US20170193327A1 - Key blank identification system with bitting analysis - Google Patents

Key blank identification system with bitting analysis Download PDF

Info

Publication number
US20170193327A1
US20170193327A1 US15/439,236 US201715439236A US2017193327A1 US 20170193327 A1 US20170193327 A1 US 20170193327A1 US 201715439236 A US201715439236 A US 201715439236A US 2017193327 A1 US2017193327 A1 US 2017193327A1
Authority
US
United States
Prior art keywords
key
bitting
identification system
master key
master
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/439,236
Inventor
Chester O.D. Thompson
William R. Mutch
Randall A. Porras
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hy Ko Products Co
Original Assignee
Hy Ko Products Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hy Ko Products Co filed Critical Hy Ko Products Co
Priority to US15/439,236 priority Critical patent/US20170193327A1/en
Assigned to HY-KO PRODUCUTS COMPNAY reassignment HY-KO PRODUCUTS COMPNAY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MUTCH, WILLIAM R., PORRAS, RANDALL A., THOMPSON, CHESTER O.D.
Assigned to HY-KO PRODUCTS COMPANY reassignment HY-KO PRODUCTS COMPANY CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE FROM Assignors: MUTCH, WILLIAM R., PORRAS, RANDALL A., THOMPSON, CHESTER O.D.
Publication of US20170193327A1 publication Critical patent/US20170193327A1/en
Assigned to HORIZON TECHNOLOGY FINANCE CORPORATION reassignment HORIZON TECHNOLOGY FINANCE CORPORATION SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CONVENTUS ORTHOPAEDICS, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06K9/6202
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/66Trinkets, e.g. shirt buttons or jewellery items
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C3/00Milling particular work; Special milling operations; Machines therefor
    • B23C3/28Grooving workpieces
    • B23C3/35Milling grooves in keys
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01BMEASURING LENGTH, THICKNESS OR SIMILAR LINEAR DIMENSIONS; MEASURING ANGLES; MEASURING AREAS; MEASURING IRREGULARITIES OF SURFACES OR CONTOURS
    • G01B11/00Measuring arrangements characterised by the use of optical techniques
    • G01B11/02Measuring arrangements characterised by the use of optical techniques for measuring length, width or thickness
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01BMEASURING LENGTH, THICKNESS OR SIMILAR LINEAR DIMENSIONS; MEASURING ANGLES; MEASURING AREAS; MEASURING IRREGULARITIES OF SURFACES OR CONTOURS
    • G01B11/00Measuring arrangements characterised by the use of optical techniques
    • G01B11/22Measuring arrangements characterised by the use of optical techniques for measuring depth
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/46Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]; Salient regional features
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C2235/00Details of milling keys
    • B23C2235/12Using a database to store details of the key, the information in the database being used for the generation of the profile of the key
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C2235/00Details of milling keys
    • B23C2235/41Scanning systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T409/00Gear cutting, milling, or planing
    • Y10T409/30Milling
    • Y10T409/30084Milling with regulation of operation by templet, card, or other replaceable information supply
    • Y10T409/300952Milling with regulation of operation by templet, card, or other replaceable information supply to cut lock key
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T409/00Gear cutting, milling, or planing
    • Y10T409/30Milling
    • Y10T409/30084Milling with regulation of operation by templet, card, or other replaceable information supply
    • Y10T409/300952Milling with regulation of operation by templet, card, or other replaceable information supply to cut lock key
    • Y10T409/301008Using templet other than a key
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T409/00Gear cutting, milling, or planing
    • Y10T409/30Milling
    • Y10T409/30084Milling with regulation of operation by templet, card, or other replaceable information supply
    • Y10T409/300952Milling with regulation of operation by templet, card, or other replaceable information supply to cut lock key
    • Y10T409/301064Complete cycle

Definitions

  • This invention relates generally to the field of systems for identifying objects and, more particularly to systems for utilizing a means for identifying key blanks that are functionally compatible with an unknown key.
  • a key blank Once a key blank is chosen, it goes through a cutting process.
  • the typical cutting process simply traces the profile of the master key onto the key blank, such that the key blank will exactly match (within the error limits and accuracy of the tracing machine) the original master key.
  • a mechanically linked cutting wheel actually cuts into the key blank while it mimics the movement of the tracer as the tracer moves longitudinally along the profile of the master key. If the incorrect key blank is provided during this process, the key blank being formed into the duplicate key may not possess the correct longitudinal length, thereby causing a failure. When this type of failure occurs, the entire process of selecting a key blank for replication and then mechanically cutting the key must begin again. Worse still, if the blank has the proper length but does not possess the appropriate thickness, contour, groove or other traits, the failure may not be discovered until the key is actually inserted into the lock.
  • a key identification system comprises a sensing device configured to determine information and characteristics of a master key, and a logic to analyze the information and characteristics of the master key.
  • the sensing device may be configured to capture information about the bittings of the master key.
  • the logic analyzes information about the bittings and compares it with bitting characteristics of known key blanks to determine the likelihood of a match between the master key and the known key blanks.
  • the system configured to extract bitting information may comprise an imaging system, such as a camera or other imaging device.
  • the camera may capture an image, such as a digital image, of the bittings of the master key to be analyzed by the logic.
  • FIG. 1 illustrates a master key
  • FIG. 2 illustrates an embodiment of the key ID system.
  • FIG. 3 illustrates an example comparison chart between a TR47 master key and TR47 key data.
  • FIG. 4 illustrates an example comparison chart between a KW1 master key and KW1 key data
  • FIG. 5 illustrates an example comparison chart between a KW1 master key and SC1 key data.
  • FIG. 6 illustrates an example comparison chart between a KW1 master key and AM3 key data.
  • a system for identifying a key blank (“key ID system”) and method for identifying a key blank are provided.
  • the key ID system analyzes a master key to be duplicated, such as a house key, car key or other key, and determines the appropriate key blank to be used.
  • the system and method described herein may be used independently to determine a proper key blank, or may be used in conjunction with other systems to narrow the field of prospective key blanks.
  • existing key identification systems may be modified or retrofitted to implement some or all features described herein.
  • the master key 10 may include standard key features such as a head 16 and a blade 18 .
  • the blade 18 may connect at one end to the head 16 with the tip 14 at the opposing end.
  • the master key 10 may include teeth or bittings 12 cut into the blade.
  • the bittings 12 consist of notches cut in the blade 18 to interface with the tumblers of a corresponding lock.
  • the bittings 12 must match up with the lock's unique tumbler configuration in order to activate and turn the lock.
  • the key ID system may analyze the master key 10 to determine certain physical characteristics of the key 10 . Based on these characteristics, the key ID system may then determine the proper key blank to be used to duplicate the master key 10 .
  • the key ID system may include a sensing device or system to extract bittings information from a master key 10 .
  • the sensing system may sense and capture parameters of the bittings 12 .
  • the sensing system may include any mechanical, electronic or optical sensors, sensors, imaging devices or other tools known in the art for extracting physical characteristics of a key or similar object.
  • the sensing system for extracting bittings information from the master key 10 includes an imaging system to scan and analyze the physical characteristics of the master key 10 .
  • the imaging system may be a laser imaging system, an optical imaging system, a photo imaging system, or any other imaging system known in the art.
  • the imaging system may scan the master key or capture an image of the master key to determine characteristics of the key that are unique to a specific key blank.
  • other known methods or devices such as electrical, mechanical, or optical sensors, may be used in place of or in conjunction with the imaging system to determine the traits and characteristics of the master key geometry.
  • the imaging system includes one or more cameras 20 configured to capture an image, such as digital images, of the master key 10 .
  • the camera 20 may specifically be positioned to capture an image of the blade 18 and bittings 12 .
  • the camera 20 may be positioned perpendicular to the blade 18 .
  • the camera 20 may positioned at an angle or at other position to capture the desired image
  • the imaging system may further include other components to aid in capturing images of the master key 10 , such as one or more lights 24 and mirrors.
  • the lights 24 may be positioned to enhance the clarity and quality of the image recorded by the imaging system.
  • the light 24 may be positioned to provide backlighting for the key.
  • the mirrors may be positioned to allow a camera in a first position to record an image of the key from a second position.
  • the mirrors may further allow a single camera to record multiple images of the master key from different angles, thereby increasing the amount of information related to the master key recorded by a single camera
  • the image system may include one or more reflectors 26 .
  • the reflector 26 may be positioned to direct light to a desired location.
  • a reflector may be positioned underneath the key 10 and facing the light 24 .
  • the reflector 26 may be angled, such as tilted upwards, to direct light from the light 24 to the underside of the key 10 , thereby providing backlighting of the key 10 .
  • the light 24 and reflector 26 may be arranged in any configuration to optimize or clarify the image of the key 10 .
  • the key ID system may include a key holder 22 to hold the master key 10 .
  • the key holder may be any device capable of holding or supporting a master key 10 .
  • the key holder 22 may comprise a lower support and an upper door to close onto the key 10 .
  • the key holder may alternatively comprise a clamp, gripper, platform, suspension, or any other device configured to hold the master key 10 .
  • the key ID system may analyze characteristics of the master key's teeth or bittings 12 . Because the bittings 12 are configured to match up with the corresponding lock's unique tumbler configuration, various characteristics of the bittings 12 are often unique to certain types of key blanks. For example, certain key manufacturers may use distinct bitting patterns, or a set of unique bitting patterns, for their locks or for a group of locks. Additionally, certain types of keys, such as house keys or car keys, may use a different bittings configuration than other types of keys. By analyzing the master key bittings 12 and comparing them to bitting configurations used with known key blanks, the field of prospective matching key blanks may be greatly reduced.
  • the key ID system may include a logic to analyze bitting characteristic information captured by the key ID system.
  • logic includes but is not limited to a software, a firmware, an executable program, a hardware or hard-wired circuit, or combinations thereof.
  • a logic may include a software controlled microprocessor, discrete logic like an application specific integrated circuit (ASIC), an analog circuit, a digital circuit, a programmed logic device, a memory device containing instructions, or the like.
  • Logic may include one or more gates, combinations of gates, or other circuit components. Logic may also be fully embodied as software. Where multiple logics are described, it may be possible to incorporate the multiple logics into one physical logic. Similarly, where a single logic is described, it may be possible to distribute that single logic between multiple physical logics.
  • the logic may be configured to determine a correlation or likelihood of a match between a known key blank and the master key 10 .
  • the logic may include a database to store key related information (“key data”).
  • the key data may include characteristics of known key blanks, such as length, shape, bitting information, size, shape and location of key grooves, and other geometric and physical characteristics of known key blanks.
  • the database may be integral with the logic, in communication with the logic, or remotely accessible to the logic.
  • the database may associate key data with specific key blanks or with types or groups of key blanks.
  • the database may associate key data with specific key manufacturers or different types of keys such as house keys or car keys.
  • the key ID system may access the database to compare scanned characteristics of the master key with the stored key data in the database. Key blanks that do not have characteristics consistent with those of the master key may be then ruled out as possible matches for the key blank.
  • the key ID system may scan the master key 10 at one or more angles and compare the scanned data with stored key data.
  • the database stores key data related to bittings used with known key blanks.
  • key bittings are represented as a numeric bitting code that contains information as to how a key is to be cut by a locksmith.
  • the bitting code is a series of integers (e.g. 372164) that may be translated or decoded from a key code chart or bitting code list.
  • the database may store data related to known key bitting patterns other than numeric bitting codes. For example, the database may store measurements of bitting geometries used with known key blanks.
  • Stored bitting geometries may include bitting spacings, notch depths, blade width, and bitting flat width.
  • Spacing data may relate to the location or spacing between of each bitting notch along the length of the key blade 18 . Spacing data may be measured from the center of each notch to a specific reference point, such as the tip 14 or shoulder of the blade 18 . Depth data may relate to the depth of each bitting notch and may be measured as the distance between a reference edge, such as the back side or center line of the blade 18 , and the notch surface.
  • Blade width may relate to the width of the blade surface to be cut.
  • Bitting flat width may relate to the width of each notch surface and may be measured as the distance across the bottom of the notch.
  • the logic may determine bitting parameters of the master key 10 by analyzing an image captured by an imaging system.
  • the bitting parameters may be compared to bitting data in the database to determine if the master key 10 matches a key blank or blanks in the database.
  • bitting parameters of the master key such as spacing and depth, may be analyzed at various preselected points, such as at the bitting notches.
  • the master key bitting parameters may then be compared to bitting data in the database. If the bitting parameters of the master key match the bitting data of a key blank in the database, then that key blank may be appropriate for duplicating the master key.
  • each bitting depth of a master key 10 is very close to an allowable bitting depth for a given key blank, then the key blank may be a match.
  • the bitting flat width and spacing of the bittings of a master key 10 are close to allowable bitting flat widths and spacings for a given key blank, then the key blank may be a match.
  • the bitting data of the master key is not close to allowable data for a given key blank, then the given key blank or blanks may be ruled out as a possible match.
  • the database may associate bitting data with various key-related identifiers. For example, while bitting data may be directly associated with specific key blanks, it may also be associated with groups of keys, such as keys made by a specific key manufacturer or certain types of keys. Accordingly, large groups of potential key blanks may be ruled out if a bitting parameter of the master key does not match a bitting parameter shared by the group of keys.
  • the bitting positions can be analyzed in any number of methods.
  • One embodiment includes first determining the pattern of the unknown subject key. Each stored pattern may then be tested against the subject key. The test may involve checking each of the known spacing positions for the stored pattern and seeing if there is a bitting at that position.
  • the logic may analyze or measure the slope or angle with respect to the length of the blade 18 of the master key pattern near the sample position and determining if there is a “flat” in that position.
  • a flat could be defined as a small segment of the pattern (0.020′′ wide for example) with a slope or angle that is close to 0 degrees, (less than 17 degrees for example) that is either centered, just left or right of, the target spacing position. If a flat is identified, then the depth of the flat can also be identified from the subject key pattern relative to the reference axis.
  • the key ID system may set tolerance ranges for each bitting parameter measurement.
  • the comparison values In order for a key blank to match a master key, the comparison values must fall within the predetermined tolerance range. For example, as illustrated in the test results window of FIGS. 3-6 , the tolerance range for bitting depth may be set to plus or minus six thousandths of an inch. In order for the master key to match a key blank, each depth measurement comparison must fall within this range. As shown in FIGS. 3 and 4 , the comparison values are all between ⁇ 1 and +1, indicating a match between the master key and the tested key blank or blanks. FIGS.
  • the pass/fail limits could be based on a set range, a set percentage of the depth offsets of the target key, or some other parameter. The limits may be set the same for all keys or may be individualized on a key-by-key basis.
  • the pattern matching algorithms may be repeated while shifting the data by small increments (0.020′′ for example) in either or both directions. For example, if a key blank was slightly miscut and the spacing was shifted from the nominal position, the search may fail at the nominal position but may identify the pattern shifted slightly over from the nominal position.
  • the spacing and depth evaluations may be measured using a scoring system of 0 to 100%, where 0 is considered to be an impossible match and 100 is a perfect match.
  • the total bitting score is then the product of the combined spacing and depth scores.
  • the logic may compare the bittings of a master key 10 to key data related to a key blank in the database and evaluate a series of preset spacing point for the given key blank. For example, the geometry of the master key 10 may be analyzed at each spacing point. A score may be given to each spacing point based on the flatness of the bitting 12 at the spacing point and a measurement of the variation or slope of the bitting 12 relative to the database depths. The relationships between angles can be varied to achieve optimal results. The flatter the area near the spacing point, the higher the score. For example, zero degrees (or flat) might represent a score of 100 and 45 degrees might represent 0.
  • the logic may analyze the depth of the blade at each spacing point give a score to the spacing point based on the variation from one of the valid depths for the given key blank stored in the database. For example, no variation might represent a score of 100 and 2 ⁇ the differences between depths might represent a score of 0.
  • the logic may compute this evaluation for each of the spacing points and then compute a total by averaging all the points. This entire process may be repeated with a slight shift towards the head 16 of the key 10 and again with a shift towards the tip 14 of the key 10 . This will compensate for a key 10 that has a slight spacing shift. The best of the three totals are used in the final results for the bitting evaluation.
  • the logic may determine the centers of each of the flats on the bittings 12 of the master key 10 . Because the center of a flat that is on the peak of a bitting may be skewed due to the depth of the bitting on the left and right, the logic may ignore peaks. The logic may also ignore ridges because the center of flats that are on ridges may be skewed due to the depth and height of the bittings 12 on either side. However, flats that are located in “valleys,” or between bittings of lesser depth, are often properly centered regardless of what is on either side. For each identified valley, the logic may compare the nearest database spacing position and a score is given. A total spacing score is then computed based on the average score for each of the valleys.
  • the database is not limited to bittings data.
  • the database may store information related to other identifying parameters of the key.
  • the key ID system may utilize other key parameters, in combination with bittings information, to narrow the field of possible key blanks.
  • the key ID system as described may be used in conjunction with other known key identification systems.
  • the key ID system may be used in conjunction with user interface identification systems, such as the object identification system disclosed in U.S. Publication No. 2004/0095380 and the key duplication system disclosed in U.S. Publication No. 2007/0224008, each of which are hereby incorporated by reference in their entirety.

