Data key and method of using same
First Claim
Patent Images
1. A key duplication system comprising:
- one or more key duplication machines configured to;
identify key information related to a master key including bitting pattern information, key blank information, and security information related to a first user;
verify the identity of a first user;
store the key information to a first computer readable medium; and
one or more key cutting devices configured to;
receive a request from a second user to retrieve said key information related to said master key related to said first user;
verify the identity of the second user;
receive the key information from a second computer readable medium;
determine a key blank associated with the key information; and
cut the key blank based on the key information.
6 Assignments
1 Petition
Accused Products
Abstract
Some of the inventive concepts described herein include a data key having a computer readable medium containing information indicative of a bitting pattern for a master key. The bitting pattern on the data key may be downloadable to a key cutting device to cut a duplicate key that has the same bitting pattern as the master key. In addition, a method of creating a data key is also provided herein. The method includes identifying a type of key; identifying a bitting pattern; and storing the type of key blank required and bitting pattern to be cut in the key blank on a computer readable medium.
-
Citations
16 Claims
-
1. A key duplication system comprising:
one or more key duplication machines configured to; identify key information related to a master key including bitting pattern information, key blank information, and security information related to a first user; verify the identity of a first user; store the key information to a first computer readable medium; and
one or more key cutting devices configured to;receive a request from a second user to retrieve said key information related to said master key related to said first user; verify the identity of the second user; receive the key information from a second computer readable medium; determine a key blank associated with the key information; and cut the key blank based on the key information. - View Dependent Claims (2, 3, 4, 5)
-
6. A data key system comprising:
-
an electronic information storage device comprising data indicative of a bitting pattern for a master key, wherein the bitting pattern is downloadable to a key cutting device to cut a duplicate key in a key blank to create the same bitting pattern as the master key; security information stored on the electronic information storage device configured to prevent unauthorized duplication of said master key wherein said security information includes at least one of an authorization code and a customer identification; and wherein the data indicative of the bitting pattern and the security information are stored on a server such that the duplicate key may be made from the data without having the master key. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification