Key duplication machine having user-based functionality

ABSTRACT

A machine is disclosed for use in duplicating features of an existing key within a key blank. The machine may have an identification module configured to capture data associated with the features of the existing key, a fabrication module configured to cut the features in the key blank based on the data, a user input device, and a controller in communication with the identification module, the fabrication module, and the user input device. The controller may be configured to regulate operation of the identification module and the fabrication module, and to receive input from a user via the user input device. The input may be indicative of the user being a first type of user or a second type of user. The controller may also be configured to selectively implement one of a first mode of operation or a second mode of operation based on the input.

RELATED APPLICATIONS

This application is a continuation application under 35 U.S.C. § 120 ofU.S. patent application Ser. No. 16/858,844, filed Apr. 27, 2020, whichis a continuation application of U.S. application Ser. No. 16/186,524,filed Nov. 10, 2018, which is a continuation application of U.S.application Ser. No. 15/414,323, filed Jan. 24, 2017, which claims thebenefit of priority to U.S. Provisional Application No. 62/292,671 filedon Feb. 8, 2016, the entire contents of all of which are expresslyincorporated herein by reference.

TECHNICAL FIELD

The present disclosure is directed to a key duplication machine and,more particularly, to a key duplication machine having user-basedfunctionality.

BACKGROUND

An existing key can be duplicated in any number of different ways, bymeasuring a profile of the existing key and duplicating that profilewithin a corresponding key blank. The key blank generally has a size andshape larger than the master key, so that the key blank can be machined(e.g., cut and/or milled down) to function like the existing key. Ingeneral, keys can be divided into two different categories, including atransponder category and a non-transponder category.

Transponder keys are most common among newer automobiles, but may alsobe available for commercial and residential building locks. Atransponder key has an rf transmitter imbedded therein, which generatesa signal used to disarm an associated security system. The signalgenerated by each rf transmitter is unique and matched to the specifickey housing the transponder. Accordingly, when a transponder key is tobe duplicated, the corresponding key blank must also include atransponder encoded the same as the master key. Non-transponder keys aremost common among older automobiles and conventional building locks. Ingeneral, transponder keys are more expensive and difficult to duplicate,because of the inclusion of the rf transmitter.

Key duplication machines are used to create copies of existing keys. Twodifferent types of duplication machines are in use today by twodifferent types of users. The first type of duplication machine is aself-service vending machine intended for direct use by a customer. Thevending machine is capable of duplicating a few of the most common andsimple types of keys, when the customer inserts an existing key andpayment into the machine. No training is required for use of the vendingmachine, but the selection and complexity of keys that can be duplicatedby the vending machine are limited to the inventory of key blanks storedinside the vending machine. In most instances, transponder keys (i.e.,the types of keys having imbedded rf transmitters) cannot be duplicatedby the vending machine. This is because transponder keys are moreexpensive than other types of keys, and a miscut or incorrect coding ofa transponder key can be costly for the vending machine owner. Inaddition, problems experienced during duplication of transponder keyscould deter customers from future use of the vending machine.

The second type of duplication machine is a manually operated machineintended for use by a retail store sales employee. The manually operatedmachine is capable of duplicating a wide variety and complexity of keys,and uses jigs, pattern followers, or punches to produce a new key usinga corresponding key blank selected and secured by the store employee.Training is typically provided for use of the manually operated machine,but the selection and complexity of keys that can be duplicated by themanually operated machine is quite broad. For example, a transponder keycan be duplicated by a store employee using the manually operatedmachine.

Although the two types of key duplication machines discussed above maybe acceptable for some environments, they can also be problematic. Inparticular, having only one type of machine is a sales environment canlimit the number and type of customers attracted to the environment.However, having both types of machines in the sales environment canconsume valuable floor space and increase equipment and operating costs.

The disclosed key duplication machine is directed to overcoming one ormore of the problems set forth above and/or other problems of the priorart.

SUMMARY

In one aspect, the present disclosure is directed to a machine forduplicating features of an existing key in a key blank. The machine mayinclude an identification module configured to capture data associatedwith the features of the existing key, a fabrication module configuredto cut the features in the key blank based on the data, a user inputdevice, and a controller in communication with the identificationmodule, the fabrication module, and the user input device. Thecontroller may be configured to regulate operation of the identificationmodule and the fabrication module, and to receive input from a user viathe user input device. The input may be indicative of the user being afirst type of user or a second type of user. The controller may also beconfigured to selectively implement one of a first mode of operation ora second mode of operation based on the input identifying a type of theuser.

In another aspect, the present disclosure is directed to another machinefor duplicating features of an existing key in a key blank. This machinemay include an identification module configured to capture dataassociated with the features of the existing key, a fabrication moduleconfigured to cut the features in the key blank based on the data, auser input device, and a transponder encoder. The machine may alsoinclude a controller in communication with the identification module,the fabrication module, the user input device, and the transponderencoder. The controller may be configured to regulate operation of theidentification module and the fabrication module, and to receive inputfrom a user via the user input device. The input may be indicative ofthe user being a customer or a store employee. The controller mayfurther be configured to selectively allow encoding and fabrication ofthe features in the key blank only when the input indicates the user isa store employee.

In yet another aspect, the present disclosure is directed to anothermachine for duplicating features of an existing key in a key blank. Thismachine may include an identification module configured to capture dataassociated with the features of the existing key, a fabrication moduleconfigured to cut the features in the key blank based on the data, auser input device, a display, and a reader configured to read an indexassociated with the key blank. The machine may also include a controllerin communication with the identification module, the fabrication module,the user input device, the display, and the reader. The controller maybe configured to regulate operation of the identification module and thefabrication module, and receive input from a user via the user inputdevice. The input may be indicative of the user being a customer or astore employee. The controller may also be configured to instruct theuser via the display to select the key blank from among a plurality ofavailable key blanks based on the data captured by the identificationmodule, and to instruct the user to pass the index associated with thekey blank in proximity to the reader. When the input indicates the useris a customer, the controller is further configured to determine a costassociated with duplicating the existing key based on the signals fromthe reader. The controller is additionally configured to allow thefabrication module to cut the features in the key blank regardless ofpayment being received only when the input indicates the user is a storeemployee.

In still another aspect, the present disclosure is directed to a methodof duplicating features of an existing key within a key blank. Themethod may include capturing data associated with the features of theexisting key, and fabricating the features in the key blank based on thedata. The method may also include receiving input from a user indicativeof the user being a customer or a store employee, and selectivelyimplementing one of a first mode of operation or a second mode ofoperation based on the input identifying a type of the user.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an isometric view illustration of an exemplary key duplicationcenter;

FIG. 2 is an isometric view illustration of an exemplary key duplicationmachine that forms a portion of the center of FIG. 1;

FIG. 3 is a control diagram of the key making machine of FIG. 2; and

FIG. 4 is an exemplary disclosed graphical user interface associatedwith the key duplication machine of FIG. 2; and

FIG. 5 is a flowchart depicting an exemplary process of duplicating anexisting key using the key duplication machine of FIG. 2.

DETAILED DESCRIPTION

FIG. 1 illustrates an exemplary key making center (“center”) 10 that canbe used to fabricate a copy of an existing key from a corresponding keyblank. Center 10 may include, among other things, a key making machine(“machine”) 12, and an inventory 14 of key blanks that are storedoutside of machine 12. In the disclosed embodiment, inventory 14includes key blanks arranged by type, size, and/or identification numberon a wall 16 behind machine 12, in one or more carousels 18 located ontop of machine 12, and/or in a cabinet 20 below machine 12. It iscontemplated that the key blanks may be organized and displayed in anymanner known in the art. It is important only to note that the keyblanks are maintained outside of machine 12 and are manually retrievablefor use within machine 12 during a key duplication process.