Abstract

A key identification system is provided. The key identification system comprises a sensing device configured to extract bitting information from a master key, and a logic configured to analyze the image. The sensing device may be configured to capture information about the bittings of the master key, such as an image of the bittings. The logic analyzes information about the bittings of the master key and compares it with bitting characteristics of known key blanks to determine the likelihood of a match between the master key and a known key blank.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 14/147,308, filed on Jan. 3, 2014, and entitled “KEY BLANK IDENTIFICATION SYSTEM WITH BITTING ANALYSIS,” which is a continuation of U.S. patent application Ser. No. 12/772,763 filed on May 3, 2010, and entitled “KEY BLANK IDENTIFICATION SYSTEM WITH BITTING ANALYSIS,” which claims the benefit of priority of U.S. Provisional Patent Application No. 61/215,122 filed on May 1, 2009, and entitled “KEY BLANK IDENTIFICATION SYSTEM WITH BITTING ANALYSIS,” and U.S. Provisional Patent Application No. 61/275,648 filed on Sep. 1, 2009, and entitled “KEY BLANK IDENTIFICATION SYSTEM WITH BITTING ANALYSIS,” each of which are hereby incorporated by reference in their entirety.
  • FIELD OF ART
  • This invention relates generally to the field of systems for identifying objects and, more particularly to systems for utilizing a means for identifying key blanks that are functionally compatible with an unknown key.
  • BACKGROUND OF THE INVENTION
  • The art of key replication is well known. Commonly, a key intended for duplication (the master key) is copied on to an appropriately identified key blank utilizing any number of different systems known in the art. The process of identifying an appropriate key blank to use when making copies of a key can be a difficult, tedious and time consuming affair. It is important that each master key be copied onto the proper key blank so as to prevent numerous adverse consequences caused by reproducing a master key onto an inappropriate key blank. However, choosing the correct key blank can be difficult even for experts in the field.
  • There are hundreds, if not thousands, of key blanks, and many blanks are not readily distinguished from others. Identifying the correct key blank for use in duplication involves selecting a blank from hundreds or even thousands of possibilities, where differences between key blanks may be very subtle. These hard-to-notice subtleties significantly increase the level of difficulty for all operators of such key replication systems, both inexperienced trainees and experts alike.
  • Once a key blank is chosen, it goes through a cutting process. The typical cutting process simply traces the profile of the master key onto the key blank, such that the key blank will exactly match (within the error limits and accuracy of the tracing machine) the original master key. Normally, a mechanically linked cutting wheel actually cuts into the key blank while it mimics the movement of the tracer as the tracer moves longitudinally along the profile of the master key. If the incorrect key blank is provided during this process, the key blank being formed into the duplicate key may not possess the correct longitudinal length, thereby causing a failure. When this type of failure occurs, the entire process of selecting a key blank for replication and then mechanically cutting the key must begin again. Worse still, if the blank has the proper length but does not possess the appropriate thickness, contour, groove or other traits, the failure may not be discovered until the key is actually inserted into the lock.
  • Businesses that offer key cutting services are often times not staffed by experienced locksmiths. Instead, employees are usually trained to “eyeball” what is thought to be the correct blank and then cut a duplicate key. Such informal and imprecise key blank identification invariably increases the rate of failures for the duplication process. These failures often occur at the expense of the industry and to the extreme dismay of the key holder. Therefore, the industry would welcome an easy-to-use key blank identification system that increases the accuracy and efficiency of key replication.
  • Not surprisingly, numerous attempts have been made to improve identification systems and/or key replication systems. Many of these improvements include imaging systems designed to determine the proper key blank based on physical parameters of the key to be copied, such as length, shape, and groove characteristics.
  • While many of these systems provide useful improvements for determining a proper key blank, they still suffer from various deficiencies. Specifically, many of these systems compare scanned data from a master key with data of known key blanks. However, in some instances the scanned key parameters and the key blank data are insufficient to determine the proper key blank. In such cases, additional information about the master key and the key blank would be useful in narrowing the field of prospective key blanks. Accordingly, an improved system and method for determining a key blank is needed.
  • SUMMARY
  • A key identification system is provided. The key identification system comprises a sensing device configured to determine information and characteristics of a master key, and a logic to analyze the information and characteristics of the master key. The sensing device may be configured to capture information about the bittings of the master key. The logic analyzes information about the bittings and compares it with bitting characteristics of known key blanks to determine the likelihood of a match between the master key and the known key blanks.
  • In an embodiment, the system configured to extract bitting information may comprise an imaging system, such as a camera or other imaging device. The camera may capture an image, such as a digital image, of the bittings of the master key to be analyzed by the logic.
  • DESCRIPTION OF THE DRAWINGS
  • Objects and advantages together with the operation of the invention may be better understood by reference to the following detailed description taken in connection with the following illustrations, wherein:
  • FIG. 1. illustrates a master key.
  • FIG. 2. illustrates an embodiment of the key ID system.
  • FIG. 3 illustrates an example comparison chart between a TR47 master key and TR47 key data.
  • FIG. 4 illustrates an example comparison chart between a KW1 master key and KW1 key data
  • FIG. 5 illustrates an example comparison chart between a KW1 master key and SC1 key data.
  • FIG. 6 illustrates an example comparison chart between a KW1 master key and AM3 key data.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Reference will now be made in detail to exemplary embodiments of the present invention, examples of which are illustrated in the accompanying drawings. It is to be understood that other embodiments may be utilized and structural and functional changes may be made without departing from the respective scope of the present invention.
  • A system for identifying a key blank (“key ID system”) and method for identifying a key blank are provided. The key ID system analyzes a master key to be duplicated, such as a house key, car key or other key, and determines the appropriate key blank to be used. The system and method described herein may be used independently to determine a proper key blank, or may be used in conjunction with other systems to narrow the field of prospective key blanks. Moreover, it will be understood that existing key identification systems may be modified or retrofitted to implement some or all features described herein.
  • With reference to FIG. 1, a master key 10 is depicted. The master key 10 may include standard key features such as a head 16 and a blade 18. The blade 18 may connect at one end to the head 16 with the tip 14 at the opposing end. The master key 10 may include teeth or bittings 12 cut into the blade. The bittings 12 consist of notches cut in the blade 18 to interface with the tumblers of a corresponding lock. The bittings 12 must match up with the lock's unique tumbler configuration in order to activate and turn the lock.
  • The key ID system may analyze the master key 10 to determine certain physical characteristics of the key 10. Based on these characteristics, the key ID system may then determine the proper key blank to be used to duplicate the master key 10. For example, the key ID system may include a sensing device or system to extract bittings information from a master key 10. The sensing system may sense and capture parameters of the bittings 12. The sensing system may include any mechanical, electronic or optical sensors, sensors, imaging devices or other tools known in the art for extracting physical characteristics of a key or similar object.
  • In an embodiment, the sensing system for extracting bittings information from the master key 10 includes an imaging system to scan and analyze the physical characteristics of the master key 10. As is known in the art, the imaging system may be a laser imaging system, an optical imaging system, a photo imaging system, or any other imaging system known in the art. The imaging system may scan the master key or capture an image of the master key to determine characteristics of the key that are unique to a specific key blank. Further, it will be appreciated that other known methods or devices, such as electrical, mechanical, or optical sensors, may be used in place of or in conjunction with the imaging system to determine the traits and characteristics of the master key geometry.
  • In an embodiment illustrated in FIG. 2, the imaging system includes one or more cameras 20 configured to capture an image, such as digital images, of the master key 10. The camera 20 may specifically be positioned to capture an image of the blade 18 and bittings 12. The camera 20 may be positioned perpendicular to the blade 18. Alternatively, the camera 20 may positioned at an angle or at other position to capture the desired image
  • The imaging system may further include other components to aid in capturing images of the master key 10, such as one or more lights 24 and mirrors. The lights 24 may be positioned to enhance the clarity and quality of the image recorded by the imaging system. For example, the light 24 may be positioned to provide backlighting for the key. The mirrors may be positioned to allow a camera in a first position to record an image of the key from a second position. The mirrors may further allow a single camera to record multiple images of the master key from different angles, thereby increasing the amount of information related to the master key recorded by a single camera
  • As illustrated in FIG. 2, the image system may include one or more reflectors 26. The reflector 26 may be positioned to direct light to a desired location. For example, as shown in FIG. 2, a reflector may be positioned underneath the key 10 and facing the light 24. The reflector 26 may be angled, such as tilted upwards, to direct light from the light 24 to the underside of the key 10, thereby providing backlighting of the key 10. It will be appreciated, however, that the light 24 and reflector 26 may be arranged in any configuration to optimize or clarify the image of the key 10.
  • The key ID system may include a key holder 22 to hold the master key 10. The key holder may be any device capable of holding or supporting a master key 10. For example, as shown in FIG. 2, the key holder 22 may comprise a lower support and an upper door to close onto the key 10. The key holder may alternatively comprise a clamp, gripper, platform, suspension, or any other device configured to hold the master key 10.
  • As described in further detail below, the key ID system may analyze characteristics of the master key's teeth or bittings 12. Because the bittings 12 are configured to match up with the corresponding lock's unique tumbler configuration, various characteristics of the bittings 12 are often unique to certain types of key blanks. For example, certain key manufacturers may use distinct bitting patterns, or a set of unique bitting patterns, for their locks or for a group of locks. Additionally, certain types of keys, such as house keys or car keys, may use a different bittings configuration than other types of keys. By analyzing the master key bittings 12 and comparing them to bitting configurations used with known key blanks, the field of prospective matching key blanks may be greatly reduced.
  • The key ID system may include a logic to analyze bitting characteristic information captured by the key ID system. As used herein, the term “logic” includes but is not limited to a software, a firmware, an executable program, a hardware or hard-wired circuit, or combinations thereof. For example, based on a desired application or needs, a logic may include a software controlled microprocessor, discrete logic like an application specific integrated circuit (ASIC), an analog circuit, a digital circuit, a programmed logic device, a memory device containing instructions, or the like. Logic may include one or more gates, combinations of gates, or other circuit components. Logic may also be fully embodied as software. Where multiple logics are described, it may be possible to incorporate the multiple logics into one physical logic. Similarly, where a single logic is described, it may be possible to distribute that single logic between multiple physical logics.
  • The logic may be configured to determine a correlation or likelihood of a match between a known key blank and the master key 10. For example, the logic may include a database to store key related information (“key data”). The key data may include characteristics of known key blanks, such as length, shape, bitting information, size, shape and location of key grooves, and other geometric and physical characteristics of known key blanks. The database may be integral with the logic, in communication with the logic, or remotely accessible to the logic. The database may associate key data with specific key blanks or with types or groups of key blanks. For example, the database may associate key data with specific key manufacturers or different types of keys such as house keys or car keys. The key ID system may access the database to compare scanned characteristics of the master key with the stored key data in the database. Key blanks that do not have characteristics consistent with those of the master key may be then ruled out as possible matches for the key blank. The key ID system may scan the master key 10 at one or more angles and compare the scanned data with stored key data.
  • In an embodiment, the database stores key data related to bittings used with known key blanks. Traditionally, key bittings are represented as a numeric bitting code that contains information as to how a key is to be cut by a locksmith. Often the bitting code is a series of integers (e.g. 372164) that may be translated or decoded from a key code chart or bitting code list. However, not all the information in the bitting code is necessary in order to determine unique properties of the bittings. Therefore, the database may store data related to known key bitting patterns other than numeric bitting codes. For example, the database may store measurements of bitting geometries used with known key blanks.
  • Stored bitting geometries may include bitting spacings, notch depths, blade width, and bitting flat width. Spacing data may relate to the location or spacing between of each bitting notch along the length of the key blade 18. Spacing data may be measured from the center of each notch to a specific reference point, such as the tip 14 or shoulder of the blade 18. Depth data may relate to the depth of each bitting notch and may be measured as the distance between a reference edge, such as the back side or center line of the blade 18, and the notch surface. Blade width may relate to the width of the blade surface to be cut. Bitting flat width may relate to the width of each notch surface and may be measured as the distance across the bottom of the notch.
  • In an embodiment, the logic may determine bitting parameters of the master key 10 by analyzing an image captured by an imaging system. The bitting parameters may be compared to bitting data in the database to determine if the master key 10 matches a key blank or blanks in the database. As shown in FIGS. 3-6, bitting parameters of the master key, such as spacing and depth, may be analyzed at various preselected points, such as at the bitting notches. The master key bitting parameters may then be compared to bitting data in the database. If the bitting parameters of the master key match the bitting data of a key blank in the database, then that key blank may be appropriate for duplicating the master key. For example, if each bitting depth of a master key 10 is very close to an allowable bitting depth for a given key blank, then the key blank may be a match. Likewise, if the bitting flat width and spacing of the bittings of a master key 10 are close to allowable bitting flat widths and spacings for a given key blank, then the key blank may be a match. However, if the bitting data of the master key is not close to allowable data for a given key blank, then the given key blank or blanks may be ruled out as a possible match.
  • The database may associate bitting data with various key-related identifiers. For example, while bitting data may be directly associated with specific key blanks, it may also be associated with groups of keys, such as keys made by a specific key manufacturer or certain types of keys. Accordingly, large groups of potential key blanks may be ruled out if a bitting parameter of the master key does not match a bitting parameter shared by the group of keys.
  • The bitting positions can be analyzed in any number of methods. One embodiment includes first determining the pattern of the unknown subject key. Each stored pattern may then be tested against the subject key. The test may involve checking each of the known spacing positions for the stored pattern and seeing if there is a bitting at that position. To accomplish this, the logic may analyze or measure the slope or angle with respect to the length of the blade 18 of the master key pattern near the sample position and determining if there is a “flat” in that position. A flat could be defined as a small segment of the pattern (0.020″ wide for example) with a slope or angle that is close to 0 degrees, (less than 17 degrees for example) that is either centered, just left or right of, the target spacing position. If a flat is identified, then the depth of the flat can also be identified from the subject key pattern relative to the reference axis.
  • To account for reasonable variances in the master key, the key ID system may set tolerance ranges for each bitting parameter measurement. In order for a key blank to match a master key, the comparison values must fall within the predetermined tolerance range. For example, as illustrated in the test results window of FIGS. 3-6, the tolerance range for bitting depth may be set to plus or minus six thousandths of an inch. In order for the master key to match a key blank, each depth measurement comparison must fall within this range. As shown in FIGS. 3 and 4, the comparison values are all between −1 and +1, indicating a match between the master key and the tested key blank or blanks. FIGS. 5 and 6, however, illustrate comparison values of greater than 6, indicating that the master key does not match the tested key blank or blanks. The pass/fail limits (tolerance range) could be based on a set range, a set percentage of the depth offsets of the target key, or some other parameter. The limits may be set the same for all keys or may be individualized on a key-by-key basis.
  • To account for positional variation inherent to the subject keys and/or the inspection system, the pattern matching algorithms may be repeated while shifting the data by small increments (0.020″ for example) in either or both directions. For example, if a key blank was slightly miscut and the spacing was shifted from the nominal position, the search may fail at the nominal position but may identify the pattern shifted slightly over from the nominal position.
  • The spacing and depth evaluations may be measured using a scoring system of 0 to 100%, where 0 is considered to be an impossible match and 100 is a perfect match. The total bitting score is then the product of the combined spacing and depth scores.
  • The logic may compare the bittings of a master key 10 to key data related to a key blank in the database and evaluate a series of preset spacing point for the given key blank. For example, the geometry of the master key 10 may be analyzed at each spacing point. A score may be given to each spacing point based on the flatness of the bitting 12 at the spacing point and a measurement of the variation or slope of the bitting 12 relative to the database depths. The relationships between angles can be varied to achieve optimal results. The flatter the area near the spacing point, the higher the score. For example, zero degrees (or flat) might represent a score of 100 and 45 degrees might represent 0. Similarly, the logic may analyze the depth of the blade at each spacing point give a score to the spacing point based on the variation from one of the valid depths for the given key blank stored in the database. For example, no variation might represent a score of 100 and 2× the differences between depths might represent a score of 0.
  • The logic may compute this evaluation for each of the spacing points and then compute a total by averaging all the points. This entire process may be repeated with a slight shift towards the head 16 of the key 10 and again with a shift towards the tip 14 of the key 10. This will compensate for a key 10 that has a slight spacing shift. The best of the three totals are used in the final results for the bitting evaluation.
  • The logic may determine the centers of each of the flats on the bittings 12 of the master key 10. Because the center of a flat that is on the peak of a bitting may be skewed due to the depth of the bitting on the left and right, the logic may ignore peaks. The logic may also ignore ridges because the center of flats that are on ridges may be skewed due to the depth and height of the bittings 12 on either side. However, flats that are located in “valleys,” or between bittings of lesser depth, are often properly centered regardless of what is on either side. For each identified valley, the logic may compare the nearest database spacing position and a score is given. A total spacing score is then computed based on the average score for each of the valleys.
  • It will be appreciated that the database is not limited to bittings data. In addition to bittings data, the database may store information related to other identifying parameters of the key. The key ID system may utilize other key parameters, in combination with bittings information, to narrow the field of possible key blanks.
  • The key ID system as described may be used in conjunction with other known key identification systems. For example, the key ID system may be used in conjunction with user interface identification systems, such as the object identification system disclosed in U.S. Publication No. 2004/0095380 and the key duplication system disclosed in U.S. Publication No. 2007/0224008, each of which are hereby incorporated by reference in their entirety.
  • The invention has been described above and, obviously, modifications and alternations will occur to others upon a reading and understanding of this specification. The claims as follows are intended to include all modifications and alterations insofar as they come within the scope of the claims or the equivalent thereof.

Claims (19)

Having thus described the invention, we claim:
1. A key identification system comprising:
an imaging system configured to capture physical characteristics of a geometry of a master key; and
a logic to analyze information representative of said physical characteristics to determine characteristics of parameters of said master key and further to compare said characteristics of said parameters with stored key related information to determine the likelihood of a match between said master key and said stored key related information;
wherein said information representative of said physical characteristics includes at least one of the depth of a geometric feature and a location of a geometric feature along a blade of said master key.
2. The key identification system of claim 1, wherein said stored key related information includes a numeric code that embodies information that represents a key cut.
3. The key identification system of claim 1, wherein said imaging system is configured to capture an image of the side of said master key.
4. The key identification system of claim 3, wherein said imaging system includes a camera.
5. The key identification system of claim 4, wherein said camera is positioned perpendicular to the blade of said master key.
6. The key identification system of claim 1 further comprising a key holder to hold said master key.
7. The key identification system of claim 1, wherein said stored key related information include bitting characteristics of a known lock.
8. The key identification system of claim 7, wherein said characteristics of said parameters include a set of depths at given blade spacing points associated with said known lock.
9. The key identification system of claim 8, wherein said logic computes a score for said known lock based on the comparison between the depths of said master key at each spacing point and said set of depths for said known lock.
10. The key identification system of claim 7, wherein said characteristics of parameters include a set of bitting flat widths at given blade spacing points associated with said known lock.
11. The key identification system of claim 10 wherein said logic compares the bitting flat widths of the master key bitting at each spacing point to said set of bitting flat widths for said known lock.
12. A key identification system comprising:
an imaging system configured to capture physical characteristics of a geometry of a master key; and
a logic to analyze information representative of said physical characteristics to determine characteristics of parameters of said master key and further to compare said characteristics of said parameters with stored key related information to determine the likelihood of a match between said master key and said stored key related information;
wherein said information representative of said characteristics of said parameters includes at least one of the depth of said geometric feature and a location of said geometric feature along a blade of said master key;
wherein said logic computes a score based on a comparison between the at least one depth of said geometric feature at a spacing point and a set of depths for said stored key related information.
13. The key identification system of claim 12, wherein said parameters include a set of bitting flat widths at given blade spacing points associated with said stored key related information.
14. The key identification system of claim 13 wherein said logic compares the bitting flat widths of the master key bitting at each spacing point to said set of bitting flat widths for said stored key related information.
15. The key identification system of claim 12, wherein said logic analyzes one of a bitting depth, and a bitting fiat width of said master key at a blade spacing point shifted from said blade spacing point.
16. The key identification system of claim 12, wherein said logic is configured to overlay geometric features for a plurality of known lock over said physical characteristics of said geometry of said master key.
17. The key identification system of claim 12, wherein said logic includes a tolerance range for each characteristic of said parameter of said master key to determine whether a master key passes or fails to match a known lock.
18. The key identification system of claim 12, wherein said logic is configured to shift the position of said characteristic of said parameter of said master key to compare with said stored key related information.
19. The key identification system of claim 18, wherein said shift includes at least one of a move laterally towards the tip, a move longitudinally towards the head, or a rotation.
US15/439,236 2009-05-01 2017-02-22 Key blank identification system with bitting analysis Abandoned US20170193327A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/439,236 US20170193327A1 (en) 2009-05-01 2017-02-22 Key blank identification system with bitting analysis

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US21512209P 2009-05-01 2009-05-01
US27564809P 2009-09-01 2009-09-01
US12/772,763 US8634655B2 (en) 2009-05-01 2010-05-03 Key blank identification system with bitting analysis
US14/147,308 US9582734B2 (en) 2009-05-01 2014-01-03 Key blank identification system with bitting analysis
US15/439,236 US20170193327A1 (en) 2009-05-01 2017-02-22 Key blank identification system with bitting analysis

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/147,308 Continuation US9582734B2 (en) 2009-05-01 2014-01-03 Key blank identification system with bitting analysis

Publications (1)

Publication Number Publication Date
US20170193327A1 true US20170193327A1 (en) 2017-07-06

Family

ID=43030394

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/772,763 Active 2032-05-26 US8634655B2 (en) 2009-05-01 2010-05-03 Key blank identification system with bitting analysis
US14/147,308 Active US9582734B2 (en) 2009-05-01 2014-01-03 Key blank identification system with bitting analysis
US15/439,236 Abandoned US20170193327A1 (en) 2009-05-01 2017-02-22 Key blank identification system with bitting analysis

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/772,763 Active 2032-05-26 US8634655B2 (en) 2009-05-01 2010-05-03 Key blank identification system with bitting analysis
US14/147,308 Active US9582734B2 (en) 2009-05-01 2014-01-03 Key blank identification system with bitting analysis

Country Status (5)

Country Link
US (3) US8634655B2 (en)
EP (1) EP2424690A4 (en)
CN (1) CN102448636B (en)
MX (1) MX2011011630A (en)
WO (1) WO2010127354A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210237175A1 (en) * 2020-02-05 2021-08-05 Ikeyless, Llc Systems and methods for creating duplicate keys
US20220139138A1 (en) * 2020-02-05 2022-05-05 Ikeyless, Llc Systems and methods for creating duplicate keys and pairing with vehicles
US20220180621A1 (en) * 2019-06-28 2022-06-09 Shenzhen Xhorse Electronics Co., Ltd Article identification method and device, and computer readable storage medium

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9101990B2 (en) 2006-01-23 2015-08-11 Hy-Ko Products Key duplication machine
CN101405104B (en) 2006-01-23 2011-05-25 海-科产品公司 Key duplication machine
WO2008066857A2 (en) 2006-11-28 2008-06-05 Key Tech, Inc. Fully automatic key duplicating machine with automatic key model identification system
US8644619B2 (en) 2009-05-01 2014-02-04 Hy-Ko Products Company Key blank identification system with groove scanning
US8634655B2 (en) * 2009-05-01 2014-01-21 Hy-Ko Products Company Key blank identification system with bitting analysis
US20130331976A1 (en) 2010-06-03 2013-12-12 Minute Key Inc. Key duplicating system
US9556649B1 (en) * 2010-07-15 2017-01-31 The Hillman Group, Inc. Key identification system
US8626331B2 (en) 2012-01-04 2014-01-07 Keyme, Inc. Systems and methods for managing key information
US20130223675A1 (en) * 2012-02-27 2013-08-29 Carter Belrose Key Identification Device and Method of Use
DE102014100393A1 (en) * 2013-02-01 2014-08-07 Karl-Heinz Bosch Method of producing a key
US9313383B2 (en) 2013-03-15 2016-04-12 Lockmasters Security Institute, Inc. System, device and method for capturing an image of multiple views of an object
US9269136B2 (en) * 2013-03-15 2016-02-23 Lockmasters Security Institute, Inc. Apparatus and methods for replicating a key from an image depicting the key
ITTV20130050A1 (en) * 2013-04-11 2014-10-12 Keyline S P A Con Unico Socio METHOD TO ASSIST A USER IN DETECTING THE GRAPHICAL EXPRESS REPRESENTATION OF A THEORETICAL PROFILE OF A KEY, AND DUPLICATING EQUIPMENT OF KEYS IMPLEMENTING THE said method
US9950375B2 (en) 2013-06-24 2018-04-24 The Hillman Group, Inc. Sequentialized key duplication system
US9506272B2 (en) 2013-08-16 2016-11-29 The Hillman Group, Inc. Two-piece key assembly
US9243426B2 (en) 2013-08-16 2016-01-26 The Hillman Group, Inc. Multi-piece key assembly
US9563885B2 (en) 2014-07-03 2017-02-07 Keyme, Inc. Systems and methods for duplicating transponder keys and managing key information thereof
CN105426900A (en) * 2014-09-18 2016-03-23 董醒华 Shadow analysis method of key photograph
CN105674907A (en) * 2014-11-18 2016-06-15 董醒华 Hatching line analytical method of key photo
US9882889B1 (en) * 2015-06-29 2018-01-30 Symantec Corporation Techniques for user authentication
EP3332353A1 (en) * 2015-08-03 2018-06-13 Hy-Ko Products Company High security key scanning system
US9818041B2 (en) 2015-08-03 2017-11-14 Hy-Ko Products Company High security key scanning system
WO2017072976A1 (en) * 2015-10-30 2017-05-04 三菱電機株式会社 Wire electric discharge machine, and control method and positioning method for control device of wire electric discharge machine
US10124420B2 (en) 2016-02-08 2018-11-13 The Hillman Group, Inc. Key duplication machine having user-based functionality
CN106021426A (en) * 2016-05-16 2016-10-12 乐视控股(北京)有限公司 Mobile terminal image recognition-based key matching method and device
US10406607B2 (en) 2016-09-13 2019-09-10 The Hillman Group, Inc. Key duplication machine having pivoting clamp
US10737335B2 (en) 2017-03-17 2020-08-11 The Hillman Group, Inc. Key duplication system with key blank orientation detection features
CN107730524B (en) * 2017-11-08 2020-09-11 北京远鸥科技有限公司 Key tooth shape code identification method
US11227455B2 (en) 2018-03-18 2022-01-18 Hy-Ko Products Company Llc Distributed cloning tool assembly, system, and method for replication of vehicle access devices
FR3084764B1 (en) * 2018-08-01 2021-11-12 Renault Sas PROCESS FOR DECODING AN INSERT WITH INTERNAL MACHINING
US11790626B2 (en) * 2020-01-18 2023-10-17 Shenzhen Xhorse Electronics Co., Ltd Method and apparatus for recognizing bitting code of key, and storage medium and image collection device
US20210260672A1 (en) * 2020-02-20 2021-08-26 Hy-Ko Products Company, LLC Key duplication system with auto tune functionality
FR3110009B1 (en) 2020-05-11 2022-07-15 Securkeys Process for recognizing and identifying keys for the purpose of duplicating them
US11768069B2 (en) * 2020-12-21 2023-09-26 Kaba Ilco Corp Decoding of angle-cut keys
CN113310414B (en) * 2021-06-01 2022-09-06 北京远鸥科技有限公司 Key image tooth profile rapid measurement and definition method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5711643A (en) * 1996-06-28 1998-01-27 Intralock Tools Ltd. Portable semi-automatic computer code key cutting machine
US5997224A (en) * 1997-01-15 1999-12-07 Ilco Unican, Inc. Key cutting machine for cutting keys by code
US20010033781A1 (en) * 1997-05-13 2001-10-25 Wills Method and apparatus for determining the bitting pattern of keys
US20070224008A1 (en) * 2006-01-23 2007-09-27 Bass Michael A Key duplication machine
US7484446B1 (en) * 2006-06-30 2009-02-03 Theodore Gula Manual punch press for keys

