FIELD OF INVENTION
[0001] The present invention relates generally to lock assembly, and more particularly to
lock assembly based on a given key.
BACKGROUND
[0002] In most cases, keys and locks are manufactured at the same time, whereby it is ensured
that the keys that are supplied fit the lock or locks.
[0003] However, there are situations where it is desired to obtain a new lock which fits
a certain key. For example, consider the situation of a residential house having multiple
doors, such as a front door and a kitchen entrance. In such circumstances it is common
to have the locks configured in the same way such that a single key can be used to
unlock any of the doors to the house. If an addition is built to the house, there
may be a new door, e.g. a new garden door. In this situation, it is desirable to install
a lock in the garden door which could also be opened using the same key that is used
for the other doors of the house.
[0004] There are several more or less automated systems for producing a copy of a given
key. However, the prior art fails to provide
[0005] On the contrary, in the prior art, assembling a lock to fit a given key is an art
performed by an experienced locksmith. The locksmith examines the key and attempts,
at least partly by trial and error, to configure a lock which matches the key.
[0006] While, in many cases, an experienced locksmith is able to obtain a lock which matches
a given key, it can sometimes take a significant amount of time to produce a fitting
lock. Moreover, it would be beneficial to allow persons with less experience to be
able to create a lock from a key.
SUMMARY OF THE INVENTION
[0007] It is therefore an object of the invention to provide a method and system which allows
an automated key analysis and pin selection.
[0008] According to the invention there is provided a method for obtaining a lock configuration
matching a key. The method comprises the steps, executed in a lock configuration device,
of: capturing an image of the key; obtaining geometric characteristics of the key
using the captured image; determining, using the geometric characteristics, order
and types of pins for the lock configuration matching the key; and presenting the
determined types of pins in the determined order.
[0009] This enables an efficient and consistent way of determining a lock configuration
matching a key. This configuration can be used to assemble a lock which matches a
particular key. Furthermore, this method allows for quality control of key production,
where the method provides a pin sequence which can be checked against an expected
pin sequence.
[0010] The step of determining may comprise determining each pin separately using a subset
of the geometric characteristics.
[0011] The step of determining order and types of pins may comprise using a lookup table.
[0012] The step of determining order and types of pins may comprise using a rule bases pin
determination.
[0013] The step of obtaining geometric characteristics may comprise obtaining geometric
characteristics for two or more separate rows of teeth of the key.
[0014] The step of obtaining geometric measurements may comprise using a coordinate system
which is fixed in relation to an identifiable point of the key.
[0015] The step of obtaining geometric measurements may comprise converting a measurement
of pixels of the captured image into a unit of length.
[0016] A second aspect of the invention is a lock configuration device for obtaining a lock
configuration, said lock configuration matching a key. The lock configuration device
comprises: a key scanner arranged to capture an image of the key; a controller arranged
to obtain geometric characteristics of the key using the captured image; determining,
using the geometric characteristics, order and types of pins for a lock matching the
key; presenting the determined types of pins in the determined order.
[0017] The key scanner and controller may be provided in separate entities with a communication
channel for communication between the key scanner and the controller.
[0018] A third aspect of the invention is a computer program (101) for a lock configuration
device, the computer program (101) comprising computer program code which, when run
on the lock configuration device, causes the lock configuration device to perform
the steps of: capturing an image of the key; obtaining geometric characteristics of
the key using the captured image; determining, using the geometric characteristics,
order and types of pins for a lock matching the key; presenting the determined types
of pins in the determined order.
[0019] A fourth aspect of the invention is a computer program product comprising a computer
program according to the third aspect and a computer readable means on which the computer
program is stored.
[0020] It is to be noted that all aspects of the first, second third, fourth aspects can
be applied, where applicable, to any other of these aspects.
[0021] Embodiments of the invention provide an elegant and convenient solution to the problem
of assembling a lock fitting a given key. The user simply scans the key using the
key scanner and is provided with information to unambiguously select the correct pins
for a fitting lock. This reduces the time such an operation takes and increases reliability
compared to the prior art.
[0022] Generally, all terms used in the claims are to be interpreted according to their
ordinary meaning in the technical field, unless explicitly defined otherwise herein.
All references to "a/an/the element, device, component, means, step, etc." are to
be interpreted openly as referring to at least one instance of the element, device,
component, means, step, etc., unless explicitly stated otherwise. The steps of any
method disclosed herein do not have to be performed in the exact order disclosed,
unless explicitly stated.
BRIEF DESCRIPTION OF DRAWINGS
[0023] The invention is now described, by way of example, with reference to the accompanying
drawings, in which:
Fig 1 is a schematic diagram of an environment where the present invention can be
embodied,
Fig 2 is a schematic diagram of how key characteristics are obtained from an image
of a key according to an embodiment of the present invention,
Fig 3 is a schematic diagram of how pin types can be presented to a user,
Fig 4 is a flowchart illustrating a method according to an embodiment of the present
invention, and
Fig 5 shows one example of a computer program product comprising computer readable
means and a computer program thereon.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[0024] The present invention will now be described more fully hereinafter with reference
to the accompanying drawings, in which certain embodiments of the invention are shown.
This invention may, however, be embodied in many different forms and should not be
construed as limited to the embodiments set forth herein; rather, these embodiments
are provided by way of example so that this disclosure will be thorough and complete,
and will fully convey the scope of the invention to those skilled in the art. Like
numbers refer to like elements throughout the description.
[0025] Fig 1 is a schematic diagram of an environment where the present invention can be
embodied. The arrangement is used to provide a scheme of pin types 17 to a user so
the user can assemble a lock 18 matching a given key 12. The key 12 is thus the key
to be used as a base for the assembly of the lock 18. The key 12 is any key 12 where
its geometric construction determines whether it can open and close a lock or not.
[0026] The key is read by a key scanner 10. The key scanner 10 captures an image of the
key 12 to allow the geometric construction of the key 12 to be analysed. The key scanner
10 can comprise a camera, a flatbed scanner or any other suitable device for capturing
an image of the key 12. The key scanner is connected via a communication channel to
a computer 11. This communication channel can for example be a wired connection such
as USB (Universal Serial Bus), FireWire, serial RS-232, Ethernet, or a wireless connection
such as BlueTooth, ZigBee, wireless USB, wireless local area network (IEEE 802.11),
etc.
[0027] Once the key scanner 10 has captured an image of the key 12, as will be explained
in more detail below, geometric characteristics are obtained from the key. This can
be performed in the key scanner 10 or a computer 11 connected to the key scanner 10.
The computer 11 can be any suitable computer with capability of executing computer
programs, communicating with the key scanner 10 and which has a user interface allowing
the user 14 to be provided with information on what types of pins to use and in what
order to assemble them.
[0028] The user 14 thus gets information from the computer 11 on how to assemble a lock
18 which matches the key 12. This is schematically shown by the pins 17 of lock 18
which have been arranged in an order corresponding to the measurements obtained from
the image of the key 12.
[0029] The key scanner 10 and the computer 11 can in conjunction be called a lock configuration
device 19. The key scanner 10 and the computer 11 can be separate, as depicted in
Fig 1, or they can be combined in a single lock configuration device 19.
[0030] Fig 2 is a schematic diagram of how key characteristics are obtained from an image
5 of a key according to an embodiment of the present invention. In this example, the
notches 13a-f are measured to obtain the characteristics of the key. Firstly, a reference
point is found on the image 5 of the key 12. This can for example be at a reference
point 15 corresponding to where the lower part of a collar of the key 12 transitions
to the blade of the key 12. Furthermore, a horizontal reference is found, such as
the upper part of the blade 16. Alternatively, the horizontal reference can be a ridge
of the profile of the key. With the reference point 15 and the horizontal reference
established, a coordinate system can be fixed in relation to the key. Once the horizontal
reference is found, measurements 13a-f can be obtained in relation to the horizontal
reference. The measurements 13a-f can be obtained at predetermined horizontal distances
from the reference point 15. Optionally, the measurements 13a-f are obtained according
to the rules, for example, in a notch or on a tooth.
[0031] It is to be noted that the system can be configured to be applicable to several different
key types. The key types can be identifies by the geometrics of the key 12 or by the
user 14 entering key type to the computer 11. The key type can affect how many pins
are to be used, what set of pins to use (in other words selecting and appropriate
look-up table or rule set), and/or the horizontal distances between measurements 13a-f.
[0032] It is to be noted that the key 12 may assume other shapes, including more square
shaped keys. Furthermore, the key could have two or more separate rows of teeth on
the same key. As long as all teeth and/or notches are captured on the image 5 from
the key scanner 10, the measurements can be obtained from the image 5 and serve as
a base for the determination of pins.
[0033] Fig 3 is a schematic diagram of how pin types can be presented to a user. This can
for example be shown on a screen of the computer 11 of Fig 1. A graphical output 32
is shown, indicating the visually how the pins should be arranged. For example, for
some locks, every pin can be rotatably arranged in two ways, whereby the graphical
output assists the user to assemble the lock correctly. Furthermore, a second section
30 of the display shows part numbers for the user. In this way, the user can unambiguously
assemble a lock which fits a given key. The part numbers shown in Fig 3 are only examples,
any unambiguous identification of pins is possible. For example, in one example, the
second section 30 can present measurements of pins, if all pins have the same profile
and only differ in length.
[0034] Fig 4 is a flowchart illustrating a method according to an embodiment of the present
invention. The method assists a user in assembling a lock for a given key, as illustrated
e.g. in Fig 1. References will also be made to Fig 1 to further clarify the various
entities used in the method.
[0035] In an initial capture key image step 40, an image of the key 12 is obtained using
the key scanner 10.
[0036] In an obtain geometric characteristics step 41, the computer 11 or the key scanner
10 obtains the geometric characteristics of the key 12, as explained in with reference
to Fig 2 above.
[0037] In a determine order and type of pins step 42, the order and types of pins are determined.
Processing for each pin is performed separately. For each pin, one, two or even more
measurements can be required to determine its type. In this example, each pin determination
corresponds to one measurement (13a-f in Fig 2). To find a pin, the measurement (or
measurements) first need to be converted to a unit of length, such as millimetres.
Once the length is used, this can be used to determine an appropriate pin, either
using a look-up table, from measurement ranges to pins, or a determination rule. For
example, if a measurement is found to be 4.2 millimetres, this can correspond to a
pin with part number 111, if there is a rule that measurements between 4.05 and 4.35
matches a pin with part number 111. Similarly, if two measurements are needed to determine
a pin, the two measurements are used together to find a matching pin type number.
This process is repeated until all pins are determined.
[0038] In a present pins step 43, the pins determined in the previous step are presented
to the user. This allows the user to assemble a lock which fits the given key 12.
Alternatively, in key production, the presented pins are checked against expected
pins to verify that the key has been produced with characteristics as expected.
[0039] Fig 5 shows one example of a computer program product 100 comprising computer readable
means. On this computer readable means a computer program 101 can be stored, which
computer program can cause a controller to execute the method according to embodiments
described herein. In this example, the computer program product is an optical disc,
such as a CD (compact disc) or a DVD (digital versatile disc). The computer program
product could also be embodied as a memory of a device, such as a memory of the computer
11. While the computer program 101 is here schematically shown as a track on the depicted
optical disk, the computer program can be stored in any way which is suitable for
the computer program product.
[0040] The invention has mainly been described above with reference to a few embodiments.
However, as is readily appreciated by a person skilled in the art, other embodiments
than the ones disclosed above are equally possible within the scope of the invention,
as defined by the appended patent claims.
1. A method for obtaining a lock configuration matching a key (12), the method, comprising
the steps, executed in a lock configuration device (19), of:
capturing (40) an image of the key;
obtaining (41) geometric characteristics of the key using the captured image;
determining (41), using the geometric characteristics, order and types of pins for
the lock configuration matching the key (12); and
presenting (43) the determined types of pins in the determined order.
2. The method according to claim 1, wherein the step (42) of determining comprises determining
each pin separately using a subset of the geometric characteristics.
3. The method according to claim 1 or 2, wherein the step (42) of determining order and
types of pins comprises using a lookup table.
4. The method according to claim 1 or 2, wherein the step (42) of determining order and
types of pins comprises using a rule based pin determination.
5. The method according to any one of the preceding claims, wherein the step (41) of
obtaining geometric characteristics comprises obtaining geometric characteristics
for two or more separate rows of teeth of the key (12).
6. The method according to any one of the preceding claims, wherein the step (41) of
obtaining geometric measurements comprises using a coordinate system which is fixed
in relation to an identifiable point (15) of the key (12).
7. The method according to any one of the preceding claims, wherein the step (41) of
obtaining geometric measurements comprises converting a measurement of pixels of the
captured image into a unit of length.
8. A lock configuration device (19) for obtaining a lock configuration, said lock configuration
matching a key, wherein the lock configuration device (19) comprises:
a key scanner (10) arranged to capture an image of the key;
a controller arranged to obtain geometric characteristics of the key using the captured
image;
determining, using the geometric characteristics, order and types of pins for a lock
matching the key;
presenting the determined types of pins in the determined order.
9. The lock configuration device (19) according to claim 8, wherein the key scanner (10)
and controller are provided in separate entities with a communication channel for
communication between the key scanner (10) and the controller.
10. A computer program (101) for a lock configuration device (19), the computer program
(101) comprising computer program code which, when run on the lock configuration device
(19), causes the lock configuration device (19) to perform the steps of:
capturing an image of the key;
obtaining geometric characteristics of the key using the captured image;
determining, using the geometric characteristics, order and types of pins for a lock
matching the key;
presenting the determined types of pins in the determined order.
11. A computer program product (100) comprising a computer program (101) according to
claim 10 and a computer readable means on which the computer program is stored.