The present disclosure is directed to object identification and duplication systems and, more particularly, to systems and methods for identifying and duplicating access control devices such as house keys, automobile keys, motorcycle keys, recreational vehicle keys, RFID fobs, etc.
Access control is a major industry, one that touches nearly every household and business. Whether a person owns a home, runs an office, drives a car, or rents a vacation home, access control devices like keys and fobs will be ubiquitous.
Managing and duplicating these access control devices presents a significant challenge, particularly in a “lockout” situation where the original device is locked inside, lost, or damage. Absent an easily accessed on-demand retail solution, one is left with few options besides an expensive locksmith service, or waiting days or weeks for a spare key to arrive.
Machines and methods for duplicating access control devices, such as key duplication machines, were once the sole purview of trained experts and locksmiths. In recent years, the industry has evolved and expanded to self-service machines and further still to fully automated robotic systems aided by artificial intelligence. But retail space and inventory remain at a premium, and every inch of floor space represents (lost) revenue for a retailer. Although the various types of machines discussed above may be individually acceptable for some environments, they can also be problematic. In particular, having only one type of machine is a sales environment can limit the number and type of customers attracted to the environment. However, having multiple types of machines in the sales environment can consume valuable floor space and increase equipment and operating costs.
Identifying and duplicating automobile keys presents both a challenge and an opportunity for the industry. Previously, a customer who lost a car key would have no choice but to return to the dealership to secure a new key, usually at a price of hundreds of dollars. In time, duplication devices for automobile keys reached the broader marketplace, offering a faster, cheaper solution. But these machines almost always required the time and attention of a well-trained store employee, and often carried a limited range of keys. As modern car keys have exploded in complexity, duplication of an existing key at a reasonable price has gotten even more difficult.
Although machines exist in the prior art for duplicating RFID key fobs, these machines also are either not self-service, not instantaneous, or are cumbersome to use. In particular, any machine that requires an untrained user to insert a blank RFID key fob back into the machine for writing runs a significant risk that the user will either walk away with the blank fob (thinking it has already been written) or will fail to place the fob properly into the machine. Both scenarios result in significant frustration and potential danger when the user tries to use the duplicate fob later only to find it worthless.
The disclosed object identification and duplication systems, which consolidate multiple functions of identifying and duplicating objects such as access control devices within one housing, are directed to overcoming one or more of the problems set forth above and/or other problems of the prior art.
In one aspect, the present disclosure is directed to a system for duplicating access devices. The system may include a self-service kiosk which includes a housing and a user interface. The self-service kiosk may further include a key identification system within the housing. The key identification system may be configured to receive an existing key at a key insertion slot, clamp the existing key, and identify geometric features of the existing key. The self-service kiosk may further include a key duplication system within the hosing. The key duplication system may be configured to retrieve a key blank associated with the existing key, clamp the key blank, cut the geometric features of the existing key identified by the key identification system into the key blank, and dispense the cut key blank. The self-service kiosk may further include an automobile key identification system within the housing. The automobile key identification system may be configured to receive input via the user interface indicative of the make, model, and year of an automobile associated with an existing automobile key, determine whether the existing automobile key includes a transponder chip, determine information associated with the type of transponder chip, interrogate the transponder chip, and determine a code associated with the transponder chip. The self-service kiosk may further include an RFID key fob duplication system within the housing. The RFID key fob duplication system may be configured to read data associated with an existing RFID key fob, and determine whether the existing RFID key fob can be duplicated. When the data indicates that the existing RFID key fob can be duplicated, the RFID key fob duplication system may be further configured to retrieve an RFID key fob container containing an RFID key fob blank, write the existing RFID key fob data onto the RFID key fob blank within the RFID key fob container, and dispense the RFID key fob container containing the written RFID key fob blank. Finally, the system may include a remote server.
In another aspect, the present disclosure is directed to a method for duplicating an automobile key. The method may include receiving input via a user interface of a self-service kiosk indicative of the make, model, and year of an automobile associated with an existing automobile key. The method may also include determining, based on the received input, that the existing automobile key is a remote control device. Additionally, the method may include capturing at least one image of a remote control device provided by a user of the self-service kiosk. The method may also include verifying, based on the captured at least one image, that the remote control device provided by the user matches a remote control device associated with the make, model, and year of an automobile input received by the user interface. Finally, the method may include transmitting the input of a make, model, and year of an automobile received by the user interface and the captured at least one image to a remote server.
In yet another aspect, the present disclosure is directed to a method for duplicating a key. The method may include receiving an existing key at a key insertion slot of a housing of a self-service kiosk. The method may further include clamping the existing key, and determining that the existing key is a sidewinder key. Also, the method may include capturing at least one sidelight image of the blade of the sidewinder key, and capturing at least one laser stripe image of the blade of the sidewinder key. The method may additionally include transmitting one or more of the at least one sidelight image and the at least one laser stripe image to a remote server. Further, the method may include determining milling geometry information for the blade of the existing sidewinder key based on one or more of the at least one sidelight image and the at least one laser stripe image. Finally, the method may include retrieving a sidewinder key blank associated with the existing sidewinder key, and milling a blade of the sidewinder key blank with geometric features of the existing sidewinder key based on the determined milling geometry information for the blade of the existing sidewinder key.
In still another aspect, the present disclosure is directed to a method for duplicating an RFID key fob. The method may include reading data associated with an existing RFID key fob at a self-service kiosk, and determining whether the existing RFID key fob can be duplicated. When the data indicates that the existing RFID key fob can be duplicated, the method includes retrieving an RFID key fob container containing an RFID key fob blank, writing the existing RFID key fob data onto the RFID key fob blank within the RFID key fob container, and dispensing the RFID key fob container containing the written RFID key fob blank.
