Data key and method of using same
First Claim
Patent Images
1. A data key comprising:
- a computer readable medium including data indicative of a bitting pattern for a master key, wherein the bitting pattern is downloadable to a key cutting device to cut a duplicate key in a key blank to create the same bitting pattern as the master key;
security information stored on the computer readable medium configured to prevent unauthorized duplication of said master key wherein said security information includes at least one of an authorization code and a customer identification;
data information stored on the computer readable medium indicative of a key blank type to duplicate the master key; and
wherein the data indicative of the bitting pattern, the security information, and the data information indicative of the key blank type are stored on a server such that the duplicate key may be made from the data without having the master key.
5 Assignments
1 Petition
Accused Products
Abstract
Some of the inventive concepts described herein include a data key having a computer readable medium containing information indicative of a bitting pattern for a master key. The bitting pattern on the data key may be downloadable to a key cutting device to cut a duplicate key that has the same bitting pattern as the master key. In addition, a method of creating a data key is also provided herein. The method includes identifying a type of key; identifying a bitting pattern; and storing the type of key blank required and bitting pattern to be cut in the key blank on a computer readable medium.
-
Citations
17 Claims
-
1. A data key comprising:
-
a computer readable medium including data indicative of a bitting pattern for a master key, wherein the bitting pattern is downloadable to a key cutting device to cut a duplicate key in a key blank to create the same bitting pattern as the master key; security information stored on the computer readable medium configured to prevent unauthorized duplication of said master key wherein said security information includes at least one of an authorization code and a customer identification; data information stored on the computer readable medium indicative of a key blank type to duplicate the master key; and wherein the data indicative of the bitting pattern, the security information, and the data information indicative of the key blank type are stored on a server such that the duplicate key may be made from the data without having the master key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for duplicating keys, the method comprising:
-
creating a data key by obtaining security information from a first particular customer, wherein said security information includes at least one of an authorization code and a customer identification; identifying a type of key blank for a master key; determining a bitting pattern of the master key; and storing said security information, said type of key blank, and said bitting pattern on a storage device; and creating a duplicate key by obtaining proper security information from a second particular customer; loading the data key into a key cutting machine; inserting a proper key blank into said key cutting machine; and cutting said bitting pattern of the master key on said key blank to create said duplicate key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A key duplication system utilizing a data key comprising:
-
one or more key duplication machines configured to; identify key information related to master keys including bitting pattern information, key blank information, and security information related to a user; receive a request to store said key information determined by the key identification device; and verify the identity of the user; store the key information to a computer readable medium; and one or more key cutting devices configured to; receive a request from a user to retrieve said key information associated with the user; verify the identity of the user; receive the key information from a computer readable medium; determine a key blank associated with the key information; and cut the key blank based on the key information.
-
Specification