This disclosure relates generally to apparatus and methods for duplicating keys, and more specifically, this disclosure relates to apparatus and methods for cutting duplicate keys based on a captured image of a master key with an auto tune functionality.
Key duplication and key cutting machines are designed to reproduce a key pattern of a master key onto a key blank. Prior art key duplication and key cutting machines typically determine the key pattern of a master key by mechanically engaging the key pattern of a master key with a stylus, tracer bar, or other such mechanical member. For example, prior art key duplication machines typically comprise a pair of clamps or vise grips mounted on a carriage. A master key, having a key pattern, is placed in a first clamp. A key blank, manually selected by the machine operator, is placed in a second clamp, which is normally positioned adjacent to the first clamp. The stylus is placed in contact with the key pattern of the master key. A cutting wheel is placed in contact with an edge of the key blank, into which the key pattern of the master key is to be duplicated. The stylus and cutting wheel are coupled such that the movement of the cutting wheel is synchronized with and controlled by the movement of the stylus.
The carriage is arranged such that the carriage may be moved pivotally and linearly along a longitudinal supporting shaft that is generally parallel to the blades of the master key and key blank. The carriage is typically moved manually along the shaft, causing the stylus to move along the key pattern of the master key. As the stylus moves along the key pattern of the master key to trace the key pattern, the cutting wheel moves along the blade of the key blank. The coupling of the stylus and cutting wheel controls the movement of the cutting wheel and cuts a duplicate key pattern into the key blank. Once the cutting process is completed, the newly duplicated key may be removed from the clamp and buffed on a buffing wheel or swiped across a wire brush to remove any burrs.
In the prior art process described, the key cutting machine operator manually selects the key blank. It is of great importance that the key pattern of a master key be copied onto an appropriate key blank having the same key blade and grooves. There are numerous key blanks, and many are not readily distinguishable from each other. Identifying the correct key blank for use in duplication often requires visually examination of a plurality of key blanks, where differences between key blanks may be very subtle, significantly increasing the level of difficulty in identifying the proper key blank. All too often, businesses that offer key cutting services are not staffed by experienced locksmiths capable of consistently and accurately identifying the proper key blank to be used. Instead, an employee is shown how to “eyeball” what is thought to be the correct blank and then cut a duplicate key at the substantial risk of the key working improperly.
Once a key blank is manually chosen by the operator that key blank goes through the cutting process. If a mistake is made in the manual selection of a key blank, the entire process of manually identifying the best key blank and mechanically cutting the key must begin again. Often, such errors are not identified until after the customer leaves the store, thus resulting in frustration with the retailer due to an unsuccessful key cut.
Although prior art key duplication machines and processes are well established and widely utilized, such machines and processes produce a relatively high scrap rate, overly rely on the experience and judgment of machine operators, and may not allow for evaluation of the accuracy of a duplicate key without the duplicate key being tested in its associated lock. Due to these and other limitations of the prior art, the art field is constantly striving to improve cut accuracy, cut quality, and ease of use of key duplication machines and processes. Improvements to key duplication machines and processes that enhance the accuracy and quality of a duplicate key or produce more user-friendly machines are well received in the key duplication industry.
A general goal of the industry is to develop key duplication machines and processes that are so user-friendly that a customer or general consumer may duplicate a key with minimal instructions and minimal knowledge of keys. Therefore, improvements in machines and processes for cutting duplicate keys that simplify the cutting process or improve the accuracy of key blank identification are greatly desired. Further, the industry constantly strives for less expensive, easier to assemble, and easier to maintain machines. Should newly developed key duplication machines or processes achieve any of these objectives, it would be a significant improvement over the expensive and often difficult to use key cutting machines currently known in the field.
Apparatus, methods, and other embodiments associated with a key duplication machine are described. In one embodiment, a system for cutting keys comprising at least one optical imaging device for capturing optical images of at least a portion of said cut key and at least a portion of said master key. A first logic is provided for comparing a cut key pattern with respect to a master key pattern and a second logic is provided for assembling one or more data points related to one or more key cutting parameters to allow for the creation and implantation of at least one automatic tuning function to provide for one or more subsequent fine tuning adjustments to a key cutting pattern. Said cut key pattern may be a duplication of said master key pattern. Said first logic may determines if said cut key pattern is within acceptable deviation from said master key pattern. Said optical image is a digital image. The system may further comprise a user interface for providing output to a user. The optical images may include portions of both said cut key and said master key within the same image. The system may include a retention mechanism for securing the cut key in an imaging zone and a cutting member configured to cut a key pattern into the cut key at a key clamping position. The imaging zone may be the same as the key clamping position. The first logic or second logic includes at least one of a software controlled microprocessor, an application specific integrated circuit, an analog circuit, a digital circuit, a programmed logic device, and a memory device containing instruction.