In another aspect, the present disclosure is directed to a system for duplicating access devices. The system may include a self-service kiosk including a housing and a user interface. The self-service kiosk may include a key identification system within the housing configured to receive an existing key at a key insertion slot, clamp the existing key, and identify geometric features of the existing key. The self-service kiosk may also include a key duplication system within the housing configured to retrieve a key blank associated with the existing key, clamp the key blank, cut the geometric features of the existing key identified by the key identification system into the key blank, and dispense the cut key blank. The self-service kiosk may additionally include an RFID key fob duplication system within the housing configured to read data associated with an existing RFID key fob, and determine whether the existing RFID key fob can be duplicated. When the data indicates that the existing RFID key fob can be duplicated, the RFID key fob duplication system may be further configured to retrieve an RFID key fob container containing an RFID key fob blank, write the existing RFID key fob data onto the RFID key fob blank within the RFID key fob container, and dispense the RFID key fob container containing the written RFID key fob blank.
Numerous types of vehicle keys are currently in use. Such keys usually include an elongated shank and a head portion that may be covered with a key fob. The key fobs may include one or more buttons configured to lock/unlock a vehicle, open the trunk of the vehicle, and/or cause the vehicle to sound an alert in an emergency.
As illustrated in the exemplary embodiment of
As illustrated in the exemplary embodiment of
As illustrated in the exemplary embodiment of
A user or customer may desire to obtain a duplicate of a key (e.g., key 10, 30, or 50) that may be a vehicle key. Many retail locations offer key duplication services for manufacture of a duplicate key. Such retail locations typically include machining centers equipped with milling cutters or other cutting devices to generate the required notches on a key blank based on a desired bitting pattern. Typically, the machining centers in retail locations can generate keys similar to key 10 shown in
Kiosk 210 may be equipped with one or more payment mechanisms to allow a user or a customer to pay for the key duplication services. In one exemplary embodiment, display 230 of kiosk 220 may be configured to display an image of, for example, a bar code or a QR code in a graphical user interface. An associate at the retail location may be able to scan the bar code or QR code allowing information from the bar code or QR code (e.g., payment information) to be directly imported into the retail location's native payment processing system. In another exemplary embodiment, one or more payment capture devices associated with kiosk 210 or 220 may include, for example, a cash acceptor, a credit or debit card reader, etc. For example, the cash acceptor may be located an outer surface of housing 222 of kiosk 220. Cash acceptor may be configured to receive currency in the form of bills or coins as payment from a customer. In some exemplary embodiments, the payment capture device may be configured to accept other types of payment such as checks or other forms of electronic payment. In some exemplary embodiments, the payment capture device may be configured to receive payment via wireless communication with another electronic device, for example, a mobile phone, a tablet computer, a laptop computer, a remote server, etc.
Slot 240 may be configured to allow a user to insert shank (e.g. 12, 32, or 52) of a key that the user wishes to duplicate. For example, display 230 may display instructions to the user to insert shank 12, 32, or 52 of a key into slot 240. Kiosk 220 may include one or more sensors configured to detect insertion of shank 12, 32, or 52 into slot 240. Kiosk 220 may also include one or more mechanical clamps, grasping devices, etc., configured to align shank 12, 32, or 52 so that shank 12, 32, or 52 may be fully insertable into slot 240 until key fob 14, 34, or 54 abuts on a surface of housing 222 of kiosk 220. Kiosk 220 may also include one or more imaging devices and/or one or more lighting devices within housing 222 of kiosk 220. The one or more imaging devices may include one or more 2D or 3D cameras, video cameras, holographic cameras, or other types of imaging devices. The one or more imaging devices may be configured to capture images of, for example, top side 16, 36, or 56, bottom side 18, 38, or 58, edge 20, 40, or 60, and/or edge 22, 42, or 62 of, for example, shank 12, 32, or 52 inserted into slot 240. It is contemplated, however, that the one or more imaging devices may be configured to capture any number of images of any number of sides of shank 12, 32, and/or 52. The one or more imaging devices within housing 222 may be positioned on one or more walls of housing 222. It is also contemplated that the one or more imaging devices within housing 222 may be attached to one or more gantries or carriage devices that may allow the one or more imaging devices to be moved in one or more directions relative to shank 12, 32, or 52 inserted into slot 240. It is also contemplated that the one or more gantries or carriage devices may include one or more tracks, chains, motors, springs, or other actuator systems configured to move the one or more imaging devices in the one or more directions. The one or more imaging devices may be configured to transmit the one or more captured images of shank 12, 32, and/or 52 to a server.
The one or more lighting devices within kiosk 220 may include, for example, one or more structured or unstructured light sources, single or multiple wavelength light sources, infrared, ultraviolet, or laser light sources, etc. Like the one or more imaging devices, the one or more lighting devices may also be attached to one or more gantries or carriage devices as discussed above to allow the one or more lighting devices to be moved in one or more directions relative to shank 12, 32, 52 inserted into slot 240 and or relative to the one or more imaging devices located within housing 222.
As discussed above, kiosk 220 may also include camera 250 that may be configured to obtain an image of one or more items positioned on platform 252. The relative positions of slot 240 and camera 250 as illustrated in
Network 410 may include any combination of communications networks. For example, network 410 may include the Internet and/or any type of wide area network, an intranet, a metropolitan area network, a local area network (LAN), a wireless network, a cellular communications network, or Wi-Fi, WiMAX, Bluetooth or other communication protocol, etc.
Server 420 may include one or more servers configured to communicate and interact with one or more kiosks 220 and/or one or more key cutting machines 430. Server 420 may be a general purpose computer, a mainframe computer, or any combination of these components. In certain exemplary embodiments, server 420 may be a standalone computing system or apparatus, or it may be part of a subsystem, which may be part of a larger system. For example, server 420 may represent distributed servers that are remotely located and communicate over a communications medium (e.g., network 410) or over a dedicated network, for example, a LAN. Server 420 may be implemented as a server, a server system comprising a plurality of servers, or a server farm comprising a load balancing system and a plurality of servers. Server 420 may be configured to receive one or more images from kiosk 220. Server 420 may also be configured to determine a bitting pattern of the key associated with the images received from kiosk 220. In one exemplary embodiment, server 420 may be configured to determine the bitting pattern based on the images of shank 12, 32, and/or 52 transmitted from kiosk 220. In another exemplary embodiment, server 420 may be configured to determine the bitting pattern based on vehicle information extracted from, for example, images of one or more documents captured by camera 250 and transmitted to server 420 from kiosk 220. It is also contemplated that server 420 may be configured to determine the bitting pattern based on both the images of shank 12, 32, and/or 52 and/or the images of one or more documents captured by camera 250.
Server 420 may access one or more databases configured to store instructions and/or data associating vehicle information such as VIN number, make, model, driver's license number, vehicle title information, license plate information, etc., with a bitting pattern for a key associated with the vehicle information. It is also contemplated that in some exemplary embodiments, server 420 may determine the bitting pattern based on one or more dimensional measurements obtained from the one or more images of, for example, shank 12, 32, and/or 52 transmitted from kiosk 220. Although server 420 has been illustrated in
Server 420 may also be configured to transmit the bitting pattern, instructions, and/or commands to key cutting machine 430 to manufacture a duplicate key based on the bitting pattern. In one exemplary embodiment, server 420 may display instructions to allow an operator to select an appropriate key blank and insert the selected key blank into key cutting machine 430. Key cutting machine 430 may be equipped with one or more cutting devices (e.g., edge milling cutters, side milling cutters, drills, saws, laser cutters, etc.). Key cutting machine 430 may also be configured to cut notches, for example, 24, 44, or 64 in key shank 12, 32, or 52 based on instructions received from server 420. It is also contemplated that in some embodiments, key cutting machine 430 may be configured to retrieve instructions for cutting notches, for example, 24, 44, or 64 in key shank 12, 32, or 52 from a database based on instructions received, for example, from server 420.
It is contemplated that after the duplicate key has been manufactured by key cutting machine 430, an operator may remove the duplicate key from key cutting machine 430 and send it to a retail location, for example, where the user or customer initially requested duplication of the key. It is also contemplated that an associate at the retail location may use additional fob duplication equipment to copy programs, instructions, or codes from the user's key fob to a key fob associated with the duplicate key.
Processor 502 may embody a single or multiple microprocessors, digital signal processors (DSPs), etc. I/O devices 504 may include physical keyboards, virtual touch screen keyboards, mice, joysticks, styluses, etc. In certain exemplary embodiments, I/O devices 504 may include a microphone (not shown) for providing input to system 400 using, for example, voice recognition, speech to text, and/or voice command applications. In other exemplary embodiments, I/O devices 504 may include a telephone keypad and/or a keypad on a touch screen for providing input to system 400.
Memory 506 may be configured to store data or one or more instructions and/or software programs that perform functions or operations when executed by the one or more processors 502. For example, memory 506 may include Random Access Memory (RAM) devices, NOR or NAND flash memory devices, Read Only Memory (ROM) devices, etc. System 400 may also include storage medium 508 configured to store data or one or more instructions and/or software programs that perform functions or operations when executed by the one or more processors 502. In some exemplary embodiments, storage medium 508 may include hard drives, solid state drives, tape drives, RAID arrays, compact discs (CDs), digital video discs (DVDs), Blu ray discs (BD), etc. Although
Displays 510 may be configured to display data and/or information and may be similar to display 230 discussed above. Communications interface 512 may allow software and/or data to be transferred between kiosk 220, network 410, server 420, and/or key cutting machine 430. Examples of communications interface 512 may include a modem, a network interface (e.g., an Ethernet card or a wireless network card), a communications port, a PCMCIA slot and card, a cellular network card, a Bluetooth interface, etc. Communications interface 512 may transfer software and/or data in the form of signals, which may be electronic, electromagnetic, optical, or other signals capable of being transmitted and received by communications interface 512. Communications interface 512 may transmit or receive these signals using wire, cable, fiber optics, radio frequency (“RF”) link, and/or other communications channels.
Display 4604 may be positioned anywhere on kiosk 4600. Display 4604 may include a conventional display device, for example, an LCD screen, an LED screen, a cathode ray tube screen, etc. In some exemplary embodiments, display 4604 may be configured to display a graphical user interface, including instructions, advertising, and/or other information. In some exemplary embodiments, display 4604 may additionally or alternatively include a touch screen device configured to receive one or more inputs from a user. Thus, for example, a graphical user interface displayed on display 4604 may allow a user to provide additional information regarding the object, key, or key fob to be duplicated and/or additional information about the user, accept or reject a displayed price, and/or request help on using kiosk 4600. In some exemplary embodiments, display 4604 may be configured to display a virtual keyboard or numeric keypad, which may allow a user to enter payment information, address information, and/or other information associated with duplicating a key or a master RFID key fob.
Key insertion slot 4606 may be configured to allow a user to insert the shank of a physical key that the user wishes to duplicate. For example, display 4604 may display instructions to the user to insert the shank of an existing key into key insertion slot 4606. Kiosk 4600 may include one or more sensors configured to detect insertion of the shank into key insertion slot 4606. As illustrated in
Kiosk 4600 may include one or more processors, memories, and/or databases and may be configured to determine geometric features of the key inserted into key insertion slot 4606. In alternative embodiments, kiosk 4600 may transmit information, images, etc. over a network such as network 410 to a remote system such as server(s) 420 that may include additional processors, memories, and/or databases. Kiosk 4600 may include an antenna 4622 for purposes of wireless transmission and receipt of information. Antenna 4622 may be configured to connect to a wireless network such as WiFi, a LAN, a WAN, etc.
In some embodiments, kiosk 4600 may include key cutting components within housing 4602. Such key cutting components may include, for example, cutting wheels, edge milling cutters, side milling cutters, drills, saws, laser cutters, etc. Components within kiosk 4600 may be programmed to identify an appropriate key blank within an included magazine or carousel, position the key blank, and to cut notches or other features into the key blank for duplicating the existing key, as discussed in further detail below. Once the key blank has been cut, the duplicate key may be dispensed to the user via duplicate key dispenser 4618. In some embodiments, key dispenser 4618 and RFID key fob dispenser 4620 may be the same; in other embodiments, they may be separate openings in housing 4602.
Kiosk 4600 may be equipped with one or more payment mechanisms configured to receive payment from the user for the desired identification and/or duplication services. In one exemplary embodiment, display 4604 of kiosk 4600 may be configured to display an image of, for example, a bar code or a QR code in a graphical user interface. In other embodiments, an associate at the retail location may be able to scan the bar code or QR code allowing information from the bar code or QR code (e.g., payment information) to be directly imported into the retail location's native payment processing system. In these embodiments, kiosk 4600 may not be equipped with a bill or card acceptor on housing 4602.
In another exemplary embodiment, one or more payment capture devices 4608 associated with kiosk 4600 may include, for example, a cash acceptor, a credit or debit card reader, etc. For example, the cash acceptor may be located on an outer surface of housing 4602 of kiosk 4600. The cash acceptor may be configured to receive currency in the form of bills or coins as payment from a user. In some exemplary embodiments, the payment capture device 4608 may be configured to accept other types of payment such as checks or other forms of electronic payment. In some exemplary embodiments, the payment capture device may be configured to receive payment via wireless, Bluetooth, or NFC communication with another electronic device, for example, a mobile phone, a tablet computer, a laptop computer, a remote server, etc.
Kiosk 4600 may also include a viewing window 4612 that may allow a user to view one or more components located within housing 4602. Window 4612 may also allow a user to view the operation of various components within kiosk 4600 when conducting various object identification and duplication processes. As illustrated in
Key fob reader 4616 may include an antenna. Upon detecting the presence of a master RFID key fob, one or more processors of kiosk 4600 may activate the included antenna within key fob reader 4616 to emit an electromagnetic field. A master RFID key fob when placed on key fob reader 4616 may receive the electromagnetic field and in response, the master RFID key fob may transmit data (e.g., one or more codes) stored on the master RFID key fob to key fob reader 4616 and associated hardware. The one or more processors of kiosk 4600 may also cause display 4604 to display instructions to the user regarding duplication of the master RFID key fob (see, e.g.,
In some embodiments, kiosk 4600 may include hardware configured to identify and/or duplicate a key for an automobile or other vehicle that contains a transponder chip. As illustrated in
In the embodiment illustrated in
USB hub 4708 may be situated atop the box surrounding key identification system 4700, or anywhere else convenient. USB hub 4708 may be configured to facilitate customization of kiosk 4600 for different retail environments and scenarios, by allowing easy plug-and-play capabilities for various identification, duplication, and software modules. As will be described in further detail below in association with
In some embodiments, key identification system 4700 may include a tip stop assembly, including tip stop gantry 4712. The tip stop assembly may serve multiple functions within key identification system 4700, including providing haptic feedback to a user as they insert an existing key into key insertion slot 4606, ejecting keys and other implements inserted into key insertion slot 4606, and assisting with key measurements based on the displacement of the tip stop as the key is inserted. The tip stop assembly may include or be associated with a motor, such as a servo motor, that provides the resistive force.
Also illustrated in
Various components are illustrated in the schematic of
In
In some embodiments, LED banks 4916 and 4920 may include guard rails (not shown) adjacent to the lights themselves. The guard rails may be made of acrylic or other non-reflective material. The guard rails may be polarized, shaded, tinted, or otherwise at least partially opaque. In these embodiments, the guard rails may reduce glare from the LEDs before the light reaches the key. Additionally, the guard rails may prevent dust and debris from accumulating on and blocking the LEDs.
In some embodiments, key identification system 4700 may include additional LED banks on the side walls of the unit near the cameras, such as side LED bank 4926 illustrated in
In some embodiments, as laser motor 4714 provides force via lead screw 4716, laser gantry 4924 and laser carriage 5010 are propelled forward and backward along profile rail 5008. In these embodiments, control board 4804 of controller 4800 may control the stepping of laser motor 4714, and home switches and other sensors (not shown) may be configured to regulate the movement and position of the assembly to ensure consistent translation and accordingly consistent imaging.
Tip stop 5102 is visible in
It should be understood that the configuration of key identification system 5700 is exemplary, and that other configurations are possible. As but one example, only half of the system (i.e. one camera, one laser assembly, half the LED banks, etc.) may be deployed in a particular key identification system 5700.
In order to create a precise measurement of an existing key inserted into the key insertion slot of the kiosk, a series of images may be acquired by cameras 4904-4906 using different lighting configurations and different exposure times. Light from LED banks 4916-4920 and lasers 4910-4912 may be used in various combinations to reveal features of the existing key that must be duplicated in a key blank. Reflections of light from various angles off of edge features can assist in developing an outline profile for an edge-cut existing key, and reflections off of internal edges may be used to determine milling geometry and an associated code for a sidewinder automobile key.
In some embodiments, to enhance the accuracy of image processing, an unlit background image is also captured by cameras 4904-4906, which permits removal of any light leakage or debris signals. Image processing may be performed in some embodiments by processors or computers within kiosk 4600. Alternatively, the image processing described herein may be performed by remote processors and systems, such as server(s) 420.
As shown in
This initial perimeter detection, as shown in
To inspect the shape of the key, the goal is to detect the key edge just inside of the key perimeter contour line. As shown in
Additional processing may be required in some embodiments to correct for other deviations in the image and in the orientation of the key, such as parallax errors and perspective errors. In some embodiments, any deviation of the camera positioning or the key positioning from horizontal may cause trapezoidal perspective distortion errors over the length of the key. In some embodiments, the system processors may be configured to detect inflection points consisting of more than two pixels in length in the key data. These line segments can then be ordered by their length, revealing the lengths of various features of the edge of the key. As shown in
The one or more processors of kiosk 4600 may also be programmed to activate antenna 5712, as shown in
As described above, antenna 5712 may be configured to write a code associated with a master key fob into one of the blank RFID key fobs located within the stack of RFID key fob containers 5704 inside of magazine(s) 5706. Antenna 5712 may have any shape or orientation (e.g., curvilinear shape, coil shape, or any other shape) capable of emitting an electromagnetic field.
Each RFID key fob container 5704 within a magazine 5706 may include a blank (e.g., writeable) RFID key fob. One or more processors of kiosk 4600 may be configured, via antenna 5712 and associated hardware, to write the data and/or information read from a master RFID key fob placed on key fob reader 4616 onto a blank RFID key fob located within an RFID key fob container 5704. It is contemplated that the data and/or information may be written to a blank key fob in a bottom-most key fob container 5704 located in a magazine 5704 of key fob dispenser 4620. In other embodiments, other orientations of magazine(s) 5706 and antenna 5712 are possible and will be readily contemplated by one of ordinary skill in the art.
RFID key fob dispenser 4620 may also include a dispensing mechanism, such as the exemplary mechanism illustrated in
In one exemplary embodiment, slider 5714 of the disclosed dispensing mechanism may include one or more teeth 5716. The actuator assembly, when present, may include motor 5720, shaft 5722, and gear 5724 mounted at one end of shaft 5722. Gear 5724 may be configured to engage with the one or more teeth 5716 forming a rack and pinion type arrangement. Rotation of shaft 5722 and gear 5724 in a clockwise or counter-clockwise direction may cause slider 5714 to move linearly in opposing directions A and B. Thus, for example, rotation of gear 5724 in one direction may cause slider 5714 to move from a left side towards a right side of
The disclosed systems may provide a simple way for a user to duplicate RFID key fobs using a key duplication kiosk generally available at a retail location without having to find and visit a specialized RFID key fob duplication location such as a vehicle dealership and/or a particular locksmith capable of duplicating RFID key fobs. Thus, the disclosed self-service kiosk may provide advantages such as increased user convenience for duplicating RFID key fobs at a retail location. Further, the disclosed kiosk may enhance the user experience and improve user convenience by dispensing a fully programmed duplicated RFID key fob inside of a key fob container, containing one or more codes retrieved from a master key fob. This reduces customer confusion and frustration, and increases sales without the need for added labor.
As illustrated in
At step 5910, display 4604 of kiosk 4600 may receive user input indicating the function of a key or other access device. The user of kiosk 4600 may be prompted via graphical user interface prompts to select what type of key or other access device he or she wishes to duplicate. Different combinations of options may be presented for any particular configuration of modules and subsystems of kiosk 4600 in a particular retail environment; see
In the example of process 5900, three potential options for duplication are illustrated. At step 5912, display 4604 may receive input that the user wishes to duplicate a brass (or aluminum, plastic, etc.) home or office key. At step 5914, display 4604 may receive input that the user wishes to duplicate an automobile or car key. And at step 5916, display 4604 may receive input that the user wishes to duplicate an RFID key fob. Each of these branches will be described in detail below.
If display 4604 receives input indicating that the user wishes to duplicate a home or office key, kiosk 4600 may execute subprocess A, which is exemplary process 6000 depicted in association with
At step 6005, key identification system 5700 may open the key insertion slot door via door assembly 5702. Next, at step 6010, key identification system 5700 may receive an existing, or “master” key via key insertion slot 4606/opening 4902. At step 6015, tip stop/guide 5102 provides tactile force to the tip of the master key by way of tip stop gantry 4712 and associated hardware and/or motors. Once the force indicates to the user and/or to the processors of kiosk 4600 that the insertion of the key is complete, at step 6020 key identification system 5700 may clamp the master key via clamp motor 4710 and associated hardware. Securing the master key before imaging increases the accuracy of the imaging and reduces the chances of misidentification and eventual miscuts.
Steps 6025-6055 involve imaging the existing/master key, as illustrated in
At steps 6035 and 6040, the process repeats for the other side of the key, if key identification system 5700 is so configured. At step 6045, lasers 4910 and 4912 are turned on, and then at step 6050 each laser assembly as illustrated in association with
Returning to process 5900 as depicted in
At step 5930, in some embodiments, kiosk 4600 proceeds to retrieve a key blank determined to be associated with the inserted master key via processors and associated hardware, including robots (see
Process 6100 begins at step 6110, where a prompt is generated by a processor of controller 4800 and displayed to a user of kiosk 4600 via display 4604 once the user has indicated that they wish to duplicate an automobile key. The display may prompt the user to enter a make, model, and/or year of an automobile associated with the automobile key that the user wishes to duplicate. Display 4604 may receive the input from the user at step 6120.
At step 6130, one or more processors associated with controller 4800 of kiosk 4600 may determine information about one or more keys and/or remote control devices associated with automobiles of the make, model, and year that were input by the user via display 4604. The information may vary based on the automobile. In some embodiments, the information may include whether the access device is a key versus an access control device; the shape and configuration of the device(s); and/or whether the device contains a transponder.
At step 6140, the processors of controller 4800 determine whether the access device for an automobile that the user wishes to duplicate has a transponder chip integrated within it. If yes, kiosk 4600 may execute subprocess C, which is exemplary process 6200 depicted in association with
At step 6210 of process 6200, kiosk 4600 determines, by one or more processors associated with controller 4800, whether or not the transponder-equipped automobile key has a blade. If yes, the process proceeds to step 6220. Controller 4800 may send a signal to open the door 4626 covering transponder reader 4610. At step 6230, the system may receive the bladed transponder key into transponder reader 4610. The user of kiosk 4600 may be guided by LEDs 4628, and/or prompts on display 4604.
At step 6240, controller 4800 may activate the transponder reader 4610, by generating an electromagnetic field. At step 6250, reader 4610 may query the transponder chip within the inserted key. At step 6260, reader 4610 and controller 4800 may determine a type of the transponder based on signals exchanged with the transponder chip. If the transponder chip is a fixed transponder (step 6264), controller 4800 may transmit information associated with the transponder chip to a remote server, such as server(s) 420, at step 6270 of process 6200.
As shown in
At step 6510, kiosk 4600 via controller 4800 may transmit key information, such as the type of key blank associated with the key, the type of transponder chip, the make/model/year of the automobile, etc. as well as customer information to a remote server, such as server(s) 420. The customer information may vary based on application or geographic location, but may include identifying information such as name, contact information, etc. See also subprocess E in association with
At step 6520, in some embodiments, key duplication equipment 6920 may retrieve the key information from server(s) 420. After retrieval, key duplication equipment 6920 and/or key technician 6910 may confirm and/or determine de novo a key blank associated with the user's key and the transmitted key information. At step 6530, key duplication equipment 6920 and/or key technician 6910 may retrieve the key blank.
Using the key information transmitted from kiosk 4600, one or more processors associated with key duplication equipment 6920 and/or key technician 6910 may determine cut geometry for the key blank to replicate the features of the blade of the user's key onto the key blank. In some embodiments, the cut geometry may be determined, for example, from image data sent by kiosk 4600 and key identification system 4700. In other embodiments, the cut geometry may be determined from a geometry profile, such as that illustrated in exemplary fashion in association with
At step 6560, key duplication equipment 6920 and/or key technician 6910 and/or server(s) 420 may proceed to verify whether the bladed transponder key has been correctly cut and/or cloned. This verification may comprise comparisons with the received key information, comparisons with databases, or other verification means known in the art. If no (step 6566), the process reverts back to step 6530 and a new key blank is retrieved and cut/programmed.
If the key blank is verified as correct (step 6564), then process 6500 proceeds to step 6570, whereby key duplication equipment 6920 and/or key technician 6910 retrieves the customer information from server(s) 420. The information may include a delivery address for the customer, such as the customer's home, the retail location of kiosk 4600, or another location. In other embodiments, the information may comprise contact information for the customer by telephone, social messaging, text messaging, SMS messaging, or email.
At step 6580, key duplication equipment 6920 and/or key technician 6910 provides the duplicated key back to the customer using the retrieved customer information. This may include shipping the key to the customer, to the retail location of kiosk 4600, or another location. Key duplication equipment 6920 and/or key technician 6910 may further send a notification to the customer via the means above to inform the customer that the key is in transit.
Returning to process 6200 (
At step 6605 of process 6600, kiosk 4600 via controller 4800 may transmit key information, such as the type of key blank associated with the key, the type of encrypted transponder chip, the make/model/year of the automobile, etc. as well as customer information to a remote scheduling server, such as server(s) 420 or a server associated with key technician 6910. Prior to sending the information, kiosk 4600 may decode, decrypt, or otherwise “crack” the encrypted transponder code via processors and software associated with transponder reader 4610, controller 4800, or an outside system. The customer information may vary based on application or geographic location, but may include identifying information such as name, contact information, etc. See also subprocess E in association with
At step 6610, customer information is retrieved from the remote scheduling server. Using the customer information, which may comprise contact information for the customer by telephone, social messaging, text messaging, SMS messaging, or email, the server and/or users thereto may contact the customer at step 6615 to set up an appointment with key technician 6910. Elements of systems 6900 or 7000 described below may then confirm the proper key blank model for the customer, be it a bladed transponder key with no buttons, a bladed transponder key with buttons, or a bladeless key fob that may include an associated sidewinder valet key. The proper key blank may be confirmed by comparison to databases, etc. by one or more associated processors. At step 6625, systems 6900 or 7000 may determine if the confirmed key blank model is available in inventory. If no (step 6626), the system proceeds to cancel the order (step 6627) and refund the customer (step 6629). If the blank is in inventory (step 6628), then the key blank is customized for the customer via key duplication equipment 6920 or other elements of systems 6900 or 7000 at step 6630. The system may then transmit the same key information and customer information received at step 6605 to a server associated with key technician 6910 (step 6635). Key technician 6910 may retrieve the key information (step 6640) and the customer information (step 6645) from the relevant server such as server(s) 420 via network 410.
At step 6650, key technician 6910 may contact the customer using the customer information and/or other information received from the scheduler and/or systems 6900 and 7000, and may proceed to meet the customer at an agreed physical location. At step 6655, key technician 6910 may program the already-customized key blank with the proper encrypted transponder code as received from kiosk 4600, using key duplication equipment 6920 or other equipment as needed. In some embodiments, the programming may need to occur at a known proximity from a processor associated with the customer's automobile. Finally, key technician 6910 may provide the programmed key to the customer.
Returning to exemplary process 6200 (
At step 6310 of process 6300, kiosk 4600 may display a prompt to the user via display 4604 and controller 4800 prompting the customer to place their bladeless automobile key in an imaging area. The user may be guided in this process by visual prompts, audio prompts, or lights associated with housing 4602 and/or window 4612.
At step 6320, kiosk 4600 may receive the user's key at an imaging location proximal to camera 4614. Camera 4614, via controller 4800, may proceed to capture one or more images of the user's key sufficient to inform components of systems 6900/7000 (such as key technician 6910) of a proper key blank. Kiosk 4600 may then execute subprocess E, which is exemplary process 6400 depicted in association with
Subprocess E/process 6400 will be described in an exemplary fashion as being performed by kiosk 4600, but other equipment may be used in alternative embodiments, such as elements of systems 6900/7000.
At step 6410, kiosk 4600 may prompt the user of the self-service kiosk to enter customer information via display 4604. As discussed above, this may include location information for the customer, contact information, etc. The input may be received from the customer via display 4604 at step 6420.
Based on the user input and information determined about the user's key, controller 4800 may proceed to determine pricing information (step 6430), i.e. a final price for the order inclusive of tax, order quantity, and/or discounts, and determine shipping information (step 6440), i.e. the cost of shipping the key(s) to the user based on the input customer information. Once determined, controller 4800 may display the pricing and shipping information to the customer via display 4604 (step 6450). Kiosk 4600 may determine whether the customer wishes to complete the order (step 6460). If no (step 6462), determined either by an affirmative declining of the transaction by the user via display 4604, or by a timing out of the response as gauged by controller 4800, the order terminates and is cancelled.
If the user does agree via input on display 4604 to proceed (step 6464), then kiosk 4600 may receive payment for the transaction, such as through payment receptacle 4608 (step 6470).
Returning to step 6140 of process 6100 (
Returning to step 5910 of process 5900 (
As an initial matter, kiosk 4600 may determine via controller 4800 whether kiosk 4600 is configured to duplicate RFID key fobs, and/or if key fob reader 4616 is enabled and working properly (step 6710). If no (step 6712), the process terminates and no further options for duplicating the RFID fob are offered (step 6714). Information to that effect may be displayed to the user via display 4604.
If kiosk 4600 is able to duplicate fobs (step 6718), then further options for the duplication may be presented to the user via display 4604 (step 6720). Display 4604 may receive input from a user regarding copying a fob (step 6730). In some embodiments, the input may comprise a type, shape, or color, etc. of RFID fob to be duplicated, or may comprise a desired quantity.
At step 6740, kiosk 4600 may display a command or other instructions to the user to place their master RFID key fob in key fob reader 4616. The instructions may appear on display 4604, or otherwise be communicated to the user by audio prompts or lights associated with housing 4602 or window 4612. While displaying the instructions, kiosk 4600 may activate key fob reader 4616 and its included antenna via controller 4800 (step 6750).
RFID key fob reader 4616 may receive the user's master RFID fob in proximity of its included antenna (step 6760) and interrogate/scan the fob using the antenna (step 6770). If the data, information, or other code contained within the RFID fob indicates at step 6780 that the fob cannot be copied, RFID key fob reader 4616 may repeat the scan one or more times (step 6784). If the RFID fob duplication process continues to fail via fob reader 4616, then kiosk 4600 may display a prompt to the user via display 4604 or other audio means that the fob cannot be copied and should be removed from fob reader 4616 (step 6786).
If the user's RFID key fob can be duplicated based on the scanned information (step 6788), then kiosk 4600 may execute subprocess I, which is exemplary process 6800 depicted in association with
At steps 6810 and 6820, if not previously completed or if it is desired to reiterate/revisit, kiosk 4600 may receive input from the user regarding the type and quantity of fobs to be duplicated. As discussed above in association with
At step 6830, kiosk 4600 may display pricing information on display 4604 based on the user's selections at steps 6810 and 6820, and then kiosk 4600 may receive payment for the RFID fob duplication task. In some embodiments, payment may be received at payment receptacle 4608; in other embodiments, payment may be received digitally, such as by or on the user's mobile device, or may be received at the retail location's point of sale. In these embodiments, kiosk 4600 may be configured to present the user with a receipt, barcode, QR code, etc. to take to the point of sale. Kiosk 4800 may display a notification to remove the original RFID fob (step 6840) to ensure that the user does not accidentally leave the fob on fob reader 4616.
At step 6850, kiosk 4600 determines, via controller 4800, the magazine 5706 containing RFID key fob containers 5704 containing the blank RFID fob type desired by the user. Once determined, fob dispenser 4620 and/or associated hardware, such as that described above in association with
At step 6870, kiosk 4600 and associated RFID key fob duplication hardware as described above may write the blank key fob 5808 with the data/information/code scanned from the master RFID fob. The writing process may take place while fob 5808 remains inside of RFID key fob container 5704.
At step 6880, antenna 5712 may be configured to verify whether the blank RFID fob 5808 was correctly written. If no (step 6882), the system may retry the writing process as discussed above (step 6884). If the verification continues to fail, kiosk 4600 may be configured via controller 4800, display 4604, and antenna 4622, etc., to seek outside assistance, be it a store employee or a remotely located customer service representative (step 6886).
If antenna 5712 verifies that the blank RFID fob 5808 was correctly written with the data/information/code of the master key, then kiosk 4600 may dispense the fob to the user via RFID fob dispenser 4620 (step 6890). In some embodiments, the duplicated fob may remain in the key fob container 5702, which the user may take with them along with the fob and an included key ring 5806.
As discussed above, network 410 may include any combination of communications networks. For example, network 410 may include the Internet and/or any type of wide area network, an intranet, a metropolitan area network, a local area network (LAN), a wireless network, a cellular communications network, or Wi-Fi, WiMAX, Bluetooth or other communication protocol, etc.
