addition is built to the house, there may be a newdoor, it is a new garden door. In this situation, e.g.desirable to install a lock in the garden door whichcould also be opened using the same key that is used for the other doors of the house.
There are several more or less automated systems forproducing a copy of a given key. However, the prior art fails to provide On the contrary, in the prior art, assembling a lock tofit a given key is an art performed by an experienced locksmith. The locksmith examines the key and attempts, at least partly by trial and error, to configure a lock which matches the key.
While, in many cases, an experienced locksmith is ableto obtain a lock which matches a given key, it cansometimes take a significant amount of time to produce afitting lock. Moreover, it would be beneficial to allowpersons with less experience to be able to create a lock from a key.
SUIVIMARY OF THE INVENTION It is therefore an object of the invention to provide amethod and system which allows an automated key analysis and pin selection.
According to the invention there is provided a methodfor obtaining a lock configuration matching a key. Themethod comprises the steps, executed in a lockconfiguration device, of: capturing an image of the key;obtaining geometric characteristics of the key using thecaptured image; determining, using the geometriccharacteristics, order and types of pins for the lockconfiguration matching the key; and presenting the determined types of pins in the determined order.
This enables an efficient and consistent way ofdetermining a lock configuration matching a key. Thisconfiguration can be used to assemble a lock whichmatches a particular key. Furthermore, this methodallows for quality control of key production, where themethod provides a pin sequence which can be checked against an expected pin sequence.
The step of determining may comprise determining eachpin separately using a subset of the geometric characteristics.
The step of determining order and types of pins may comprise using a lookup table.
The step of determining order and types of pins may comprise using a rule bases pin determination.
The step of obtaining geometric characteristics maycomprise obtaining geometric characteristics for two or more separate rows of teeth of the key.
The step of obtaining geometric measurements maycomprise using a coordinate system which is fixed in relation to an identifiable point of the key.
The step of obtaining geometric measurements maycomprise converting a measurement of pixels of the captured image into a unit of length.
A second aspect of the invention is a lock configurationdevice for obtaining a lock configuration, said lockconfiguration matching a key. The lock configurationdevice comprises: a key scanner arranged to capture animage of the key; a controller arranged to obtaingeometric characteristics of the key using the capturedimage; determining, using the geometric characteristics,order and types of pins for a lock matching the key;presenting the determined types of pins in the determined order.
The key scanner and controller may be provided in separate entities with a communication channel for communication between the key scanner and the controller.
A third aspect of the invention is a computer program(101) for a lock configuration device, the computerprogram (101) comprising computer program code which,when run on the lock configuration device, causes thelock configuration device to perform the steps of:capturing an image of the key; obtaining geometriccharacteristics of the key using the captured image;determining, using the geometric characteristics, orderand types of pins for a lock matching the key;presenting the determined types of pins in the determined order.
A fourth aspect of the invention is a computer programproduct comprising a computer program according to thethird aspect and a computer readable means on which the computer program is stored.
It is to be noted that all aspects of the first, second third, fourth aspects can be applied, where applicable, to any other of these aspects.
Embodiments of the invention provide an elegant andconvenient solution to the problem of assembling a lockfitting a given key. The user simply scans the key usingthe key scanner and is provided with information tounambiguously select the correct pins for a fittinglock. This reduces the time such an operation takes and increases reliability compared to the prior art.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwiseherein. All references to "a/an/the element, device,component, means, step, etc." are to be interpretedopenly as referring to at least one instance of theelement, device, component, means, step, etc., unlessexplicitly stated otherwise. The steps of any methoddisclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
BRIEF DESCRIPTION OF DRAWINGS The invention is now described, by way of example, with reference to the accompanying drawings, in which: Fig 1 is a schematic diagram of an environment where the present invention can be embodied, Fig 2 is a schematic diagram of how key characteristicsare obtained from an image of a key according to an embodiment of the present invention, Fig 3 is a schematic diagram of how pin types can be presented to a user, Fig 4 is a flowchart illustrating a method according to an embodiment of the present invention, and Fig 5 shows one example of a computer program productcomprising computer readable means and a computer program thereon.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS The present invention will now be described more fullyhereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown.