Family Cites Families (354)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US40480A (en) 1863-11-03 Improved machine for making boxes
US466044A (en) 1891-12-29 Maurice jacobs
US288300A (en) 1883-11-13 Beeffhabd boeowskt
US1702488A (en) 1929-02-19 Edward p
US943806A (en) 1908-03-16 1909-12-21 William F Billings Key-cutting machines.
US1135676A (en) 1911-10-20 1915-04-13 Oscar M Engelbert Key-cutting machine.
US1059545A (en) 1912-03-21 1913-04-22 Paulin Karl Kunze Device for obtaining intimate contact with, engaging, or clamping bodies of any shape.
US1081472A (en) 1912-10-29 1913-12-16 Philip Kovsky Key-duplicating clamp.
US1218653A (en) 1916-01-10 1917-03-13 Philip Kovsky Key-cutting machine.
US1367280A (en) 1919-10-13 1921-02-01 Reiges Jerry Silverware-cleaner
US1440459A (en) 1920-06-23 1923-01-02 Jean Armand Haurat Key-lock mechanism
US1390958A (en) 1920-09-24 1921-09-13 George J Hulbert Adjustable saw
US1628637A (en) 1921-04-04 1927-05-10 Sargent & Co Key-cutting device
US1674291A (en) 1922-12-22 1928-06-19 Ingersoll Milling Machine Co Work fixture
US1752668A (en) 1925-09-10 1930-04-01 Johnson Edward Key duplicator
US1656295A (en) 1925-11-14 1928-01-17 Rosenberg Abraham Key-cutting machine
US1961516A (en) 1927-03-28 1934-06-05 Keil Francis & Son Inc Key cutting apparatus
US1750218A (en) 1927-04-18 1930-03-11 Falk Morris Key-cutting machine
US1889461A (en) 1928-03-27 1932-11-29 Keil Francis & Son Inc Key cutting apparatus
US1775921A (en) 1928-07-03 1930-09-16 Benjamin S Williams Key-cutting machine
US1848046A (en) 1929-04-30 1932-03-01 Leominster Tool Co Inc Key duplicating machine
US1991151A (en) 1931-01-03 1935-02-12 Keil Francis & Son Inc Apparatus for determining code of keys for cylinder locks
US1923164A (en) 1931-02-17 1933-08-22 Axel H Roos Code key cutting machine
US1978628A (en) 1932-06-28 1934-10-30 Keil Francis & Son Inc Key cutting machine
US1948260A (en) 1933-02-11 1934-02-20 F W Stewart Mfg Company Key cutting machine
US2038949A (en) 1934-09-19 1936-04-28 Joseph A Mintz Key cutting and duplicating machine
US2032820A (en) 1935-02-01 1936-03-03 Edward M Kline Key machine
US2105099A (en) 1935-08-31 1938-01-11 Western Electric Co Method of manufacturing keys
US2098728A (en) 1936-01-27 1937-11-09 Seth A Mcphee Key cutting machine
US2176106A (en) 1936-08-13 1939-10-17 Segal Samuel Key cutting machine
US2148668A (en) 1936-12-02 1939-02-28 Yoskowitz Samuels Key duplicating mechanism
US2114597A (en) 1937-03-19 1938-04-19 Francis M Goddard Key cutting machine
US2325541A (en) 1939-12-04 1943-07-27 Gen Motors Corp Milling machine
US2329269A (en) 1940-04-13 1943-09-14 Briggs & Stratton Corp Key cutting and duplicating machine
US2274012A (en) 1940-07-24 1942-02-24 Gen Motors Corp Antenna
US2430924A (en) 1940-09-21 1947-11-18 Linde Air Prod Co Method and means for producing contours in material
US2386816A (en) 1944-08-11 1945-10-16 Louis A Scholz Stereoscopic modeling machine
US2445041A (en) 1945-01-01 1948-07-13 Louis A Scholz Silhouette reproducing machine
US2582012A (en) 1946-04-06 1952-01-08 Independent Lock Co Machine for operating on blanks
US2499124A (en) 1947-05-29 1950-02-28 Production Devices Inc Apparatus for protecting operating parts of vises from chips or other refuse incidental to machine work
US2556577A (en) 1948-05-15 1951-06-12 Niles Bement Pond Co Tailstock for grinding machines
US2645978A (en) 1949-04-19 1953-07-21 Sejarto Lester Key duplicating machine
US2605294A (en) 1949-06-02 1952-07-29 Firestone Tire & Rubber Co 1, 4-dibromo-2, 3-dichloro-2-butene
US2622485A (en) 1950-06-16 1952-12-23 Cincinnati Milling Machine Co Automatic line tracking machine
US2707335A (en) 1951-01-09 1955-05-03 Independent Lock Co Decoding gauges for keys
US2728251A (en) 1954-06-08 1955-12-27 Sheffield Twist Drill & Steel Improved vise having jaws movable downwardly when clamping a workpiece
US5119190A (en) 1963-03-11 1992-06-02 Lemelson Jerome H Controlling systems and methods for scanning and inspecting images
US5966457A (en) 1955-06-14 1999-10-12 Lemelson; Jerome H. Method for inspecting, coding and sorting objects
US2860884A (en) 1957-01-31 1958-11-18 Cushman Chuck Co Clamping jaws for chucks
US2940183A (en) 1957-10-18 1960-06-14 Fromberg Inc Key rack with gauge
US2929177A (en) 1958-05-12 1960-03-22 Black & Decker Mfg Co Sanding apparatus
US3053149A (en) 1958-11-27 1962-09-11 Simeca S A Machine for copying flat keys
US3094039A (en) 1960-03-18 1963-06-18 Yale & Towne Mfg Co Key bitting machine
US3430535A (en) 1961-08-25 1969-03-04 Independent Lock Co Key cutter
US3323420A (en) 1961-11-24 1967-06-06 Coin A Key Inc Automatic key cutting and vending machine
US3442174A (en) 1961-11-24 1969-05-06 Vend A Key Corp Key-blank dispenser-and-cutter apparatus
US3138999A (en) 1962-03-27 1964-06-30 Independent Lock Co Automatic key cutter
US3172969A (en) 1962-08-09 1965-03-09 Independent Lock Co Key identifier device and switch means therefor
US3429207A (en) 1963-08-16 1969-02-25 Netzsch Geb Photoelectrically controlled copying apparatus
US3259022A (en) 1963-12-17 1966-07-05 Ibm Object scanning techniques
US3245149A (en) 1964-09-15 1966-04-12 Independent Lock Co Key locator means
US3257908A (en) 1964-09-25 1966-06-28 Independent Lock Co Key cutter clamp hold down
US3286596A (en) 1964-12-31 1966-11-22 Curtis Noll Corp Automatic key cutting machine
US3305100A (en) 1965-01-15 1967-02-21 Floyd R Barbee Article holder
US3276328A (en) 1965-04-13 1966-10-04 Schreiber George Key cutting machine
US3286597A (en) 1965-06-03 1966-11-22 Taylor Lock Company Key-duplicating machine
US3388619A (en) 1966-06-30 1968-06-18 Schreiber Joseph Method for cutting keys
US3424056A (en) 1966-08-01 1969-01-28 Martin Stolove Key duplicating machine
US3418882A (en) 1966-09-02 1968-12-31 Max K. Brand Key making machine for tubular-type key
US3440906A (en) 1966-10-27 1969-04-29 William H Allen Key cutting machine
US3466747A (en) 1967-04-13 1969-09-16 Cole National Corp Automatic code key cutter
US3499366A (en) 1967-07-17 1970-03-10 Roy Clifton Spain Key cutting machine
US3457831A (en) 1967-08-24 1969-07-29 Ilco Corp Plunge actuated cutter for keys having angularly directed bits
US3599147A (en) 1967-09-12 1971-08-10 Nat Res Dev Character recognition systems and apparatus
US3496636A (en) 1968-05-15 1970-02-24 Curtis Noll Corp Key cutting machine with preselected depth gauging
USRE26848E (en) 1968-07-01 1970-04-07 Key cutting machine and method
US3826555A (en) 1969-07-21 1974-07-30 Canon Kk Holographic camera for forming planar or volume holograms
US3625111A (en) 1969-10-06 1971-12-07 Cole National Corp Key duplicating machine
US3602092A (en) 1969-12-04 1971-08-31 Ilco Corp Key-positioning vise assembly for automatic key cutter
US3633451A (en) 1970-02-19 1972-01-11 Curtis Noll Corp Key-cutting machine with coordinated positioning and cutting movements
US3656402A (en) 1970-03-23 1972-04-18 George F French Key cutting device
US3651573A (en) 1970-04-22 1972-03-28 Cole National Corp Blade lock for scissors
US3675536A (en) 1970-11-27 1972-07-11 Cole National Corp Key cutting machine
US3722341A (en) 1971-01-18 1973-03-27 Cole Nat Corp Key cutter
US3682041A (en) 1971-01-22 1972-08-08 Essig R R Ted Method and apparatus for duplicating a key
US3707999A (en) 1971-01-25 1973-01-02 J Coats Moving shadow light indexing means
US3810416A (en) 1971-03-19 1974-05-14 D Nelms Key-mode apparatus and system
USRE27665E (en) 1971-04-07 1973-06-12 Key cutting machine
US3884121A (en) 1971-06-01 1975-05-20 Frank P Agius Key cutter
US3955179A (en) 1971-12-14 1976-05-04 Tore Planke Apparatus for automatic pattern recognition and registration of empty bottles
US3796130A (en) 1972-02-10 1974-03-12 Sargent & Greenleaf Key duplicating and vending machine
US3769865A (en) 1972-03-08 1973-11-06 Junkunc Bros American Lock Co Key code cutting machine
US3795174A (en) 1972-04-06 1974-03-05 R Oliver Machine for cutting multiple keys
US3919920A (en) 1972-05-10 1975-11-18 Schlage Lock Co Machine for making obtunded key profile
US3773360A (en) 1972-09-01 1973-11-20 W Timbers Quick disconnect coupling
FR2198811B1 (en) 1972-09-13 1978-09-29 Crasnianski France Sa
US3792639A (en) 1972-11-20 1974-02-19 Cole National Corp Key machine drive
US3807276A (en) 1972-12-11 1974-04-30 R Oliver Lock key reproducing tool
US3880047A (en) 1973-03-22 1975-04-29 Dosier Paul Ass Inc Chip removal and hold-down device for lateral movement routers
US3919589A (en) 1973-04-06 1975-11-11 Rca Corp Electroluminescent cell with a current-limiting layer of high resistivity
US3865011A (en) 1973-09-05 1975-02-11 Hudson Lock Inc Automatic key duplicating apparatus
US3978764A (en) 1973-09-05 1976-09-07 Hudson Lock, Inc. Automatic key duplicating apparatus
US3870895A (en) 1973-10-09 1975-03-11 Jacob Lax Automotive anti-theft device
US3848235A (en) 1973-10-24 1974-11-12 Ibm Scan and read control apparatus for a disk storage drive in a computer system
US3902382A (en) 1974-03-14 1975-09-02 Curtis Noll Corp Calibration gauge for key duplicating machine
US4019415A (en) 1974-04-08 1977-04-26 Wich Horst W Key cutting machine
US3945298A (en) 1974-04-25 1976-03-23 Darrel Cockroft Key cutting machine
US4105340A (en) 1975-04-17 1978-08-08 Kempf Paul S Optical comparator and inspection apparatus
US4012991A (en) 1975-06-02 1977-03-22 Klaus W. Gartner Key decoding and duplicating apparatus and method
US3981214A (en) 1975-11-13 1976-09-21 Wich Horst W Code key cutter having interchangeable attachments
US4172632A (en) 1976-01-21 1979-10-30 Holmes Lawrence Jr Method and apparatus producing three-dimensional shadow images
DE2620240A1 (en) 1976-05-07 1977-11-24 Bosch Gmbh Robert METHOD AND DEVICE FOR TESTING LIGHTNUT TRANSLUCENT WORKPIECES
US4023464A (en) 1976-06-23 1977-05-17 Dominion Lock Company Ltd. Automatic multi-blank key cutting device
US4051748A (en) 1976-07-20 1977-10-04 Unican Security Systems, Ltd Key cutting machine for producing obliquely oriented bitting
DE2637969A1 (en) 1976-08-24 1978-03-02 Neiman Gmbh & Co Kg MILLING DEVICE FOR THE CONTROL GROOVE OF A FLAT KEY
US4062261A (en) 1976-10-14 1977-12-13 Alvin M. Chanin Key cutting apparatus
US4092806A (en) 1976-11-17 1978-06-06 Wich Horst W Key duplicating machine
NL180042C (en) 1977-01-31 1986-12-16 Ind & Merchandising Service DEVICE FOR CHECKING THE PROFILE OF A FLAT KEY.
US4088060A (en) 1977-02-17 1978-05-09 Johns Tom R Key cutting device
US4121292A (en) 1977-03-17 1978-10-17 Bethlehem Steel Corporation Electro-optical gaging system having dual cameras on a scanner
USD251365S (en) 1977-04-21 1979-03-20 Lipinski Robert C Combined hook and line gauge
US4294096A (en) 1977-04-25 1981-10-13 Heimann Joseph B Method and apparatus for making a secondary key for a lock mechanism
US4143582A (en) 1977-04-25 1979-03-13 Heimann Joseph B Method and apparatus for making a secondary key for a lock mechanism
JPS6040017B2 (en) 1977-08-19 1985-09-09 大日本スクリ−ン製造株式会社 Image circulation tracking recording device
SE405214B (en) 1977-08-24 1978-11-27 Hugin Kassaregister Ab APPARATUS FOR IDENTIFICATION AND REGISTRATION OF BOTTLES
SE412286B (en) 1978-07-10 1980-02-25 Saab Scania Ab SET AND DEVICE FOR PHOTOELECTRIC DIMENSION OF WIDES OR SIMILAR GEOMETRICALLY DETERMINED FORMS
US4188163A (en) 1978-07-21 1980-02-12 John Juskevic Key duplicating machine
USD257758S (en) 1978-09-01 1981-01-06 Limacher Robert J Combined nail-screw shield and measuring instrument
US4223791A (en) 1978-09-15 1980-09-23 Plastilite Corporation Fishing rod holder
US4251173A (en) 1978-10-25 1981-02-17 Edward Saucedo Key cutter
US4281379A (en) 1978-12-18 1981-07-28 Mcdonnell Douglas Corporation Computer driven control system for a numerically controlled machine tool
SE422481B (en) 1979-07-10 1982-03-08 Gkn Stenman Ab CYLINDERLAS KEY COMBINATION, KEY TO THIS AND WAY TO MANUFACTURE THE KEY
US4256423A (en) 1979-08-13 1981-03-17 John Juskevic Key cutting machine
US4300836A (en) 1979-10-22 1981-11-17 Oregon Graduate Center For Study And Research Electro-optical scanning system with self-adaptive scanning capability
DE2951065A1 (en) 1979-12-19 1981-07-02 F.I.M.A.T.- Fabbrica Italiana Macchine Automatiche e Transfer S.p.A., Zola Predosa Automatic key cutting machine - has cutter for each slot in key moving longitudinally and transversely
US4300042A (en) 1980-04-08 1981-11-10 Vendacopy, Inc. Magnetic stripe card author
US4283859A (en) 1980-05-19 1981-08-18 Maromatic Co., Inc. Method and apparatus for reading a key
US4354780A (en) 1980-05-23 1982-10-19 Ilco Unican Corp. Making formed milled cutters and key cutters
US4472056A (en) 1980-07-23 1984-09-18 Hitachi, Ltd. Shape detecting apparatus
US4359299A (en) 1980-09-11 1982-11-16 Ilco Unican Corp. Milling cutter
JPS5761487A (en) 1980-09-30 1982-04-13 Fujitsu Fanuc Ltd Hand for industrial robot
US4373414A (en) 1980-10-06 1983-02-15 Agius Frank P Coded key cutting device
DE3044611A1 (en) 1980-11-27 1982-11-25 Webb Service GmbH, 6000 Frankfurt METHOD AND DEVICE FOR DETECTING CROSS-SECTIONAL PROFILES OF OBJECTS
DE3104809C1 (en) 1981-02-11 1982-10-28 August Börkey Nachf., 5820 Gevelsberg Key-milling machine
US4437150A (en) 1981-04-27 1984-03-13 Dahlgren Jr William V Tool manipulating method and apparatus for multiple job processing
US4526498A (en) * 1981-07-30 1985-07-02 Lloyd Matheson, Inc. Key forming machine
US4468994A (en) 1981-09-03 1984-09-04 Congoleum Corporation Key cutting device
DE3138483A1 (en) 1981-09-28 1983-04-14 Deutsche Gesellschaft für Wiederaufarbeitung von Kernbrennstoffen mbH, 3000 Hannover "DEVICE FOR POSITIONING, CONNECTING AND EDITING COMPONENTS"
JPS5860593A (en) 1981-10-06 1983-04-11 株式会社日立製作所 Method and device for detecting shape
US4432142A (en) 1982-02-26 1984-02-21 All-Lock Electronics, Inc. Key code
US4433487A (en) 1982-02-26 1984-02-28 All-Lock Electronics, Inc. Key reading system
JPS58167902A (en) 1982-03-30 1983-10-04 Agency Of Ind Science & Technol Detecting device for object
US4426179A (en) 1982-06-25 1984-01-17 Jefferson Robert C Tester for key duplicating machines
GB2124329B (en) 1982-07-20 1986-02-26 Hillman Newby Ltd Hydraulic seal for pit prop
US5363463A (en) 1982-08-06 1994-11-08 Kleinerman Marcos Y Remote sensing of physical variables with fiber optic systems
FR2531650A1 (en) 1982-08-12 1984-02-17 Hk France DEVICE FOR REPRODUCTION OF ENCRYPTED KEYS
US4521142A (en) 1982-08-30 1985-06-04 Essential Automotive Products, Inc. Key cutting machine
US4783829A (en) 1983-02-23 1988-11-08 Hitachi, Ltd. Pattern recognition apparatus
NO152065C (en) 1983-02-24 1985-07-24 Tomra Systems As PROCEDURE FOR CONTINUOUS RECOGNITION OF TOTAL OR PARTIAL TRANSPARENT GOODS, EX. BOTTLES
JPS59201708A (en) 1983-04-25 1984-11-15 Tsugami Totsuki Kk Machining device of key
JPS59226981A (en) 1983-06-08 1984-12-20 Fujitsu Ltd Method and device for pattern matching
JPS601194U (en) 1983-06-16 1985-01-07 株式会社 富士楽器 Finger-fitting in koto-zume
FR2548938B1 (en) 1983-07-13 1987-01-09 France H K PROCESS FOR PRODUCING A KEY WITH A KNOWN NUMBER OR CODE AND MACHINE FOR THE IMPLEMENTATION OF THIS PROCESS
US4525908A (en) 1983-08-18 1985-07-02 Tri County Tool Inc. Manually operable universal key code cutting device
US4666351A (en) 1983-10-13 1987-05-19 Marchal Ronald L Apparatus and method for automatically making a duplicate key
US4592683A (en) 1983-11-30 1986-06-03 Wu Kuo Shen Automatic key cutting machine
US4671711A (en) 1983-12-05 1987-06-09 Chicago Lock Co. Key-cutting machine
US4767110A (en) 1983-12-22 1988-08-30 Tai Her Yang Servo-clamping device
US4562759A (en) 1984-02-02 1986-01-07 Schmitt Thomas W Universal cam for key cutting machine
US4614465A (en) 1984-03-02 1986-09-30 Wu Kuo Shen Cavity key duplicating machine
CA1227922A (en) 1984-06-18 1987-10-13 Georges Zoueki Multipurpose apparatus for drilling, engraving and carving ophtalmic lenses
US4653104A (en) 1984-09-24 1987-03-24 Westinghouse Electric Corp. Optical three-dimensional digital data acquisition system
JPS6177701A (en) 1984-09-25 1986-04-21 Mitsutoyo Mfg Co Ltd Edge detector of optical measuring instrument
US4656590A (en) 1984-11-07 1987-04-07 Ronald Ace Method and apparatus for making patterns for eyeglasses
JPS61128105A (en) 1984-11-26 1986-06-16 Mitsutoyo Mfg Co Ltd Edge detector of optical measuring instrument
US4601185A (en) 1985-02-19 1986-07-22 Sheldon Richard F Key identifier
US4657448A (en) 1985-04-29 1987-04-14 Arthur Alexander Pantograph angular bitted key cutting machine
US4648585A (en) 1985-06-07 1987-03-10 Yang Tai Her Vise structure having articulatable vise jaws
US4741652A (en) 1985-08-07 1988-05-03 Marchal Ronald L Apparatus and method for automatically making a duplicate key
US4647028A (en) 1985-08-19 1987-03-03 Yang Tai Her Versatile clamping assembly for workbench or the like
US4679331A (en) 1985-08-26 1987-07-14 Ppg Industries, Inc. Apparatus and method for determining contour characteristics of a contoured article
US4651604A (en) 1985-09-16 1987-03-24 Donald F. Almblad Apparatus for and method of duplicative punched notching of the serration edges of key blanks
US4638567A (en) 1986-01-06 1987-01-27 Leversee Garrett J Key decoding device for automobiles
ES8801003A1 (en) 1986-04-02 1987-12-16 Investronica Sa Matching method and device for automatic cutting of patterned fabrics.
US4677835A (en) 1986-04-10 1987-07-07 Donald Almblad Plastic card/key combination and hinge structure
SE469321B (en) 1986-04-14 1993-06-21 Joenkoepings Laens Landsting SET AND DEVICE TO MAKE A MODIFIED THREE-DIMENSIONAL IMAGE OF AN ELASTIC DEFORMABLE PURPOSE
