The technology described herein is directed to the field of key duplication. More specifically, a key duplication system is provided that includes a network of kiosks and a remote central server that facilitates the purchase of duplicate keys by customers while at the same time facilitating management of the key manufacturing and distribution system.
Duplicate keys are typically cut from pre-existing master keys using a hand-operated table-top tool having two clamps, a cutting wheel, a follower and a cleaning wheel. There is a long-felt need for a fully automatic key identifying and/or duplicating machine that can provide a duplicate key for an ordinary consumer in a manner as easy as purchasing an item, from a vending machine or receiving money from an automated teller machine.
In accordance with one embodiment, a self-service, fully-automatic kiosk for duplicating keys includes a kiosk housing having a customer interface for receiving payment from a customer for the purchase of at least one duplicate of the customer's key. A key-receiving entry in the housing receives at least a portion of the customer's key to be duplicated, and a key analysis system within the housing analyzes the blade of a key inserted in the key-receiving entry to determine whether the inserted key matches one of a group of preselected key types and, if so, which preselected key type is matched. A key blank magazine within the housing stores key blanks for each of the preselected key types. A key blank extraction system extracts from the magazine a key blank for the preselected key type matched by the blade of the key inserted in the key-receiving entry. Then a key duplicating system within the kiosk replicates the tooth pattern of the blade of the key inserted in the key-receiving entry, on the blade of the extracted key blank. The kiosk includes a processor coupled to sensors and controllable devices within the kiosk and to a communications port for communicating with a remote central server. The processor is programmed to display multiple available manual commands in response to an input signal requesting such a display, and, in response to manual selection of the commands, to produce signals that energize and de-energize selected devices within the kiosk, thereby permitting remote manual control of the devices and mechanisms associated with those devices. The processor may also be programmed to control a video camera within the kiosk, in response to command signals received from the remote central server via the communications port, so that a remote operator can view the interior of the kiosk while manually controlling devices within the kiosk. The status of multiple devices within the kiosk may also be displayed by the processor in response to a signal from the remote computer.
The invention will be better understood from the following description of preferred embodiments together reference to the accompanying drawings, in which:
Although the invention will be described in connection with certain preferred embodiments, it will be understood that the invention is not limited to those particular embodiments. On the contrary, the invention is intended to cover all alternatives, modifications, and equivalent arrangements as may be included within the spirit and scope of the invention as defined by the appended claims.
Key duplication requires analysis of the master key to determine the model and tooth pattern of the master key, and then reproducing that tooth pattern on a key blank of the same model as the master key.
The exemplary key-duplicating kiosk shown in
The depth and width of the kiosk housing 10 are 25″ and 34″, respectively, so that the kiosk footprint is less than about 6 square feet, to minimize the floor space occupied by the kiosk in a retail store. This kiosk has the capacity of storing more than 3000 key blanks of different types and styles. For security and safety reasons, the kiosk is entirely self-contained except for an electrical power connection. Electronic communications with the processor inside the kiosk are preferably wireless. A locked door in the front of the housing 10 permits access by only authorized personnel for replenishing the supply of key blanks inside the kiosk, or for repair or maintenance purposes. Different access privileges may be provided for merchandisers (replenishment), maintenance, and removal of cash.
The touch-screen display 11 contains soft touch keys denoted by graphics on the underlying display and used to operate the kiosk 10. The touch screen preferably extends over the entire display 11 to allow customers to make displayed selections by touching the touch screen at appropriate touch keys. The display itself may take the form of a high resolution LCD, a plasma display, an LED or OLED display, a non-touch screen with selection buttons along the side, or any other type of display suitable for use in the kiosk 10.
The payment device 12 may include a bill acceptor for receiving paper currency, a coin acceptor, a change dispenser, a card reader, and/or a reader or sensor for other tangible portable credit storage devices that may also authorize access to and debit a central account, such as a cellular payment system which operates via text messages from customers' cell phones,
Turning now to
The processor 24 may include any combination of hardware, software, and/or firmware that may control the transfer of data between the kiosk and a bus, another computer, processor, or device and/or a service and/or a network. The communications interface 24b preferably couples the kiosk wirelessly to an external network, which is described in more detail below. The controller 25 receives signals from various sensors 29 within the kiosk, as described in more detail below, and generates control signals for solenoids 26, relays 27 and motors 28 within the kiosk, as also described below.
The key-receiving entry 14 is located in a central recess 17a of a guard 17 that protrudes from the front of the kiosk to protect the head of a key inserted in the kiosk from being bumped. The key entry area is the same height as a door lock, making the key insertion process easy and intuitive for a customer. When the customer inserts a key into the slot 104, only the blade portion of the key extends inside the kiosk, because the slot 104 is dimensioned to block the head portion of the key from entering the kiosk. This prevents the loss of a customer's key inside the kiosk, and also makes the customer comfortable because the head of the key is always visible to the customer while it is being analyzed and duplicated. Additionally, blocking the entry of the key head prevents the customer from inconveniently being forced to take the key off a keychain or remove identifiers from the key head to insert the key for analysis and duplication. As shown in
The mechanisms inside the kiosk cabinet 10 include the following mechanisms:
The processor 24 and the custom controller board 25 are programmed to carry out the following functions:
When the kiosk is not in use by a customer, the display 11 displays a promotion, such as “Buy 2, Get 1 Free”, and a message that invites a customer to “Touch Here to Begin.” The screen may also include advertising for a third party, which can be remotely managed and automatically adapted to the kiosk venue, time of day, individual customers and other factors. When a customer stands in front of the kiosk, a proximity detector (not shown) located on the front panel of the kiosk triggers the initiation of a voiceover or video demonstration on how to use the machine. When the customer touches the touch screen 11, the display changes to a welcome screen, shown in
The screen in
When the desired quantity of duplicated keys has been selected, the display changes to the “Review Order and Pay” screen shown in
If the response from the credit provider is a “no” (the selected credit card is not authorized for payment), the display may change to inform the customer that credit has been denied, inviting the customer to insert a different credit card. If no action is taken by the customer within a preselected time interval, the display asks “do you need more time,” and if no action is taken, then the display is returned to the “Touch to Start” screen.
If the response from the credit provider is a “yes” (the card is authorized for payment), or if the card is accepted because of a lack of connectivity with the credit provider, the system is ready to accept a key from the customer, and the door 100 is opened to permit insertion of the customer's key into a slot 104. This authorizes the charge, but the payment will only be completed at the end of the key duplication process. At the same time the door 100 is opened, the display is changed to request the customer to insert the key to be duplicated, with instructions specifying which direction the key should be facing, as shown in the screen shot in
At the end of the key duplication process the display is changed to show the customer an on-screen copy of his or her transaction receipt, as shown in
To latch the movable plate 100 in its closed position, so that the closure of the key-receiving entry is tamper-proof, a first latch element 110 is pivotably coupled to one end of the plate 100. This first latch element 110 includes a hooked portion 110a that meshes with a second latch element 112 having, a hooked portion 112a and pivotably coupled to a stationary pin 113. The first latch element 110 is urged toward the second latch element 112 by a coil spring 114 that has one end attached to the first latch element 110, and a second end attached to a stationary pin 114a. Thus, the first latch element 110 is continuously urged toward its position of latching engagement with the second latch element 112. To open the latch, a motor driven cam 115 is rotated to lift the second latch element 112 away from the first latch element 110, and then pivots the first latch element in a clockwise direction (as viewed in
When it is desired to have the customer remove the key from the key entry slot, the drive motor for the cam 115 is energized to return the cam to its original position, thereby allowing the spring 114 to return the first latch element to its latched position, which in tum slides the plate 100 to its closed position. Returning the cam 115 to its original position also allows the second latch element 112 to return to engagement with the first latch clement 110, thereby securing the movable plate 100 in its closed position. The latch provides protection against tampering or vandalism.