This invention may, however, be embodied in manydifferent forms and should not be construed as limitedto the embodiments set forth herein; rather, theseembodiments are provided by way of example so that thisdisclosure will be thorough and complete, and will fullyconvey the scope of the invention to those skilled inthe art. Like numbers refer to like elements throughout the description.
Fig 1 is a schematic diagram of an environment where thepresent invention can be embodied. The arrangement isused to provide a scheme of pin types 17 to a user sothe user can assemble a lock 18 matching a given key 12.The key 12 is thus the key to be used as a base for theassembly of the lock 18. The key 12 is any key 12 whereits geometric construction determines whether it can open and close a lock or not.
The key is read by a key scanner 10. The key scanner 10captures an image of the key 12 to allow the geometricconstruction of the key 12 to be analysed. The keyscanner 10 can comprise a camera, a flatbed scanner orany other suitable device for capturing an image of thekey 12. The key scanner is connected via a communicationchannel to a computer 11. This communication channel canfor example be a wired connection such as USB (UniversalSerial Bus), FireWire, serial RS-232, Ethernet, or awireless connection such as BlueTooth, ZigBee, wireless USB, wireless local area network (IEEE 802.11), etc.
Once the key scanner 10 has captured an image of the key12, as will be explained in more detail below, geometric characteristics are obtained from the key. This can be performed in the key scanner 10 or a computer 11connected to the key scanner 10. The computer 11 can beany suitable computer with capability of executingcomputer programs, communicating with the key scanner 10and which has a user interface allowing the user 14 tobe provided with information on what types of pins to use and in what order to assemble them.
The user 14 thus gets information from the computer 11on how to assemble a lock 18 which matches the key 12.This is schematically shown by the pins 17 of lock 18which have been arranged in an order corresponding to the measurements obtained from the image of the key 12.
The key scanner 10 and the computer 11 can inconjunction be called a lock configuration device 19.The key scanner 10 and the computer 11 can be separate,as depicted in Fig 1, or they can be combined in a single lock configuration device 19.
Fig 2 is a schematic diagram of how key characteristicsare obtained from an image 5 of a key according to anembodiment of the present invention. In this example,the notches 13a-f are measured to obtain thecharacteristics of the key. Firstly, a reference pointis found on the image 5 of the key 12. This can forexample be at a reference point 15 corresponding towhere the lower part of a collar of the key 12transitions to the blade of the key 12. Furthermore, ahorizontal reference is found, such as the upper part ofthe blade 16. Alternatively, the horizontal referencecan be a ridge of the profile of the key. With the reference point 15 and the horizontal reference established, a coordinate system can be fixed inrelation to the key. Once the horizontal reference isfound, measurements 13a-f can be obtained in relation tothe horizontal reference. The measurements l3a-f can beobtained at predetermined horizontal distances from thereference point 15. Optionally, the measurements 13a-fin a are obtained according to the rules, for example, notch or on a tooth.
It is to be noted that the system can be configured tobe applicable to several different key types. The keytypes can be identifies by the geometrics of the key 12or by the user 14 entering key type to the computer 11.The key type can affect how many pins are to be used,what set of pins to use (in other words selecting andappropriate look-up table or rule set), and/or the horizontal distances between measurements l3a-f.
It is to be noted that the key 12 may assume othershapes, including more square shaped keys. Furthermore,the key could have two or more separate rows of teeth onthe same key. As long as all teeth and/or notches arecaptured on the image 5 from the key scanner 10, themeasurements can be obtained from the image 5 and serve as a base for the determination of pins.
Fig 3 is a schematic diagram of how pin types can bepresented to a user. This can for example be shown on ascreen of the computer 11 of Fig 1. A graphical output32 is shown, indicating the visually how the pins shouldbe arranged. For example, for some locks, every pin canbe rotatably arranged in two ways, whereby the graphical output assists the user to assemble the lock correctly.
Furthermore, a second section 30 of the display showspart numbers for the user. In this way, the user canunambiguously assemble a lock which fits a given key.The part numbers shown in Fig 3 are only examples, anyunambiguous identification of pins is possible. Forexample, in one example, the second section 30 canpresent measurements of pins, if all pins have the same profile and only differ in length.
Fig 4 is a flowchart illustrating a method according toan embodiment of the present invention. The methodassists a user in assembling a lock for a given key, asillustrated e.g. in Fig 1. References will also be madeto Fig 1 to further clarify the various entities used in the method.
In an initial capture key image step 40, an image of the key 12 is obtained using the key scanner 10.
In an obtain geometric characteristics step 41, thecomputer 11 or the key scanner 10 obtains the geometriccharacteristics of the key 12, as explained in with reference to Fig 2 above.
In a determine order and type of pins step 42, the orderand types of pins are determined. Processing for eachpin is performed separately. For each pin, one, two oreven more measurements can be required to determine itstype. In this example, each pin determinationcorresponds to one measurement (13a-f in Fig 2). To finda pin, the measurement (or measurements) first need tobe converted to a unit of length, such as millimetres.Once the length is used, this can be used to determine an appropriate pin, either using a look-up table, from measurement ranges to pins, or a determination rule. Forexample, if a measurement is found to be 4.2millimetres, this can correspond to a pin with partnumber 111, if there is a rule that measurements between4.05 and 4.35 matches a pin with part number 111.Similarly, if two measurements are needed to determine apin, the two measurements are used together to find amatching pin type number. This process is repeated until all pins are determined.
In a present pins step 43, the pins determined in theprevious step are presented to the user. This allows theuser to assemble a lock which fits the given key 12.Alternatively, in key production, the presented pins arechecked against expected pins to verify that the key has been produced with characteristics as expected.
Fig 5 shows one example of a computer program product100 comprising computer readable means. On this computerreadable means a computer program 101 can be stored,which computer program can cause a controller to executethe method according to embodiments described herein. Inthis example, the computer program product is an opticaldisc, such as a CD (compact disc) or a DVD (digitalversatile disc). The computer program product could alsobe embodied as a memory of a device, such as a memory ofthe computer 11. While the computer program 101 is hereschematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product.
The invention has mainly been described above with reference to a few embodiments. However, as is readily 11 appreciated by a person skilled in the art, otherembodiments than the ones disclosed above are equallypossible within the scope of the invention, as defined by the appended patent claims.
Claims (11)
1. A method for obtaining a lock configuration matchinga key (12), the method, comprising the steps, executedin a lock configuration device (19), of: capturing (40) an image of the key; obtaining (41) geometric characteristics of the keyusing the captured image; determining (41), using the geometriccharacteristics, order and types of pins for the lockconfiguration matching the key (12); and presenting (43) the determined types of pins in the determined order.
2. The method according to claim 1, wherein the step(42) of determining comprises determining each pinseparately using a subset of the geometric characteristics.
3. The method according to claim 1 or 2, wherein thestep (42) of determining order and types of pins comprises using a lookup table.
4. The method according to claim 1 or 2, wherein thestep (42) of determining order and types of pins comprises using a rule based pin determination.
5. The method according to any one of the precedingclaims, wherein the step (41) of obtaining geometriccharacteristics comprises obtaining geometriccharacteristics for two or more separate rows of teeth of the key (12). 13
6. The method according to any one of the precedingclaims, wherein the step (41) of obtaining geometricmeasurements comprises using a coordinate system whichis fixed in relation to an identifiable point (15) of the key (12).
7. The method according to any one of the precedingclaims, wherein the step (41) of obtaining geometricmeasurements comprises converting a measurement of pixels of the captured image into a unit of length.
8. A lock configuration device (19) for obtaining alock configuration, said lock configuration matching akey, wherein the lock configuration device (19)comprises: a key scanner (10) arranged to capture an image ofthe key; a controller arranged to obtain geometriccharacteristics of the key using the captured image; determining, using the geometric characteristics,order and types of pins for a lock matching the key; presenting the determined types of pins in the determined order.
9. The lock configuration device (19) according toclaim 8, wherein the key scanner (10) and controller areprovided in separate entities with a communicationchannel for communication between the key scanner (10) and the controller. 14
10. A computer program (101) for a lock configurationdevice (19), the computer program (101) comprisingcomputer program code which, when run on the lockconfiguration device (19), causes the lock configurationdevice (19) to perform the steps of: capturing an image of the key; obtaining geometric characteristics of the key usingthe captured image; determining, using the geometric characteristics,order and types of pins for a lock matching the key; presenting the determined types of pins in the determined order.
