This invention relates to a data key for creating duplicates of keys and a method of using the same.
People often lose their keys. Losing a key is aggravating and can be very expensive. Often a person must call a locksmith to change the locks on their home or to open a vehicle. Further, most vehicle keys today have microchips implanted in them and a person often is required to order a new key from the dealership and wait until that key is shipped to them. In the event the person previously lost their spare key, or are out of town, they may be without their vehicle for days.
Some of the inventive concepts described herein include a data key having a computer readable medium containing information indicative of a bitting pattern for a master key. The bitting pattern on the data key may be downloadable to a key cutting device to cut a duplicate key that has the same bitting pattern as the master key. In addition, a method of creating a data key is also provided herein. The method includes identifying a type of key; identifying a bitting pattern; and storing the type of key blank required and bitting pattern to be cut in the key blank on a computer readable medium.
Other features and advantages of the invention will be apparent from the description and drawings, and from the claims.
Data source 320 is a media capable of conveying data. Data source 320 may contain human readable information. Data source 320 may any suitable material, such as, for example, cardboard or plastic. Data source 320 may be attached directly to the key blank, attached to a package surrounding the key blank or connected to a cover plate 310 as shown in
In one embodiment, data source 320 includes coded instructions that are machine-readable. These instructions may be read by a computer and displayed for a user/sales person to follow. These instructions may include, for example, instructions on how to position the key and key blanks in the cutting machine, instructions to obtain the customer's identification information, instructions on the proper forms to fill out, instructions to offer the customer promotional deals or discounts on additional keys or other related items, such as, key chains, and bow covers. In such cases, data source 320 includes an electronic information storage device 325, such as, for example, a radio frequency identification device (“RFID”) or a microchip. The electronic information storage device 325 includes a computer readable medium, such as, for example, random access memory (“RAM”), read only memory (“ROM”), flash memory or any other memory capable of storing data. Accordingly, data source 320 includes memory on which electronic data may be stored and/or retrieved.
The term “data key” as used herein refers to information related to duplicating a key that is electronically stored on a computer readable medium, or the electronic information storage device. In one embodiment, a data key is an electronic information storage device 325 that is programmed to contain one or more of: directions, release forms, customer identification information, customer validation information, or key characteristics, such as for example, the type of key, the type of key blank, an origination address, a destination address, a manufacturer, a manufacturing date, a lot number, etc. The information may be read through a reader, such as an RFID reader, or may be read and displayed on a display viewable by a user, such as a point of sales person. In one embodiment, the electronic information device 325 plugs into a port on a computer allowing the information to be displayed or downloaded to the computer. The electronic information storage device 325 may be secured to data source 320, may be embedded completely within, or partially within, data source 320. In one embodiment, data source 320 includes both human readable information and electronically stored data.
Information may be stored on the electronic information storage device 325 at any point in the distribution channel, such as, for example, at the time the customer desires to have a key copied, or have an electronic or digitized copy of the key made. Such information may include, for example, information related to the customer or information related to the key bitting that is, or will be, cut into the key blank. Additional information may also include, for example, data indicative of information that is stored on the original key that is being copied. In one embodiment, a key being copied is a key for a vehicle (not shown) that has a microchip embedded within the key. The microchip (not shown) contains electronic data that a duplicated, or copied key, must also have for the duplicated key to be able to start the car. Accordingly, this type of information may be stored on the electronic information storage device 325. The data source 320 and electronic information storage device 325 may be retained by the customer, and a duplicate key can be created at any time by inputting the stored information into a key duplicating machine.
In one embodiment, data source 505 also includes an electronic information storage device (not shown). As described above, information, such as key cutting machine setup information, the bitting pattern, the proper type of key blank, and customer identification may be stored on the electronic storage device (not shown). In addition, the electronic storage device (not shown) may include additional information that is required for a complete copy of a key to be made. Such information includes, for example, codes necessary for a key to operate a specific locking mechanism. This information may be retrieved and utilized to create a duplicate key. In one embodiment, data source 505, or any of the other data sources described herein, has substantially the same dimensions as a credit card. Accordingly, the data source fits conveniently in a user's wallet or purse. Thus, data source 505 enables a customer to go to an establishment that has s manual key cutting machine and use data source 505 as a master key (provided that electronic data is not required for the key to operate the locking mechanism) or go to an establishment that has a key cutting machine that can retrieve the electronic information stored on the electronic storage device and cut a new key based on that information.
In one embodiment, a customer can have a data key made without making a physical copy of the key. Accordingly, for keys that are expensive to duplicate because the key blanks are expensive, such as for example, automobile keys, a user may simply have a data key created and kept in a safe place for use in an emergency or in the event the customer loses her automobile key. Because the data key contains all of the information required to duplicate the customer's key, a duplicate key may be created without having the original key.