From the time the kiosk first requests the customer to insert the key to be duplicated, the customer has approximately 60 seconds to insert a key into the slot 17. During this time, the alignment mechanism 30 is in the “low-force” position, waiting for a key insertion. When the customer begins to insert a key into the slot 21, an optical sensor 22 (
While the master key K is being inserted into the kiosk, a pair of sensors produce signals that are used by the controller to determine whether the master key is possibly a type that can he duplicated by the kiosk. Specifically, as the master key K is inserted into the kiosk, the tip of the key engages and advances a slide 71 (
Before the key K engages the slide 71, the two tabs 71a and 71b are outside their respective optical sensors 73a and 73b. After the key K engages the slide 71 and begins to advance it, to the right as viewed in
The wide tab 71b enters its sensor 73b slightly before the narrow tab 71a exits from the light beam in the sensor 73a, so if the light beam in the sensor 73b is interrupted at the time the narrow tab exits from its light beam, the two sensor outputs indicate that the master key K is too long rather than too short. In this event, the controller immediately generates a signal that causes the display of a message informing the customer that “We Cannot Copy Your Key,” without waiting for the time-out of the 7-second interval. As long as neither of the two light beams has been interrupted, insertion of the key might not yet be completed, so no message is generated until the 7-second interval has expired. If at that time neither light beam has been interrupted, the controller generates the “We Cannot Copy Your Key” message.
Full insertion of the key is detected by a sensor 23 (see
If the controller does receive a “Key Fully Inserted” signal, a “Correct Range” signal and a “Key Present” signal within the 7-second time interval, the controller changes the display to “We cannot copy your key,” and the order is canceled. If the controller receives a “Key Fully Inserted” signal, a “Correct Range” signal and a “Key Present” signal within the 7-second time interval, the controller causes the key-alignment mechanism 30 to be moved to its fully advanced, “high-force” position to precisely position the fully inserted key before it is clamped in place for the duplicating process. If the controller determines that the key cannot be duplicated by the kiosk because the inserted key is too long, it immediately informs the customer that “We cannot copy your key.” If the controller determines that the inserted key cannot be duplicated by the kiosk because the inserted key is too short, the kiosk controller waits until the 7-second interval has expired, and if nothing changes before that interval expires, the display is changed to inform the customer that “We cannot copy your key,” and directing the customer to remove the key from the kiosk.
If the kiosk controller determines that the master key K may possibly be duplicated, the drive screw motor 37 of the alignment mechanism 30 is energized to turn the drive screw 36 to advance the upper block 35 to the position shown in
The two end pins P1 and P3 are beveled on both sides to form a straight vertical edge that engages the master key K and urges the key against the alignment wall 49. Because the vertical edges on the ends of the pins P1 and P3 engage the key K along the entire height of the edge surface of the key, there is no risk of tilting the key as it is pushed against the alignment wall 49, as depicted in
An upper clamp 5 is then lowered into engagement with the upper surface of the master key K to clamp the key tightly against the lower amp 50. The master key remains in this firmly clamped condition while (1) the position of the clamped key is checked to determine whether the key shifted during clamping, (2) the alignment mechanism is moved to its fully retracted position if the key remained in position, (3) the cross-sectional profile of the master key is identified, (4) a blank key having the design selected by the customer and also having the same cross sectional profile (same key type) as the master key is extracted from the blank-key magazines, (5) the extracted blank key is cut to have the same tooth pattern as the master key, (6) the new key is de-burred, (7) the new key is dropped into the duplicate key discharge tray 15 for delivery to the customer and (8) any key chains or other options are dispensed if they were ordered.
The master key clamp is shown in
To control the angular position of the cam follower 59, a pair of optical sensors 160 and 161 supply signals to the controller when a tab 162 on a collar 163 connected to the output shaft of the motor 55 passes through the sensors. While the tab 162 is moving from sensor 160 to sensor 161, the cam follower 59 is riding over the peak 58a on the cm surface 58, which is the interval during which the key clamp is open. Thus, the motor 55 can be precisely controlled to open and close the clamp.
The “Key Present” signal mentioned above is produced by an optical sensor 22 built into the master-key clamping assembly. Specifically, a light source 22a is built into the lower clamp 50 and a photodetector 22b is built into the upper clamp 51, with the light beam 21 passing through the master-key slot between the two clamps. Thus, when a master key is inserted between the two clamps 50 and 51, the light beam is interrupted, and the sensor supplies a corresponding output signal to the controller.
To check the position of the key after it has been clamped, the kiosk controller checks the signals from the “Key-Fully Inserted” sensor 23, the two length sensors 45a and 45b and the “Key Present” sensor 22. If the kiosk controller determines that the position of the key did riot change during clamping, the controller causes the alignment mechanism 30 to fully retract by energizing the drive screw motor 37 to turn the drive screw 36 in the reverse direction. If the kiosk controller determines that the key position did change during clamping, the controller causes the alignment mechanism 30 to return from the high-force position to the low-force position, causes the master-key clamping assembly to be released, and changes the kiosk display to a screen that directs the customer to “Insert and Hold Your Key.” This re-starts the entire process described above, starting with insertion of a key by the customer. If the customer re-inserts the key and the position of the key again changes during clamping, the kiosk changes the display to the screen to inform the customer that “We cannot copy your key,” and directing the customer to remove the key from the kiosk.
As described in U.S. Patent Publication No. 2008/0145163, the blade of the master key can have one of several different cross-sectional profiles, and identifying the profile of the master key effectively determines what type of key it is. Because only a limited number of different types of key blanks can be stored in the kiosk, the cross-sectional profile of the profile master key is matched against only preselected profiles, which are the profiles for which blanks are available in the kiosk. For example, a first profile may correspond to a Schlage key, a second profile may correspond to a Kwikset key, and a third profile may correspond to a Weiser key. Other key types may be identified with other corresponding profiles.
In the illustrative embodiment, the profile matching begins by engaging each side of the blade of the master key K with a plurality of gauges that correspond to the cross-sectional profile of one side of a specific type of key. Each gauge may have a profile that matches all or a portion of one of the grooves in a particular key type, or may simply sense the depth of the groove at a particular location that is common to several different key types, so that the combination of the depths at several different locations can be used to identify the key type. Referring to
The four gauges 60-63 are all mounted for pivoting movement around a common shaft 66, for movement between their retracted and advanced positions. The left-hand ends of the four gauges 60-63, as viewed in
If the combination of output signals from the four sensors 67-70 does not correspond to one of the preselected key types, the kiosk controller changes the display to the screen that informs the customer that the key inserted by the customer cannot be duplicated by the kiosk and that the customer should remove the key, and the master key clamp is released to permit removal of the key. If the combination of output signals does correspond to one of the preselected key types, the kiosk controller aligns that particular type of key blank in the key-blank magazine 80 with the key-blank extraction mechanism. If the magazine contains that type of key-blank in different styles, the particular style selected by the customer is aligned with the extraction mechanism.
As can be seen in
The magazine 80 is also moved to pass each of the multiple vertical channels past an optical sensor 93 to detect when the supply of blanks in any channel drops below the level of the sensor, e.g., a height of 40 key blanks above the bottom of the magazine. As long as any given channel contains at least 40 keys, a light beam directed to the sensor 93 from a source behind the magazine 80 is interrupted by the stack of blanks in that channel. But when the supply of keys in a given channel drops below 40, the light beam is no longer interrupted, and thus the sensor 93 changes state to indicate that the supply of blanks in that channel is low and should be replenished.
In the illustrative embodiment, the extractor 86 is in the form of a flat bar that has a fiat front end 86a that abuts a corresponding flat 86b on the top of each key blank. As a key blank B is pushed forwardly out of the magazine by the extractor 86, a taper 86c (see
Referring to
To avoid errors when loading the key blanks into the magazine 80, such as inserting a particular type of blank or style of blank into the wrong compartment, and/or inserting a blank upside down in the correct compartment, the blanks have specific features that physically block any given blank from entering the wrong compartment and also block a key from entering the correct compartment but up-side-down. For example, as can be seen in
To assist in the loading of different styles of blanks of the same type, a cavity 87a is provided at the top of the rear surface of each compartment to receive a sample 87b of the blank to be loaded into each compartment, as shown in
To expedite the loading of the key blanks, the manual loading tool shown in
The box 301 has spacers at opposite ends of the packaged batch of blanks to provide spaces for receiving a pair of tabs 304 and 305 projecting from opposite ends of the compartment 300. All the keys in a given box have the same orientation and length. A spring-loaded gripper 306 is manually opened slightly while the tabs 304, 305 are inserted into the box of blanks, and then released so that the spring 307 closes the gripper 306 against the entire batch of key blanks. A small bump 308 is formed on the top edge of the blade of each key blank when it is manufactured, and these bumps are engaged by a lip 309 on the free end of the gripper 306 to enable the entire batch of blanks to be captured and held together within the tool as they are removed from the box, transferred to the magazine, and loaded into the magazine. If a blank is oriented in the wrong direction, it will not be gripped and likely will drop out of the gripped stack, thereby avoiding the loading of that blank into the magazine. The bump 308 on each blank is ultimately removed as a part of the cutting operation that forms the desired tooth profile in the blank within the kiosk, as described in detail below.
There are many key blank and key machine manufacturers, and they can and do manufacture their keys with different lengths and bottom shoulder locations. As such, conventional home and office key duplication theory discourages the referencing of key blanks using the bottom shoulder and/or the tip of the key, as it may result in keys that do not function. However, in the illustrative kiosk, the bottom shoulder and the tip of the extracted key blank are used as reference locations because the dimensions of the key blanks are controlled during the custom manufacture of those, blanks. Specifically, the distance between the top shoulder and the tip, and the distance between the top shoulder and the bottom shoulder, are both controlled so that these dimensions may be used to control the position of a blank as it is automatically manipulated within the kiosk to ensure that the top shoulder of the blank is aligned in the correct location before that blank is cut.
Referring to
The clamp assembly 90 is open while the extracted key blank B is being advanced between the upper and lower clamps 90a, 90b, and an optical sensor in the clamp assembly 90 detects the entry of the blank into the clamp assembly and produces a “Blank Present” signal that is sent to the kiosk controller. The optical sensor 91 is built into the clamp assembly 90. Specifically, a light source 91a is built into the lower clamp 90b and a photodetector 91b is built into the upper clamp 90a, with the light beam passing through the key-blank slot between the two clamps. Thus, when the key blank being extracted enters between the two clamps 90a and 90b, the sensor is tripped by interruption of the light beam.
The final position at which the key blank B stops within the clamp assembly 90 is determined by one of two or more different stops. For longer key blanks, the tip of the blade of the key blank engages a stop block 92 on the front side of the clamp assembly 90. For shorter key blanks, the left-hand (bottom) shoulder of the key blank, as viewed from the front of the kiosk, engages the rear side wall of the lower clamp 90b. After the key-blank extractor 86 has reached its most advanced position, and the “Blank Present” signal is still present, the clamp assembly 90 is closed by lowering the upper clamp 90a, in the same manner described above for the master key clamp assembly, to press the key blank tightly down against the lower clamp 90b. The key blank is then ready to be cut to reproduce the clamped master key.
Referring next to
As can be seen in
When the follower 132 is not aligned with the master key K, pivoting movement of the base 133 about the shaft 138 is limited by a cam 140, as shown in
In
Most of the key-cutting wheel 131 and the de-burring wheel 141 are enclosed in respective vacuum shrouds 144 and 145 coupled to a common vacuum source for removing debris caused by the cutting process. The two vacuum shrouds 144 and 145 are coupled to the common vacuum source by respective conduits 147 and 148, both of which join a single conduit 149 leading to the vacuum source. As can be seen in
A small digital video camera, e.g., a webcam, is mounted in the interior of the kiosk for recording and transmitting video and photo images of different regions of the interior of the kiosk. These video images may be used for different purposes, such as troubleshooting a kiosk that has reported a malfunction such as an inability to complete a preselected number of customer-initiated transactions within a preselected time period, repairing detected malfunctions, monitoring the condition of parts that need periodic replacement such as cutting tools and cleaning brushes, monitoring the condition of items that require maintenance such as the vacuum system that accumulates the debris from the cutting and brushing operations, monitoring the numbers of different types of key blanks remaining in the key-blank magazines, etc. The video output of the digital video camera is coupled to the cell modern, for periodic transmission to the server 210 in the central office 204 and/or to a local service provider for a number of kiosks within a given geographic region. The video camera can also be remotely controlled for producing video images upon receipt of command signals from a remote computer such as the server 201. Video images from the camera can also be transmitted to the kiosk display, to replace or supplement the viewing window in the kiosk that allows customers to view the key-duplicating operations,
For example, if an error report is sent regarding malfunctioning sensors in the kiosk, the webcam allows a remote user to monitor the robot through the webcam and help determine which sensors are not working properly. The remote user can then remotely control the kiosk, or reset or re-initialize the kiosk if necessary. In addition to being able to monitor everything that is going on within the kiosk, the webcam can take high resolution photographs of a problematic area, which can then be further analyzed at a remote location to determine what mitigation steps need to be taken. For example, if the webcam shows that a key is jammed in the kiosk, that problem can be fixed by remotely commanding the kiosk to eject the jammed key.
The kiosks 200a-200n communicate independently with a credit card payment processor 207 via communication line 208. The credit card payment processor 207 may also communicate with the central office 204 via lines 211 and 212. Upon reading customers' credit cards during the payment processes, the kiosks 200a-200n send the credit card data through a wireless connection to the processor 207, which checks to see if each card is authorized for the requested amount and reports the result to the kiosk. When a request for credit card payment reports is sent to the processor 207 from the central office via line 211, the payment processor 207 sends back the requested credit card payment notification via line 212.
The individual kiosks 200a-200n also communicate independently with individual customers 209 via communication line 210, such as when a kiosk sends an email receipt of a completed transaction to the customer at the email address supplied to the kiosk by that customer.
The server 201 maintains a list of all the kiosks available for remote access, and enables a connection to be made between the central office computer 204 and any kiosk linked to the server 201. This allows for close monitoring of the kiosks and provides the capability of remotely managing most issues that can arise with the kiosks 200a-200n. The kiosks periodically report order transaction information and error information to the server 201 via communication line 202. The order transaction information includes details of every completed transaction. The error information includes any technical, mechanical, electrical or other issues that a kiosk is experiencing, or has experienced. When the server 201 receives error information, it automatically sends an email notification regarding the errors to the central office 204. The server also maintains recorded information about each customer's keyway and key profile, allowing customers to later request a copy of their key to be mailed to them.
The processor 24 in each kiosk includes a “Remote Maintenance Tool” (RMT) program that produces displays of (1) the status of all the controllable devices and sensors within the kiosk, and (2) multiple commands that can be selected by an operator to energize or de-energize the controllable devices to permit remote manual control of those devices and their associated mechanisms. The Remote Management Tool (RMT) has several functions and uses, such as moving selected motors, solenoids and parts within the kiosk, testing systems and subsystems, viewing the signals from various sensors in the kiosk in real time, and commanding movement of specified motors incrementally or to bring them to specific defined positions. These tools, used together, and along with the live video, allows a remote expert to fix and/or troubleshoot issues efficiently and accurately. These extensive tools allow the remote expert t p point issue without visiting the complex kiosk. If the expert cannot fix the kiosk remotely, the expert can manage a field technician through the fix. The remote expert can upload photos and videos, send instructions to the kiosk, and walk the field technician through the fix, in real time using the various remote tools, webcam and on-screen commands. This allows a layman or a technician with little experience to fix an extremely complex kiosk.
The key blank extractor is identified in the display in
The display in
Examples of information automatically reported by each kiosk 200a-200n to the remote server 201 are “invalid keyways” detected on master keys (which means such keys cannot be duplicated in the kiosks), the insertion of master keys that are too long or too short to be duplicated in the kiosks, detected misalignment of a master key after clamping, credit card rejections, insertions of credit cards that could not he read, etc. All this data is analyzed, either in the server 201 or in the central office computer, and reports of the results of these analyses are generated and either distributed automatically or stored for periodic reviews by authorized personnel. For example, one type of report compares the data collected from any given kiosk with the same type of data from other kiosks in a similar market or geographical region, or even all the other kiosks in the network. Another type of report compares the latest data from a given kiosk with the historical averages of the same types of data from that same kiosk, so that deviations from chronological trends can be detected and analyzed, and alerts can be generated if the current data falls outside an acceptable range.
For example, if a problem develops with the keyway identification system in a given kiosk, causing that kiosk to generate false rejections, the average percentage of master keys, and thus customers, that are rejected will increase for that kiosk. This increase will appear in the “health” reports for that kiosk, which can then be inspected, virtually and/or physically.
The kiosks 200a-200n also conduct self tests and report the results to the remote server 201. For example, after each order, readings are taken from all the sensors and compared to predetermined thresholds or ranges representing normal operation of each sensor. If the reading taken from any sensor deviates from the predetermined threshold or range, that sensor may not be functioning, not functioning properly, or even have a design flaw. Such a reading may also be indicative of malfunctioning hardware associated with that sensor. Regular reporting of the results of the automatic self tests enable early detection and correction of such issues, thereby reducing the down time for all the networked kiosks.
Another example of a self-test is the automatic cycling of moving parts in the kiosk at predetermined times to determine whether those parts successfully move to known positions within a specified time intervals. These self tests can indicate whether a specific motor is moving, whether a specific part is moving, whether specific movements occur within the specified time intervals, whether specific sensors are functional, etc. If any of the preselected criteria are not met in these self tests, the kiosk automatically sends an alert to the remote server so that the part in question can be quickly inspected and corrective action taken.
After an error has been corrected, a remote user in the central office may virtually run a test sequence to confirm that the problem has indeed been rectified. The server also allows troubleshooting of software-related issues, and can he used to update the software in the kiosks. Promotions and advertisements the customer sees on the kiosk display screen can also be updated and controlled via the server 201.
Other communications sent by the kiosks to the server 201 include daily sales and transaction reports which contain a compilation of sales and transaction data, including the total number of transactions and the corresponding dollar amount, for the day. These reports also help maintain the key blank inventory. If a key blank magazine, or certain compartments of a magazine, are reported as being depleted or low on stock, the webcam may be used to confirm the stock level and updates can then be made accordingly. The central server 201 can also monitor and correlate data from each kiosk with data from other sources, such as reports from the facilities in which the kiosks are located and historical records maintained for each kiosk. For example, returns of duplicate keys made by the kiosks are handled by customer calls to a toll-free number, and the server 201 maintains a rate-of-return record for each individual kiosk and for different groups of kiosks, e.g., by retail organization and/or by geographical region. An increase in the rate-of-return for a particular kiosk by more than a certain amount above the average for all kiosks indicates that a problem might exist for that particular kiosk and, therefore, it should be inspected. Another example is comparing the rate of rejection of customers, based on the insertion of keys having unsupported keyways, by a particular kiosk compared with other kiosks located in similar markets or stores. The maintenance record of each kiosk may also be periodically compared with other kiosks of similar age and usage rates. The results of these and other analyses can be used to identify issues before they become serious and before they have a significant effect on sales and/or relationships with store personnel.
A “log file” is preferably maintained for the entire history of each individual kiosk, and this historical log file may be consulted at any time to determine whether the kiosk has a history of experiencing a particular problem. For example, if a given kiosk experiences master key alignment problems, the remote operator may check the log file for that kiosk to determine whether it has a history of master key alignment problems and, if it does, to arrange for corrective action to be taken.
Kiosks of the type described above are capable of providing return rates of less than 1%, and the time required to produce a single duplicate of a master key is less than about 70 seconds. The remote communication system permits these and other performance parameters to be continuously monitored, so that any deviation can be promptly detected, and corrective actions can also be taken promptly. Mis-cut returns for each kiosk can be monitored in near real time by matching the customer making a return to the time, date and location of the kiosk used to make the returned key, and building a mis-cut timeline for each kiosk. Field personnel can also be provided with special master keys that are used to make duplicate keys that are returned to the central office for measurement and analysis for any corrective action that might be needed.
The remote communication system can minimize down time for all deployed kiosks by monitoring alert signals generated automatically by each kiosk when a questionable condition is detected. These signals can be investigated immediately by central office personnel who can take the necessary corrective action to ensure that a kiosk that sent an alert does not go down, or to promptly restore that kiosk to normal operation. This central-office monitoring and remote fixing reduces reaction time and also provides more consistent and accurate maintenance by field personnel with more limited experience on many issues that arise in maintaining a kiosk, as compared with highly trained personnel in the central office. Central remote fixing allows experts located at the central office to obtain a large amount of detailed information about any given kiosk in a large network, and to use the webcam to quickly identify a problem while a field technician is dispatched to the machine. When the technician arrives on scene, the central office can send visual and audio demonstrations to the kiosk display to remotely guide the technician in efficiently resolving the problem. Central monitoring is also more effective in dealing with a problem, such as a had lot of key blanks, that originates from a single source but results in problems distributed over a number of different kiosks.
If an alert signal relates to a problem caused by the customer, a dialog can be initiated between the customer and an operator at the remote central computer. This dialog is initiated by displaying a message from the remote computer in a chat box on the display of the kiosk, along with a virtual keyboard so that the customer can respond. For example, if a customer neglects to remove his or her key from the kiosk after a transaction has been completed, an alert is sent to the central office computer at the expiration of a preselected time interval following the dispensing of a duplicate key. An operator at the central office can then cause the chat box to be displayed on the kiosk screen and send the customer a message asking if there is a problem in removing the customer's key from the kiosk. The customer can respond using the virtual keyboard displayed on the kiosk below the chat box, and the ensuing exchange of messages can result in removal of the customer's key from the kiosk.
In
5. Digital images of keys received from customers that requested storage of those images for future use.
The customer has the option of requesting that the digital images and/or the information derived from those images be saved or deleted by the remote server after they have been used to make the ordered duplicate key(s). If the customer requests that the images and/or the derived information be deleted, e.g., for security reasons, then the images can be saved on the customer's own computer, or on the smart phone, for possible future use, when the customer would need to transmit them to the remote server again. The customer also has the option of requesting that the information derived from the images be transmitted to the customer for saving, before it is deleted by the central server.
At the remote server, the digital images are assigned a password at step 310 and then processed to determine the type of keyway at step 311, which is information needed to select the proper type of key blank. At step 312, the key's teeth are aligned with a key depth template at step 312, and then the image perspective is corrected, if necessary, at step 313. The key's cutting code is then determined at step 314, and that code is then stored at step 315 for use in producing a duplicate key.
The remote central server 201 maintains a number of different databases, as depicted in
A network system that includes both the remote central server and the remote key fabricating module (which may be at the same location or different locations) permits the kiosks, and the servicing of the kiosks, to be simplified. For example, the kiosks may contain only a couple of types of key blanks (e.g., without any stylized versions), for duplicating only the most common types of keys, along with the capability of offering the customer the option and opportunity to view and order a duplicate key from an unlimited variety of different styles and designs via the remote server and remote key fabricating module. Each kiosk can display menus of all the different styles and designs available for duplicates keys to be ordered by the customers, as well as color images of the actual keys to help the customers select the key or keys most attractive to them. The order can be placed instantly via the kiosk communicating with the remote central server, and the ordered key(s) can be fabricated immediately and shipped to the customer, for next-day delivery if selected by the customer.
The central server has the capability of storing arty information it receives for making duplicate keys, including both keys made in the kiosks and keys made in the remote key duplicating module. The stored information is correlated with information identifying the respective customers from which the information was obtained, so that it can be retrieved to make additional duplicate keys for the same customer that originally provided the stored information. Each time the systems receives such information from a customer, the customer is given the option of requesting that the information provided for making a duplicate key be deleted after use, i.e., not stored. When the information is stored, it is preferably encrypted and can be accessed only when the ordering customer provides a password or other identification provided when the customer's account was set up.
The remote central server may include a “website,” i.e., a known Internet-accessible computer system that provides content provided by a website creator and operator. This content is made available to Internet users via known computer programs called “browsers” that run on a user's computer such as a laptop computer, a desktop computer, a tablet computer, a smart phone, a personal digital assistant (PDA) and the like. The websites may provide marry different forms of content to users such as textual information, images, videos, audio and sounds, and the like.
The website preferably contains components such as a header, a footer, a body, columns of textual information, sidebars, image carousels and other types of components. These components in some cases are called “content containers” or “content items,” because they serve as distinct regions in a website for holding and displaying specific types of content, which is sometimes dynamically updated by a computer system associated with the website. The website may be hosted on the remote central server using a web hosting service, sometimes referred to as “in the cloud.” The “cloud” typically refers to the practice of using one or more remote servers hosted on a public access network such as the Internet to store, manage and process data, rather than the user's local system. Cloud computing is used to invoke computing resources that are delivered as a service over a network. In the case of website hosting, the remote server may be accessed by users via an Internet connection, and the server may be operated by a third party separately from the website's creator, owner or operator.
The website operates like an e-commerce virtual store, but there is no need for an inventory of each displayed type of key blank pre-printed with each displayed design, because any order placed by a customer via the website can be quickly printed and/or cut for immediate shipment to the customer. An inventory of the most popular key blanks pre-printed with the most popular designs may be maintained, but any order key blank can be quickly cut to duplicate the customer's master key and printed with the design ordered by the customer, in a few minutes. Thus, a large variety of different types of key blanks, printed with any of an even larger variety of different designs, and even customized designs, can be offered to a customer shopping in the virtual store.
When a customer accesses the virtual-store website, a welcoming screen identifies the different types of key blanks available for purchase, and identifies different categories of available designs, such as logos of sports teams, floral patterns, geometric patterns, animals, birds, etc. This may be the information and images contained in the “Endless Aisle Catalog Info” database discussed above. The customer may select any of the identified types of key blank types and designs by simply clicking on them to place them in the customer's “shopping cart.” Payment may be made by any of the known techniques used in Internet shopping, such as by credit or debit card, PayPal, etc.
While particular embodiments and applications of the present invention have been illustrated and described, it is to be understood that the invention is not limited to the precise construction and compositions disclosed herein and that various modifications, changes, and variations may be apparent from the foregoing descriptions without departing from the spirit and scope of the invention as defined in the appended claims. For example, the master key inserted by the customer could be analyzed and matched to an original code that is then used to control the cutting of the duplicate key(s), rather than using the master key as a real-time pattern for cutting the duplicate. In this case, the remote communication system could be used to pre-order the cutting of a duplicate key using a code identified by the customer. Another alternative is to add a printing station to create different styles of keys in the key, to avoid the need to store different styles of blanks for the same type.
This is a continuation of U.S. patent application Ser. No. 16/505,549 filed on Jul. 8, 2019, pending, which is a continuation of U.S. patent application Ser. No. 15/885,366, filed on Jan. 31, 2018, which is a continuation of U.S. patent application Ser. No. 13/964,017, filed on Aug. 9, 2013, abandoned, which is a continuation-in-part of U.S. Pat. No. 8,634,951, filed Jun. 8, 2011, which is a continuation-in-part of U.S. Pat. No. 8,979,446, filed Jun. 3, 2011, which claims the benefit of U.S. Provisional Application Ser. No. 61/351,046 filed Jun. 3, 2010, all of which are incorporated herein by reference in their respective entireties.
Number | Name | Date | Kind |
---|---|---|---|
488058 | Breed | Dec 1892 | A |
1135676 | Engelbert | Apr 1915 | A |
1165099 | Hoernel | Dec 1915 | A |
1243810 | Christoph | Oct 1917 | A |
1400678 | Holbrook | Dec 1921 | A |
1422155 | Wetherholt | Jul 1922 | A |
1461171 | Barnes | Jul 1923 | A |
1462150 | Segal | Jul 1923 | A |
1587181 | Pomeroy et al. | Jun 1926 | A |
1614852 | Scharf | Jan 1927 | A |
1656295 | Schechter | Jan 1928 | A |
1697747 | Bachmann | Jan 1929 | A |
1752468 | Stull | Apr 1930 | A |
1752668 | Johnson | Apr 1930 | A |
1800209 | Christopherson | Apr 1931 | A |
1811922 | Falk | Jun 1931 | A |
1869631 | Swanson | Aug 1932 | A |
2038949 | Mintz | Apr 1936 | A |
2095196 | Paquette | Oct 1937 | A |
2148667 | Yoskowitz et al. | Feb 1939 | A |
2266864 | Hausknecht | Dec 1941 | A |
2398869 | Mead | Apr 1946 | A |
2582012 | Currier | Jan 1952 | A |
2682809 | May | Jul 1954 | A |
2712769 | Prescott | Jul 1955 | A |
2809566 | Orchard | Oct 1957 | A |
2821064 | Nelson | Jan 1958 | A |
3116665 | Reisner | Jan 1964 | A |
3245149 | Haggstrom | Apr 1966 | A |
3265245 | Harden | Aug 1966 | A |
3323420 | Roxburgh | Jun 1967 | A |
3358561 | Roxburgh et al. | Dec 1967 | A |
3413892 | Casey et al. | Dec 1968 | A |
3442174 | Weiner et al. | May 1969 | A |
3496636 | Lieptz | Feb 1970 | A |
3602092 | Richens | Aug 1971 | A |
3625111 | Carlo et al. | Dec 1971 | A |
3675536 | Hungerford et al. | Jul 1972 | A |
3682041 | Essig | Aug 1972 | A |
3748940 | Muri | Jul 1973 | A |
3780550 | Simorghi | Dec 1973 | A |
3792639 | Richens et al. | Feb 1974 | A |
3796130 | Gartner | Mar 1974 | A |
3797291 | Simorghi | Mar 1974 | A |
3810416 | Nelms, Jr. | May 1974 | A |
3865011 | Patriquin | Feb 1975 | A |
3870136 | Voegeli | Mar 1975 | A |
3880321 | Braginetz | Apr 1975 | A |
3884330 | Chalabian | May 1975 | A |
3956968 | Crasnianski | May 1976 | A |
3958081 | Ehrsam et al. | May 1976 | A |
3962539 | Ehrsam et al. | Jun 1976 | A |
3978764 | Patriquin | Sep 1976 | A |
4012991 | Uyeda | Mar 1977 | A |
4051748 | Sherman | Oct 1977 | A |
4055880 | Moessner | Nov 1977 | A |
4090303 | Uyeda | May 1978 | A |
4092806 | Wich | Jun 1978 | A |
4117763 | Uyeda | Oct 1978 | A |
4159783 | Crasnianski | Jul 1979 | A |
4203693 | Schwartz et al. | May 1980 | A |
4235087 | Bianchi | Nov 1980 | A |
4294096 | Heimann | Oct 1981 | A |
4338849 | Turner | Jul 1982 | A |
4423655 | Turner | Jan 1984 | A |
4426179 | Jefferson | Jan 1984 | A |
4614465 | Wu | Sep 1986 | A |
4646590 | Jones | Mar 1987 | A |
4663721 | Herscovici | May 1987 | A |
4666351 | Marchal | May 1987 | A |
4741652 | Marchal | May 1988 | A |
4752876 | Couch et al. | Jun 1988 | A |
4780032 | Uyeda et al. | Oct 1988 | A |
4878630 | Schmid | Nov 1989 | A |
4898504 | Agius et al. | Feb 1990 | A |
4899391 | Cimino et al. | Feb 1990 | A |
4901548 | Deslandes | Feb 1990 | A |
4929129 | Dickson | May 1990 | A |
4937623 | Nishimori et al. | Jun 1990 | A |
4969782 | Castain | Nov 1990 | A |
5122018 | Zion | Jun 1992 | A |
5127532 | Cimino et al. | Jul 1992 | A |
5128531 | Fadel | Jul 1992 | A |
5133127 | Bush | Jul 1992 | A |
5144452 | Abuyama | Sep 1992 | A |
5167171 | Heredia | Dec 1992 | A |
5171112 | Roland | Dec 1992 | A |
5172829 | Dellicker, Jr. | Dec 1992 | A |
5201048 | Coulter et al. | Apr 1993 | A |
5259708 | Brice | Nov 1993 | A |
5271698 | Heredia et al. | Dec 1993 | A |
5314274 | Heredia et al. | May 1994 | A |
5331474 | Lee | Jul 1994 | A |
5351409 | Heredia | Oct 1994 | A |
5383345 | Kallinger-Prskawetz-Jacobsen | Jan 1995 | A |
5441369 | Foscan et al. | Aug 1995 | A |
5443339 | Heredia et al. | Aug 1995 | A |
5493880 | Jang | Feb 1996 | A |
5496138 | Drori | Mar 1996 | A |
5538374 | Cole et al. | Jul 1996 | A |
5538534 | Cole et al. | Jul 1996 | A |
5546316 | Buckley et al. | Aug 1996 | A |
5556240 | Almblad | Sep 1996 | A |
5569003 | Goldman et al. | Oct 1996 | A |
5590809 | Prescott et al. | Jan 1997 | A |
5607267 | Heredia et al. | Mar 1997 | A |
5627549 | Park | May 1997 | A |
5660509 | Cole et al. | Aug 1997 | A |
5671523 | Juchinewicz | Sep 1997 | A |
5676504 | Mueller et al. | Oct 1997 | A |
5739766 | Chaloux | Apr 1998 | A |
5764156 | Chaloux | Jun 1998 | A |
5771176 | Froehlich et al. | Jun 1998 | A |
5807042 | Almblad et al. | Sep 1998 | A |
5833406 | Chies et al. | Nov 1998 | A |
5844808 | Konsmo et al. | Dec 1998 | A |
5906365 | Wu | May 1999 | A |
5908273 | Titus et al. | Jun 1999 | A |
5945602 | Ross | Aug 1999 | A |
5951218 | Wu | Sep 1999 | A |
5956985 | Chang | Sep 1999 | A |
5964554 | Drori | Oct 1999 | A |
5974844 | Harrelson et al. | Nov 1999 | A |
5997224 | Beauregard et al. | Dec 1999 | A |
6064747 | Wills et al. | May 2000 | A |
6065911 | Almblad et al. | May 2000 | A |
6106131 | Hao | Aug 2000 | A |
6152662 | Titus et al. | Nov 2000 | A |
6185311 | Yanovsky et al. | Feb 2001 | B1 |
6237756 | Caudle | May 2001 | B1 |
6371286 | Montanari | Apr 2002 | B1 |
6406227 | Titus et al. | Jun 2002 | B1 |
6449381 | Yanovsky et al. | Sep 2002 | B1 |
6543972 | Cimino | Apr 2003 | B1 |
D475195 | Christianson | Jun 2003 | S |
6588995 | Wills et al. | Jul 2003 | B2 |
6595045 | Fuglewicz et al. | Jul 2003 | B1 |
6602030 | Markbreit | Aug 2003 | B1 |
6606602 | Kolls | Aug 2003 | B1 |
6641339 | Chies et al. | Nov 2003 | B2 |
6647308 | Prejean | Nov 2003 | B1 |
6651470 | Rafter | Nov 2003 | B1 |
6684673 | Florendo | Feb 2004 | B2 |
6782725 | Linares | Aug 2004 | B2 |
6801829 | Kawai | Oct 2004 | B2 |
6839449 | Campbell et al. | Jan 2005 | B1 |
6892558 | Chodosh | May 2005 | B2 |
6895100 | Pacenzia et al. | May 2005 | B1 |
7055352 | Meyerson et al. | Jun 2006 | B2 |
7077607 | Foscan | Jul 2006 | B2 |
7114894 | Mueller et al. | Oct 2006 | B2 |
7167892 | Defossé et al. | Jan 2007 | B2 |
7214011 | Ryai, Sr. et al. | May 2007 | B2 |
7218991 | Walker et al. | May 2007 | B2 |
7331521 | Sorenson et al. | Feb 2008 | B2 |
7346562 | Inoue et al. | Mar 2008 | B2 |
7380428 | Morehart et al. | Jun 2008 | B2 |
7387476 | Ryai, Sr. | Jun 2008 | B2 |
7527458 | Ryai, Sr. et al. | May 2009 | B2 |
D618983 | Downes | Jul 2010 | S |
7890878 | Bass et al. | Feb 2011 | B2 |
7891919 | Bass et al. | Feb 2011 | B2 |
7894935 | Hagen et al. | Feb 2011 | B1 |
7918629 | Belflower et al. | Apr 2011 | B2 |
8074481 | Bass et al. | Dec 2011 | B2 |
8126764 | Murray et al. | Feb 2012 | B2 |
8128322 | Bass et al. | Mar 2012 | B2 |
8142117 | Belflower et al. | Mar 2012 | B2 |
8191779 | Illingworth et al. | Jun 2012 | B2 |
8214247 | Murray et al. | Jul 2012 | B2 |
8215625 | Wu | Jul 2012 | B2 |
8225696 | Downes | Jul 2012 | B2 |
8287215 | Freeman et al. | Oct 2012 | B2 |
8292556 | Ryai, Sr. et al. | Oct 2012 | B2 |
D674590 | Busch | Jan 2013 | S |
8342783 | Ryai, Sr. | Jan 2013 | B2 |
8373558 | Sagady et al. | Feb 2013 | B2 |
8484068 | Godwin et al. | Jul 2013 | B2 |
8484070 | Murray et al. | Jul 2013 | B2 |
8532809 | Freeman | Sep 2013 | B2 |
8600546 | Hagen et al. | Dec 2013 | B1 |
8626331 | Marsh et al. | Jan 2014 | B2 |
8634951 | Freeman | Jan 2014 | B2 |
8682468 | Marsh et al. | Mar 2014 | B2 |
8688579 | Ethington et al. | Apr 2014 | B1 |
8979446 | Freeman | Mar 2015 | B2 |
8992145 | Mueller et al. | Mar 2015 | B1 |
9073133 | Mueller et al. | Jul 2015 | B1 |
9101990 | Mutch et al. | Aug 2015 | B2 |
9149877 | Mueller et al. | Oct 2015 | B1 |
9199318 | Freeman et al. | Dec 2015 | B2 |
9243426 | Gerlings et al. | Jan 2016 | B2 |
9323237 | Freeman | Apr 2016 | B2 |
9468982 | Mueller et al. | Oct 2016 | B1 |
9487968 | Gerlings | Nov 2016 | B2 |
9506272 | Gerlings et al. | Nov 2016 | B2 |
9515997 | Westman | Dec 2016 | B1 |
9556649 | Mueller et al. | Jan 2017 | B1 |
9558236 | Hagen et al. | Jan 2017 | B1 |
9563885 | Marsh et al. | Feb 2017 | B2 |
9580932 | Gerlings et al. | Feb 2017 | B2 |
9586272 | Mueller et al. | Mar 2017 | B1 |
9764393 | Mueller et al. | Sep 2017 | B2 |
9797163 | Grice et al. | Oct 2017 | B2 |
9808900 | Gardner et al. | Nov 2017 | B2 |
9895753 | Huss et al. | Feb 2018 | B2 |
9914179 | Freeman et al. | Mar 2018 | B2 |
9987715 | Gardner et al. | Jun 2018 | B2 |
10040135 | Gardner et al. | Aug 2018 | B2 |
10124420 | Spangler et al. | Nov 2018 | B2 |
10196834 | Gerlings | Feb 2019 | B2 |
10252392 | Gardner et al. | Apr 2019 | B2 |
10259052 | Gardner et al. | Apr 2019 | B2 |
10482439 | Freeman | Nov 2019 | B2 |
20020022901 | Wetterlin et al. | Feb 2002 | A1 |
20020031251 | Campbell et al. | Mar 2002 | A1 |
20020141843 | Mueller et al. | Oct 2002 | A1 |
20030033054 | Yamazaki | Feb 2003 | A1 |
20040148988 | Taylor | Aug 2004 | A1 |
20040199426 | Prorock | Oct 2004 | A1 |
20040253067 | Bosch | Dec 2004 | A1 |
20050043011 | Murray et al. | Feb 2005 | A1 |
20050135891 | Ryai, Sr. et al. | Sep 2005 | A1 |
20050241353 | Moening | Nov 2005 | A1 |
20060044109 | Griffits et al. | Mar 2006 | A1 |
20060048553 | Almquist | Mar 2006 | A1 |
20060090528 | Moening | May 2006 | A1 |
20070050266 | Barber et al. | Mar 2007 | A1 |
20070136125 | Godwin et al. | Jun 2007 | A1 |
20070224008 | Bass et al. | Sep 2007 | A1 |
20080145163 | Freeman et al. | Jun 2008 | A1 |
20090074528 | Hadad | Mar 2009 | A1 |
20090228795 | Bass et al. | Sep 2009 | A1 |
20090257091 | Shelton et al. | Oct 2009 | A1 |
20100052234 | Ryai, Sr. | Mar 2010 | A1 |
20100057871 | Kaplan et al. | Mar 2010 | A1 |
20100138037 | Adelberg et al. | Jun 2010 | A1 |
20100278437 | Thompson et al. | Nov 2010 | A1 |
20100278438 | Thompson et al. | Nov 2010 | A1 |
20100316250 | Perrigo | Dec 2010 | A1 |
20110110741 | Huss et al. | May 2011 | A1 |
20110167377 | Bass et al. | Jul 2011 | A1 |
20110176881 | Bass et al. | Jul 2011 | A1 |
20110262240 | Mutch et al. | Oct 2011 | A1 |
20110297691 | Freeman | Dec 2011 | A1 |
20110301738 | Freeman | Dec 2011 | A1 |
20120014762 | Ryai, Sr. et al. | Jan 2012 | A1 |
20120038453 | Bass et al. | Feb 2012 | A1 |
20120154127 | Donadini | Jun 2012 | A1 |
20120213603 | Bass et al. | Aug 2012 | A1 |
20120243957 | Drake et al. | Sep 2012 | A1 |
20130017030 | Freeman et al. | Jan 2013 | A1 |
20130039714 | Ryai, Sr. et al. | Feb 2013 | A1 |
20130094918 | Ryai, Sr. | Apr 2013 | A1 |
20130138243 | Freeman | May 2013 | A1 |
20130170693 | Marsh et al. | Jul 2013 | A1 |
20130173044 | Marsh et al. | Jul 2013 | A1 |
20130294857 | Bass et al. | Nov 2013 | A1 |
20130297431 | Deubell et al. | Nov 2013 | A1 |
20130297670 | Lundberg et al. | Nov 2013 | A1 |
20130331976 | Freeman et al. | Dec 2013 | A1 |
20140064597 | Fagan et al. | Mar 2014 | A1 |
20140064598 | Fagan et al. | Mar 2014 | A1 |
20140113683 | Hickey | Apr 2014 | A1 |
20140148941 | Marsh et al. | May 2014 | A1 |
20140377027 | Burkett et al. | Dec 2014 | A1 |
20150050094 | Gerlings | Feb 2015 | A1 |
20150286201 | Marsh et al. | Oct 2015 | A1 |
20160004892 | Marsh et al. | Jan 2016 | A1 |
20160114412 | Bosch | Apr 2016 | A1 |
20160321632 | Moore et al. | Nov 2016 | A1 |
20160346847 | Gerlings | Dec 2016 | A1 |
20170008096 | Mueller et al. | Jan 2017 | A1 |
20170008097 | Marsh et al. | Jan 2017 | A1 |
20170100785 | Hagen et al. | Apr 2017 | A1 |
20170103516 | Mueller et al. | Apr 2017 | A1 |
20170136557 | Huss et al. | May 2017 | A1 |
20170225242 | Spangler et al. | Aug 2017 | A1 |
20180010364 | Grice et al. | Jan 2018 | A1 |
20180071838 | Gerlings et al. | Mar 2018 | A1 |
20180079014 | Marsh et al. | Mar 2018 | A1 |
20180079015 | Marsh et al. | Mar 2018 | A1 |
20180154459 | Freeman | Jun 2018 | A1 |
20180207733 | Mutch et al. | Jul 2018 | A1 |
20180236570 | Freeman et al. | Aug 2018 | A1 |
20180264561 | Schmidt et al. | Sep 2018 | A1 |
20190076938 | Spangler et al. | Mar 2019 | A1 |
20190153749 | Gerlings | May 2019 | A1 |
Number | Date | Country |
---|---|---|
2365738 | Sep 2000 | CA |
102005027102 | Dec 2006 | DE |
2017240 | Jan 1990 | ES |
H09-216112 | Aug 1997 | JP |
82904 | May 2009 | RU |
87030 | Sep 2009 | RU |
WO 89012867 | Dec 1989 | WO |
WO 93006959 | Apr 1993 | WO |
WO 95005609 | Feb 1995 | WO |
WO 99048065 | Sep 1999 | WO |
WO 99050801 | Oct 1999 | WO |
WO 02001480 | Jan 2002 | WO |
WO 02101180 | Dec 2002 | WO |
WO 2004012893 | Feb 2004 | WO |
WO 2007093982 | Aug 2007 | WO |
WO 2008066857 | Jun 2008 | WO |
Entry |
---|
Office Action dated Mar. 10, 2017 in U.S. Appl. No. 15/191,071, filed Jun. 23, 2016. |
Office Action dated Feb. 23, 2017 in U.S. Appl. No. 14/920,060, filed Oct. 22, 2015. |
Final Rejection dated Aug. 24, 2015 in U.S. Appl. No. 13/961,519, filed Aug. 7, 2013. |
Office Action dated Feb. 10, 2015 in U.S. Appl. No. 13/961,519, filed Aug. 27, 2013. |
Office Action dated Oct. 1, 2014 in U.S. Appl. No. 13/153,065, filed Jun. 3, 2011. |
2nd Examination Report dated Sep. 5, 2014 in Australian Patent Appl. No. 2007325754. |
Office Action dated Sep. 3, 2014 in Canadian Patent Appl, No. 2797774. |
Office Action dated Jun. 13, 2014 in Canadian Patent Appl. No. 2801424. |
Examination Report dated May 17, 2014 in Australian Patent Appl. No. 2011261228. |
The Hillman Group, Inc. v. Minute Key Inc., Case No. 1:13-cv-00707, Dkt#55, filed Aug. 15, 2014 in the United States District Court for the Southern District of Ohio Western Division, “Order Granting Defendant's Motions to Dismiss (Doc. 40, 42): and Denying as Moot Plaintiff's Motion to File Amended Reply (Doc. 41)”. |
The Hillman Group, Inc. v. Minute Key Inc., Case No. 1:13-cv-00707, “Hillman's Invalidity Contentions” dated Jul. 7, 2014. |
The Hillman Group, Inc. v. Minute Key Inc., Case No. 1:13-cv-00707, “Hillman's Preliminary Claim Constructions and Identification of 35 U.S.C. § 112, ¶6 Corresponding Structures” dated Aug. 11, 2014. |
The Hillman Group, Inc. v. Minute Key Inc., Case No. 1:13-cv-00707, “Hillman's Proposed Claim Terms for Construction and Identification of Claim Terms to be Governed by 35 U.S.C. § 112, ¶6” dated Jul. 21, 2014. |
The Hillman Group, Inc. v. Minute Key Inc., Case No. 1:13-cv-707-SJD, “Minute Key Inc.'s Listing of Claim Terms for Construction” dated Jul. 21, 2014. |
The Hillman Group, Inc. v. Minute Key Inc., Case No. 1.13-cv-707-SJD, “Minute Key Inc.'s Proposed Preliminary Claim Constructions” dated Aug. 22, 2014. |
Cherkassky, Irene, “The e-volution of wireless vending”, Beverage World, Feb. 15, 2000. |
Kasavana, Michael, “Kiosk technology will give vending new capabilities”, Automatic Merchandiser, Dec. 1, 2007. |
Examination Report dated Aug. 5, 2013 in Australian Patent Appl. No. 2007325754. |
Canadian Intellectual Property Office, Office Action dated Nov. 18, 2013 for Appl. No. 2801424, entitled “Fully Automatic Self-Service Key Duplicating Kiosk”, 4 pages. |
International Search Report dated Aug. 18, 2008 from Appl. No. PCT/US07/24522. |
Written Opinion dated Aug. 18, 2008 from Appl. No. PCT/US07/24522. |
International Search Report dated Nov. 9, 2012 from Appl. No. PCT/US12/40656. |
Written Opinion dated Nov. 9, 2012 from Appl. No. PCT/US 12/40656. |
International Search Report dated Nov. 29, 2011 from Appl. No. PCT/US11/39128. |
Written Opinion dated Nov. 29, 2011 from Appl. No. PCT/US11/39128. |
“BD Laser Computerized High Security Key Machine”; Locksmith Ledger, Jul. 1, 2005 (3 pp.). |
BD Laser Max Use and Maintenance Manual (24 pp.). |
Blue Shark Manual (2002); (70 pp). |
Claim Charts Ex A-1 through Ex A-19 (642 pp.). |
Final Written Decision; Nov. 14, 2016 (18 pp.). |
Freeman, Daniel, et al.; U.S. Appl. No. 60/897,796, filed Nov. 30, 2006 (17 pp.). |
Hy-Ko Key Machine Center webpage; Apr., 2009; (2 pp.). |
Bill Donahue, “Key-Cutting Cos. Lock Down Antitrust, Patent Settlements,” Nov. 6, 2012, Law 360 (2 pp). |
“Home Improvements,” Jun. 26, 2009, Sbonline.com, Hy-Ko Kid System (2) (2 pp.). |
Key Product Guide (24 pp.). |
Hy-Ko Promatic-100 Key Machine Manual (2010); (44 pp.). |
Contentions cover paper; Nov. 15, 2019 (42 pp.). |
“I-400: Multlock's Industrial Machine for Multi-Row Dimple Keys;” Jan. 30, 2013; https://www.youtube.com/watch?v=d93Q_IC56gc. |
“Key Machines, Blue Shark Stand-alone Hand Activated Robotic Keymachine;” HPC World, Dec. 2, 2002 (2 pp.). |
“Keyline Dezmo & Dromo”; Apr. 20, 2010; https://www.youtube.com/watch?v=DkVJIDA3afo. |
“KID 1—Mach Intro”; May 14, 2019; https://www.youtube.com/watch?v=eFlzMeCPdEs. |
“Make Keys Quick with Minute Key in Lowes—Big Brother Is Watching . . . ”; Jun. 29, 2013; https://www.youtube.com/watch?v=kAYTKwPG6a0. |
“Minute Key”; Apr. 14, 2013; https://www.youtube.com/watch?v=Q_obxkvd9xM. |
“Minutekey Key Duplicator”; Jun. 18, 2011, https://www.youtube.com/watch?v=nYo9zm303_I. |
Minute Key website; http://www.minutekey.com. |
Mul-T-Lock Classic Systems Webpage (1 p.). |
Mul-T-Lock Industrial Machinery Webpage (1 p.). |
Quattrocode Operating Manual, v. 2.0 (1999); (57 pp.). |
Silca Unocode 299-399 Optional Accessories Guide (2012) (16 pp.). |
Silca Unocode 399 Manual v. 7.0 (2002) (85 pp.). |
Silca Unocode 399 Plus Manual v. 1.0 (2010) (98 pp). |
“Unocode 399 Plus”; Silca Magazine (2 pp.). |
Unocode 399 Plus webpage (1 p.). |
Wilco Supply, Key Machines, Blue Shark (27 pp.). |
Number | Date | Country | |
---|---|---|---|
20200219075 A1 | Jul 2020 | US |
Number | Date | Country | |
---|---|---|---|
61351046 | Jun 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16505549 | Jul 2019 | US |
Child | 16794648 | US | |
Parent | 15885366 | Jan 2018 | US |
Child | 16505549 | US | |
Parent | 13964017 | Aug 2013 | US |
Child | 15885366 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13155994 | Jun 2011 | US |
Child | 13964017 | US | |
Parent | 13153065 | Jun 2011 | US |
Child | 13155994 | US |