US4687389A (en) 1986-04-14 1987-08-18 Lori Corporation Key duplication machine
US4845764A (en) 1986-07-17 1989-07-04 Matsushita Electric Industrial Co., Ltd. Shape recognition apparatus
US4809341A (en) 1986-07-18 1989-02-28 Fujitsu Limited Test method and apparatus for a reticle or mask pattern used in semiconductor device fabrication
US4710808A (en) 1986-08-05 1987-12-01 Mechanical Technology Incorporated Machine vision differential measurement system
JPH0346005Y2 (en) 1986-08-13 1991-09-27
US4697300A (en) 1986-10-08 1987-10-06 Warlop Stephen M Antistatic vacuum cleaner and method
US4717294A (en) 1986-11-24 1988-01-05 Curtis Industries, Inc. House-key code cutter
US4780032A (en) 1987-02-25 1988-10-25 Klaus W. Gartner Key duplicating apparatus
GB8709127D0 (en) 1987-04-15 1987-05-20 Autoflow Eng Ltd Sensing lens blank
US4839913A (en) 1987-04-20 1989-06-13 American Science And Engineering, Inc. Shadowgraph imaging using scatter and fluorescence
US4909892A (en) 1987-05-27 1990-03-20 Sampson Machine Company Apparatus for welding thermoplastic frame members
US4821393A (en) 1987-05-28 1989-04-18 Srtechnologies, Inc. Component centering tool
US5029459A (en) 1987-09-03 1991-07-09 Mitsubishi Corporation Flat plastic key with rigid torque transfer insert
US5201203A (en) 1987-09-03 1993-04-13 Mitsubishi Corp. Flat plastic key with shortened key alignment groove
US4803371A (en) 1987-09-30 1989-02-07 The Coe Manufacturing Company Optical scanning method and apparatus useful for determining the configuration of an object
US4868559A (en) 1987-10-02 1989-09-19 Universal Photonix, Inc. Security system employing optical key shape reader
CH673612A5 (en) 1987-10-12 1990-03-30 Hans Zulliger Key cutting machine allowing automatic key copying - with central processor receiving data obtained from original key to control orthogonal stepping motors
US5130064A (en) 1988-04-18 1992-07-14 3D Systems, Inc. Method of making a three dimensional object by stereolithography
US4941335A (en) 1988-05-03 1990-07-17 Mitsubishi Corporation Combination key and key holder
US4848116A (en) 1988-05-19 1989-07-18 Ilco Unican Inc. Permutation type lock control assembly
US4993291A (en) 1988-06-13 1991-02-19 Keymak Company Key cutting apparatus
US5127532A (en) * 1988-06-24 1992-07-07 Cimino William J Automatic key identification system
US4899391A (en) * 1988-06-24 1990-02-06 Cimino William J Automatic key identification system
IT1225998B (en) 1988-10-03 1990-12-10 Silca S P A A OPTICAL PROFILE READER, ESPECIALLY FOR KEY DUPLICATING MACHINES
US4929129A (en) 1988-10-11 1990-05-29 Dickson Russell A Key cutting apparatus
US5314274A (en) 1988-10-21 1994-05-24 Axxess Entry Technologies Method and apparatus for duplicating keys using tip-referenced alignment between key blank and master key
US5271698A (en) 1988-10-21 1993-12-21 Axxess Entry Technologies Key cutting machine with a code selectable key duplicating system
US5556240A (en) 1988-10-21 1996-09-17 Axxess Technologies, Inc. Key positioning fixture for a key cutting machine
AU651554B2 (en) 1988-10-21 1994-07-28 Axxess Technologies, Inc. Method and apparatus for aligning and cutting single-sided and double-sided keys
US5043144A (en) 1988-10-27 1991-08-27 Honeywell Inc. Self-centering vise for holding a sample in a laboratory instrument chamber
US4898504A (en) 1988-11-30 1990-02-06 Agius Frank P Key cutting machine
JPH02160408A (en) 1988-12-07 1990-06-20 Ueda Eng Kk Side face processing machine
CH677570A5 (en) 1989-05-17 1991-05-31 Ascom Audiosys Ag
JPH02303900A (en) 1989-05-19 1990-12-17 Gojigen Kikaku:Kk Automatic carving apparatus
US4929843A (en) 1989-06-28 1990-05-29 General Electric Company Apparatus and method for determining a dimension of an object
US4998349A (en) 1989-08-28 1991-03-12 Curtis Industries, Inc. Key-cutting device
GB8923169D0 (en) 1989-10-13 1989-11-29 British United Shoe Machinery Digitising irregularly shaped articles
US5139246A (en) 1989-11-08 1992-08-18 Canon Kabushiki Kaisha Work clamping apparatus
ES2017240A6 (en) 1989-11-30 1991-01-01 Areitio & Arteta Comunicad De Installation for the automatic reproduction of keys
US4969782A (en) 1989-12-20 1990-11-13 Castain David T Key blank adaptor
US4971489A (en) 1990-01-16 1990-11-20 Womack Robert C Code key cutting machine fast cam feed
US5083759A (en) 1990-01-24 1992-01-28 American Machine & Tool Co. Anti-kickback device
GB9004246D0 (en) 1990-02-26 1990-04-18 Automation Tooling Syst Vision system for inspection of electronic components
JP2510786B2 (en) 1990-04-14 1996-06-26 松下電工株式会社 Object shape detection method and apparatus
US5058940A (en) 1990-07-31 1991-10-22 Hart Leroy Automatic dead locking bolt assembly
JPH04123829A (en) 1990-09-10 1992-04-23 Masaji Terada Machine for copying key
GB9021447D0 (en) 1990-10-03 1990-11-14 Renishaw Plc Capacitance probes
US5192469A (en) 1990-10-30 1993-03-09 3D Systems, Inc. Simultaneous multiple layer curing in stereolithography
US5255199A (en) 1990-12-14 1993-10-19 Martin Marietta Energy Systems, Inc. Cutting tool form compensaton system and method
IT1242780B (en) 1990-12-19 1994-05-17 Pierluigi Oliana MULTIPLE KEY ENCRYPING MACHINE.
NL9002869A (en) 1990-12-27 1992-07-16 Philips Nv DEVICE FOR OPTICALLY MEASURING THE HEIGHT OF A SURFACE.
JPH04250911A (en) 1990-12-28 1992-09-07 Ishikawajima Harima Heavy Ind Co Ltd Portal cutting machine
US5594652A (en) 1991-01-31 1997-01-14 Texas Instruments Incorporated Method and apparatus for the computer-controlled manufacture of three-dimensional objects from computer data
GB9105903D0 (en) 1991-03-20 1991-05-08 Adwest Eng Ltd Anti-roll mechanism for a rack and pinion
US5176015A (en) * 1991-04-10 1993-01-05 Sussina Stan J Restricted key system
US5293687A (en) 1991-05-10 1994-03-15 Aluminum Company Of America Wheel manufacturing method
US5122018A (en) * 1991-07-22 1992-06-16 Alfred Zion High productivity key cutting machine
DE4130237A1 (en) 1991-09-11 1993-03-18 Zeiss Carl Fa METHOD AND DEVICE FOR THE THREE-DIMENSIONAL OPTICAL MEASUREMENT OF OBJECT SURFACES
US5171112A (en) 1991-12-26 1992-12-15 Maromatic Company, Inc. Key cutting apparatus
US5244321A (en) 1992-01-21 1993-09-14 Keymak Company Key cutting apparatus
US5146689A (en) 1992-01-29 1992-09-15 Maromatic Company, Inc. Key reading method and apparatus
JP3135155B2 (en) 1992-01-30 2001-02-13 豊田工機株式会社 Work pressing device
US5311286A (en) 1992-04-01 1994-05-10 Materials Technologies Corporation Apparatus and method for optically measuring a surface
US5545367A (en) 1992-04-15 1996-08-13 Soane Technologies, Inc. Rapid prototype three dimensional stereolithography
EP0598858A4 (en) 1992-06-15 1994-12-07 Alpine Eng Prod Automatic saw machine and method.
DE69333912T2 (en) 1992-06-24 2006-06-29 Hoya Corporation Production of spectacle lenses
JP2680224B2 (en) 1992-06-25 1997-11-19 松下電工株式会社 Three-dimensional shape detection method and apparatus
US5311756A (en) 1992-07-08 1994-05-17 Villani Fiorenzo L Automobile anti-theft device
USD348393S (en) 1992-11-23 1994-07-05 Axxess Entry Technologies Disposable container for storing and dispensing a stack of identical card-mounted key blanks
US5259708A (en) 1992-12-07 1993-11-09 Ilco Unican Inc. Key cutting machine having manual and automatic modes of operation
US5311758A (en) 1992-12-16 1994-05-17 Axxess Entry Technologies Key storage tag
US5308360A (en) 1992-12-16 1994-05-03 Axxess Entry Technologies, Inc. Key storage container
US5351409A (en) 1992-12-16 1994-10-04 Axxess Entry Technologies Key identifier method and apparatus
US5382784A (en) 1993-02-08 1995-01-17 Indala Corporation Hand-held dual technology identification tag reading head
GB9305736D0 (en) 1993-03-19 1993-05-05 Autokey Uk Ltd A key mill
US5393967A (en) 1993-07-21 1995-02-28 Sensis Corporation Method and apparatus for non-contact reading of a relief pattern
IT1266760B1 (en) 1993-07-29 1997-01-14 Silca Spa DUPLICATING MACHINE FOR SECURITY KEYS
US5496138A (en) 1994-01-27 1996-03-05 Drori; Mordeki Duplicating key machine and method of operating same
US5543103A (en) 1994-05-31 1996-08-06 Hogan; S. David Process of surface shaping
US5503785A (en) 1994-06-02 1996-04-02 Stratasys, Inc. Process of support removal for fused deposition modeling
US5538374A (en) 1994-08-12 1996-07-23 American Consumer Products, Inc. Key duplicating machine and method
US5660509A (en) 1994-08-12 1997-08-26 American Consumer Products, Inc. Key duplicating machine with bottom clearance
US5555176A (en) 1994-10-19 1996-09-10 Bpm Technology, Inc. Apparatus and method for making three-dimensional articles using bursts of droplets
US5552992A (en) 1994-11-01 1996-09-03 Larry J. Winget Method and system for reproduction of an article from a physical model
US5497888A (en) 1994-11-16 1996-03-12 American Consumer Products, Inc. Modular display system
US5926388A (en) 1994-12-09 1999-07-20 Kimbrough; Thomas C. System and method for producing a three dimensional relief
US5807042A (en) * 1995-06-07 1998-09-15 Almblad; Robert Method and apparatus for automatically making keys
WO1996019309A1 (en) 1994-12-22 1996-06-27 Almblad Robert E Method and apparatus for automatically making keys
US6065911A (en) * 1994-12-22 2000-05-23 Almblad; Robert Method and apparatus for automatically making keys
US5575318A (en) 1995-02-17 1996-11-19 Thermwood Corporation Slide assembly for machine tools and method of making same
US5630332A (en) 1995-06-07 1997-05-20 Kaba High Security Locks Corporation Hybrid plug lock
US5515903A (en) 1995-06-19 1996-05-14 Multi-Products, Incorporated Method of making a mold
US5739766A (en) 1995-07-12 1998-04-14 Ilco Unican Inc. Transponder detector
US5671523A (en) 1995-09-15 1997-09-30 Medeco Security Locks, Inc. Method for supporting keys and key blanks during cutting thereof
US6133355A (en) 1995-09-27 2000-10-17 3D Systems, Inc. Selective deposition modeling materials and method
US5617323A (en) 1995-10-31 1997-04-01 Stansberry; Warren W. Key identifier method and apparatus
US5676504A (en) 1995-12-14 1997-10-14 Axxess Technologies, Inc. Key cutting machine with key tracing and electronic code cutting duplication modes
US5940229A (en) 1996-03-26 1999-08-17 David Baumgarten Image reflecting device for use with a computer monitor
US5764156A (en) 1996-07-11 1998-06-09 Ilco Unican Inc. Transponder detector
US5771176A (en) 1996-09-03 1998-06-23 Froehlich; Phillip E. Process and apparatus for enhancement for security in a mechanical lock environment (DPN-1)
US6067695A (en) 1996-10-11 2000-05-30 Noran S.L. Double arm vertical miller
EP0837300B1 (en) 1996-10-21 2003-07-09 Carl Zeiss Procedure and apparatus for measuring the edges of objects
US6175638B1 (en) 1996-11-29 2001-01-16 Vladislav Yanovsky Shadow image acquisition device
US5906365A (en) 1997-01-23 1999-05-25 Wu; Kuo-Shen Clamping device for key duplicating machine
US5886775A (en) 1997-03-12 1999-03-23 M+Ind Noncontact digitizing imaging system
US6064747A (en) 1997-05-13 2000-05-16 Axxess Technologies, Inc. Method and apparatus for using light to identify a key
US5997795A (en) 1997-05-29 1999-12-07 Rutgers, The State University Processes for forming photonic bandgap structures
US6647308B1 (en) * 1997-07-29 2003-11-11 Ronald Martin Prejean Key manufacturing method
US6152662A (en) * 1997-07-31 2000-11-28 Machine Magic, Llc Key duplication apparatus and method
US5908273A (en) 1997-07-31 1999-06-01 Machine Magic-Llc Key duplication apparatus and method
US6185311B1 (en) 1997-08-18 2001-02-06 Vladislav Yanovsky Key imaging system
US6082580A (en) 1998-01-26 2000-07-04 Axxess Technologies, Inc. Article dispensing apparatus
US6059495A (en) 1998-03-24 2000-05-09 Axxess Technologies, Inc. Engraving apparatus
US6186711B1 (en) 1998-04-03 2001-02-13 Axxess Technologies, Inc. Engraving system
US6318137B1 (en) * 1998-04-08 2001-11-20 David Chaum Electronic lock that can learn to recognize any ordinary key
IL124815A (en) 1998-06-08 2004-05-12 Mul T Lock Technologies Ltd Key duplication machine
US5984597A (en) 1998-08-28 1999-11-16 Chieh Yung Automation Corp. Milling apparatus for forming a key bit
US6094953A (en) 1998-11-10 2000-08-01 Mas-Hamilton Group, Inc. Electrically controlled slidebolt lock
US6321430B1 (en) 1998-12-04 2001-11-27 Axxess Technologies, Inc. Workpiece carrying system
US6965911B1 (en) 1998-12-21 2005-11-15 Intel Corporation Efficiently exporting local device access onto a system area network using a direct-call interface
IT1311781B1 (en) 1999-03-05 2002-03-19 Silca Spa METHOD OF IDENTIFYING THE PROFILE OF A KEY AND EQUIPMENT TO IMPLEMENT THE METHOD.
US6243960B1 (en) 1999-03-16 2001-06-12 National Optronics, Incorporated Tracer, clamp and object engager for holding and tracing a lens mount of an eyeglass frame, a lens, and/or a lens pattern, to reliably detect a shape thereof even when the shape includes high wrap
US7010498B1 (en) 1999-09-23 2006-03-07 International Business Machines Corporation Personal product locator on store-owned shopping aid
US6179531B1 (en) 1999-09-24 2001-01-30 Joei Jaw Portable machine for processing keys
US20030154135A1 (en) 1999-11-05 2003-08-14 Covington Robert D. Interactive in-store/in-mall and on-line shopping system and method
AU4510601A (en) * 1999-12-01 2002-01-08 Robert E. Almblad Operator assisted method for making keys
AU2001231261A1 (en) 2000-02-01 2001-08-14 Machine Magic-Llc Key measurement apparatus and method
USD455104S1 (en) 2000-03-07 2002-04-02 Eric Hillman Towing unit for a snowmobile
US6415931B1 (en) 2000-03-20 2002-07-09 The Hillman Group, Inc. Feed spring
JP3379933B2 (en) 2000-03-23 2003-02-24 株式会社 川井商会 Key information registration procedure support system, recording medium, key plate cutting machine
US6687565B2 (en) 2000-06-02 2004-02-03 Machine Magic, Llc Key identification code and manufacturing method
US20010056385A1 (en) 2000-06-22 2001-12-27 John Timms Fastener retailing method with graphic interface selection and locator software
US6543972B1 (en) * 2000-06-27 2003-04-08 William J Cimino Device to help determine key cut attributes
US6612142B1 (en) 2000-07-14 2003-09-02 Robert G. Capwell Guard side passive two key lock
US6839449B1 (en) 2000-07-25 2005-01-04 The Hillman Group, Inc. Key identification system
US6839451B2 (en) * 2000-07-25 2005-01-04 John Campbell Key identification system
US6836553B2 (en) 2000-07-25 2004-12-28 The Hillman Group, Inc. Key identification system
US6711557B1 (en) 2000-08-14 2004-03-23 Adobe Systems Incorporated Client-based background update monitoring
DE60234579D1 (en) 2001-03-26 2010-01-14 Hillman Group Inc KEY CUTTING METHOD
US20020168241A1 (en) 2001-05-09 2002-11-14 United Air Lines, Inc. Router apparatus
ITVE20010028A1 (en) 2001-06-01 2002-12-01 Silca Spa PERFECTED CLAMP FOR KEY DUPLICATING MACHINE
US20030145499A1 (en) 2002-02-05 2003-08-07 The Hillman Group, Inc. Stand-alone folding sign
MXPA05001361A (en) 2002-08-02 2005-10-05 Hy Ko Products Co Object identification system.
US6989741B2 (en) 2002-08-07 2006-01-24 G-5 Electronics Object tracking
US7172498B2 (en) 2002-09-27 2007-02-06 Professional Tool Manufacturing, Llc Drill sharpener
US6959862B2 (en) 2002-11-25 2005-11-01 Yoram Neumark Inventory control and identification method
EP1599828A1 (en) 2003-03-06 2005-11-30 Animetrics, Inc. Viewpoint-invariant image matching and generation of three-dimensional models from two-dimensional imagery
DE10317775A1 (en) 2003-04-16 2004-11-04 Karl-Heinz Bosch Method of making a key blank
US7111894B2 (en) 2003-06-13 2006-09-26 Mazda Motor Corporation Automobile door structure
US20050000052A1 (en) 2003-07-03 2005-01-06 Byles Raymond G. Vacuum attachment for drilling tool
ES2575982T3 (en) 2003-10-20 2016-07-04 Hy-Ko Products Company Key cutting machine
US20050216120A1 (en) 2004-03-29 2005-09-29 Yair Rosenberg Automatic vending machine and method
US7114436B1 (en) 2004-05-14 2006-10-03 Mueller Thomas L Safety interlock and retraction mechanism for clinching, crimping, and punching presses
ITPN20040066A1 (en) 2004-09-22 2004-12-22 Keyline S R L CLAMP FOR KEY DUPLICATING MACHINE
US7300235B2 (en) * 2004-12-03 2007-11-27 Jet Hardware Manufacturing Corporation Key duplicating machine
EP1953862A4 (en) 2005-11-22 2009-01-14 Murata Manufacturing Co Coil antenna and portable electronic apparatus
US20120243957A1 (en) * 2006-01-23 2012-09-27 Drake Robert E Key duplication machine
US9101990B2 (en) 2006-01-23 2015-08-11 Hy-Ko Products Key duplication machine
US8128322B2 (en) 2006-01-23 2012-03-06 Hy-Ko Products Company Key duplication machine
IL173803A (en) 2006-02-19 2013-01-31 Mul T Lock Technologies Ltd Key duplication machine
US7506464B2 (en) 2006-03-10 2009-03-24 The Hillman Group, Inc. Character display system and method of making the same
WO2008066857A2 (en) * 2006-11-28 2008-06-05 Key Tech, Inc. Fully automatic key duplicating machine with automatic key model identification system
US7918629B2 (en) * 2007-03-15 2011-04-05 Kaba Iko Corp. Ez key registration assembly
US20090180664A1 (en) 2008-01-16 2009-07-16 Christine Efstathiades Master Key Identification System
WO2010024909A1 (en) 2008-08-27 2010-03-04 Hy-Ko Products Company Key clamping device
US8644619B2 (en) 2009-05-01 2014-02-04 Hy-Ko Products Company Key blank identification system with groove scanning
US8634655B2 (en) * 2009-05-01 2014-01-21 Hy-Ko Products Company Key blank identification system with bitting analysis
US8634951B2 (en) 2010-06-03 2014-01-21 Minute Key Inc. Fully automatic self-service key duplicating kiosk

