E05B19/24

KEY-SHAPE DATA MANAGEMENT SYSTEM AND KEY-SHAPE DATA MANAGEMENT METHOD
20200130647 · 2020-04-30 ·

A key-shape data management system includes a storage server, an acceptance server, and a transmission server. The storage server stores vehicle identification information capable of identifying a vehicle, mechanical lock identification information capable of identifying a mechanical lock mounted on the vehicle, key-shape data of a mechanical key used in combination with the mechanical lock, and information on multiple manufacturing bases capable of manufacturing the mechanical key. The acceptance server accepts a request for acquiring the mechanical key together with determining information and delivery location information indicating a delivery location of the mechanical key. The transmission server determines the vehicle identification information based on the determining information, determines the key-shape data based on the vehicle identification information, determines one of the manufacturing bases corresponding to the delivery location, and transmits the delivery location information and the key-shape data to the determined manufacturing base.

KEY COVER
20200123805 · 2020-04-23 ·

A cover for a key is disclosed. The cover includes: a first wall; a second wall opposite to the first wall; and an outer wall extending between the first wall and the second wall, the outer wall defining a pair of slots extending therethrough, the slots being positioned opposite to each other on the outer wall, wherein the first wall, the second wall, and the outer wall define a closed chamber for receiving a bow of the key and an opening to the chamber.

KEY COVER
20200123805 · 2020-04-23 ·

A cover for a key is disclosed. The cover includes: a first wall; a second wall opposite to the first wall; and an outer wall extending between the first wall and the second wall, the outer wall defining a pair of slots extending therethrough, the slots being positioned opposite to each other on the outer wall, wherein the first wall, the second wall, and the outer wall define a closed chamber for receiving a bow of the key and an opening to the chamber.

DATA KEY AND METHOD OF USING SAME

Some of the inventive concepts described herein include a data key having a computer readable medium containing information indicative of a bitting pattern for a master key. The bitting pattern on the data key may be downloadable to a key cutting device to cut a duplicate key that has the same bitting pattern as the master key. In addition, a method of creating a data key is also provided herein. The method includes identifying a type of key; identifying a bitting pattern; and storing the type of key blank required and bitting pattern to be cut in the key blank on a computer readable medium.

Key cover
10519693 · 2019-12-31 · ·

A cover for a key is disclosed. The cover includes: a first wall; a second wall opposite to the first wall; and an outer wall extending between the first wall and the second wall, the outer wall defining a pair of slots extending therethrough, the slots being positioned opposite to each other on the outer wall, wherein the first wall, the second wall, and the outer wall define a closed chamber for receiving a bow of the key and an opening to the chamber.

Key cover
10519693 · 2019-12-31 · ·

A cover for a key is disclosed. The cover includes: a first wall; a second wall opposite to the first wall; and an outer wall extending between the first wall and the second wall, the outer wall defining a pair of slots extending therethrough, the slots being positioned opposite to each other on the outer wall, wherein the first wall, the second wall, and the outer wall define a closed chamber for receiving a bow of the key and an opening to the chamber.

Data key and method of using same

Some of the inventive concepts described herein include a data key having a computer readable medium containing information indicative of a bitting pattern for a master key. The bitting pattern on the data key may be downloadable to a key cutting device to cut a duplicate key that has the same bitting pattern as the master key. In addition, a method of creating a data key is also provided herein. The method includes identifying a type of key; identifying a bitting pattern; and storing the type of key blank required and bitting pattern to be cut in the key blank on a computer readable medium.

System and method for identifying a lock associated with a given key
10296537 · 2019-05-21 ·

An apparatus and system facilitates the identification of a key and its corresponding lock by marking each key with a unique indicia element that has a unique set of indicia. The indicia is easily recognized by a computing device using an image recognition process, and can map the unique indicia into a corresponding unique identifier to create a record that correlates the key with a specific lock, indicating the lock's location and other information about the lock. A user, given a key with indicia element on it, can then determine the lock to which the key corresponds by the indicia being automatically recognized, and used to locate a record corresponding to the indicia, and presenting the information in the record to the user.

System and method for identifying a lock associated with a given key
10296537 · 2019-05-21 ·

An apparatus and system facilitates the identification of a key and its corresponding lock by marking each key with a unique indicia element that has a unique set of indicia. The indicia is easily recognized by a computing device using an image recognition process, and can map the unique indicia into a corresponding unique identifier to create a record that correlates the key with a specific lock, indicating the lock's location and other information about the lock. A user, given a key with indicia element on it, can then determine the lock to which the key corresponds by the indicia being automatically recognized, and used to locate a record corresponding to the indicia, and presenting the information in the record to the user.

Key Labeling System and Method of Promotional Advertising through Distribution of Labeled Key Head Covers
20190139458 · 2019-05-09 ·

A key labeling system and method of promotional advertising through distribution of labeled key head covers enables free distribution of a labeled key head cover to potential consumers for personal use, whereby, the potential consumer frequently views advertisements, messages, and logos that display on the key. The method is also marketed to promotional catalogues. The labeled key head cover comprises a circular-shaped sleeve having a first face, a second face, an inner cavity for retaining the key head, a through opening to fit around the key head, and a resilient material fitting around the key head. The first face comprises a printed promotional indicia that can include: an advertisement, a contact identifier, a promotion, a trademark, a product name, a business name, and a logo. A gap forms in the second face of sleeve for receiving and viewing an insert label that can be marked and customized by the consumers.