As shown in FIG. 2, machine 12 may be designed for human interactionduring the key duplication process. In particular, machine 12 may have acentralized display 22, a key blank slot (“slot”) 24, one or moreexisting key slots (“slots”) 26, a transponder section 28, and a reader30. Following queues provided via display 22, a user may insert anexisting key into slot 24 for identification and/or data capturing, andthen insert a corresponding key blank manually retrieved from inventory14 into slot 26 for fabrication. Transponder section 28 may be used todetect and/or program transponders embedded within the existing keyand/or the key blank. Reader 30 may be used to confirm that a manuallyretrieved key blank is the correct key blank corresponding to theexisting key, and/or to charge the user for the key duplication process.One of more of slot 24, slot(s) 26, transponder section 28, and reader30 may be provided with an indicator light 32 in close proximity thatprovides additional queues to the user of machine 12.

A diagrammatic illustration of machine 12 is provided in FIG. 3. Asshown in this figure, machine 12 may be generally modular and include,among other things, an identification module 34 configured to receivethe shank end of an existing key inserted through slot 24, at least onefabrication module 36 configured to receive the shank end of a key blankinserted through slot 26, a transponder sensor/cloner 38 associated withtransponder section 28, and a controller 40. Controller 40 maycommunicate with each of the other components, as well as with display22, reader 30, and indicator light(s) 32 to regulate the key duplicationprocess. Although the inter-component communications shown in FIG. 3 areillustrated as wired connections, it is contemplated that some or all ofthese communications could be wireless (e.g., Bluetooth, cellular,infrared, radio, Wi-Fi, etc.), if desired. It is further contemplatedthat machine 12 could be equipped with a router or cellular modem forcommunication with another machine 12, a back office, a service tool,etc.

As described above, display 22 may provide queues to the user of machine12 regarding the key duplication process. These queues may include,among other things, when, where, and how to insert the existing key andthe key blank into machine 12. For example, display 22 may have agraphical user interface (GUI) that shows an image of the outside ofmachine 12, along with highlighting of the active slot (i.e., slot 24 orslot 26) that should be used for key insertion. In another example,controller 40 may correlate images on display 22 with illumination ofparticular indicator lights 32, thereby guiding the user to the correctslot. Further, a color, intensity, and/or frequency of lightillumination may vary based on a degree of key insertion. For example, aparticular indicator light 32 could initially illuminate in a red color,attracting the attention of the user to the corresponding slot. Then, asthe user inserts the existing key or the key blank into that slot, theparticular indicator light 32 could illuminate in a yellow color,followed by green when the key is fully and properly inserted. Otherillumination strategies may also be employed.

In some embodiments, display 22 may additionally allow the user to inputinstructions, make selections, and/or answer questions regarding adesired duplication event. The instructions may include, for example, anumber of duplicate keys to be produced, a desired pick-up time, auser's name, a desired delivery address, key identification information,a desire for duplication information to be stored for future reference,etc. The questions asked of the user may include for example, a make,model, and/or year of an associated car that the existing keycorresponds with; a type and/or brand of lock to which the existing keybelongs; and whether the existing key is a transponder key. Theinstructions, selections, and/or questions, as well as correspondingresponses, may be communicated visually, audibly, and/or tactilely viadisplay 22, as desired. For example, display 22 may be a touch screenand/or include another input device such as a key board, a mouse, alight pen, or a microphone that receives input from the user.Information received via display 22 may be directed to controller 40 forfurther processing, and controller 40 may respond to the customer viadisplay 22.

Reader 30 may be configured to detect and read an index 42 associatedwith the key blanks of inventory 14. In one example, each index 42 is aunique barcode printed on a card to which each key blank is affixed, andcorresponds with information stored in a memory of controller 40. Forexample, the barcode could correspond with an identity of the affixedkey blank and/or a cost associated with using the affixed key blank in aduplication process. It is contemplated that the barcode (or anotherindex 42) could alternatively be located directly on the key blank, ifdesired. Signals generated by reader 30 may be directed to controller 40for comparison of the stored identity with an expected identity of acorrect key blank. If the identity associated with index 42 does notcorrespond with the expected identity of the correct key blank,controller 40 may then cause display 22 to alert the user that theselected key blank is incorrect.

Identification module 34 may be configured to detect, identify, and/ormeasure distinguishing characteristics of the existing key insertedthrough slot 24. Although identification module 34 is shown in FIG. 2 asbeing co-located within a common housing, it is contemplated thatidentification module 34 could alternatively be housed separately andpositioned near (e.g., adjacent and facing in the same or anotherdirection as) or remote from fabrication module 36, as desired.Identification module 34 may include, among other things, a keyreceiving assembly 44 and an imaging system 46. Key receiving assembly44 may be configured to receive an existing key in a particularorientation (e.g., lying horizontally with the shank thereof pointedinward toward the module) and at a particular location. Imaging system46 may be configured to generate images of the existing key (or portionsthereof) after it is received within key receiving assembly 44, and todirect data associated with the images to controller 40.

An exemplary embodiment of key receiving assembly 44 is shown in FIG. 3as having a clamp 48 located immediately adjacent slot 24, and a guide50 positioned at a side of clamp 48 opposite slot 24. Each of thesecomponents may cooperate to receive an existing key as the existing keyis inserted by the user shank-first through slot 24. For example, sideedges of slot 24 may be beveled inward toward a general center suchthat, as the existing key is inserted, the head of the existing key mayengage the bevels and be urged toward the center (i.e., toward greateralignment with guide 50). Guide 50 may slide from clamp 48 inward to adesired imaging position during and/or after insertion of the existingkey through slot 24. Clamp 48 may be spring-biased to secure theexisting key in place during imaging, and a mechanical advantage may beprovided to help reduce the effort required from the operator to insertthe existing key through slot 24. In the disclosed embodiment, themechanical advantage is provided by way of a lever arm 51.

Imaging system 46 may be a vision-based system employing one or moresources of visible and/or invisible light, and a receiver. The receivermay be, for example, a camera 52 that is located to any side of theexisting key during imaging. Camera 52 may be configured to captureimages of the existing key, while the light sources are selectivelyturned on and off. In the disclosed example, the light sources are “backlights” 54 configured to shine directly or indirectly toward theexisting key from a side opposite (e.g., from below) camera 52. Camera52, at this time, may capture a silhouette image of the existing keyshowing an exterior edge outline of the existing key and a location ofreference features of the existing key (e.g., of shoulders and/or a tipof the existing key). Signals generated by camera 52 may be directed tocontroller 40 for further processing.

In another example, imaging system 46 may include one or more “sidelights” 56 and/or a laser 58. Side lights 56 may be configured to shinelight onto the existing key, one at a time, from an oblique side angle.During activation of each side light 56, camera 52 may be used togenerate an image of the existing key showing an interior edge outlineof notches milled into a center of the existing key. Laser 58 may beconfigured to scan the existing key while camera 52 generates one ormore transverse stripe images. These additional signals generated bycamera 52 may also be directed to controller 40 for further processing.

Fabrication module 36 may include, among other things, a receiving unit60, and one or more cutting wheels 62 movable relative to receiving unit60 via a gantry 64. The key blank retrieved by the user from inventory14 based on image data captured via identification module 34 may beinserted through slot 26 into receiving unit 60. After being accepted byreceiving unit 60 (e.g., after the shank end of the key blank has passedthrough slot 26), cutting wheel(s) 62 and gantry 64 may be selectivelyactivated to produce desired features within the key blank.

Receiving unit 60 may have any configuration known in the art forreceiving, clamping, and/or positioning the inserted key blank relativeto cutting wheels 62. In one embodiment, receiving unit 60 includes jawsthat are spring-biased toward each other to sandwich the key blank therebetween, and/or a clamp that is movable to secure the key blank oncepositioned. In some embodiments, a sensor may be used to measure a shanklength of the key blank during insertion, the length being subsequentlyused by controller 40 as a way to confirm proper placement of the keyblank. Once the key blank has been placed at a desired cutting location,the clamp may be actuated to push down on only the key blank.Thereafter, the jaws may be completely withdrawn from the key blank,exposing the shank of the key blank to cutting wheels 62.

Cutting wheels 62 may be used to make notches in one or both shank edgesof the key blank. During fabrication of the notches, one or more motorsconnected to cutting wheels 62 may be selectively activated, and a leadscrew of gantry 64 may be driven in an X-direction to move cuttingwheels 62 into and out of the shank along the length or Y-direction ofthe key blank. The amount of movement in the X-direction at a givenposition in the Y-direction may be controlled based on the pattern ofexisting notches measured in the existing key by identification module34. For a singled-edge key, only one of cutting wheels 62 may be used atone side of the key blank. For a dual-edge key, both cutting wheels 62may be used at the same time or at different times to create notches inopposing sides of the key blank. It is contemplated that somefabrications modules 36 may have only one cutting wheel 62, while otherfabrication modules 36 may include the two cutting wheels 62 describedabove. In particular, some systems may be designed to cut only a singleedge into a key blank, while other systems may be designed to cut dualedges. In fact, it may be possible for a single fabrication module 36 toinclude both types of systems. Any configuration may be possible.

As discussed above, it may be possible for the existing key that theuser wishes to duplicate to be embedded with or otherwise include atransponder that enables activation of an associated lock (e.g., anignition lock in a vehicle). In these situations, it may be desirable tocode a new duplicate key (i.e., the key blank notched by machine 12) tomatch the existing key with the same transponder code to ensure that theduplicate key functions in the same manner as the existing key. In thedisclosed embodiment, the transponder code in the existing key can bedetected and read at sensor/cloner 38. And after fabricating notchesinto the shank of the appropriate key blank, the same code may be clonedwithin the transponder of the new key at sensor/cloner 38. In thedisclosed embodiment, sensing and cloning are performed by the samedevice and at the same location on machine 12. It is contemplated,however, that different devices located together or separately mayalternatively be used to perform these functions, if desired.

Controller 40 may embody a single microprocessor or multiplemicroprocessors that include a means for controlling operations ofmachine 12. Numerous commercially available microprocessors can beconfigured to perform the functions of controller 40. Controller 40 mayinclude all the components required to run an application such as, forexample, a memory, a secondary storage device, and a processor, such asa central processing unit or any other means known in the art forcontrolling display 22, reader 30, indicator lights 32, identificationmodule 34, fabrication module 36, and transponder sensor/cloner 38.Various other known circuits may be associated with controller 40,including power supply circuitry, signal-conditioning circuitry,solenoid driver circuitry, communication circuitry, switching circuitry,and other appropriate circuitry.

In some embodiments, machine 12 may also include a means for receivingpayment from the user. These means may include, for example, a coinoperated mechanism, a bill receiver, a credit card reader, and/or areceipt reader (e.g., a barcode reader configured to recognize aprevious payment having already been received at another location and/ortime). The means for receiving payment may be located anywhere onmachine 12, and be capable of directing signals associated with thepayment to controller 40 (or elsewhere) for further processing.

FIG. 4 illustrates an exemplary graphical user interface that may beshown on display 22 during a duplication process that is implemented bycontroller 40 and depicted in FIG. 5. FIGS. 4 and 5 will be described inmore detail in the following section to further illustrate the disclosedconcepts.

INDUSTRIAL APPLICABILITY

The disclosed key duplication machine 12 may be utilized to duplicate anexisting key from a key blank stored in inventory 14. The disclosedduplication machine 12 may be easy to use by both an untrained customerand a retail store sales employee. An exemplary operation of thedisclosed key duplication machine 12 will now be described withreference to FIGS. 4 and 5.

To begin the duplication process, a user (e.g., the customer or thesales employee) may approach machine 12 and be greeted by a message ondisplay 22. FIG. 4 represents one such message that may be shown ondisplay 22 at this time. As seen in FIG. 4, the greeting message shownon display 22 may ask the user to indicate if the user is a customer oran employee, and provide a way for the user to respond. Specifically,the user may touch one of two designated areas (e.g., a customer area 66or an employee area 68) of display 22 corresponding to the correctanswer.

As seen in FIG. 5, controller 40 may determine the response provided bythe user (Step 500), and selectively implement one of two availablemodes of operation based on the response. These modes of operation mayinclude a customer mode of operation and an associate mode of operation,wherein the two modes of operation have different functionality. In thedisclosed embodiment, the customer mode of operation has limitedfunctionality, when compared to the associate mode of operation. It iscontemplated, however, that more than two modes of operation may beavailable and/or that the customer mode of operation could have greaterfunctionality than the remaining mode(s), if desired.

When area 66 of the GUI shown on display 22 has been touched, controller40 may instruct the customer to insert the existing key to be duplicatedinto slot 24 of identification module 34 (Step 505). Part of thisinstruction may include an animation of the insertion action shown ondisplay 22, and/or illumination of the corresponding indicator light 32located adjacent slot 24. The customer may need to press on lever arm 51at this time, in order to facilitate insertion of the existing key. Insome embodiments, the instruction provided by controller 40 may show howto use lever arm 51. After successful insertion of the existing key intoslot 24 (e.g., after the corresponding indicator light 32 turns green),the customer may release lever arm 51. Controller 40 may then triggercamera 52 to capture image data associated with the existing key (Step510).

Based on the image data, controller 40 may determine if the existing keyis likely to include a transponder (Step 515). This likelihood may bedetermined based on a shape, type, size, etc. of the existing key, asrecognized by controller 40 from the captured image data. In particular,the image data captured by camera 52 may be compared to image dataassociated with known transponder keys stored in memory. When theinserted existing key is determined by controller 40 likely to be atransponder key (step 515: Y), controller 40 may relay that informationto the customer via display 22, and instruct the customer to seekassistance from a sales employee (Step 520). In the disclosedembodiment, this results in termination of the duplication process, andcontrol returns from step 520 to step 500.

However, when controller 40 determines that the existing key insertedinto slot 24 is not likely to be a transponder key (step 515: N),controller 40 may instead instruct the customer to retrieve acorresponding key blank from inventory 14 and to scan index 42 withreader 30 (Step 525). As in step 505 described above, the instruction ofstep 525 may include use of animation and/or indicator lightillumination, if desired. The information corresponding to the scannedindex 42 may then be compared with information corresponding to acorrect or intended key blank to determine if the retrieved key blank isthe correct key blank (Step 530). If the retrieved key blank is not thecorrect key blank (step 530: N), controller 40 may cause an errormessage to be shown on display 22 (Step 535), and control may return tostep 525.

It is contemplated that the customer may have a key that is not withinthe capabilities of machine 12 to duplicate. In this situation, when thecustomer inserts the existing key at step 505, the customer may beinformed of the inability to duplicate the key or instructed to seeassociate assistance. This may occur even when the existing key is not atransponder key.

At step 530, when controller 40 determines that the retrieved key blankis the correct key blank (step 530: Y), controller 40 may display a costfor duplicating the existing key using the retrieved key blank (Step540). In addition, in some embodiments, controller 40 may provideinstruction for making payment at step 540. The instruction couldinclude use of a built-in payment mechanism, scanning of a paymentreceipt, wireless payment, or payment in another form. The process ofkey duplication may then pause until sufficient payment has beenreceived. That is, controller 40 may determine if payment has beenreceived (Step 545), and loop back through step 540 until this conditionbecomes true. This may inhibit fabrication by a customer of a key thathas not yet been paid for. After payment is received, controller 40 mayinstruct the customer to insert the retrieved key blank into slot 26 offabrication module 36 (Step 550), and cause fabrication module 36 toinitiate cutting of the features of the existing key into the key blank(Step 555). After completion of the cutting process, controller 40 mayinstruct the customer via display 22 to remove all keys (i.e., theexisting key and the newly cut key) from slots 24 and 26 (Step 560).