Server(s) 420 may include one or more servers configured to communicate and interact with kiosk 4600, key technician 6910, and/or key duplicating equipment 6920. Server(s) 420 may be a general purpose computer, a mainframe computer, or any combination of these components. In certain exemplary embodiments, server(s) 420 may be a standalone computing system or apparatus, or it may be part of a subsystem, which may be part of a larger system. For example, server(s) 420 may represent distributed servers that are remotely located and communicate over a communications medium (e.g., network 410) or over a dedicated network, for example, a LAN. Server(s) 420 may be implemented as a server, a server system comprising a plurality of servers, or a server farm comprising a load balancing system and a plurality of servers. Server(s) 420 may be configured to receive one or more images or other data, including geometric data, milling geometry information, or cut geometry information, from kiosk 4600. Server(s) 420 may also be configured to determine a bitting pattern or other geometric information of the key associated with the images received from kiosk 4600.
In some embodiments, server 420 may access one or more databases configured to store instructions and/or data associating vehicle information such as VIN number, make, model, driver's license number, vehicle title information, license plate information, etc., with a bitting pattern for a key associated with the vehicle information. Although server 420 has been illustrated in
Server 420 may also be configured in some embodiments to transmit geometric information, key codes, instructions, and/or commands to one or more of key technician 6910 and/or key duplication equipment 6920 to manufacture a duplicate key. In one exemplary embodiment, server 420 may display instructions to allow an operator (in some embodiments, key technician 6910) to select an appropriate key blank and insert the selected key blank into key duplication equipment 6920. Key duplication equipment 6920 may be configured in various embodiments with one or more cutting devices (e.g., edge milling cutters, side milling cutters, drills, saws, laser cutters, etc.). Key duplication equipment 6920 may also be configured to cut notches, for example, 24, 44, or 64 in key shank 12, 32, or 52 based on instructions received from server 420. It is also contemplated that in some embodiments, key duplication equipment 6920 may be configured to retrieve instructions for cutting notches, for example, 24, 44, or 64 in key shank 12, 32, or 52 from a database based on instructions received, for example, from server 420.
In other embodiments, kiosk 4600 may include an automobile key identification module 7130, which may also be configured to execute all or some of processes such as processes 6100, 6200, and/or 6300 described above. In still other embodiments, kiosk 4600 may include an automobile key duplication module 7140, which may also be configured to execute all or some of processes such as processes 6100, 6200, 6300, 6400, 6500, and/or 6600 described above.
In other embodiments, kiosk 4600 may include an RFID fob identification module 7150 and/or an RFID fob duplication module 7160, which may each be configured to execute all or some of processes such as processes 6700 and 6800 described above.
In still other embodiments, kiosk 4600 may include a generalized object identification module 7170 and/or a generalized object duplication module 7180 to duplicate any or all of the access devices described above or others that may be contemplated by those skilled in the art, such as rare keys, dimple keys, angled bit keys, etc.
In some embodiments, kiosk 4600 may include an automatic configuration management module 7190, which may interface with and/or include controller 4800 for purposes of controlling and coordinating object identification and duplication.
At step 7210, kiosk 4600 may receive input from the user, via display 4604 or other means, indicating that the original key or access device is absent. After receiving the input, kiosk 4600 via controller 4800 may retrieve stored information, either from a user entry saved on server(s) 420 or from a database (step 7220). In some embodiments, for example, controller 4800 and associated processors may be configured to determine transponder code information or milling geometry information for a sidewinder automobile key based on a VIN (vehicle identification number) of the vehicle.
At step 7230, controller 4800 and/or server(s) 420 may confirm an appropriate key blank or other blank associated with the absent access device, i.e. a key blank, an unprogrammed remote control device, or a blank RFID fob. Once determined, controller 4800 may determine pricing and shipping information, and may be configured to display that information to the user via display 4604. Kiosk 4600 may then receive payment (step 7240) as discussed above via payment receptable 4608, or other known means.
Controller 4800 may then determine whether the appropriate blank item is stored inside of housing 4602 of kiosk 4600. If no (step 7252), then controller 4800 may display information to that effect to the user via display 4604 and may proceed to coordinate remote duplication of the blank device via other elements of system 6900/7000, such as a different kiosk 4600, a key technician 6910, or key duplication equipment 6920 (step 7255).
If the blank device is located within housing 4602 (step 7254), then controller 4800 and associated robots, motors, and other hardware may retrieve the determined appropriate blank device (step 7260), and clamp and/or align it within the relevant module hardware as appropriate for the device (step 7270).
At step 7280, the duplicate is made, and at step 7290, the duplicate is provided to the user through housing 4602. Although these steps are exemplified with “keys” from homes, offices, or automobiles, in other embodiments other access devices like RFID key fobs or key cards may be duplicated and dispensed to the user if the kiosk is so equipped. Those of skill in the art will be able to contemplate various access devices that can be duplicated without the original device present using kiosk 4600 or other elements of systems 6900/7000.
The disclosed object identification and duplication systems and methods provide a simple, one-stop place for a user to duplicate nearly every type of access device by themselves with no training and without having to find and visit a specialized key duplication location such as a vehicle dealership and/or a particular locksmith. Particularly for automotive keys, the clamping of the existing key, the ability to decode the transponder at the kiosk, and the ability to verify the identity and fidelity of a remote control device for newer cars represents clear advantages over the prior art and promotes increased accuracy, fewer miscuts and misduplications, and less waste. Furthermore, the disclosed object identification and duplication systems may allow retail locations to offer lucrative access control device duplication services without having to store a large inventory at the retail location and without having to dedicate additional labor. Thus, the disclosed system may provide advantages such as increased user convenience, better quality duplicates, and reduced storage space requirements and inventory costs for the retail location.
It will be apparent to those skilled in the art that various modifications and variations can be made to the disclosed object identification and duplication systems and methods. Other embodiments will be apparent to those skilled in the art from consideration of the specification and practice of the disclosed systems and methods. It is intended that the specification and examples be considered as exemplary only, with a true scope being indicated by the following claims and their equivalents.
This application claims the benefit of priority to U.S. Provisional Patent Application No. 63/260,208, filed Aug. 12, 2021, the contents of which are expressly incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
63260208 | Aug 2021 | US |