The “information” described above with respect to a specific data source, electronic information storage device, or data key is also applicable to the other embodiments described herein even though that information may not have been specifically described with respect to a particular embodiment. Accordingly, such information is included in whole, in part or in any combination thereof in each embodiment. In addition, additional information, such as, for example, automobile warranty information or dealer maintenance records that would be convenient for the customer to have on hand may also be stored on an electronic data source.
Security information may also be stored on the data source or data key. Security information may include a customers' name, a personal identification number (“PIN”), or biometric data, such as a fingerprint scan, photographic data, retinal scan and/or a facial scan. This information can be used to insure that unauthorized copies of the key are not made. A sales person may review the security information prior to duplicating a key. In one embodiment, to preserve the owner's anonymity, a duplicate would only be made if a proper PIN number were provided by the customer, which matched the pin number stored on the data source.
Optionally when a key is duplicated, information relating to the master key and the customer is stored on the data key that is provided to the customer and is also stored on the duplication center's server (or on a secured server maintained for example, by a distributor of keys). Accordingly, if a company that has a national distribution network, such as, for example, Wal-Mart or the Home Depot, makes a copy of a customer's key and the customer loses the key while away from home and does not have her personal data key, the customer need only go to one of the company's retail stores provide the proper security information and have a copy of the key made from the information previously stored.
In addition, the electronic data key may be transmitted to a second person so that that person may have a key duplicated without the original customer having to travel to the location of the duplicating machine. For example, if a child is away at college in California and loses her keys to the car, her parents could simply travel to a key duplicating location in their hometown in Ohio with a second key, have the information stored as a data key and then transmit that information to their daughter who can go to a location in California that has a key duplicating machine, download the data key to that duplicating machine and have a key made from the data key.
It should also be clear from this disclosure that the present invention has numerous additional uses outside of the key industry. The present invention is equally applicable to other applications wherein the creation of a duplicate device is desired.
In addition, while the present invention has been illustrated by the description of embodiments thereof, and while the embodiments have been described in some detail, it is not the intention of the applicant to restrict or in any way limit the scope of the appended claims to such detail. Additional advantages and modifications will readily appear to those skilled in the art. For example, various combinations of the embodiments described herein may be combined with one another. Therefore, the invention in its broader aspects is not limited to the specific details, representative apparatus and methods, and illustrative examples shown and described. Accordingly, departures may be made from such details without departing from the spirit or scope of the applicant's general inventive concept.
This application is a continuation in part of and claims the benefits of and priority to U.S. patent application Ser. No. 12/965,319 titled “Radio Frequency Identification (RFID) System for Manufacturing, Distribution and Retailing of Keys” filed on Dec. 10, 2010; which is a continuation of U.S. patent application Ser. No. 11/224,194, now U.S. Pat. No. 7,849,721, also titled “Radio Frequency Identification (RFID) System for Manufacturing Distribution and Retailing of Keys” which was filed in the United States Patent Office on Sep. 12, 2005; which claims priority to and the benefits of U.S. Provisional Application Ser. No. 60/609,188, also titled “Radio Frequency Identification (RFID) System for Manufacturing Distribution and Retailing of Keys” filed on Sep. 10, 2004. These applications are incorporated by reference herein in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
3841120 | Gartner | Oct 1974 | A |
3958105 | Sidlauskas | May 1976 | A |
