SYSTEMS AND METHODS FOR DUPLICATING KEYS
First Claim
Patent Images
1. A system for creating keys, the system comprising:
- at least one hardware processor that;
receives security information from a user; and
receives geometric information about a first key associated with the security information from a storage device; and
a key shaping device that creates a second key using the geometric information.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for duplicating keys are provided. In some embodiments, a systems for creating keys are provided, the systems comprising: at least one hardware processor that: receives security information from a user; and receives geometric information about a first key associated with the security information from a storage device; and a key shaping device that creates a second key using the geometric information.
21 Citations
30 Claims
-
1. A system for creating keys, the system comprising:
-
at least one hardware processor that; receives security information from a user; and receives geometric information about a first key associated with the security information from a storage device; and a key shaping device that creates a second key using the geometric information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for creating keys, the system comprising:
-
a key receiver that receives a first key; a key scanner that captures geometric information about the first key; a hardware processor that determines a key type and bitting pattern of the first key based on the geometric information; and a key shaping device that creates a second key based on the key type and bitting pattern determined by the processor. - View Dependent Claims (14, 15)
-
-
16. A method for creating keys, the method comprising:
-
receiving security information from a user; receiving geometric information about a first key associated with the security information from a storage device; and creating a second key using the geometric information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for creating keys, the method comprising:
-
receiving a first key; scanning geometric information about the first key; determining a key type and bitting pattern of the first key based on the geometric information; and creating a second key based on the key type and bitting pattern determined by the processor. - View Dependent Claims (29, 30)
-
Specification