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5711643A (en) * 1996-06-28 1998-01-27 Intralock Tools Ltd. Portable semi-automatic computer code key cutting machine
US5997224A (en) * 1997-01-15 1999-12-07 Ilco Unican, Inc. Key cutting machine for cutting keys by code
US20010033781A1 (en) * 1997-05-13 2001-10-25 Wills Method and apparatus for determining the bitting pattern of keys
US20070224008A1 (en) * 2006-01-23 2007-09-27 Bass Michael A Key duplication machine
US7484446B1 (en) * 2006-06-30 2009-02-03 Theodore Gula Manual punch press for keys

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220180621A1 (en) * 2019-06-28 2022-06-09 Shenzhen Xhorse Electronics Co., Ltd Article identification method and device, and computer readable storage medium
US20210237175A1 (en) * 2020-02-05 2021-08-05 Ikeyless, Llc Systems and methods for creating duplicate keys
WO2021156632A3 (en) * 2020-02-05 2021-11-04 Iconx Ltd Key scanning
US20220139138A1 (en) * 2020-02-05 2022-05-05 Ikeyless, Llc Systems and methods for creating duplicate keys and pairing with vehicles
GB2607767A (en) * 2020-02-05 2022-12-14 Iconx Ltd Key scanning

Also Published As

Publication number Publication date
EP2424690A1 (en) 2012-03-07
US20140140628A1 (en) 2014-05-22
CN102448636A (en) 2012-05-09
MX2011011630A (en) 2012-09-28
CN102448636B (en) 2014-09-10
US20100278438A1 (en) 2010-11-04
US9582734B2 (en) 2017-02-28
US8634655B2 (en) 2014-01-21
EP2424690A4 (en) 2013-11-27
WO2010127354A1 (en) 2010-11-04

Similar Documents

Publication Publication Date Title
US9582734B2 (en) Key blank identification system with bitting analysis
US20220139065A1 (en) Key blank identification system with groove scanning
US11842554B2 (en) High security key scanning system
US5807042A (en) Method and apparatus for automatically making keys
CN101405104B (en) Key duplication machine
US6588995B2 (en) Method and apparatus for aligning keys for cutting
US6064747A (en) Method and apparatus for using light to identify a key
US6543972B1 (en) Device to help determine key cut attributes
US20230082628A1 (en) Key scanning
US10737335B2 (en) Key duplication system with key blank orientation detection features
US20210260672A1 (en) Key duplication system with auto tune functionality
EP0799105B1 (en) Method and apparatus for automatically making keys
EP3332353A1 (en) High security key scanning system
Imre Forensic Mark Examination of Vehicle Keys
CA2208437A1 (en) Method and apparatus for automatically making keys

Legal Events

Date Code Title Description
AS Assignment

Owner name: HY-KO PRODUCUTS COMPNAY, OHIO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:THOMPSON, CHESTER O.D.;MUTCH, WILLIAM R.;PORRAS, RANDALL A.;SIGNING DATES FROM 20140312 TO 20140319;REEL/FRAME:041342/0179

AS Assignment

Owner name: HY-KO PRODUCTS COMPANY, OHIO

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE FROM;ASSIGNORS:THOMPSON, CHESTER O.D.;MUTCH, WILLIAM R.;PORRAS, RANDALL A.;SIGNING DATES FROM 20140312 TO 20140319;REEL/FRAME:042272/0057

AS Assignment

Owner name: HORIZON TECHNOLOGY FINANCE CORPORATION, CONNECTICUT

Free format text: SECURITY INTEREST;ASSIGNOR:CONVENTUS ORTHOPAEDICS, INC.;REEL/FRAME:044771/0238

Effective date: 20171222

Owner name: HORIZON TECHNOLOGY FINANCE CORPORATION, CONNECTICU

Free format text: SECURITY INTEREST;ASSIGNOR:CONVENTUS ORTHOPAEDICS, INC.;REEL/FRAME:044771/0238

Effective date: 20171222

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION