[go: up one dir, main page]

CN108140126A - High security key scanning system - Google Patents

High security key scanning system Download PDF

Info

Publication number
CN108140126A
CN108140126A CN201680057803.8A CN201680057803A CN108140126A CN 108140126 A CN108140126 A CN 108140126A CN 201680057803 A CN201680057803 A CN 201680057803A CN 108140126 A CN108140126 A CN 108140126A
Authority
CN
China
Prior art keywords
key
high security
master key
blade
scanning system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201680057803.8A
Other languages
Chinese (zh)
Inventor
威廉·R·马奇
托马斯·F·菲奥里
兰德尔·A·波拉斯
切斯特·O·D·汤普森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sea Ke Products Co
Original Assignee
Sea Ke Products Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sea Ke Products Co filed Critical Sea Ke Products Co
Priority claimed from PCT/US2016/045367 external-priority patent/WO2017024043A1/en
Publication of CN108140126A publication Critical patent/CN108140126A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/66Trinkets, e.g. shirt buttons or jewellery items
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C3/00Milling particular work; Special milling operations; Machines therefor
    • B23C3/28Grooving workpieces
    • B23C3/35Milling grooves in keys
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/141Control of illumination
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/145Illumination specially adapted for pattern recognition, e.g. using gratings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/56Cameras or camera modules comprising electronic image sensors; Control thereof provided with illuminating means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C2235/00Details of milling keys
    • B23C2235/41Scanning systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23PMETAL-WORKING NOT OTHERWISE PROVIDED FOR; COMBINED OPERATIONS; UNIVERSAL MACHINE TOOLS
    • B23P15/00Making specific metal objects by operations not covered by a single other subclass or a group in this subclass
    • B23P15/005Making specific metal objects by operations not covered by a single other subclass or a group in this subclass keys
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/16Image acquisition using multiple overlapping images; Image stitching

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Mechanical Engineering (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Provide a kind of high safety key scanning system and method.The scanning system can include being configured to determine that the information of main high security key and the sensing device further of feature and analyze the information of master key and the Digital Logic of feature.Sensing device further can be configured as the information for the geometry for capturing the feature about incision in master key surface.Logic can analyze the information in relation to the geometry, and its known feature with the high security key pattern is compared, to determine that the data needed for this feature are replicated on new high security key billet.The system can be configured as carrys out catch surface geometry using camera or other imaging devices.The system can capture desired feature using object coating technology, irradiation technique, filtering technique, image processing techniques and Feature Extraction Technology.

Description

高安全性钥匙扫描系统High security key scanning system

相关申请的交叉引用Cross References to Related Applications

此申请要求于2016年8月3日提交的题为“High Security Key Scanning System”的美国发明申请号15/227,619和于2015年8月3日提交的题为“High Security KeyScanning System”的美国临时专利申请号62/200208的优先权,通过整体引用将其并入本文。This application claims U.S. Invention Application No. 15/227,619, filed August 3, 2016, entitled "High Security Key Scanning System" and U.S. Provisional Application No. 15/227,619, filed August 3, 2015, entitled "High Security Key Scanning Priority of Patent Application No. 62/200208, which is hereby incorporated by reference in its entirety.

技术领域technical field

此发明一般地涉及用于对钥匙进行复制的仪器和方法,并且更具体地,此发明涉及用于利用电子器件来读取切入到钥匙(诸如高安全性钥匙)的刃的表面中的独特特征并可选地将该数据提供至钥匙复制机器的仪器和方法。This invention relates generally to apparatus and methods for duplicating keys and, more particularly, to utilizing electronics to read a unique feature cut into the surface of the blade of a key, such as a high security key And optionally provide this data to the apparatus and method of the key duplication machine.

背景技术Background technique

用于标准单侧钥匙和双侧钥匙的钥匙复制技术是众所周知的。通常,利用本领域中已知的任何数目的不同系统将待复制的钥匙(主钥匙)复制在适当识别出的钥匙坯上。然而,存在广泛范围的高安全性锁具和钥匙类型,其中,锁具被特别设计为难以捅开,并且钥匙被特别设计为难以复制。由此,用于复制高安全性钥匙的过程通常相当复杂,并且需要昂贵且复杂的钥匙切削装备。此外,高安全性钥匙的成功复制通常要求高精确度,以便正确地操作锁具。因为所有的这些约束,高安全性钥匙的成功复制通常还要求训练有素且经验丰富的人员诸如锁匠。Key duplication techniques for standard single-sided keys and double-sided keys are well known. Typically, the key to be duplicated (the master key) is duplicated on an appropriately identified key blank using any number of different systems known in the art. However, there is a wide range of high security locks and key types, where the locks are specifically designed to be difficult to break and the keys are specifically designed to be difficult to duplicate. As such, the process for duplicating high security keys is often quite complex and requires expensive and complex key cutting equipment. Furthermore, successful duplication of high security keys typically requires high precision in order to properly operate the lock. Because of all of these constraints, successful duplication of high security keys also typically requires highly trained and experienced personnel such as locksmiths.

存在许多不同类型的高安全性锁具和钥匙。例如,有些要求刃中的齿切削以不同复合角度来切削。这些成角度的切削使得在标准钥匙复制装备上的复制不太可能。高安全性钥匙的其他类型包括切入到钥匙刃中的并不完全穿透钥匙刃的独特表面特征(诸如内部切削、响尾蛇(sidewinder,也称为激光切削)、浅凹)和侧杆钥匙。再次,此类切削使得在标准钥匙复制装备上的复制不太可能。另一些类型的高安全性钥匙利用电子应答器来验证钥匙。此类电子器件要求专用装备来读取和复制应答器功能。还存在利用非标准刃几何形状(诸如十字形或管状)和其他独特刃样式类型的高安全性钥匙。这些钥匙的几何形状和切削样式全都要求专用的复制装备。存在所有这些类型及其他类型的高安全性锁具及钥匙的许多变型,因为多年来其由许多不同锁具制造商生产。有些甚至利用不止一种类型的高安全性特征,以便宣称更高级别的安全性。There are many different types of high security locks and keys. For example, some require that the tooth cuts in the blade be cut at different compound angles. These angled cuts make duplication on standard key duplication rigs unlikely. Other types of high security keys include unique surface features cut into the key blade that do not completely penetrate the key blade (such as internal cutting, sidewinder (also known as laser cutting), dimples) and sidebar keys. Again, such chipping makes duplication on standard key duplication equipment unlikely. Other types of high security keys utilize electronic transponders to authenticate the keys. Such electronics require specialized equipment to read and replicate transponder functions. There are also high security keys that utilize non-standard blade geometries, such as cross or tubular, and other unique blade style types. The geometry and cutting pattern of these keys all require dedicated reproduction equipment. There are many variations of all of these types of high security locks and keys, and others, as they have been produced by many different lock manufacturers over the years. Some even utilize more than one type of high security feature in order to claim a higher level of security.

由于复杂性、广泛范围的昂贵复制装备以及需要深入经验和知识的所有这些,高安全性钥匙的复制已被主要局限于锁匠市场。由于这些同样的原因,提供零售钥匙切削服务的其他商店(诸如五金商店、家居装修商店和汽车零配件商店)不能够提供这些服务。降低装备的成本并且降低复制高安全性钥匙所需技能水平的系统对于零售钥匙复制行业来说将非常有价值。The duplication of high security keys has been largely limited to the locksmith market due to the complexity, the extensive range of expensive duplication equipment and all this requiring in-depth experience and knowledge. For these same reasons, other stores that offer retail key cutting services, such as hardware stores, home improvement stores, and auto parts stores, are not able to provide these services. A system that reduces the cost of equipment and reduces the level of skill required to duplicate high security keys would be very valuable to the retail key duplication industry.

发明内容Contents of the invention

提供了一种高安全性钥匙扫描系统。该扫描系统包括被配置为确定主高安全性钥匙的信息和特点的感测装置和分析主钥匙的信息和特点的数字逻辑(logic)。感测装置可以被配置为捕捉关于切入到主钥匙表面中的特征的几何形状的信息。所述逻辑可以分析有关该几何形状的信息并将其与该高安全性钥匙的样式的已知特点进行比较,以便确定在新的高安全性钥匙坯上复制该特征所需的数据。A high security key scanning system is provided. The scanning system includes a sensing device configured to determine information and characteristics of the master high security key and digital logic to analyze the information and characteristics of the master key. The sensing device may be configured to capture information about the geometry of features cut into the face of the master key. The logic can analyze information about the geometry and compare it to known characteristics of the style of the high security key to determine the data needed to replicate the characteristic on a new high security key blank.

在实施例中,该系统可以被配置为使用成像系统(诸如照相机或其他成像装置)测量表面几何形状。该系统可以利用对象涂层技术、照射技术、滤波技术、图像处理技术以及特征提取技术来测量期望的特征。In an embodiment, the system may be configured to measure surface geometry using an imaging system such as a camera or other imaging device. The system can utilize object coating techniques, illumination techniques, filtering techniques, image processing techniques, and feature extraction techniques to measure desired features.

在一个实施例中,如图所示,提供了一种高安全性钥匙扫描系统,其包括被配置为捕捉高安全性主钥匙的刃的第一侧面的部分的至少一个图像的成像装置。第一光源可以被定位为以第一角度引导光朝向成像位置处的高安全性主钥匙的所述刃的第一侧面。第二光源可以被定位为以第二角度引导光朝向成像位置处的高安全性主钥匙的所述刃的第一侧面,其中,所述被捕捉的图像揭示了形成在所述刃的至少一部分的面部中的表面特征。逻辑可以被配置为分析所述至少一个被捕捉的图像,以确定所述表面特征的特点。逻辑还可以将所述表面特征的所述特点与已知锁具样式的切削代码数据进行比较。该切削代码数据可以包括间隔尺寸和切削位置中的至少一个。该逻辑可以确定所述高安全性主钥匙的至少一个切削位置或至少一个切削代码。切削位置或所述切削代码可以被用于从钥匙坯复制出高安全性钥匙。高安全性主钥匙可以是响尾蛇钥匙。第一光源和第二光源可以被控制为单独被开启和关闭,以将光引导到高安全性主钥匙的表面上。成像装置可以捕捉各自来自不同照射场景的高安全性主钥匙的多个图像。In one embodiment, as shown, there is provided a high security key scanning system comprising an imaging device configured to capture at least one image of a portion of a first side of a blade of a high security master key. The first light source may be positioned to direct light at a first angle towards the first side of the blade of the high security master key at the imaging location. A second light source may be positioned to direct light at a second angle towards the first side of the blade of the high security master key at an imaging location, wherein the captured image reveals at least a portion formed on the blade surface features in the face. Logic may be configured to analyze the at least one captured image to determine characteristics of the surface features. The logic may also compare the characteristics of the surface features to cut code data for known lock styles. The cutting code data may include at least one of a spacing dimension and a cutting location. The logic may determine at least one cutting location or at least one cutting code of the high security master key. Cutting locations or said cutting codes can be used to copy high security keys from key blanks. The high security master key can be a Rattlesnake key. The first light source and the second light source may be controlled to be turned on and off individually to direct light onto the face of the high security master key. The imaging device may capture multiple images of the high security master key, each from a different illumination scene.

背光灯可以被定位为引导光朝向与高安全性钥匙的刃的第一侧面相对的第二侧面,该背光灯可以被配置用于与逻辑一起使用,该逻辑用于确定以下中的一个或多个:识别主钥匙类型、验证主钥匙是否固定以及确定主钥匙的取向。第一光源和第二光源中的至少一个可以引导准直光朝向成像位置。高安全性钥匙可以包括被形成在所述高安全性主钥匙的所述刃上的纹路(pathway)。该逻辑可以分析所述表面特征的所述特点,以便确定在所述主钥匙表面上形成的纹路。经确定的形成的纹路可以被用于在钥匙坯上复制高安全性主钥匙。A backlight may be positioned to direct light toward a second side opposite the first side of the blade of the high security key, the backlight may be configured for use with logic for determining one or more of One: Identify the master key type, verify that the master key is secured, and determine the orientation of the master key. At least one of the first light source and the second light source can direct collimated light toward the imaging location. The high security key may include a pathway formed on the blade of the high security master key. The logic may analyze the characteristics of the surface features to determine the texture formed on the surface of the master key. The determined pattern formed can be used to reproduce the high-security master key on the key blank.

在一个实施例中,第三光源可以被定位为以第三角度引导光朝向成像位置处的高安全性主钥匙的所述刃的第一侧面,并且第四光源可以被定位为以第四角度引导光朝向成像位置处的高安全性主钥匙的所述刃的第一侧面。第一角度、第二角度、第三角度和第四角度相对于成像位置的水平轴线可以不相同。In one embodiment, the third light source may be positioned to direct light at a third angle towards the first side of the blade of the high security master key at the imaging location and the fourth light source may be positioned to direct light at a fourth angle Light is directed toward the first side of the blade of the high security master key at the imaging location. The first angle, the second angle, the third angle and the fourth angle may be different relative to the horizontal axis of the imaging location.

在如图所示的另一实施例中,提供了一种用于扫描高安全性主钥匙的方法,所述方法包括从第一角度照射被形成在所述高安全性主钥匙的刃的第一侧面上的表面特征。可以从第二角度照射被形成在所述高安全性主钥匙的所述刃的第一侧面上的表面特征,第一角度和第二角度相对于水平成像位置轴线可以不相同。可以捕捉所述高安全性主钥匙的刃的被照射表面的一部分的至少一个图像。可以确定所述表面特征的特点。可以将所述表面特征的特点与已知锁具样式的切削代码数据进行比较。可以确定用于所述主钥匙的至少一个切削代码。可以利用所述至少一个切削代码来复制所述主钥匙。In another embodiment as shown in the figures, there is provided a method for scanning a high security master key, the method comprising illuminating a first angle formed on a blade of the high security master key from a first angle. Surface features on one side. The surface features formed on the first side of the blade of the high security master key may be illuminated from a second angle, the first angle and the second angle may be different relative to the horizontal imaging position axis. At least one image of a portion of an illuminated surface of a blade of the high security master key may be captured. The surface features can be characterized. The characteristics of the surface features can be compared to cut code data for known lock styles. At least one cutting code for the master key may be determined. The master key may be duplicated with the at least one cutting code.

在一个实施例中,从第一角度照射表面特征的步骤可以由第一光源来提供,并且从第二角度照射表面特征的步骤可以由第二光源来提供,其中,所述第一光源和第二光源在捕捉至少一个图像之前被控制为开启或关闭,以创建不同的照射角度。可以捕捉各自具有不同照射场景的多个图像。可以用逻辑来确定表面特征,该逻辑被配置为分析具有所述不同照射场景的多个图像。表面特征可以包括被形成在主钥匙的所述刃上的纹路。可以将所述表面特征的特点与已知锁具样式的切削位置数据进行比较。至少一个切削位置可以被确定用于所述主钥匙。切削位置可以由物理测量值来表示,该测量值由逻辑来确定。可以通过使用所述测量值来复制高安全性主钥匙。可以分析所述表面特征的特点,以便测量所述高安全性主钥匙的表面上形成的纹路。可以通过使用所述测量值来复制所述高安全性主钥匙。背光照明可以被用于照射高安全性主钥匙,并且可以识别与高安全性主钥匙相关联的合适的钥匙坯。In one embodiment, the step of illuminating surface features from a first angle may be provided by a first light source and the step of illuminating surface features from a second angle may be provided by a second light source, wherein the first light source and the second light source Two light sources are controlled to be on or off before capturing at least one image to create different illumination angles. Multiple images may be captured, each with a different illumination scene. The surface characteristics may be determined with logic configured to analyze a plurality of images of said different illumination scenarios. The surface feature may comprise a texture formed on said blade of the master key. The characteristics of the surface features can be compared to cut location data for known lock styles. At least one cutting location may be determined for the master key. Cutting locations may be represented by physical measurements that are determined by logic. A high security master key can be duplicated by using said measurements. The characteristics of the surface features may be analyzed to measure the texture formed on the surface of the high security master key. The high security master key can be duplicated by using the measured value. Backlighting can be used to illuminate the high security master key and can identify the appropriate key blank associated with the high security master key.

附图说明Description of drawings

通过参考结合下面图示理解的下面的详细描述,可以更好地理解本发明的目的和优点以及本发明的操作,其中:The objects and advantages of the invention, as well as the operation of the invention, may be better understood by referring to the following detailed description read in conjunction with the following illustrations, wherein:

图1示出了利用传统钥匙复制装备的标准切削钥匙的示例;Figure 1 shows an example of a standard cut key equipped with conventional key duplication;

图2示出了利用切入到刃表面中的特征的高安全性钥匙的示例;Figure 2 shows an example of a high security key utilizing features cut into the blade surface;

图3示出了典型内部切削的高安全性钥匙的示例,并且突显了待测量的几何形状;Figure 3 shows an example of a typical internally cut high security key and highlights the geometry to be measured;

图4A是扫描系统的实施例的分解的后透视图,该扫描系统被配置为捕捉切入到高安全性钥匙刃表面中的特征的形状的图像;4A is an exploded rear perspective view of an embodiment of a scanning system configured to capture images of the shape of features cut into the surface of a high security key blade;

图4B是图4A的扫描系统的分解前透视图,该扫描系统被配置为捕捉切入到高安全性钥匙刃表面中的特征的形状的图像;4B is an exploded front perspective view of the scanning system of FIG. 4A configured to capture images of the shape of features cut into the surface of the high security key blade;

图5是扫描系统的实施例的透视图,其中,可以利用对象涂层技术来减少高安全性钥匙刃表面上的光谱反射(spectral reflection);Figure 5 is a perspective view of an embodiment of a scanning system in which object coating techniques can be utilized to reduce spectral reflection on the surface of a high security key blade;

图6A示出了用未使用准直照明的照射技术成像的高安全性钥匙刃的俯视图;Figure 6A shows a top view of a high security keyblade imaged with an illumination technique that does not use collimated illumination;

图6B示出了图6A的高安全性钥匙刃的俯视图,其已经利用了使用来自被用于使切入到高安全性钥匙刃表面中的特征的形状突显的第一角度的准直照明的照射技术成像;6B shows a top view of the high security keyblade of FIG. 6A that has been utilized with illumination using collimated illumination from a first angle used to accentuate the shape of features cut into the surface of the high security keyblade technical imaging;

图6C示出了图6A和图6B的高安全性钥匙刃的俯视图,其已经利用了使用来自被用于使切入到高安全性钥匙刃表面中的特征的形状突显的第二角度的准直照明的照射技术成像;Figure 6C shows a top view of the high security key blade of Figures 6A and 6B, which has been utilized using collimation from a second angle used to accentuate the shape of features cut into the surface of the high security key blade Illumination technology imaging;

图7A是扫描系统的透视图,其中可以利用多个光源来收集多组被照射的图像;7A is a perspective view of a scanning system in which multiple light sources can be utilized to collect multiple sets of illuminated images;

图7B是图7A的扫描系统的示意图,其示出了相对于公共轴线的多个光源;7B is a schematic diagram of the scanning system of FIG. 7A showing multiple light sources relative to a common axis;

图8是扫描系统的分解透视图,其中可以利用诸如偏振的滤波技术来突显切入到钥匙刃表面中的特征的形状;8 is an exploded perspective view of a scanning system where filtering techniques such as polarization can be utilized to accentuate the shape of features cut into the keyblade surface;

图9A示出了未应用图像处理技术而成像的高安全性钥匙刃的俯视图;Figure 9A shows a top view of a high security keyblade imaged without the application of image processing techniques;

图9B示出了用图像处理技术成像的图9A的高安全性钥匙刃的俯视图,其中,利用阈值级别(threshold level)来突显切入到刃的表面的特征形状;Figure 9B shows a top view of the high security key blade of Figure 9A imaged using image processing techniques, wherein a threshold level is utilized to highlight the shape of features cut into the surface of the blade;

图10示出了用诸如边缘检测的特征提取技术成像的高安全性钥匙刃的俯视图,可以利用该特征提取技术来突显切入到刃的表面中的特征的形状;Figure 10 shows a top view of a high security key blade imaged with a feature extraction technique such as edge detection, which can be utilized to highlight the shape of features cut into the surface of the blade;

图11是钥匙扫描机器的实施例的透视图,该钥匙扫描机器被配置为捕捉切入到刃的表面中的特征的形状的图像;11 is a perspective view of an embodiment of a key scanning machine configured to capture images of the shape of features cut into the surface of the blade;

图12A示出了具有集成的扫描系统的钥匙复制机器的透视图,该集成的扫描系统被配置为捕捉被形成在高安全性钥匙刃表面中的特征的形状的图像,并且在钥匙坯上复制该钥匙形状;Figure 12A shows a perspective view of a key duplication machine with an integrated scanning system configured to capture images of the shape of features formed in the high security key blade surface and replicated on the key blank the shape of the key;

图12B示出了具有集成的扫描系统的钥匙复制机器的局部透视图,该集成的扫描系统被配置为捕捉被形成在高安全性钥匙刃表面中的特征的形状的图像,并且在钥匙坯上复制该钥匙形状;Figure 12B shows a partial perspective view of a key duplicating machine with an integrated scanning system configured to capture images of the shape of features formed in the high security key blade surface, and on the key blank Copy the key shape;

图12C示出了具有集成的扫描系统的钥匙复制机器的透视图,该集成的扫描系统被配置为捕捉被形成在高安全性钥匙刃表面中的特征的形状的图像,并且在钥匙坯上复制该钥匙形状;以及Figure 12C shows a perspective view of a key duplication machine with an integrated scanning system configured to capture images of the shape of features formed in the high security key blade surface and replicated on the key blank the shape of the key; and

图13是示出了用于利用电子器件来读取切入到钥匙(诸如高安全性钥匙)的刃表面中的独特特征并将该数据提供给钥匙复制机器的方法的实施例的流程图。Figure 13 is a flow chart illustrating an embodiment of a method for utilizing electronics to read a unique feature cut into the blade surface of a key, such as a high security key, and provide this data to a key duplication machine.

具体实施方式Detailed ways

现在将详细参考本发明的示例性实施例,在附图中示出了其示例。要理解的是,可以利用其它实施例,并且可以在不脱离本发明的相应范围的情况下可以进行结构和功能的改变。Reference will now be made in detail to the exemplary embodiments of the present invention, examples of which are illustrated in the accompanying drawings. It is to be understood that other embodiments may be utilized and structural and functional changes may be made without departing from the corresponding scope of the present invention.

提供了一种用于扫描所提供的高安全性类型钥匙的表面特征的系统100和方法。该系统分析待复制的高安全性主钥匙(诸如,高安全性房屋钥匙、高安全性车钥匙或其他高安全性钥匙),并且确定将该钥匙的特征复制到高安全性钥匙坯(blank)上所需的适当的数据。本文所描述的系统和方法可以被单独使用以扫描高安全性钥匙,或者可以与其他系统结合使用以复制高安全性钥匙。A system 100 and method for scanning surface features of supplied high security type keys is provided. The system analyzes a high security master key to be copied (such as a high security house key, a high security car key, or other high security key) and determines the characteristics of the key to be copied to a high security key blank Appropriate data required on the . The systems and methods described herein can be used alone to scan high security keys, or can be used in conjunction with other systems to replicate high security keys.

图1示出了具有围绕钥匙刃(key blade)的外部外形(profile)形成的齿(bitting)的标准钥匙50。图2示出了高安全性类型钥匙200的各种实施例,其中,这种系统和方法能够扫描、成像和复制。显然,该系统和方法还可以被用于扫描标准钥匙的表面。在优选的实施例中,扫描系统分析被形成在主钥匙200的刃206的面部204中的表面特征202的特点(图2)。表面特征202可以包括在刃的面部的中间向下形成的纹路(pathway)、在刃的面部的一个边缘附近形成的单个纹路、在刃的面部的边缘附近形成的一对相对的纹路、在刃的面部中形成的浅凹(dimple)、在刃的面部中形成的凹口(notch)、或者在刃的面部中形成或另外成形的与对应锁具的部件相接合的其他几何特征。“形成的纹路”可以包括在刃的面部的中间向下形成的纹路、在刃的面部上形成的单个纹路、在刃的面部的边缘附近形成的一对相对的纹路。这些特征可以存在于刃的仅一个侧面上,或者可以存在于刃的两个侧面上。被形成在高安全性钥匙刃一个面部或两个面部中的轮廓(contour)的外形被构造为与可以是独特构造的关联锁具的安全性部件相配合。一旦高安全性钥匙与锁具的安全性特征相接合,则钥匙头可以被转动以缩回诸如螺栓(bolt)的安全性特征。图3示出了几何外形230的实施例,几何外形230具有被形成在将由所公开的系统测量/扫描的主钥匙的刃206的面部204中的表面特征202。Figure 1 shows a standard key 50 with bitting formed around the outer profile of the key blade. Figure 2 illustrates various embodiments of a high security type key 200 in which such systems and methods are capable of scanning, imaging and duplication. Obviously, the system and method can also be used to scan the face of a standard key. In a preferred embodiment, the scanning system analyzes the characteristics of the surface features 202 formed in the face 204 of the blade 206 of the master key 200 (FIG. 2). Surface features 202 may include a pathway formed down the middle of the face of the blade, a single pathway formed near one edge of the face of the blade, a pair of opposing pathways formed near the edge of the face of the blade, Dimples formed in the face of the blade, notches formed in the face of the blade, or other geometric features formed or otherwise shaped in the face of the blade to engage with components of a corresponding lock. "Formed grains" may include grains formed down the middle of the face of the blade, a single grain formed on the face of the blade, a pair of opposing grains formed near the edge of the face of the blade. These features may be present on only one side of the blade, or may be present on both sides of the blade. The contours formed in one or both faces of the high security keyblade are contoured to mate with security components of an associated lockset, which may be uniquely configured. Once the high security key is engaged with the security feature of the lock, the key head can be turned to retract the security feature, such as a bolt. FIG. 3 illustrates an embodiment of a geometry 230 having surface features 202 formed in the face 204 of the blade 206 of a master key to be measured/scanned by the disclosed system.

在优选的实施例中,系统100可以利用2D成像技术。例如,扫描系统100可以利用对象涂层技术、照射技术、滤波技术、图像处理技术以及特征提取技术中的一些组合,以扫描和分析主钥匙的物理特点。其他实施例包括诸如立体成像的3D成像技术;诸如激光点、激光条、结构光、调制光的三角测量技术;或者任何其他成像技术的使用,以便扫描表面几何形状。该成像系统还可以是基于无光的,诸如通过使用超声波技术或x射线技术。如图4A和图4B所示,图像系统100可以包括图像捕捉装置110,并且可以包括至少一个镜子120,其中,图像捕捉装置可以与镜子对准,以使光路112在成像位置125处与主钥匙200对准。In a preferred embodiment, system 100 may utilize 2D imaging techniques. For example, scanning system 100 may utilize some combination of object coating techniques, illumination techniques, filtering techniques, image processing techniques, and feature extraction techniques to scan and analyze physical characteristics of the master key. Other embodiments include 3D imaging techniques such as stereo imaging; triangulation techniques such as laser spots, laser bars, structured light, modulated light; or the use of any other imaging technique to scan surface geometry. The imaging system may also be non-optical based, such as by using ultrasound or x-ray techniques. As shown in FIGS. 4A and 4B , the imaging system 100 can include an image capture device 110 and can include at least one mirror 120 , wherein the image capture device can be aligned with the mirror so that the optical path 112 is aligned with the master key at an imaging position 125 . 200 alignment.

在一个实施例中,光学成像装置110是照相机,并且所捕捉的图像是摄影图像。在实施例中,照相机是数字照相机,并且所捕捉的图像是数字图像。数字图像可以以文件形式或以数据形式存储,并且可以被逻辑分析。尽管扫描系统在本文中被描述为包括成像系统,但将理解的是,本领域中已知的其他系统可以被用于分析主钥匙的参数。例如,扫描系统可以使用塞尺、电容式传感器、探针或其他机电测量装置。扫描系统还可以与读取高安全性钥匙上的应答器的天线集成。In one embodiment, the optical imaging device 110 is a camera and the captured images are photographic images. In an embodiment, the camera is a digital camera and the captured image is a digital image. Digital images can be stored as files or as data and can be logically analyzed. Although the scanning system is described herein as including an imaging system, it will be appreciated that other systems known in the art may be used to analyze the parameters of the master key. For example, scanning systems may use feeler gauges, capacitive sensors, probes, or other electromechanical measuring devices. Scanning systems can also be integrated with antennas that read transponders on high security keys.

如本文所使用的,术语“逻辑”包括但不限于硬件、固件、软件和/或各自的组合,以执行(一个或多个)功能或(一个或多个)动作和/或引起来自另一逻辑、方法和/或系统的功能或动作。例如,基于期望的应用或需求,逻辑可以包括软件控制的微处理器、像专用集成电路(ASIC)的离散逻辑、模拟电路、数字电路、经编程的逻辑装置、含有指令的存储装置等。逻辑可以包括一个或多个门、门的组合或其他电路部件。逻辑还可以被完全实施为软件。在描述多个逻辑性逻辑的情况下,可以将该多个逻辑性逻辑并入到一个物理逻辑中。类似地,在描述单个逻辑性逻辑的情况下,可以将该单个逻辑性逻辑分布在多个物理逻辑之间。此外,如本文所使用的,术语“数据库”包括可以存储数据的物理性和/或逻辑性实体。例如,数据库可以是传统的数据库、表、文件、列表、队列、堆、存储器、寄存器等。数据库可以存在于一个逻辑性和/或物理性实体中,和/或可以被分布在两个或更多个逻辑性和/或物理性实体之间。可以使用技术、算法、封装以及本领域中已知的其他能力来组装处理逻辑。As used herein, the term "logic" includes, but is not limited to, hardware, firmware, software, and/or combinations thereof, to perform function(s) or action(s) and/or cause Function or action of logic, method and/or system. For example, logic may include software controlled microprocessors, discrete logic like application specific integrated circuits (ASICs), analog circuits, digital circuits, programmed logic devices, memory devices containing instructions, etc., based on the desired application or needs. Logic may include one or more gates, combinations of gates, or other circuit components. Logic could also be fully implemented as software. Where multiple logical logics are described, the multiple logical logics may be incorporated into one physical logic. Similarly, where a single logical logic is described, that single logical logic may be distributed among multiple physical logics. Furthermore, as used herein, the term "database" includes physical and/or logical entities that can store data. For example, a database may be a conventional database, table, file, list, queue, heap, memory, register, or the like. A database can reside in one logical and/or physical entity, and/or can be distributed between two or more logical and/or physical entities. Processing logic may be assembled using techniques, algorithms, packaging, and other capabilities known in the art.

扫描系统可以包括用于存储钥匙相关的信息(“钥匙数据”)的数据库。该钥匙数据可以包括已知高安全性钥匙的特点,诸如钥匙长度、钥匙形状、表面几何形状以及其他特点。数据库可以将钥匙数据与特定钥匙坯或者与钥匙的类型或组别相关联。例如,数据库可以存储不同钥匙制造商的钥匙数据。扫描系统可以访问该数据库,以将扫描出的主钥匙的特点与数据库中存储的钥匙数据进行比较。此类比较可以被用于确定将主高安全性钥匙的独特几何形状正确地复制到新的高安全性钥匙坯上所需的数据。The scanning system may include a database for storing key-related information ("key data"). The key data may include characteristics of known high security keys, such as key length, key shape, surface geometry, and other characteristics. The database may associate key data with particular key blanks or with types or groups of keys. For example, the database can store key data for different key manufacturers. The database can be accessed by the scanning system to compare the characteristics of the scanned master key with the key data stored in the database. Such comparisons can be used to determine the data required to correctly replicate the unique geometry of the master high security key onto the new high security key blank.

在实施例中,数据库存储与已知锁具样式一起使用的切削代码相关的钥匙数据。对于标准切削钥匙50来说,切削代码数据被称为齿数据,并且由与锁具中的配合销(matingpin)相关联的间隔和深度尺寸组成。对于高安全性钥匙200来说,此类切削代码数据被称为切削位置数据,并且由与高安全性锁具的配合部件相关联的间隔和切削位置尺寸组成。对于任何特定的锁具样式来说,配合部件之间的间隔可以不改变。照这样,每个主钥匙可以在每个间隔位置处仅在切削位置变化。用于特定主钥匙的切削代码被用于记录每个已知间隔位置处的切削位置。传统上,切削代码被表示为数字或字母-数字代码,其包含关于钥匙将被代码切削机器如何切削的信息。通常,切削代码是一组字母和/或整数(例如,“K263”),其可以根据钥匙代码图或切削代码列表来解译或解码。该代码还可以由一组切削位置来表示,这组切削位置限定了在钥匙每个侧面上的间隔位置处的切削的形状以便操作锁具。这些切削位置可以由整数代码(例如,“331351”和“266431”)来表示,或者可以由物理测量值(例如,“0.285、0.285、0.313、0.285、0.256、0.313英寸”和“0.299、0.242、0.242、0.270、0.285、0.313英寸”)来表示。In an embodiment, the database stores key data associated with cutting codes for use with known lock styles. For a standard cut key 50, the cut code data is referred to as tooth data and consists of the spacing and depth dimensions associated with the mating pins in the lockset. Such cutting code data is referred to as cutting location data for the high security key 200 and consists of the spacing and cutting location dimensions associated with the mating components of the high security lock. The spacing between mating parts may not vary for any particular lock style. In this way, each master key can be changed at each spaced position only in the cutting position. The chipping code for a particular master key is used to record the chipping location at each known interval. Traditionally, chipping codes are represented as numeric or alpha-numeric codes that contain information about how the key is to be chipped by a code chipping machine. Typically, a chipping code is a set of letters and/or integers (eg, "K263") that can be interpreted or decoded from a key code map or chipping code list. The code may also be represented by a set of cutting locations defining the shape of the cutting at spaced locations on each side of the key to operate the lock. These cutting locations can be represented by integer codes (e.g., "331351" and "266431"), or by physical measurements (e.g., "0.285, 0.285, 0.313, 0.285, 0.256, 0.313 inches" and "0.299, 0.242, 0.242, 0.270, 0.285, 0.313 inches") to represent.

将理解的是,该数据库不限于钥匙数据和切削代码数据。此外,该数据库可以存储与钥匙的其他识别参数相关的信息。测量系统可以将其他钥匙参数与切削信息组合利用,以缩小可能的钥匙坯的范围。It will be understood that the database is not limited to key data and cutting code data. In addition, the database can store information related to other identification parameters of the key. The measurement system can combine other key parameters with cutting information to narrow down the possible key blanks.

在优选的实施例中,成像系统100可以被用于分析主高安全性钥匙200,并且确定复制该钥匙所需的数据。成像系统100可以利用组合成像技术以正确地分析主钥匙的物理特点。此类成像技术包括对象涂层技术、照射技术、滤波技术、图像处理技术以及特征提取技术。In a preferred embodiment, imaging system 100 may be used to analyze master high security key 200 and determine the data required to replicate the key. The imaging system 100 can utilize a combination of imaging techniques to properly analyze the physical characteristics of the master key. Such imaging techniques include object coating techniques, illumination techniques, filtering techniques, image processing techniques, and feature extraction techniques.

如图5所示,成像系统100可以包括在主高安全性钥匙200的表面上涂层145的施加,以便消除各种光谱反射。这可以提高提取自该图像的数据的质量。此类涂层可以包括粉末状或液体材料,并且可以用诸如喷涂、电化学沉积或锟涂施加(roll application)的涂层工艺来施加。涂层145还可以是通过用制冷剂冷却刃而诱导被施加至高安全性钥匙表面的薄层材料。As shown in FIG. 5, the imaging system 100 may include the application of a coating 145 on the surface of the master high security key 200 in order to eliminate various spectral reflections. This can improve the quality of the data extracted from the image. Such coatings may include powdered or liquid materials and may be applied using coating processes such as spray coating, electrochemical deposition or roll application. Coating 145 may also be a thin layer of material induced to be applied to the surface of the high security key by cooling the blade with a refrigerant.

另外,如图4A、图4B、图7A和图7B所示,成像系统100可以利用照射技术来突显待扫描的高安全性钥匙200的刃206的表面几何形状。特别是,可以利用各种类型的光源以及光源相对于图像位置125的各种位置。例如,各种彩色光源可以被用于突显主钥匙刃200上的某些特征。主钥匙可以被定位在成像位置125处,其中,第一光源130A和第二光源135A也可以被定位为将光引导至成像位置125处,以当高安全性钥匙200被定位在成像位置125处时允许各种光类型和角度照射高安全性钥匙200的第一侧面155。另外,第三光源130B和第四光源135B也可以被定位为引导光朝向成像位置125处的高安全性钥匙200的第一侧面155,以允许各种光类型和角度照射高安全性钥匙200的第一侧面155。第一光源130A可以是明场照明,而第二光源135A可以是暗场照明。此外,第三光源130B可以是明场照明,而第四光源135B可以是暗场照明。然而,可以由第一光源、第二光源、第三光源和第四光源的任意组合来提供明场照明和暗场照明的任意组合,并且此公开不限于此。第一光源130A可以包括至少一个第一顶灯132,其可以包括一排灯。可以将第一顶灯132邻近于成像位置125的第一侧面150定位,以引导光朝向成像位置125处的高安全性主钥匙200的第一侧面155。第三光源130B可以包括至少一个第二顶灯134,其可以包括一排灯。可以将第二顶灯134邻近于成像位置125的相对的第二侧面160定位,以引导光朝向成像位置125处的高安全性主钥匙200的第一侧面155。Additionally, as shown in FIGS. 4A, 4B, 7A, and 7B, the imaging system 100 may utilize illumination techniques to highlight the surface geometry of the blade 206 of the high security key 200 to be scanned. In particular, various types of light sources and various positions of light sources relative to image position 125 may be utilized. For example, various colored light sources may be used to accentuate certain features on the master key blade 200 . The master key can be positioned at the imaging location 125, wherein the first light source 130A and the second light source 135A can also be positioned to direct light to the imaging location 125, so that when the high security key 200 is positioned at the imaging location 125 Various light types and angles are allowed to illuminate the first side 155 of the high security key 200. Additionally, third light source 130B and fourth light source 135B may also be positioned to direct light toward first side 155 of high security key 200 at imaging location 125 to allow various light types and angles to illuminate the sides of high security key 200. first side 155 . The first light source 130A may be bright field illumination and the second light source 135A may be dark field illumination. Additionally, the third light source 130B may be brightfield illumination, while the fourth light source 135B may be darkfield illumination. However, any combination of brightfield illumination and darkfield illumination may be provided by any combination of the first light source, the second light source, the third light source, and the fourth light source, and this disclosure is not limited thereto. The first light source 130A may include at least one first overhead light 132, which may include a row of lights. First overhead light 132 may be positioned adjacent to first side 150 of imaging location 125 to direct light toward first side 155 of high security master key 200 at imaging location 125 . The third light source 130B may include at least one second overhead light 134, which may include a row of lights. Second overhead light 134 may be positioned adjacent to opposite second side 160 of imaging location 125 to direct light toward first side 155 of high security master key 200 at imaging location 125 .

第二光源135A可以包括至少一个第一底灯142,其可以包括一排灯。可以将第一底灯142邻近于成像位置125的第一侧面150定位,以引导光朝向成像位置125处的高安全性主钥匙200的第一侧面155。第四光源135B可以包括至少一个第二底灯144,其可以包括一排灯。可以将第二底灯144邻近于成像位置125的相对的第二侧面160定位,以引导光朝向成像位置125处的高安全性主钥匙200的第一侧面155。The second light source 135A may include at least one first bottom light 142, which may include a row of lights. First bottom light 142 may be positioned adjacent to first side 150 of imaging location 125 to direct light toward first side 155 of high security master key 200 at imaging location 125 . The fourth light source 135B may include at least one second bottom light 144, which may include a row of lights. Second bottom light 144 may be positioned adjacent to opposite second side 160 of imaging location 125 to direct light toward first side 155 of high security master key 200 at imaging location 125 .

第一顶灯132和第二顶灯134以及第一底灯142和第二底灯144可以被配置为允许光路112穿过系统100并且从镜子120反射,以在主钥匙200被定位在成像位置125处时捕捉主钥匙200的图像。灯和灯的位置允许光路112从成像位置125视角来说不间断。另外,在一个实施例中,灯或一排灯可以被定位为提供以各种角度朝向高安全性主钥匙200的第一侧面155的准直光。First top light 132 and second top light 134 and first bottom light 142 and second bottom light 144 may be configured to allow light path 112 to pass through system 100 and reflect off mirror 120 for imaging when master key 200 is positioned at imaging location 125 Capture the image of the master key 200 at the same time. The lamps and lamp locations allow the light path 112 to be uninterrupted from the perspective of the imaging location 125 . Additionally, in one embodiment, a light or an array of lights may be positioned to provide collimated light at various angles towards the first side 155 of the high security master key 200 .

第一光源130A可以以相对于水平成像位置轴线172的第一角度A朝向成像位置125成角度。成像位置轴线172可以是相对于成像位置125的中心为水平的轴线。参见图7B。第二光源135A可以以相对于水平成像位置轴线172的第二角度B朝向成像位置125成角度。第三光源130B可以以相对于成像位置轴线172的第三角度C朝向成像位置125成角度。第四光源135B可以以相对于成像位置轴线125的第四角度D朝向成像位置125成角度。相对于水平成像位置轴线172,第四角度D可以大于第三角度C,第三角度C可以大于第二角度B,第二角度B可以大于第一角度A。第一顶灯132和第二顶灯134可以被定位成比第一底灯142和第二底灯144更远离成像位置125。First light source 130A may be angled toward imaging position 125 at a first angle A relative to horizontal imaging position axis 172 . Imaging location axis 172 may be a horizontal axis relative to the center of imaging location 125 . See Figure 7B. Second light source 135A may be angled toward imaging position 125 at a second angle B relative to horizontal imaging position axis 172 . The third light source 130B may be angled toward the imaging location 125 at a third angle C relative to the imaging location axis 172 . The fourth light source 135B may be angled toward the imaging location 125 at a fourth angle D relative to the imaging location axis 125 . With respect to the horizontal imaging position axis 172 , the fourth angle D may be greater than the third angle C, the third angle C may be greater than the second angle B, and the second angle B may be greater than the first angle A. First overhead light 132 and second overhead light 134 may be positioned farther from imaging location 125 than first bottom light 142 and second bottom light 144 .

还可以参照垂直成像位置轴线170来识别第一光源、第二光源、第三光源和第四光源的位置及角度。在一个实施例中,第一顶灯132和第二顶灯134相对于轴线170可以大体上彼此对称。而且,第一底灯142和第二底灯144相对于轴线170可以大体上彼此对称。在另一实施例中,第一顶灯132和第二顶灯134相对于轴线170可以大体上彼此不对称。而且,第一底灯142和第二底灯144相对于轴线170可以大体上彼此不对称。在又一实施例中,该系统可以包括光源的多个水平,诸如顶、中、底等。此公开考虑了光源相对于成像位置125的各种布置和构造,并且在这方面不受限制。The positions and angles of the first light source, the second light source, the third light source and the fourth light source can also be identified with reference to the vertical imaging position axis 170 . In one embodiment, the first dome light 132 and the second dome light 134 may be substantially symmetrical to each other about the axis 170 . Also, the first bottom light 142 and the second bottom light 144 may be substantially symmetrical to each other with respect to the axis 170 . In another embodiment, the first dome light 132 and the second dome light 134 may be generally asymmetrical to each other with respect to the axis 170 . Also, first bottom light 142 and second bottom light 144 may be generally asymmetrical to each other with respect to axis 170 . In yet another embodiment, the system may include multiple levels of light sources, such as top, middle, bottom, and the like. This disclosure contemplates various arrangements and configurations of light sources relative to imaging location 125 and is not limited in this respect.

在一些情况下,散射光可以被用于消除由被形成在主钥匙200的刃206的面部204中的表面特征202引起的阴影。在其他情况下,可以从特定角度使用非散射光或准直光通过创建阴影来突显某些表面特征202。通过用来自许多不同角度的准直光照射对象,许多不同类型的表面特征可以相对其阴影而被突显。图像随后可以针对每个不同的照射角度被收集并且被处理,以便正确地分析所有的表面特征和几何形状。轴向散射光可以被用于突出某些特征类型。红外光也可以被用作光源,以便消除反射并减小色差。可以操作光源130A、130B、135A、135B以从相对于成像位置125和被定位在此处的钥匙的不同照射角度创建准直光。灯或成排灯132、134、142、144中的每一个可以被控制为提供朝向成像位置的各种颜色和强度的光,以操纵主钥匙200的图像。In some cases, scattered light may be used to eliminate shadows caused by surface features 202 formed in face 204 of blade 206 of master key 200 . In other cases, certain surface features 202 may be accentuated by creating shadows using unscattered or collimated light from certain angles. By illuminating an object with collimated light from many different angles, many different types of surface features can be accentuated against their shadows. Images can then be collected for each different illumination angle and processed in order to properly analyze all surface features and geometries. Axial scattered light can be used to highlight certain feature types. Infrared light can also be used as a light source to eliminate reflections and reduce chromatic aberration. The light sources 130A, 130B, 135A, 135B can be operated to create collimated light from different illumination angles relative to the imaging location 125 and the key positioned therein. Each of the lights or banks of lights 132 , 134 , 142 , 144 may be controlled to provide light of various colors and intensities towards the imaging location to manipulate the image of the master key 200 .

另外,在系统100中可以提供背光灯175。背光灯175可以引导光朝向成像位置125处的高安全性主钥匙200的第二侧面156。钥匙200的第二侧面156可以与第一侧面155相对。可以将背光灯175邻近于成像位置125相对于光源130A、130B、135A和135B的相对侧定位。可以将背光灯175定位成与光路112相对于主钥匙200的方向相对。背光灯175可以提供在主钥匙背面的照射,并且可以被开启和关闭。背光灯照射可以与用于识别主钥匙类型、验证主钥匙是否固定以及确定主钥匙的取向的逻辑一起使用。Additionally, a backlight 175 may be provided in the system 100 . Backlight 175 may direct light toward second side 156 of high security master key 200 at imaging location 125 . The second side 156 of the key 200 may be opposite the first side 155 . Backlight 175 may be positioned adjacent to the opposite side of imaging location 125 relative to light sources 130A, 130B, 135A, and 135B. The backlight 175 may be positioned opposite the direction of the light path 112 relative to the master key 200 . Backlight 175 can provide illumination on the back of the master key and can be turned on and off. Backlighting may be used with logic for identifying the master key type, verifying that the master key is secured, and determining the orientation of the master key.

可以理解的是,可以用不同的照射场景来收集多个图像。例如,光源可以被移动或者钥匙可以被移动以创建期望的角度。此外,通过按期望方式操作各种灯可以将多个光源用于创建多个照射场景。另外,可以利用各种不同类型的光源(诸如不同颜色的灯)、来自不同角度的亮光场和暗光场,以从位于静止位置处的图像捕捉设备收集多组被照射的图像。此类方法可以利用逻辑中的彩色滤波器来创建表示每个单独照射角度的一组图像。这种多色技术降低了系统的复杂性,并且创建了该组图像内的绝对配准(registration)。It will be appreciated that multiple images may be collected with different illumination scenarios. For example, the light source can be moved or the key can be moved to create a desired angle. Furthermore, multiple light sources can be used to create multiple illumination scenes by operating the various lamps as desired. Additionally, various different types of light sources (such as different colored lamps), bright and dark light fields from different angles can be utilized to collect multiple sets of illuminated images from an image capture device at a stationary location. Such methods can utilize color filters in the logic to create a set of images representing each individual angle of illumination. This multicolor technique reduces system complexity and creates absolute registration within the set of images.

图6A、图6B和图6C示出采取准直角度以及不采取准直角度情况下的高安全性钥匙200的各种图像。图6A示出了具有用未使用准直照明的照射技术成像的特定表面特征202的高安全性钥匙200的刃206的俯视图。图6B示出了图6A的高安全性钥匙,其利用了使用来自被用于使切入到高安全性钥匙刃206的面部204中的表面特征202的形状突显的第一角度的准直照明的照射技术成像。此图像示出了沿着表面特征202的底部220的阴影效果和沿着表面特征202的顶部210的更亮的照射效果。在一个实施例中,图6B的图像可以被理解为具有提供自第一光源130A的第一顶灯132的光,而第一底灯142、第二顶灯134和第二底灯144不提供光。6A, 6B and 6C show various images of the high security key 200 with and without collimation angles. Figure 6A shows a top view of a blade 206 of a high security key 200 having specific surface features 202 imaged with an illumination technique that does not use collimated illumination. 6B shows the high security key of FIG. 6A utilizing collimated illumination from a first angle used to accentuate the shape of surface features 202 cut into face 204 of high security key blade 206. Irradiation technique imaging. This image shows a shadow effect along the bottom 220 of the surface feature 202 and a brighter illumination effect along the top 210 of the surface feature 202 . In one embodiment, the image of FIG. 6B may be understood as having light provided from first top light 132 of first light source 130A, while first bottom light 142 , second top light 134 , and second bottom light 144 provide no light.

图6C示出了图6A的高安全性钥匙,其利用了使用来自被用于使切入到高安全性钥匙刃206的面部204中的表面特征202的形状突显的第二角度的准直照明的照射技术成像。此图像示出了沿着表面特征202的顶部210的阴影效果和沿着表面特征202的底部220的更亮的照射效果。在一个实施例中,图6C的图像可以被理解为具有提供自第三光源130B的第二顶灯134的光,而第二底灯144、第一顶灯134和第一底灯144不提供光。6C shows the high security key of FIG. 6A utilizing collimated illumination from a second angle used to accentuate the shape of surface features 202 cut into face 204 of high security key blade 206. Irradiation technique imaging. This image shows a shadow effect along the top 210 of the surface feature 202 and a brighter illumination effect along the bottom 220 of the surface feature 202 . In one embodiment, the image of FIG. 6C may be understood as having light provided from second top light 134 of third light source 130B, while second bottom light 144 , first top light 134 , and first bottom light 144 provide no light.

此方法是利用来自朝向成像位置125的各种角度的各种方向的光来捕捉主钥匙200的各种图像的示例。然后可以通过逻辑系统对该图像进行处理,以识别表面特征202的显著部分。这些处理允许以提高效率和精确度有关来捕捉与表面特征202的几何图案有关的数据。This method is an example of capturing various images of master key 200 with light from various directions at various angles towards imaging location 125 . The image may then be processed by a logic system to identify salient portions of surface features 202 . These processes allow data related to the geometric pattern of surface features 202 to be captured with increased efficiency and accuracy.

如图8所示,在一个实施例中,成像系统100可以包括第一滤波器260和第二滤波器265。滤波器可以沿着成像装置110的光路112对齐。逻辑的滤波技术可以增强主钥匙200的表面特征204的对比度。滤波器260、265可以包括透镜,其可以包括彩色形、干涉型、中性密度型和偏振型。彩色滤波器可以增强某些颜色的对比度,并且降低其他颜色的对比度。还可以使用干涉滤波器来增强某些光带。中性密度滤波器可以被用于降低整体亮度,如果是图像的话。偏振滤波器可以被用于减少镜面反射。在一些情况下,来自第一光场130或第二光场135的光源和成像装置110的透镜都可以具有偏振滤波器260、265。尽管滤波技术通常涉及物理透镜,但将理解的是还可以利用数字技术来产生逻辑上的滤波效果。在一个实施例中,可以将第一滤波器邻近于成像装置110定位,而可以将第二滤波器265邻近于镜子120或成像位置125定位。As shown in FIG. 8 , in one embodiment, imaging system 100 may include a first filter 260 and a second filter 265 . The filters may be aligned along the optical path 112 of the imaging device 110 . Logic's filtering techniques may enhance the contrast of the surface features 204 of the master key 200 . Filters 260, 265 may include lenses, which may include chromatic, interference, neutral density, and polarizing types. Color filters enhance the contrast of some colors and reduce the contrast of others. Interference filters can also be used to enhance certain light bands. Neutral density filters can be used to reduce the overall brightness if it is an image. Polarizing filters can be used to reduce specular reflections. In some cases, both the light source from the first light field 130 or the second light field 135 and the lens of the imaging device 110 may have polarization filters 260 , 265 . Although filtering techniques generally involve physical lenses, it will be appreciated that digital techniques can also be utilized to produce logical filtering effects. In one embodiment, the first filter can be positioned adjacent to the imaging device 110 , while the second filter 265 can be positioned adjacent to the mirror 120 or the imaging location 125 .

此外,图像处理技术可以被用于突显待扫描的表面几何形状。如图9A和图9B所示,此类技术可以包括数字图像处理功能,以调整诸如曝光度、亮度、对比度、色相、饱和度、高通滤波、低通滤波、阈值级别调整和包括图像掩蔽、覆盖及其他逐像素功能的多图像比较。这些技术通常被应用至或者整个图像或者选定的感兴趣区域。图9A示出了主钥匙200的刃206的俯视图,该主钥匙具有用照射技术成像而未通过使用各种图像处理技术进行处理的特定表面特征202。图9B示出了图9A的高安全性钥匙,其已经利用了其中应用了阈值处理技术以捕捉切入到高安全性钥匙刃206的面部204中的表面特征202的精确的几何形状的照射技术成像。此图像示出了沿着表面特征202的顶部210和底部220的阈值效果。在一个实施例中,图9B的图像是对图9A的图像应用处理技术的结果。Additionally, image processing techniques can be used to highlight the geometry of the surface to be scanned. As shown in Figures 9A and 9B, such techniques may include digital image processing functions to adjust features such as exposure, brightness, contrast, hue, saturation, high-pass filtering, low-pass filtering, threshold level adjustments and including image masking, overlay and other pixel-wise features for multi-image comparison. These techniques are typically applied to either the entire image or selected regions of interest. FIG. 9A shows a top view of a blade 206 of a master key 200 having certain surface features 202 imaged with illumination techniques and not processed by using various image processing techniques. 9B shows the high security key of FIG. 9A that has been imaged using an illumination technique in which a thresholding technique is applied to capture the precise geometry of the surface features 202 cut into the face 204 of the high security key blade 206. . This image shows the effect of thresholding along the top 210 and bottom 220 of the surface feature 202 . In one embodiment, the image of Figure 9B is the result of applying a processing technique to the image of Figure 9A.

成像系统100可使用诸如边缘检测、斑点分析和模式识别的特征提取处理技术,以分析被突显的几何形状并确定所期望特征的几何形状。在一个实施例中,如图10所示,可以使用边缘检测来突显表面特征202的边缘220。在另一个实施例中,可以使用逐个像素的梯度检测来识别沿着表面特征202的被突显特征的边缘。在一个优选实施例中,可以利用斑点分析的形式来隔离表示被突显的表面特征的轮廓的边缘点。然后可以处理这些点的有序列表,以生成位置配准和边缘数据。可以利用诸如样条曲线、傅立叶分析、神经网络、哈达玛变换和霍夫变换等数学抽象来增强数据分析。The imaging system 100 may use feature extraction processing techniques such as edge detection, blob analysis, and pattern recognition to analyze the highlighted geometry and determine the geometry of desired features. In one embodiment, as shown in FIG. 10 , edge detection may be used to highlight edges 220 of surface features 202 . In another embodiment, pixel-by-pixel gradient detection may be used to identify edges of highlighted features along surface feature 202 . In a preferred embodiment, a form of blob analysis may be utilized to isolate edge points representing the contours of highlighted surface features. An ordered list of these points can then be processed to generate positional registration and edge data. Data analysis can be enhanced with mathematical abstractions such as splines, Fourier analysis, neural networks, Hadamard transforms, and Hough transforms.

扫描系统100可以被用作钥匙数据捕捉装置,其被配置为测量切入到高安全性钥匙刃的表面中的特征的形状,并确定制作该主钥匙的复制品所需要的数据。此类钥匙数据捕捉装置可以是钥匙识别机器或如图11示出的钥匙扫描系统机器300的一部分。此机器300可以包括具有朝向成像位置125成角度的多个光源310的壳体。机器300可以配备有多个光源,多个光源可以包括明场照明和暗场照明,并且可以被配置为测量主钥匙的表面特征的形状。机器300可以被配置为识别合适的钥匙坯并确定制作该主钥匙的复制品所需的数据。此数据随后可以由分离的钥匙切削机器或钥匙复制机器可选地使用以切削高安全性钥匙坯,以便复制该主钥匙。Scanning system 100 may be used as a key data capture device configured to measure the shape of features cut into the surface of a high security key blade and determine the data needed to make a replica of the master key. Such a key data capture device may be part of a key identification machine or a key scanning system machine 300 as shown in FIG. 11 . This machine 300 may include a housing with a plurality of light sources 310 angled toward the imaging location 125 . The machine 300 may be equipped with multiple light sources, which may include brightfield illumination and darkfield illumination, and may be configured to measure the shape of surface features of the master key. Machine 300 may be configured to identify suitable key blanks and determine the data required to make a replica of the master key. This data can then optionally be used by a separate key cutting machine or key duplication machine to cut high security key blanks in order to duplicate the master key.

扫描系统100还可以被集成到如图12A、图12B和图12C示出的钥匙扫描和复制机器400中。例如,扫描系统100可以与钥匙复制系统结合使用,诸如在美国专利号7,891,919中公开的钥匙复制机器,在此通过整体引用将其并入本文。此类系统将能够帮助识别合适的钥匙坯、确定制作主钥匙的复制品所需的数据以及切削高安全性钥匙坯,以便复制该主钥匙。另外,扫描系统100可以与美国专利号8,644,619;8,634,655;7,890,878;以及9,101,990中公开的系统结合使用,在此通过整体引用将其并入本文。The scanning system 100 may also be integrated into a key scanning and duplicating machine 400 as shown in Figures 12A, 12B and 12C. For example, scanning system 100 may be used in conjunction with a key duplication system, such as the key duplication machine disclosed in US Patent No. 7,891,919, which is hereby incorporated by reference in its entirety. Such systems would be able to assist in identifying suitable key blanks, determining the data required to make replicas of a master key, and cutting high security key blanks in order to duplicate the master key. Additionally, scanning system 100 may be used in conjunction with the systems disclosed in US Patent Nos. 8,644,619; 8,634,655; 7,890,878; and 9,101,990, which are hereby incorporated by reference in their entirety.

如上所述,提供了一种扫描主钥匙500的方法。该方法由图13所示的流程图示出。该方法包括从第一角度A照射被形成在所述主钥匙的刃上的表面特征的步骤。可以从第二角度B照射被形成在所述主钥匙的刃上的表面特征。第一角度A和第二角度B相对于成像位置轴线175可以不同。捕捉所述主钥匙的刃的部分的至少一个图像。确定所述表面特征的特点。逻辑可以被用来确定表面特征的特点,并用来分析刃的所捕捉的图像。该逻辑可以被用于将所述表面特征的特点与已知锁具样式的切削代码数据进行比较。该逻辑还可以被用来确定用于所述主钥匙的至少一个切削代码。该至少一个切削代码可以被用来复制所述主钥匙。表面特征202包括被形成在主钥匙200的所述刃上的纹路230。可以从由第一光源130A提供的第一角度A来照射表面特征。可以从由第二光源135A提供的第二角度B来照射表面特征。第一光源130A和第二光源135A可以在成像装置110捕捉图像之前被控制为开启或关闭,以创建不同的照射角度。成像装置110可以捕捉多个图像,其中每个图像包括由光源130A、130B、135A和135B以及背光灯175中的至少一个提供的不同照射场景。可以用被配置为分析每个图像包括不同照射场景的多个图像的逻辑来确定表面特征。As described above, a method of scanning the master key 500 is provided. This method is illustrated by the flowchart shown in FIG. 13 . The method comprises the step of illuminating a surface feature formed on a blade of said master key from a first angle A. The surface features formed on the blade of the master key may be illuminated from a second angle B. The first angle A and the second angle B may be different relative to the imaging position axis 175 . At least one image of a portion of the blade of the master key is captured. The surface features are characterized. Logic can be used to characterize surface features and to analyze captured images of the blade. This logic can be used to compare the characteristics of the surface features to the cut code data of known lock styles. The logic may also be used to determine at least one chipping code for the master key. The at least one cutting code may be used to duplicate the master key. The surface feature 202 includes a texture 230 formed on the blade of the master key 200 . The surface features may be illuminated from a first angle A provided by the first light source 130A. The surface features may be illuminated from a second angle B provided by the second light source 135A. The first light source 130A and the second light source 135A may be controlled to be turned on or off before an image is captured by the imaging device 110 to create different illumination angles. Imaging device 110 may capture multiple images, where each image includes a different illumination scene provided by at least one of light sources 130A, 130B, 135A, and 135B and backlight 175 . The surface characteristics may be determined with logic configured to analyze the plurality of images, each image including a different illumination scene.

另外,可以将所述表面特征的特点与已知锁具样式的切削位置比较。此比较可以由其中所述切削位置可以由物理测量值来表示的逻辑来执行。该测量值还可以由该逻辑来确定。可以通过使用所述测量值来复制主钥匙。可替选地,逻辑可以分析所述表面特征的所述特点,以便测量所述主钥匙的表面上所形成的纹路230。所形成的纹路230可以由物理测量值来表示。Additionally, the characteristics of the surface features can be compared to the cut locations of known lock styles. This comparison can be performed by logic where the cutting location can be represented by a physical measurement. The measured value can also be determined by the logic. The master key can be duplicated by using said measurements. Alternatively, the logic may analyze the characteristics of the surface features to measure the lines 230 formed on the surface of the master key. The texture 230 formed may be represented by physical measurements.

另外,可以捕捉背光图像。逻辑可以分析所述背光图像,并且将其与已知钥匙坯的数据库比较。与主钥匙相关联的合适的钥匙坯可以被逻辑识别出并被传递至用户或者被用来识别用于该关联的主钥匙的合适的切削代码数据。Additionally, backlit images can be captured. Logic can analyze the backlight image and compare it to a database of known key blanks. The appropriate key blank associated with the master key may be logically identified and communicated to the user or used to identify the appropriate cutting code data for the associated master key.

尽管已经就扫描高安全性钥匙上的表面特征方面描述了本发明,但其使用决不局限于仅表面特征或仅高安全性钥匙。本发明构思中的许多可以被用在外侧边缘特征和标准的、边缘切削的家用钥匙及汽车钥匙上。Although the invention has been described in terms of scanning surface features on high security keys, its use is by no means limited to only surface features or only high security keys. Many of the inventive concepts can be used on outside edge features and on standard, edge-cut home and car keys.

在上面已经对本发明进行了描述,并且显然地,对于阅读并理解此说明书的其他人来说将可以想到修改和变更。以下权利要求旨在包括所有的修改和变更,只要其在权利要求及其等价物的范围以内。The invention has been described above, and obviously modifications and alterations will occur to others upon the reading and understanding of this specification. The following claims are intended to cover all modifications and changes provided they come within the scope of the claims and their equivalents.

Claims (30)

