Patent classifications
B23C2235/12
SYSTEMS AND METHODS FOR CREATING DUPLICATE KEYS
A flipper presents a key-receiving and positioning component to a user having a known key type that is not conducive to laser scanning or the like on a flat imaging glass plate; 2) a key storage system comprising a matrix of known storage cells and an automated system used to automatically identify, locate and select keys stored in the storage matrix; 3) enhanced packaging formats for storing a variety of keys for efficient picking and placing of the keys for cutting operation and a Faux Key Blade for use in packaging of smartkeys and OBD Dongle products that do not have a key blade incorporated therein or is a detachable feature; 4) a gripping or grabbing mechanism adapted to effectively pull a desired duplicate key from a known storage spot or cell among a key product storage matrix of storage cells; and 5) an effective escrow of collective delivery system to deliver multiple items or key products in one transaction as opposed to piecemeal transactions.
SYSTEMS AND METHODS FOR CREATING REPLACEMENT VEHICLE KEYS
The present invention generally relates to the field of replicating or copying keys. More specifically, the present invention relates to creating a copy of a master key based on a captured image of the master key. The present invention identifies a set of target key information based on the image of the master key to provide for the cutting of a duplicate key blade copy to be shipped to a user. Additional key information may also be captured along with the image of the master key.
Key identification system
A key identification system that includes a key identification system housing, a key clamp, a key ring support tray, and two digital identifiers is disclosed. The key identification system housing may include a key receiving aperture extending through housing and sized to receive at least some of a key blade of a key. The key clamp is positioned adjacent to the key receiving aperture and allows the system to maintain the key blade in a fixed position within the key identification system housing when the key is inserted into the key receiving aperture. The key ring support tray is typically coupled to the key identification system housing below the key receiving aperture. The two digital identifiers are positioned within the key identification system housing and designed to capture key blade information.
KEY DUPLICATION MACHINE HAVING USER-BASED FUNCTIONALITY
A machine is disclosed for use in duplicating features of an existing key within a key blank. The machine may have an identification module configured to capture data associated with the features of the existing key, a fabrication module configured to cut the features in the key blank based on the data, a user input device, and a controller in communication with the identification module, the fabrication module, and the user input device. The controller may be configured to regulate operation of the identification module and the fabrication module, and to receive input from a user via the user input device. The input may be indicative of the user being a first type of user or a second type of user. The controller may also be configured to selectively implement one of a first mode of operation or a second mode of operation based on the input.
KEY DUPLICATION MACHINE HAVING PIVOTING CLAMP
A clamp is disclosed for a key making machine. The clamp may have an anvil, and a door movable toward the anvil to sandwich a key blank therebetween. The clamp may also have a gate pivotally connected to the door and configured to engage the key blank.
KEY DUPLICATION SYSTEM
A key-duplicating system comprises a network that includes a multiplicity of kiosks at a multiplicity of different locations, each of the kiosks having a customer interface and a processor coupled to the customer interface. A remote central server coupled to the kiosks is adapted to receive, from the kiosks, information identifying master keys to be duplicated. A key analysis module uses the information identifying master keys to be duplicated to derive information required to produce duplicates of the identified master keys, and a key duplicating module uses that information to produce duplicates of said identified master keys.
Key duplication machine having user-based functionality
A machine is disclosed for use in duplicating features of an existing key within a key blank. The machine may have an identification module configured to capture data associated with the features of the existing key, a fabrication module configured to cut the features in the key blank based on the data, a user input device, and a controller in communication with the identification module, the fabrication module, and the user input device. The controller may be configured to regulate operation of the identification module and the fabrication module, and to receive input from a user via the user input device. The input may be indicative of the user being a first type of user or a second type of user. The controller may also be configured to selectively implement one of a first mode of operation or a second mode of operation based on the input.
Key duplication machine having pivoting clamp
A clamp is disclosed for a key making machine. The clamp may have an anvil, and a door movable toward the anvil to sandwich a key blank therebetween. The clamp may also have a gate pivotally connected to the door and configured to engage the key blank.
IDENTIFICATION MODULE FOR KEY MAKING MACHINE
An identification module is disclosed for use in a key making machine. The identification module may have a key receiving assembly configured to receive only a shank of an existing key. The identification module may also have a tip guide, configured to receive a tip of the shank of the existing key. The tip guide may have a slot that exposes a tip end of the shank. The identification module may also have an imaging assembly configured to capture an image of the tip end through the slot.
Key duplication system
A key-duplicating system comprises a network that includes a multiplicity of kiosks at a multiplicity of different locations, each of the kiosks having a customer interface and a processor coupled to the customer interface. A remote central server coupled to the kiosks is adapted to receive, from the kiosks, information identifying master keys to be duplicated. A key analysis module uses the information identifying master keys to be duplicated to derive information required to produce duplicates of the identified master keys, and a key duplicating module uses that information to produce duplicates of said identified master keys.