In an embodiment, provided is a method for cutting keys, said method comprising providing a housing having an opening for receiving a master key and a cut key. A master key is retained within an imaging zone. At least one optical image of at least a portion of said master key is captured with an optical imaging device. A cut key is retained within said imaging zone. At least one optical image of at least a portion of said cut key is captured with said optical imaging device. A logic is provided to compare a cut key pattern with respect to a master key pattern. Said cut key pattern is compared with respect to said master key pattern. One or more data points are assembled related to one or more key cutting parameters to allow for the creation and implantation of at least one automatic tuning function. The at least one automatic tuning function is used to provide for one or more subsequent fine tuning adjustments to said cut key pattern. The automatic tuning function may utilize the logic to make fine tuning adjustments to the key cutting device relative to the key to be cut. Said cut key pattern may be a duplication of said master key pattern. The method may further comprise the step of determining if said cut key pattern is within acceptable deviation from said master key pattern and may further comprise the step of outputting a comparison of said cut key pattern with respect to said master key pattern to a user. The logic may include at least one of software controlled microprocessor, an application specific integrated circuit, an analog circuit, a digital circuit, a programmed logic device, and a memory device containing instruction.
In another embodiment provided is an identification system for duplicating keys. The system comprises an outer shell having a slot formed therein to receive a master key and a cut key. An imaging system configured to capture a master key pattern and said cut key after the master key or cut key has been received within the slot. A first logic for comparing a cut key pattern with respect to said master key pattern; and a second logic for assembling one or more data points related to one or more key cutting parameters to allow for the creation and implantation of at least one automatic tuning function to provide for one or more subsequent fine tuning adjustments to a key cutting pattern. The system may further comprise a retention mechanism disposed within the housing and configured to receive at least a portion of said master key and said cut key.
In another embodiment, provided is a system for duplicating keys. The system comprises a device for determining the cut pattern on a master key. A mechanism for receiving and retaining a key blank. A device for duplicating the cut pattern of the master key onto the key blank. A device for measuring the cut pattern on the new cut key. A first logic for comparing said cut key pattern with respect to said master key pattern and a second logic for assembling one or more data points related to one or more key cutting parameters to allow for the creation and implantation of at least one automatic turning function to provide for one or more subsequent fine tuning adjustments to a key cutting pattern. Said measuring, receiving, retaining, and duplicating devices may all part of one single assembly or located within a common housing. Alternatively, said measuring, receiving, retaining, and duplicating devices may be separated into two or more assemblies wherein said separate assemblies are connected and share data. Said cut pattern for said master key may be a cut path of coordinate points or said cut pattern for said master key may be a series of cut codes. Said cut pattern may be duplicated by replicating the cut path of coordinate points into the key blank. Said cut pattern may be duplicated by replicating the cut codes into the key blank. Said cut pattern for said new key may be a cut path of coordinate points or a series of cut codes. Said measurement of cut pattern on said new key includes the measurement of one or more cut features. Said first logic for comparing said cut key pattern with respect to said master key pattern determines if the new key cut pattern is within some pass/fail limit of the master key cut pattern. The second logic may be automatically applied to each and every key subsequent cut or wherein the second logic is applied to only certain keys cut. The fine tuning adjustments may be applied to each and every key cut or said fine tuning adjustments are applied to only certain keys cut.
In the accompanying drawings, which are incorporated in and constitute a part of this specification, embodiments of the invention are illustrated, which, together with a general description of the invention given above, and the detailed description given below serve to illustrate the principles of this invention. The drawings and detailed description are not intended to and do not limit the scope of the invention or the claims in any way. Instead, the drawings and detailed description only describe embodiments of the invention, and other embodiments of the invention not described are encompassed by the claims.
The Detailed Description of the Invention merely describes embodiments of the invention and is not intended to limit the scope of the claims in any way. Indeed, the invention as described by the claims is broader than and unlimited by the preferred embodiments, and the terms in the claims have their full ordinary meaning.
As described herein, apparatus and methods can be designed to produce accurate and reliable duplicates of master keys. In one embodiment, the duplication of a master key is facilitated by the capture of an optical image of a profile or silhouette of the master key, including the key pattern of the master key, and the capture of a profile or silhouette of a key blank. As will be further described herein, the captured images may be analyzed by logic to determine the proper key blank to be used for a duplicate key, validate the selection of the proper key blank, facilitate the accurate cutting of the key pattern of the master key into the key blank, and validate the accuracy of the key pattern cut into the key blank. The apparatus and methods may further facilitate the cutting of a substantial variety of key types, such as single-sided keys, double-sided keys, sidewinder keys, house keys, automobile keys, commercial keys, and the like. The analysis of images by logic may include, for example, the logic storing images, storing data, quantifying physical measurements based on the image, retrieving referencing data contained in a database, and the like.
As used herein, the term “logic” includes but is not limited to hardware, firmware, software and/or combinations of each to perform a function(s) or an action(s), and/or to cause a function or action from another logic, method, and/or system. For example, based on a desired application or needs, logic may include a software controlled microprocessor, discrete logic like an application specific integrated circuit (ASIC), an analog circuit, a digital circuit, a programmed logic device, a memory device containing instructions, or the like. Logic may include one or more gates, combinations of gates, or other circuit components. Logic may also be fully embodied as software. Where multiple logical logics are described, it may be possible to incorporate the multiple logical logics into one physical logic. Similarly, where a single logical logic is described, it may be possible to distribute that single logical logic between multiple physical logics. In addition, as used herein, the term “database” includes a physical and/or logical entity that can store data. A database may be, for example, a traditional database, a table, a file, a list, a queue, a heap, a memory, a register, and so on. A database may reside in one logical and/or physical entity and/or may be distributed between two or more logical and/or physical entities.