1.一种高安全性钥匙扫描系统,包括:1. A high-security key scanning system, including: 成像装置,其被配置为捕捉高安全性主钥匙的刃的第一侧面的部分的至少一个图像;an imaging device configured to capture at least one image of a portion of the first side of the blade of the high security master key; 第一光源,其被定位为以第一角度引导光朝向成像位置处的所述高安全性主钥匙的所述刃的第一侧面;a first light source positioned to direct light at a first angle towards a first side of the blade of the high security master key at an imaging location; 第二光源,其被定位为以第二角度引导光朝向所述成像位置处的所述高安全性主钥匙的所述刃的第一侧面,其中,所述被捕捉的图像揭示被形成在所述刃的至少一部分中的面部中的表面特征;以及a second light source positioned to direct light at a second angle toward the first side of the blade of the high security master key at the imaging location, wherein the captured image reveals the image formed on the Surface features in the face in at least a portion of the blade; and 逻辑,其被配置为分析至少一个被捕捉的图像,以确定所述表面特征的特点。Logic configured to analyze at least one captured image to determine a characteristic of the surface feature. 2.根据权利要求1所述的钥匙扫描系统,其中,所述逻辑还将所述表面特征的所述特点与已知锁具样式的切削代码数据进行比较。2. The key scanning system of claim 1 wherein said logic further compares said characteristics of said surface features to cut code data for known lock styles. 3.根据权利要求2所述的钥匙扫描系统,其中,所述切削代码数据包括间隔尺寸和切削位置中的至少一个。3. The key scanning system of claim 2, wherein the cut code data includes at least one of a spacing dimension and a cut location. 4.根据权利要求2所述的钥匙扫描系统,其中,所述逻辑确定所述高安全性主钥匙的至少一个切削位置或至少一个切削代码。4. The key scanning system of claim 2, wherein the logic determines at least one chipping location or at least one chipping code of the high security master key. 5.根据权利要求4所述的钥匙扫描系统,其中,所述切削位置或所述切削代码被用于从钥匙坯复制出高安全性钥匙。5. The key scanning system of claim 4, wherein the cut location or the cut code is used to reproduce a high security key from a key blank. 6.根据权利要求1所述的钥匙扫描系统,其中,所述高安全性主钥匙是响尾蛇钥匙。6. The key scanning system of claim 1, wherein the high security master key is a Sidewinder key. 7.根据权利要求1所述的钥匙扫描系统,其中,所述第一光源和第二光源被控制为被单独地开启和关闭,以将光引导到所述高安全性主钥匙的表面上。7. The key scanning system of claim 1, wherein the first light source and the second light source are controlled to be turned on and off individually to direct light onto a surface of the high security master key. 8.根据权利要求7所述的钥匙扫描系统,其中,所述成像装置捕捉各自来自不同照射场景的所述高安全性主钥匙的多个图像。8. The key scanning system of claim 7, wherein the imaging device captures a plurality of images of the high security master key, each from a different illumination scene. 9.根据权利要求1所述的钥匙扫描系统,还包括背光灯,其被定位为引导光朝向与所述高安全性钥匙的刃的第一侧面相对的第二侧面,所述背光灯被配置为与逻辑一起使用,所述逻辑用于确定识别所述主钥匙类型、验证所述主钥匙是否固定和确定所述主钥匙的取向中的一个或多个。9. The key scanning system of claim 1 , further comprising a backlight positioned to direct light toward a second side opposite the first side of the blade of the high security key, the backlight configured For use with logic for determining one or more of identifying the master key type, verifying that the master key is secured, and determining the orientation of the master key. 10.根据权利要求1所述的钥匙扫描系统,其中,所述第一光源和所述第二光源中的至少一个引导准直光朝向所述成像位置。10. The key scanning system of claim 1, wherein at least one of the first light source and the second light source directs collimated light toward the imaging location. 11.根据权利要求1所述的钥匙扫描系统,其中,所述高安全性钥匙包括被形成在所述高安全性主钥匙的所述刃上的纹路。11. The key scanning system of claim 1, wherein the high security key includes a pattern formed on the blade of the high security master key. 12.根据权利要求11所述的钥匙扫描系统,其中,所述逻辑分析所述表面特征的所述特点,以便确定所述主钥匙的表面上的形成的纹路。12. The key scanning system of claim 11, wherein the logic analyzes the characteristics of the surface features to determine a pattern formed on the surface of the master key. 13.根据权利要求12所述的钥匙扫描系统,其中,经确定的所述形成的纹路被用于在钥匙坯上复制所述高安全性主钥匙。13. A key scanning system according to claim 12, wherein the determined formed pattern is used to reproduce the high security master key on a key blank. 14.根据权利要求1所述的钥匙扫描系统,还包括第三光源,其被定位为以第三角度引导光朝向所述成像位置处的所述高安全性主钥匙的所述刃的第一侧面;和第四光源,其被定位为以第四角度引导光朝向所述成像位置处的所述高安全性主钥匙的所述刃的第一侧面,其中,所述第一角度、第二角度、第三角度和第四角度相对于所述成像位置的水平轴线是不同的。14. The key scanning system of claim 1 , further comprising a third light source positioned to direct light at a third angle toward the first edge of the blade of the high security master key at the imaging location. a side; and a fourth light source positioned to direct light toward a first side of the blade of the high security master key at the imaging location at a fourth angle, wherein the first angle, the second The angle, third angle and fourth angle are different relative to the horizontal axis of the imaging location. 15.一种用于扫描高安全性主钥匙的方法,所述方法包括:15. A method for scanning a high security master key, the method comprising: 从第一角度照射被形成在所述高安全性主钥匙的刃的第一侧面上的表面特征;illuminating the surface features formed on the first side of the blade of the high security master key from a first angle; 从第二角度照射被形成在所述高安全性主钥匙的所述刃的所述第一侧面上的表面特征,所述第一角度和所述第二角度相对于水平成像位置轴线是不同的;illuminating the surface feature formed on the first side of the blade of the high security master key from a second angle, the first angle and the second angle being different relative to a horizontal imaging position axis ; 捕捉所述高安全性主钥匙的所述刃的被照射表面的一部分的至少一个图像;以及capturing at least one image of a portion of the illuminated surface of the blade of the high security master key; and 确定所述表面特征的特点。The surface features are characterized. 16.根据权利要求15所述的方法,还包括将所述表面特征的所述特点与已知锁具样式的切削代码数据进行比较。16. The method of claim 15, further comprising comparing said characteristics of said surface features to cutting code data of known lock styles. 17.根据权利要求15所述的方法,还包括确定用于所述主钥匙的至少一个切削代码。17. The method of claim 15, further comprising determining at least one chipping code for the master key. 18.根据权利要求17所述的方法,还包括利用所述至少一个切削代码来复制所述主钥匙。18. The method of claim 17, further comprising replicating the master key with the at least one cutting code. 19.根据权利要求15所述的方法,其中,从第一角度照射表面特征的所述步骤是由第一光源来提供的,并且从第二角度照射表面特征的所述步骤是由第二光源来提供的,其中,所述第一光源和所述第二光源在捕捉至少一个图像之前被控制为开启或关闭以创建不同的照射角度。19. The method of claim 15, wherein said step of illuminating surface features from a first angle is provided by a first light source, and said step of illuminating surface features from a second angle is provided by a second light source is provided, wherein the first light source and the second light source are controlled to be turned on or off to create different illumination angles prior to capturing at least one image. 20.根据权利要求19所述的方法,其中,捕捉各自具有不同照射场景的多个图像。20. The method of claim 19, wherein a plurality of images each having a different illumination scene are captured. 21.根据权利要求20所述的方法,其中,用逻辑来确定所述表面特征,所述逻辑被配置为分析具有所述不同照射场景的多个图像。21. The method of claim 20, wherein the surface characteristics are determined with logic configured to analyze a plurality of images of the different illumination scenes. 22.根据权利要求21所述的方法,还包括将所述表面特征的所述特点与已知锁具样式的切削位置数据进行比较。22. The method of claim 21, further comprising comparing the characteristic of the surface feature with cutting location data for known lock patterns. 23.根据权利要求22所述的方法,还包括确定用于所述主钥匙的至少一个切削位置。23. The method of claim 22, further comprising determining at least one cutting location for the master key. 24.根据权利要求23所述的方法,其中,所述切削位置由物理测量值来表示,所述测量值由所述逻辑确定。24. The method of claim 23, wherein the cutting location is represented by a physical measurement, the measurement being determined by the logic. 25.根据权利要求24所述的方法,还包括通过使用所述测量值来复制所述高安全性主钥匙。25. The method of claim 24, further comprising replicating the high security master key by using the measured value. 26.根据权利要求15所述的方法,其中,所述表面特征包括被形成在主钥匙的所述刃上的纹路。26. The method of claim 15, wherein the surface feature comprises a texture formed on the blade of a master key. 27.根据权利要求26所述的方法,还包括分析所述表面特征的所述特点,以便测量所述高安全性主钥匙的表面上所形成的纹路。27. The method of claim 26, further comprising analyzing the characteristics of the surface features to measure the texture formed on the surface of the high security master key. 28.根据权利要求27所述的方法,还包括通过使用所述测量值来复制所述高安全性主钥匙。28. The method of claim 27, further comprising duplicating the high security master key by using the measured value. 29.根据权利要求15所述的方法,还包括背光照射所述高安全性主钥匙。29. The method of claim 15, further comprising backlighting the high security master key. 30.根据权利要求29所述的方法,还包括识别与所述高安全性主钥匙相关联的合适的钥匙坯。30. The method of claim 29, further comprising identifying a suitable key blank associated with the high security master key.
CN201680057803.8A 2015-08-03 2016-08-03 High security key scanning system Pending CN108140126A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201562200208P 2015-08-03 2015-08-03
US62/200,208 2015-08-03
PCT/US2016/045367 WO2017024043A1 (en) 2015-08-03 2016-08-03 High security key scanning system

Publications (1)

Publication Number Publication Date
CN108140126A true CN108140126A (en) 2018-06-08

Family

ID=62079092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680057803.8A Pending CN108140126A (en) 2015-08-03 2016-08-03 High security key scanning system

Country Status (2)

Country Link
EP (1) EP3332353A1 (en)
CN (1) CN108140126A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021143146A1 (en) * 2020-01-18 2021-07-22 深圳数马电子技术有限公司 Method and apparatus for recognizing bitting code of key, and storage medium and image collection device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5807042A (en) * 1995-06-07 1998-09-15 Almblad; Robert Method and apparatus for automatically making keys
US6588995B2 (en) * 1997-05-13 2003-07-08 The Hillman Group, Inc. Method and apparatus for aligning keys for cutting
CN101405104A (en) * 2006-01-23 2009-04-08 海-科产品公司 Key duplication machine
CN102448636A (en) * 2009-05-01 2012-05-09 海高制品有限公司 Key blank identification system with bitting analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5807042A (en) * 1995-06-07 1998-09-15 Almblad; Robert Method and apparatus for automatically making keys
US6588995B2 (en) * 1997-05-13 2003-07-08 The Hillman Group, Inc. Method and apparatus for aligning keys for cutting
CN101405104A (en) * 2006-01-23 2009-04-08 海-科产品公司 Key duplication machine
CN102448636A (en) * 2009-05-01 2012-05-09 海高制品有限公司 Key blank identification system with bitting analysis

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021143146A1 (en) * 2020-01-18 2021-07-22 深圳数马电子技术有限公司 Method and apparatus for recognizing bitting code of key, and storage medium and image collection device
US11790626B2 (en) 2020-01-18 2023-10-17 Shenzhen Xhorse Electronics Co., Ltd Method and apparatus for recognizing bitting code of key, and storage medium and image collection device
EP4092569A4 (en) * 2020-01-18 2024-03-13 Shenzhen Xhorse Electronics Co., Ltd KEY SLOT CODE RECOGNITION METHOD AND APPARATUS, AND STORAGE MEDIUM AND IMAGE CAPTURE DEVICE

Also Published As

Publication number Publication date
EP3332353A1 (en) 2018-06-13

Similar Documents

Publication Publication Date Title
US11842554B2 (en) High security key scanning system
CN102448636B (en) Key blank identification system with bitting analysis
Venkatesh et al. Morphed face detection based on deep color residual noise
US9058533B2 (en) Method for encoding information in illumination patterns
TWI435277B (en) Document authentication using template matching with fast masked normalized cross-correlation
CN101583979B (en) Method for detecting soiling and/or color wear in areas of color transitions on documents of value and device for carrying out the method
US8630481B2 (en) Encoding information in illumination patterns
US9336434B2 (en) Method for detecting a true face
RU2745098C2 (en) Method of determinig authorship of a painting
Christlein et al. A study on features for the detection of copy-move forgeries
CN107743627A (en) A method for identifying security patterns using artificial 3D reconstruction technology
CA3000153A1 (en) Analysis process for a structure document capable of being deformed
FR2979728A1 (en) FRAUD DETECTION FOR BIOMETRIC TYPE ACCESS CONTROL SYSTEM
Ke et al. Exposing image forgery by detecting consistency of shadow
Dybala et al. Detecting filtered cloning in digital images
Kumar et al. Identifying photo forgery using lighting elements
Liu et al. Enhanced geometric reflection models for paper surface based authentication
Mayer et al. Improved forgery detection with lateral chromatic aberration
CN108140126A (en) High security key scanning system
JP2002324260A (en) Coin identification method and apparatus
KR102500424B1 (en) How to verify security devices containing signatures
Hildebrandt et al. High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection
CN111435559A (en) Financial terminal, detection method of paper money watermark image and memory
Alam et al. A Literature study on Image forgery
JP7069627B2 (en) Information recording medium reading method and authenticity judgment method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180608

WD01 Invention patent application deemed withdrawn after publication