11. A computer program product (100) comprising acomputer program (101) according to claim 10 and acomputer readable means on which the computer program is stored.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0950984A SE535288C2 (en) | 2009-12-18 | 2009-12-18 | Lock schema device, method, computer program product and computer program |
EP20100195383 EP2336462A1 (en) | 2009-12-18 | 2010-12-16 | Lock pin configuration device and method, computer program product and computer program therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0950984A SE535288C2 (en) | 2009-12-18 | 2009-12-18 | Lock schema device, method, computer program product and computer program |
Publications (2)
Publication Number | Publication Date |
---|---|
SE0950984A1 SE0950984A1 (en) | 2011-06-19 |
SE535288C2 true SE535288C2 (en) | 2012-06-19 |
Family
ID=43709038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE0950984A SE535288C2 (en) | 2009-12-18 | 2009-12-18 | Lock schema device, method, computer program product and computer program |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2336462A1 (en) |
SE (1) | SE535288C2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103499305B (en) * | 2013-09-23 | 2015-11-04 | 董仲伟 | The automatic testing method of spring lock lock body precision |
CN103453840B (en) * | 2013-09-23 | 2015-12-23 | 董仲伟 | The automatic testing method of lock core precision of cylinder lock |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3226811A (en) * | 1964-06-26 | 1966-01-04 | Maromatic Co Inc | Tumbler lock pin setting machine |
US3264742A (en) * | 1965-04-12 | 1966-08-09 | Maromatic Co Inc | Tumbler identifying key reader |
FR2255140A1 (en) * | 1973-12-20 | 1975-07-18 | Neiman Exploitation Brevets | Automatic assembler for safety lock type mechanisms - has sensor for reading lock key code for controlling assembling sequences |
US6836553B2 (en) * | 2000-07-25 | 2004-12-28 | The Hillman Group, Inc. | Key identification system |
EP1976656B1 (en) * | 2006-01-23 | 2014-10-29 | Hy-Ko Products Company | Key duplication machine |
-
2009
- 2009-12-18 SE SE0950984A patent/SE535288C2/en not_active IP Right Cessation
-
2010
- 2010-12-16 EP EP20100195383 patent/EP2336462A1/en not_active Ceased
Also Published As
Publication number | Publication date |
---|---|
SE0950984A1 (en) | 2011-06-19 |
EP2336462A1 (en) | 2011-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8037533B2 (en) | Detecting method for network intrusion | |
CA2428396A1 (en) | Method of updating interests | |
JP2015529907A (en) | Software tools for creating and managing document reference templates | |
CN102945517B (en) | The data digging method in a kind of apparel standard man-hour based on cluster analysis | |
CN108388640B (en) | Data conversion method and device and data processing system | |
Xu et al. | Multivariate quality control solved by one‐class partial least squares regression: identification of adulterated peanut oils by mid‐infrared spectroscopy | |
Carroll et al. | Roll call analysis and the study of legislatures | |
Wunsch et al. | Patterns of democratic backsliding in third-wave democracies: a sequence analysis perspective | |
Mollica et al. | Epitope profiling via mixture modeling of ranked data | |
SE535288C2 (en) | Lock schema device, method, computer program product and computer program | |
CN108009740B (en) | Intelligent fine identification system and method for tobacco essence and flavor | |
CN115908080A (en) | Carbon emission optimization method and system based on multidimensional data analysis | |
EP2605539B1 (en) | Method and system for sensor classification | |
US7890522B2 (en) | Record media written with data structure for recognizing a user and method for recognizing a user | |
CN109063026A (en) | A kind of geographic information data acquisition method and system | |
Oktaviandri et al. | Design and development of visitor management system | |
Guan | A composite likelihood cross‐validation approach in selecting bandwidth for the estimation of the pair correlation function | |
CN110073334A (en) | Building control system | |
US20130039530A1 (en) | System and Method for Replacing a Key | |
Liu et al. | Automated image localization to support rapid building reconnaissance in a large‐scale area | |
CN113933263B (en) | Near infrared spectrum model building method based on index fitting | |
Studer | Validating sequence analysis typologies using bootstrapping | |
CN115454299B (en) | User identity authentication public portal service arrangement management method and system | |
Zhang et al. | Peak tree: a new tool for multiscale hierarchical representation and peak detection of mass spectrometry data | |
Rahman et al. | The Role-Based Goal Modeling. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NUG | Patent has lapsed |