Systems and methods for duplicating keys

  • US 8,682,468 B2
  • Filed: 01/04/2013
  • Issued: 03/25/2014
  • Est. Priority Date: 01/04/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system for creating keys, the system comprising:

  • a first kiosk comprising;

    a key scanner that captures first geometric information about a first key and captures second geometric information about a second key; and

    a first hardware processor that;

    receives first security information specified by a first particular user and identifying the first particular user;

    automatically determines a key type of the first key from a plurality of known key types based on the captured geometric information about the first key;

    automatically determines bit heights of the first key based on the captured geometric information about the first key;

    causes the first geometric information, including the key type of the first key and the bit heights of the first key, and first identifying information based on the first security information to be stored at a remote storage device;

    receives second security information specified by a second particular user and identifying the second particular user;

    automatically determines a key type of the second key from the plurality of known key types based on the captured geometric information about the second key;

    automatically determines bit heights of the first key based on the captured geometric information about the second key; and

    causes the second geometric information, including the key type of the second key and the bit heights of the second key, and second identifying information based on the second security information to be stored at a remote storage device;

    a second kiosk comprising;

    a second hardware processor that;

    receives third security information, wherein the third security information corresponds to the first identifying information but not the second identifying information;

    verifies that the third security information corresponds to the first identifying information;

    identifies first stored geometric information about one or more keys that can be made in response to verifying that the third security information corresponds to the first security information, wherein the first stored geometric information includes the first geometric information but does not include the second geometric information; and

    receives the first geometric information from the remote storage device based on the verification that the third security information corresponds to the first security information; and

    a first key shaping device that creates a third key using the first geometric information, including the key type of the first key and the bit heights of the first key; and

    a third kiosk comprising;

    a third hardware processor that;

    receives fourth security information, wherein the fourth security information corresponds to the second identifying information but not the third identifying information;

    verifies that the fourth security information corresponds to the second identifying information;

    identifies second stored geometric information about one or more keys that can be made in response to verifying that the fourth security information corresponds to the second security information, wherein the second stored geometric information includes the second geometric information but does not include the first geometric information; and

    receives the second geometric information from the remote storage device based on the verification that the fourth security information corresponds to the second security information; and

    a second key shaping device that creates a fourth key using the second geometric information, including the key type of the second key and the bit heights of the second key.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×