B23C2235/12

IDENTIFICATION MODULE FOR KEY MAKING MACHINE

An identification module is disclosed for use in a key making machine. The identification module may have a key receiving assembly configured to receive only a shank of an existing key. The identification module may also have a tip guide, configured to receive a tip of the shank of the existing key. The tip guide may have a slot that exposes a tip end of the shank. The identification module may also have an imaging assembly configured to capture an image of the tip end through the slot.

Key duplication machine having pivoting clamp

A clamp is disclosed for a key making machine. The clamp may have an anvil, and a door movable toward the anvil to sandwich a key blank therebetween. The clamp may also have a gate pivotally connected to the door and configured to engage the key blank.

Method and Apparatus for Key Origination
20220371107 · 2022-11-24 ·

A retainer, that holds a group of precision, off-the-shelf components in relative alignment so as to allow a standard key duplicating machine to function as a key code origination machine is disclosed. A person of ordinary skill in pinning a lock and operating a key duplicating machine is able to practice the invention. An aspect of the invention is that an ordinary, inexpensive key duplicating machine can be converted to code-cutting functionality with minimal cost, requiring no adaptation of key duplicating machine. Also disclosed are methods of positional registration, machine error compensation, and notch shaping.

Identification module for key making machine

An identification module is disclosed for use in a key making machine. The identification module may have a key receiving assembly configured to receive only a shank of an existing key. The identification module may also have a tip guide, configured to receive a tip of the shank of the existing key. The tip guide may have a slot that exposes a tip end of the shank. The identification module may also have an imaging assembly configured to capture an image of the tip end through the slot.

KEY DUPLICATION MACHINE HAVING USER-BASED FUNCTIONALITY

A machine is disclosed for use in duplicating features of an existing key within a key blank. The machine may have an identification module configured to capture data associated with the features of the existing key, a fabrication module configured to cut the features in the key blank based on the data, a user input device, and a controller in communication with the identification module, the fabrication module, and the user input device. The controller may be configured to regulate operation of the identification module and the fabrication module, and to receive input from a user via the user input device. The input may be indicative of the user being a first type of user or a second type of user. The controller may also be configured to selectively implement one of a first mode of operation or a second mode of operation based on the input.

Tablet computer support
09759372 · 2017-09-12 ·

A support for a tablet computer includes a base shaped to stably rest both on flat and on curved surfaces, a mechanical system for removably fixing the base securely to a key processing machine to be connected to and controlled by the tablet, a tubular element fixed on the upper surface of the base, a cylindrical member housed in the interior of the tubular element and rotatable relative thereto, first members for resting on and coupling to the lower transverse edge of the tablet and second members for resting on and coupling to the upper transverse edge of the tablet, wherein the first members and the second members are disposed at an angle to each other and are associated with the cylindrical member to rotate therewith relative to the tubular element, the relative distance between said the resting and coupling members and the second resting and coupling members being adjustable.

KEY BLANK IDENTIFICATION SYSTEM WITH GROOVE SCANNING
20220139065 · 2022-05-05 ·

A key identification system is provided. The key identification system comprises an imaging system to capture an image of a master key, and a logic to analyze the captured image. The imaging system may be capture an image of a groove in the master key from an angle between perpendicular and parallel to the blade of said master key. The logic analyzes the captured image to compare characteristics of the groove with groove characteristics of known key blanks to determine the likelihood of a match between the master key and a known key blank. The key identification system may further compensate for displacement or orientation of the master key with respect to the imaging system when analyzing characteristics of the groove.

Key blank identification system with groove scanning

A key identification system is provided. The key identification system comprises an imaging system to capture an image of a master key, and a logic to analyze the captured image. The imaging system may be capture an image of a groove in the master key from an angle between perpendicular and parallel to the blade of said master key. The logic analyzes the captured image to compare characteristics of the groove with groove characteristics of known key blanks to determine the likelihood of a match between the master key and a known key blank. The key identification system may further compensate for displacement or orientation of the master key with respect to the imaging system when analyzing characteristics of the groove.

KEY DUPLICATION SYSTEM
20220005008 · 2022-01-06 · ·

A key-duplicating system comprises a network that includes a multiplicity of kiosks at a multiplicity of different locations, each of the kiosks having a customer interface and a processor coupled to the customer interface. A remote central server coupled to the kiosks is adapted to receive, from the kiosks, information identifying master keys to be duplicated. A key analysis module uses the information identifying master keys to be duplicated to derive information required to produce duplicates of the identified master keys, and a key duplicating module uses that information to produce duplicates of said identified master keys

Key duplication system
11170356 · 2021-11-09 · ·

A key-duplicating system comprises a network that includes a multiplicity of kiosks at a multiplicity of different locations, each of the kiosks having a customer interface and a processor coupled to the customer interface. A remote central server coupled to the kiosks is adapted to receive, from the kiosks, information identifying master keys to be duplicated. A key analysis module uses the information identifying master keys to be duplicated to derive information required to produce duplicates of the identified master keys, and a key duplicating module uses that information to produce duplicates of said identified master keys.