Optionally, the apparatus and methods described herein may accept input from a user or operator of a key duplication machine and may provide output to the user or operator of the machine to further facilitate key duplication. For example, the apparatus may include a user interface, such as monitor, touch screen, or other such device, through which a user may enter information and information may be displayed to the user.
In an embodiment, a method of using the key duplication machine comprises the steps of inserting a master key into the machine such that the blade of the master key is within an imaging zone of the machine; capturing an image of the key pattern of the master key; utilizing logic to analyze the captured image; comparing the captured image with data on key blanks contained in a database; determining the proper key blank for duplicating the master key; outputting information regarding the proper key blank to the user; removing the master key from the machine; retrieving and inserting the proper key blank into the machine such that the blade of the key blank is within the imaging zone of the machine; capturing an image of the key blank; using logic to analyze the image of the key blank and validating that the key blank is proper; aligning the key blank; moving the key blank to a cutting zone of the machine; cutting the key pattern of the master key into the key blank; moving the newly-cut duplicate key to the imaging zone of the machine; capturing an image of the duplicate key; using logic to analyze the image of the duplicate key; compare the analysis of the image of the master key with the analysis of the image of the duplicate key to validate the accuracy of the key pattern cut into the duplicate key; removing the duplicate key from the machine; and de-burring the duplicate key.
An exemplary embodiment of a key duplication machine 10 is illustrated in the accompanying Figures. The key duplication machine 10 as described herein has numerous features or improvements, each of which are believed to be independently novel. Therefore, while embodiments of the present invention are described as utilizing each of these novel features or improvements in the aggregate, nothing in the present description should be interpreted as requiring an embodiment to include or exclude any of the particular improvements described herein. In addition, the key duplication machine 10 described herein incorporates a key blank identification system and a key cutting system into a single apparatus. However, it should be understood that either system could be used individually or used together. Nothing in this description should be interpreted to limit novel features of each individual system as used alone or in an integrated unit. Therefore, as described herein as an integrated system, a master key is imaged and compared with other key blanks to determine the appropriate key blank to be used, while also utilizing the master key image to provide key pattern information to be cut into the key blank.
With reference to
The combination of the door clamp 14, base 16, handle 18, and biasing member forms a retention mechanism 19 for retaining or securing a master key 22 or key blank 24. As illustrated in
As will be further described, the blade 32 of a key 22 and 24 may be positioned within the machine 10 such that an image of the blade 32 may be captured. In addition, the blade 32 of a key blank 24 may be positioned within the machine 10 such that the blade 32 is exposed to clamps and cutters. The clamps are arranged to selectively rigidly secure the key blank 24, and the cutters are arranged to selectively cut a key pattern into the blade 32 of the key blank 24 when the key blank 24 is rigidly secured in the clamps.
In an embodiment, the key 22 and 24 may be positioned with a first side of the blade 32 facing upward, or the key 22 and 24 may be rotated 180 degrees and positioned with the first surface of the blade 32 positioned downward. As will be further described, in such an embodiment, such variable orientation or registration of the key 22 and 24 does not affect the subsequent imaging, positioning or cutting of a key 22 and 24. The key duplication machine 10 may be arranged such that logic used to analyze images and control the movement, alignment, and cutting of keys 22 and 24 may detect the orientation or registration of the key 22 and 24 and account for such orientation or registration during the duplication of a master key 22 so that the proper key cuts are made regardless of the positioning of the key blank 24 so as to promote user friendliness and speed of duplication.
The door clamp 14, base 16, handle 18, and slot 20 are located on a retention mechanism panel 21. The panel 21 is arranged such that the panel 21 may slide to the left and right, with respect to
The key duplication machine 10 includes a table 38 located below the slot 20. The table 38 is positioned such that when a master key 22 is secured in the slot 20, the table 38 holds additional keys on a key ring so that the user does not have to remove the master key 22 from its key ring for the purposes of duplication. A touch-screen monitor 40 is incorporated into the machine 10, through which a user may enter information and information may be displayed to the user. In addition, a metal shavings drawer 42 is provided beneath the internal key cutting mechanisms to catch metal shavings generated during the cutting of keys. The shavings drawer 42 may be removed from the machine 10 to facilitate the disposal of collected shavings. For convenience, a de-burring slot 44 is provided. The slot 44 leads to a burr-cleaning member such as a wheel, square brush, or the like, to clean and de-burr newly cut keys.
As illustrated in
Optionally, a vacuum system (not shown) may be incorporated into the machine 10 to capture key cutting shavings as they are generated and to assist in cleaning the work area after key cutting operations. Such a vacuum system may be attached to the machine 10 in the vicinity of the cutting operation or in or near a catch basin. Such an exemplary system is described in U.S. patent application Ser. No. 10/970,844, titled KEY CUTTING MACHINE, filed on Oct. 20, 2004, and commonly owned by the present assignee. The Ser. No. 10/970,844 patent application is hereby expressly incorporated by reference in its entirety. The Ser. No. 10/970,844 application describes a removable vacuum tube capable of capturing key cutting shavings and assisting in cleaning the work area after the key cutting operation. It will be clear to those skilled in the art that such a vacuum system could be incorporated into the present apparatus and attached in the vicinity of the cutting operation or in or near the catch basin.
As will be further described, during the process of duplicating or cutting a key, internal components, mechanisms, and systems of the key duplication machine 10 experience motion and movement relative to other components of the machine 10. To facilitate the description of such motion and movements, reference will be made to movements relative to an X-axis, Y-axis, and Z-axis. The orientations of these axes are shown in
Referring again to
In one embodiment, the optical imaging device 50 is a camera, and the image captured is a photographic image. In an embodiment, the camera 50 is a digital camera, and the image captured is a digital image. A digital image may be stored in file form or in data form and may be analyzed by logic. As best seen in
To enhance an image captured by the optical imaging device 50, the machine 10 includes a system for providing backlighting to the key 22 and 24. As best seen in
The lighting panel 52 may include any type of light-emitting devices such as, for example, light bulbs, light emitting diodes (LED), liquid crystal displays (LCD), and the like. In an embodiment, the light panel 52 comprises a matrix of evenly spaced LEDs. Alternatively, LEDs may be unevenly spaced so as to create more favorable light dispersion and diffusion. In an embodiment, the light emitted from the lighting panel 52 may be in the red spectrum, which may, under certain circumstances, create crisper images of a key silhouette. As will be understood by those skilled in the art, other types of backlighting systems may include directing light on the shavings or an object in the shavings drawer 42. Any particular configuration that provides well-dispersed and diffused light appropriate for backlighting is contemplated and incorporated herein. Alternatively, front lighting or providing light directly to the key 22 and 24 may also be used when capturing an image of the key 22 and 24.
The logic may be arranged to analyze the backlighting and the resulting quality of a captured image. Based on such analysis, the backlighting may be adjusted, such as in direction or in intensity, to improve subsequent captured images. In addition, the positioning of the lighting panel 52, reflector plate 54, and a blocking plate 56 may also be adjusted to improve subsequent captured images.
The apparatus as described may be utilized to capture the image of the blade 32 of a master key 22, including the key pattern 36. Such a captured image may be analyzed by logic to quantify and specifically define the key pattern 36 of the master key. Such analysis may include quantifying and defining the depth, angle, and position of each tooth in the key pattern 36; determining whether there is a key pattern 36 on one side of the key 22 (a single-sided key) or on both sides of the key 22 (a double-sided key); determining precisely where along the blade 32 the key pattern 36 begins and ends; and the like. In addition, surface features of the blade 32, such as the presence, length, and width of a key groove 34, may be determined. In one embodiment, surface features of the blade 32 may be determined by positioning the optical imaging device 50 to an angle with respect to the surface of the blade 32. As will be further described, such information may be stored by the logic for subsequent use in selecting a key blank 24, precisely cutting a key pattern into a key blank 24 and in comparing the key pattern cut into the key blank 24 and the key pattern 36 of the master key 22.
The logic may be in communication with a database to store key related information (“key data”). The key data may include characteristics of known keys, such as key length, key shape, surface geometry shapes, and other characteristics. The database may associate the key data with specific key blanks or with types or groups of keys. For example, the database may store key data for different key manufacturers. The system may access the database to compare scanned characteristics of the master key with the stored key data in the database. Such comparison may be used to determine the data needed to properly replicate the unique geometry of the master key onto a new duplicate key. In an embodiment, the database stores key data related to cut codes used with known lock styles. Traditionally, cut codes are represented as a numeric or alpha-numeric code that contains information as to how a key is to be cut by a code cutting machine. Often, the cut code is a series of letters and/or integers (e.g. “K263”) that may be translated or decoded from a key code chart or cut code list. The code may be translated into a series of positions that define the shape of the cut at the critical locations on each side of the key in order to operate the lock. These cut positions may be represented by integer codes (e.g. “331351” and “266431”) or may be represented by physical measurement values (e.g. “0.285, 0.285, 0.313, 0.285, 0.256, 0.313 inches” and “0.299, 0.242, 0.242, 0.270, 0.285, 0.313 inches”).
It will be appreciated that the database is not limited to key data and cut codes. In addition, the database may store information related to other identifying parameters of the key. The measuring system may utilize other key parameters, in combination with cut information, to narrow the field of possible key blanks. Further, the system may be able to measure the pattern 36 of a master key 22 wherein that key pattern 36 may be the edge bittings. Further, there are many different types of locks and keys. For example, some require that the bitting cuts in the blade are cut at different compound angles. These angled cuts make duplication impossible on standard key duplication equipment. Others types of high security keys include unique surface features that are cut into the key blade that do not completely penetrate the blade of the key such as internal cut, sidewinder, laser cut, dimple, and sidebar keys. The instant disclosure contemplates to provide an improved system to allow for improved and more accurate cuts related to all types of keys including coded, patterned, sidewinder or other high security type keys.
The captured image of the blade 32 of the master key 22 may also be used to specifically determine the proper key blank 24 to use when duplicating the master key 22. The captured image may be analyzed using logic to quantify and specifically define features of the master key blade 32 such as, for example, the size and shape of the shoulder 30, the length and width of the blade 32, whether the master key 22 is single-sided or double-sided, whether the blade 32 includes any steps or grooves, and the like. To facilitate the identification of a proper key blank 24, the logic may compare the quantified and defined features of the master key 22 with data in a database regarding known key blanks 24. Such a database may include data on the physical dimensions of known key blanks 24, and the logic may make direct comparisons between physical dimensions of known key blanks 24 and the features of the master key 22 as determined from the captured image. Such comparisons may lead to the determination and selection of the proper key blank 24 for the master key 22.
Optionally, additional imaging of the master key 22 may be performed to determine or quantify surface features of the master key 22 such as, for example, the keyway groove 34. Such surface features may assist in narrowing or choosing the proper key blank 24. Such imaging may be performed by providing a ring of structured light about the key blade 32 and an optical imaging device to record a tip view or cross-sectional view of the key 24, performing a laser scan across the key blade 32 to identify the width and spacing of a keyway groove 34, or projecting a shadow across the surface of the blade 32 to measure the variations in shadow contour related to surface area contour.
With regard to a laser scan of the key blade 32, a dot scan may be utilized using a single laser dot that may be moved continuously along a path, projected at certain points along a path, or utilized with multiple laser dot scans in numerous types of configurations to acquire the necessary information. It should be clear that such a scan could read one or both sides of a key 22. Information on the groove 34 may likewise be analyzed and compared by the logic to groove information stored in the database related to known key blanks 24. Therefore, based upon the master key 24 silhouette and, optionally, the key groove 34 features, the logic may identify a single key blank 24 for use in duplicating the master key 24.
Once the proper key blank 24 is identified, the key duplication machine 10 may direct output information to the user to indicate which specific key blank 24 is identified. In one embodiment, such information may be displayed on the touch-screen monitor 40. The user may then retrieve the proper key blank 24 from a retail display based on the displayed information. In an embodiment, various key blanks 24 may be displayed on a display or retail rack with light indicators positioned near each type of key blank 24. Once the proper key blank 24 is identified, the machine 10 may send a signal to the display rack and the display rack may illuminate the light indicator associated with the proper key blank 24. Such a system directs the user to the proper key blank 24 and reduces user error in selecting a key blank 24. The machine 10 may include a display connection 59 (as seen in
Once the proper key blank 24 is identified and retrieved by the user, the user may remove the master key 24 from the slot 20 in the retention mechanism panel 21 and place the key blank 24 in the slot 20. When the key blank 24 is placed into the slot 20, the key blank 24 may be validated to insure that the proper key blank was retrieved by the user, internal mechanisms may align the key blank 24, the key blank 24 may be further secured or clamped, and a key pattern may be cut into the key blank 24 to duplicate the maser key 22. As previously described, the orientation or registration at which the user inserts the key blank 24 in the slot 21 does not affect the subsequent operations on the key blank 24. The logic may analyze captured images of the inserted blank 24 to determine the orientation and adjust all subsequent operations accordingly.
The logic may validate that the key blank 24 selected by the user and positioned in the machine 10 is the proper key blank 24, as previously identified. An image of the key blank 24 may be captured by the optical imaging device 50, and logic may be used to analyze the image. Such analysis may determine or quantify features of the key blank 24 such as, for example, the size and shape of the shoulder 30, the length and width of the blade 32, whether the blank 24 is designed as a single-sided or double-sided key, whether the blade 32 includes any steps, and the like. Such determined features may be compared to data regarding features of the previously-identified proper key blank 24 stored in the database. Provided the determined features of the user-selected key blank 24 and the stored features of the previously-identified proper key blank are in agreement, the logic may determine that the proper key blank 24 was selected and positioned by the user. The user may be informed that the user-selected blank 24 is proper, and the duplication process may continue. If the determined features of the user-selected key blank 24 and stored features of the proper key blank are in not in agreement, the logic may inform the user that an improper key blank was selected and instruct the user to reselect a key blank 24 for duplication of the master key 22. Optionally, the duplication process may be halted until the user positions a proper key blank 24, or the machine 10 may incorporate an override function to allow a key pattern to be cut into the selected key blank 24.
Prior to clamping the key blank 24 in the clamping assembly 64, the key blank 24 may be aligned to insure a key pattern is properly cut into the blank 24. The position of the key blank 24, as initially manually positioned by the user, may be determined from the captured image of the blank 24. This image is analyzed by logic and compared to the ideal position for cutting the blank 24, and the positioning of the blank 24 is adjusted to conform to the ideal cutting position. As best shown in
The left positioner finger 72 is generally fixed with respect to the blank 24. This is to say that forces between the blank 24 and the left positioner finger 72 do not cause the left positioner finger 72 to deflect. The right positioner finger 74, however, is designed to deflect slightly upon engagement with the blank 24. The right positioner finger 74 includes a cantilever arm 76 that deflects due to forces between the right positioner finger 74 and the blank 24. Such deflection insures that sufficient force is applied to the blank 24 by the fingers 72 and 74 to grip and align the blank 24. When the fingers 72 and 74 are not needed, they may be rotated upwards and out of the way. As best shown in
Once the positioner fingers 72 and 74 have corrected the alignment of the blank 24 based on the analysis of the initial captured image, yet another image of the blank 24 may be captured to validate that the alignment is now proper. In addition to validating the alignment of the blank 24, this captured image may be utilized to record reference points along the blade 32 such as the location of the key shoulder 30, the location of the tip of the blade 32, and the like. As will be further described, the logic may use such reference points, along with the determination of the orientation of the key blank 24, to guide the cutting wheels 60 and 62 during the cutting process.
Although the alignment of a key is generally described with reference to the alignment of a key blank 24 upon the insertion of the blank 24 into the slot 20, it will be readily understood by those skilled in the art that the positioner fingers 72 and 74 may be used, for example, to align a master key 22 prior to capturing an image of the key 22 to be analyzed by the logic.
As shown in
Such movement of the key blank 24 moves the blank 24 from the imaging zone to the cutting zone. The clamp assembly 64 is generally fixed with respect to the Y-axis and generally defines the cutting zone. The blank 24 is moved along the Y-axis by the synchronized movement of the left 72 and right 74 positioner fingers and the retention mechanism panel 21, which includes the slot 20. As seen in
With reference to
Once the key blank 24 is clamped, the cutting operation can be performed. The logic may use the quantified and stored information from the captured image of the key pattern 36 of the master key 22 to calculate precise movements of the cutting wheels 60 and 62, with respect to the key blank 24, to produce a duplicate key. The movements of the cutting wheels 60 and 62 are generally two-dimensional. The wheels 60 and 62 are moved along the X-axis to cut the key pattern along the length of the blade 32. In addition, the wheels 60 and 62 move independently along the Y-axis to cut the depth of each tooth of the key pattern into the blade 32. While numerous paths for the cutting wheels 60 and 62 may be utilized, in an embodiment, the cutting wheels 60 and 62 begin near the shoulder 30 of the key blank 24 and proceed to the tip of the key blank 24 blade 32 to cut the key pattern into the blade 32. The precise movements calculated for the cutting wheels 60 and 62 may be transferred to a 2-axis CNC cutter so that the key pattern 36 of the master key 22 may be duplicated on the blade 32 of the key blank 24.
As shown in
If the master key 22 is a single-sided key, only one of the cutting wheels 60 and 62 is engaged with the blank 24 to cut the key pattern 36. The logic may make a determination on whether the left 60 or right 62 cutting wheel is to be utilized based on the captured image of the key blank 24. The user may insert the blank 24 into the slot 20 without regard to the orientation of the blade 24. The logic may determine from the captured image whether the key pattern should be cut into the left edge or the right edge of the key blank 24 based on the contour and shape of the shoulder 30 of the blade 32, the tip of the blade 32, or any other characteristic that may distinguish the edges of the blade 32.
Once the key pattern is cut into the key blank 24, the top clamp member 66 may be lifted along the Z-axis, releasing the newly-cut key. The newly-cut key remains secured by the retention mechanism 19. The newly-cut key may be returned to the imaging zone by moving the retention mechanism panel 21 to the right along the Y-axis. A new image of the newly-cut key may be captured and compared to the captured image of the master key 22. Logic may utilize such a comparison to validate that the newly-cut key is within acceptable deviation from the master key 22. The deviation of the newly-cut key as compared to the master key 22 may be quantified by any statistic method. For example, a number of measurements along the key pattern 36 of the master key and the key pattern of the newly-cut key may be taken and quantified. The average difference of the comparable measurements may be used to calculate an average difference and compare that average difference to a predetermined limit. The results of such a validation may be displayed to the user on the touch-screen monitor 40 or otherwise output to the user.
In another embodiment, the validation results may be used to further improve the cutting accuracy of the machine. If, for example, the validation shows that the key is cut too deep or otherwise slightly shifted relative to the comparison with the master key, the machine may be automatically adjusted or auto tuned to compensate by cutting the next key in a slightly more shallow or accurate manner. Similar tunings or compensations could be done if the cuts are too shallow, too close to the head, too close to the tip, or rotated off axis. This embodiment of the present invention is intended to cover any and all measurable anomalies that could be automatically corrected with an automated fine tuning function. Such fine tuning adjustments could be a set of one or more general adjustments that are applied to all keys cut, just certain keys, or individual adjustments per key type. For example, a certain house key (such as KW1) could have its own fine tuning that is different than another house key (such as SC1) or any other key. In one embodiment, every key type could have its own fine tuning adjustments. A key cutting machine that automatically fine tunes itself based off of feedback developed based on measuring its own recently cut keys would be a significant improvement in the key duplication machine industry. Such a machine would be able to cut keys more accurately, reduce miscuts, and have reduced maintenance and calibration needs.
For an automatic tuning function to be successful, it must provide proper and safe control of the fine tuning adjustments. Any such adjustments must improve the cutting accuracy over time without undercompensating, overcompensating, compensating for errors, or getting/going out of control. In order to provide appropriate control of the adjustments, the automatic tuning could use any number of statistical and mathematical control algorithms. One such approach could include basing adjustments on an average measurement of a larger sample size rather than just one key. It would be safer, in one embodiment, to make adjustments based on the average error over the last 5, 10, 15, or 25 keys cut, rather than the last 1 key. This number may be programmable and this application is not limited to the range of the prior number of keys averaged or the types of keys included in that analysis. To reduce the effect of an erroneous measurement throwing off the adjustment, in one instance median values could be utilized instead of averages. Using a median value of a set of 15 samples would make certain that one or a small number of errors will have absolutely no significant effect on the adjustment.
The auto tune method and system may be incorporated into a database or logic of a key cutting machine. The auto tune logic may be described as a second logic for assembling one or more data points related to one or more key cutting parameters to allow for the creation and implantation of at least one automatic tuning function to provide for one or more subsequent fine tuning adjustments to a key cutting pattern.
Auto tune feature may be applied differently to different types of key cutting devices but could be adapted for use with any type of key duplication machine. The auto tune feature may be the result of validation or comparison of overlain images of a plurality of cut keys in comparison to the original or master key. The dimensional differences in the X and Y direction relative to a reference point are able to be averaged in which a signal from the key duplication machine may be sent from the logic to the key cutting device. The logic may utilize images of the inserted key and compare it to data saved relative to the customer key or type of customer key. The auto tune feature may be programmed to determine the orientation and to automatically adjust the inserted key's orientation in the X and Y axis directions. This may be done by automatically translating or slightly moving the cutting wheels 62, 64, clamping assembly, grippers, fixed wall 320, moveable wall 322 and/or fingers 72, 76 to slightly adjust the position of the key to be cut relative to the cutting wheels to improve accuracy of the cut to be made thereon. Further, the rotational speed of the cutting wheels may also be adjusted by the auto tune feature if it has been determined that such adjustment to the speed may improve the accuracy based on the validation steps of subsequent cut keys. In another embodiment, the auto tune feature may identify to a user through the display to manually reposition the inserted key within the slot 20 in a desired position based on signals processed through the auto tune function.
Other constraints can be put into place to further insure proper control of the auto tuning function. For example, in one embodiment, drastically miscut keys could be excluded from the samples altogether as they are likely to have been caused by some extraneous factor. To be sure accurate measurements are used, in one embodiment the automatic tuning key samples could be limited to certain keys that are known to produce accurate and repeatable measurements. In order to speed the reaction time of the adjustments, the automatic tuning key samples could, in one embodiment, be limited to certain keys that are common and cut often (such as KW1, SC1 or the like). In addition, specific adjustments can be made to the cutting process, such as avoiding cutting into the shoulder on a single-sided key. Since the cuts on single-sided keys are measured with respect to the shoulder, cutting into the shoulder will provide incorrect and misleading data with respect to the cut position distances from the shoulder. Additionally, to further reduce the chances of an out of control situation, the magnitude of the adjustments can be limited to allowable amounts, and the automatic tuning function could create an alarm or fault condition if the limits are reached. The machine could even send out its own service request in such cases so the appropriate people could schedule a technician to service the machine.
Turning to
While various additional embodiments are described above, the automatic tuning function of the present invention described above is to be viewed as non-limiting and such automatic tuning function is intended to cover all types of fine tuning, all types of algorithms, and all types of constraints.
The auto tune function may be incorporated into any type of key duplicating system or key cutting machine to cut more accurate keys based on measuring the accuracy of cuts made on prior duplicate keys. The auto tune functionality may be applied to any machine or set of devices that are configured to cut and measure using any method. For example, the auto tune functionality may be incorporated to known key duplication devices such as the a KID machine as disclosed herein or any other automated key machines, or networked devices, that could measure the cuts on the master key or duplicate key.
Once the validation is completed, the user may lift the spring-biased door clamp 14 using the handle 18 and remove the newly-cut key from the slot 20. The logic may be arranged to retain the captured image of the master key 22 for a period of time, such that the user may place another proper key blank 24 into the slot 20 and cut yet another duplicate key. If no additional duplicate keys are required, the logic may discard the captured image of the master key 22 and prepare to receive another master key 22 and begin the duplication process anew. Such processes may be driven by the logic with regard to time limits or may be driven by the user inputting information through a touch screen or other user interface.
When a newly-cut key is removed from machine, the user may de-burr the key by inserting the blade of the newly-cut key into the de-burring slot 44. As shown in
As described above, the process of cutting duplicate keys relies on the movement of numerous interior components, mechanisms, and systems. Such movement is generally facilitated through a number of motors mounted within the key duplication machine 10.
A retention mechanism slide motor 92 is coupled to the retention mechanism panel 21 to move the retention mechanism panel 21 along the Y-axis. Such movement occurs as a key blank 24 is moved between the imaging zone and the cutting zone.
A first slide motor 94 is coupled to both the right cutting wheel 62 and the right positioner finger 74 to move the right cutting wheel 62 and the right positioner finger 74 along the Y-axis. A second slide motor 96 is coupled to both the left cutting wheel 60 and the left positioner finger 72 to move the left cutting wheel 60 and the left positioner finger 72 along the Y-axis. Such movement of the positioner fingers 72 and 74 and the cutting wheels 60 and 62 occur under a number of conditions. For example, when the fingers 72 and 74 are engaged with the blade 32 of a key blank 24, movement of the fingers 72 and 74 along the Y-axis may move the blank 24 between the imaging zone and the cutting zone. In another example, when a key blank 24 is secured in the clamping assembly 64 and the fingers 72 and 74 are rotated out of engagement with the blade 32, the cutting wheels 60 and 62 may be independently moved along the Y-axis to facilitate the cutting of the key pattern 36 into the blade 32.
A third slide motor 97 is coupled to both the left 60 and right 62 cutting wheels to move the cutting wheels 60 and 62 together along the X-axis. Such movement along the X-axis occurs as the wheels 60 and 62 move along the length of the blade 32 to cut the key pattern 36 into the blade.
A first rotational motor 98 is coupled to the right cutting wheel 62 to rotate the right cutting wheel 62 about the X-axis as the wheel 62 cuts a key pattern 36 into the right edge of a key blank 24 blade 32. A second rotational motor 100 is coupled to the left cutting wheel 60 to rotate the left cutting wheel 60 about the X-axis as the wheel 60 cuts a key pattern 36 into the left edge of a key blank 24 blade 32.
A third rotational motor 102 is coupled to the right positional finger 74 to rotate the finger 74 about the X-axis to engage and disengage the finger 74 with the blade 32 of the key blank 24. A fourth rotational motor 104 is coupled to the left positional finger 72 to rotate the finger 72 about the X-axis to engage and disengage the finger 72 with the blade 32 of the key blank 24.
A clamp motor 106 is coupled to the top clamp member 66 to move the top clamp member 66 along the Z-axis. Such movement clamps and unclamps a key blank 24 in the clamp assembly 64 prior to and after the cutting of key patterns 36 into the blade 32 of a blank 24.
The key duplication machine 10 as described herein may be designed and fabricated as an assembly of modular components. In an embodiment, as shown in
The process of duplicating a key using the key duplication machine 10 as described above may be facilitated through the interaction of a user with a user interface. For example, the user may be given a number of optional methods for identifying a proper key blank for the duplication of a master key. Such options may be displayed on a user interface such as, for example, a touch-screen monitor. Once displayed on a touch-screen monitor, the user may initiate the duplication process by manually selecting one of the offered options. A first option may request that the key duplication machine determine the proper key blank by taking a photograph of the master key, as described herein, and comparing the physical characteristics of the master key to a database containing physical characteristics of key blanks. The results of such a comparison may yield more than one potentially appropriate key blank. As illustrated in
Another option for identifying a proper key blank for the duplication of a master key is for a user to provide specific known information regarding the master key. As shown in
In each of the options described above, specific information entered by the user may be compared to a database containing information regarding key blanks. Such a comparison may be used to identify the proper key blank. Once the proper key blank is identified, the key blank may be displayed on the user interface to inform the user which key blank should be retrieved by the user.
Regardless of the method used to identify a key blank, the machine may be arranged to warn a user that a master key to be copied may contain a computer chip, transponder, or the like. Such computer chips and transponders are common in automobile keys. Duplicates for such keys may need to include a corresponding computer chip in order for the duplicate to be successful. Once it is determined that a master key may have a computer chip, the user may be instructed to place the master key in or near a device designed to sense the presence of a computer chip in a key. If the master key does include a computer chip, the user may be instructed on how to proceed to ensure a functional duplicate key is made.
Once a proper key blank is identified and retrieved by the user, the user interface may further guide the user in duplicating the master key and displaying the progress of duplication of the key. As shown in
The logic may be arranged to collect and store data regarding key duplications performed by the key duplication machine 10. For example, data regarding the number of key duplications performed, the number of different key blanks used in key duplication, the number of an individual key blank used in key duplication, success rate of duplicating keys, and the like may be collected and stored. Such information and data may be analyzed by the logic associated with the machine 10 or be downloaded for remote analysis.
Although the invention has been described with reference to certain embodiments detailed herein, other embodiments can achieve the same or similar results. Variations and modifications of the invention will be obvious to those skilled in the art and the invention is intended to cover all such modifications and equivalents.
This application claims priority to and the benefit of U.S. Provisional Patent Application No. 62/979,084 titled, “KEY DUPLICATION SYSTEM WITH AUTOTUNE FUNCTIONALITY,” filed Feb. 20, 2020. This application is related to applicant's commonly owned patents including: U.S. Pat. Nos. 7,891,919; 7,890,878; 8,634,655; 8,644,619; 9,101,990; 9,308,590; and 9,963,908, each of which are incorporated by reference in their entireties.
Number | Date | Country | |
---|---|---|---|
62979084 | Feb 2020 | US |