4200227 | Lemelson | Apr 1980 | A |
4673932 | Ekchian | Jun 1987 | A |
4688036 | Hirano et al. | Aug 1987 | A |
4738334 | Weishaupt | Apr 1988 | A |
4939917 | Cartwright | Jul 1990 | A |
5232528 | Reznickenko et al. | Aug 1993 | A |
5351409 | Heredia | Oct 1994 | A |
5365235 | Kennedy et al. | Nov 1994 | A |
5477214 | Bartel | Dec 1995 | A |
5561331 | Suyama et al. | Oct 1996 | A |
5807042 | Almblad et al. | Sep 1998 | A |
5836187 | Janssen et al. | Nov 1998 | A |
5842365 | Bordonaro | Dec 1998 | A |
5874896 | Lowe et al. | Feb 1999 | A |
5905446 | Benore et al. | May 1999 | A |
5908273 | Titus et al. | Jun 1999 | A |
5952937 | Koopman et al. | Sep 1999 | A |
6064747 | Wills et al. | May 2000 | A |
6204764 | Maloney | Mar 2001 | B1 |
6216501 | Marquardt et al. | Apr 2001 | B1 |
6276179 | Janssen et al. | Aug 2001 | B1 |
6297725 | Tischendorf et al. | Oct 2001 | B1 |
6367299 | Janssen et al. | Apr 2002 | B1 |
6386007 | Johnson et al. | May 2002 | B1 |
6406227 | Titus et al. | Jun 2002 | B1 |
6407665 | Maloney | Jun 2002 | B2 |
6427504 | Janssen et al. | Aug 2002 | B1 |
6427913 | Maloney | Aug 2002 | B1 |
6457337 | Hattick et al. | Oct 2002 | B1 |
6460386 | Watanuki et al. | Oct 2002 | B1 |
6600418 | Francis et al. | Jul 2003 | B2 |
6637245 | Bolton | Oct 2003 | B1 |
6647308 | Prejean | Nov 2003 | B1 |
6647752 | Chaillie | Nov 2003 | B1 |
6672118 | Wright | Jan 2004 | B1 |
6681990 | Vogler et al. | Jan 2004 | B2 |
6687565 | Wetterlin et al. | Feb 2004 | B2 |
6710701 | Leatherman | Mar 2004 | B2 |
6765311 | Labonde | Jul 2004 | B1 |
6801829 | Kawai | Oct 2004 | B2 |
6933849 | Sawyer | Aug 2005 | B2 |
6948344 | Janssen | Sep 2005 | B2 |
6952156 | Arshad et al. | Oct 2005 | B2 |
6978118 | Vesikivi et al. | Dec 2005 | B2 |
6998956 | Dix | Feb 2006 | B2 |
7098791 | Okada | Aug 2006 | B2 |
7142413 | Sugimoto et al. | Nov 2006 | B2 |
7236085 | Aronson et al. | Jun 2007 | B1 |
7290419 | Balko et al. | Nov 2007 | B2 |
7310980 | Hashimoto et al. | Dec 2007 | B2 |
7360383 | Chang | Apr 2008 | B1 |
7370501 | Miyata et al. | May 2008 | B2 |
8074481 | Bass et al. | Dec 2011 | B2 |
20010034565 | Leatherman | Oct 2001 | A1 |
20020038267 | Can et al. | Mar 2002 | A1 |
20020084887 | Arshad et al. | Jul 2002 | A1 |
20020126010 | Trimble et al. | Sep 2002 | A1 |
20020158751 | Bormaster | Oct 2002 | A1 |
20030051520 | Janssen et al. | Mar 2003 | A1 |
20030144926 | Bodin et al. | Jul 2003 | A1 |
20030189482 | Arshad et al. | Oct 2003 | A1 |
20030200778 | Chhatwal | Oct 2003 | A1 |
20030210128 | Dix | Nov 2003 | A1 |
20030216969 | Bauer et al. | Nov 2003 | A1 |
20040024730 | Brown et al. | Feb 2004 | A1 |
20040069850 | De Wilde | Apr 2004 | A1 |
20040095380 | Bass et al. | May 2004 | A1 |
20040143505 | Kovach | Jul 2004 | A1 |
20040189440 | Wong | Sep 2004 | A1 |
20040237613 | Shimura | Dec 2004 | A1 |
20040252030 | Trimble et al. | Dec 2004 | A1 |
20040263316 | Dix et al. | Dec 2004 | A1 |
20050088279 | Denison et al. | Apr 2005 | A1 |
20050166650 | Shimura et al. | Aug 2005 | A1 |
20050223766 | Hashimoto et al. | Oct 2005 | A1 |
20060053848 | Ghabra et al. | Mar 2006 | A1 |
20060150696 | Eychenne et al. | Jul 2006 | A1 |
20060159260 | Pereira et al. | Jul 2006 | A1 |
20060202798 | Baumgartner et al. | Sep 2006 | A1 |
20060230796 | Keller et al. | Oct 2006 | A1 |
20060260370 | Miwa et al. | Nov 2006 | A1 |
20060261925 | Baumgartner et al. | Nov 2006 | A1 |
20060266089 | Dimig | Nov 2006 | A1 |
20070003388 | Doong | Jan 2007 | A1 |
20070033974 | Calavenna | Feb 2007 | A1 |
20070056338 | Sabo et al. | Mar 2007 | A1 |
20070103271 | King et al. | May 2007 | A1 |
20070262640 | Szczerba et al. | Nov 2007 | A1 |
20080127693 | Cadiz et al. | Jun 2008 | A1 |
20080129448 | Reichling | Jun 2008 | A1 |
Number | Date | Country |
---|---|---|
29917257 | May 2000 | DE |
19723039 | Dec 2003 | DE |
0291614 | Nov 1988 | EP |
1035503 | Sep 2000 | EP |
1221518 | Jul 2002 | EP |
1923823 | May 2008 | EP |
2435323 | Aug 2007 | GB |
2003150733 | May 2003 | JP |
Entry |
---|
One page printout from www.theaa.com/allaboutcars/security/keys.html, dated Jul. 8, 2004. |
Partial International Search Report from PCT/US2005/032584. |
PCT International Search Report and Written Opinion, dated Dec. 7, 2012, from related Application No. PCT/US2012/050678. |
Number | Date | Country | |
---|---|---|---|
20120038453 A1 | Feb 2012 | US |
Number | Date | Country | |
---|---|---|---|
60609188 | Sep 2004 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11224194 | Sep 2005 | US |
Child | 12965319 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12965319 | Dec 2010 | US |
Child | 13222005 | US |