Returning to step 500, when the user touches area 68 of the GUI shown ondisplay 22, controller 40 may instruct the sales employee to insert theexisting key into slot 24 (Step 565) and then trigger camera 52 tocapture image data (Step 570). These steps may be substantiallyidentical to steps 505 and 510, respectively, that are described above.However, instead of automatically determining, based on the image data,if the existing key is likely to have a transponder, controller 40 mayinstead instruct the employee to retrieve the corresponding key blankand scan index 42 (Step 575). That is, the employee may be allowed toproceed with the process of FIG. 5, regardless of the existing keyhaving a transponder. Controller 40 may then determine if the retrievedkey blank is correct (Step 580), and display an error message if theretrieved key blank is incorrect (Step 585). Steps 575-585 may besubstantially identical to steps 525-535 described above.

Following step 580, when controller 40 determines that the key blankretrieved by the sales employee is the correct key blank correspondingto the existing key inserted into slot 24 (step 580: Y), controller 40may prompt the employee to indicate if the existing key has atransponder (Step 587). In other words, controller 40 may rely on thetraining of the employee when determining if the existing key has atransponder. In some embodiments, the employee may be unsure of theexistence of the transponder, and may manually move the existing keypast transponder sensor/cloner 38 in order to confirm such existence. Itis contemplated that indicator light 32 located proximate transpondersensor/cloner 38 could automatically illuminate when the transponder ispresent within the existing key and the existing key is moved pasttransponder sensor/cloner 38. Other methods of manually and/orautomatically determining the existence of the transponder may also beutilized, if desired.

After prompting the employee for input at step 587, controller 40 maydetermine if the subsequent response from the employee indicates theexisting key is a transponder key (Step 589). When the existing key isindicated as being a transponder key (step 589: Y), controller 40 mayinstruct the employee to encode the retrieved key blank with the samecode found in the existing key (Step 590), and then to insert the keyblank into slot 26 (Step 592). When the existing key is indicated as notbeing a transponder key (step 589: N), control may proceed from step 589directly to step 592 (i.e., control may bypass step 590).

Following step 592, controller 40 may simultaneously perform twodifferent functions. Specifically, controller 40 may be configured tocause fabrication module 36 to initiate cutting of features into the keyblank (Step 596—substantially identical to step 555) and also todetermine if additional existing keys are to be duplicated (Step 594).Controller 40 may prompt the employee at this time to make thedetermination of step 594, or the employee may have already entered theinformation at another time during the process (e.g., at a beginning ofthe process, the employee may have indicated that multiple existing keysrequired duplication). If no additional existing keys are to beduplicated (step 594: N), and after completion of the feature cuttingprocedure, controller 40 may instruct the employee to remove all keysfrom slots 24 and 26 (Step 598—substantially identical to step 560).However, if additional existing keys are to be duplicated, control mayinstead move from step 594 to step 599, at which the employee isinstructed by controller 40 to remove only the existing key from slot24. Control may then return from step 599 to step 565. This may allowfor images of a second existing key to be captured at about the sametime that features of the first existing key are being cut into thecorresponding key blank, which could save time and increase profitsassociated with the duplication process.

It should be noted that one or more of the steps shown in FIG. 5 may befollowed in an order different than described above, if desired. Forexample, step 587, step 589, and part of step 590 (i.e., the decodingpart of step 590) could be completed at any time after completion ofstep 500. Other steps of FIG. 5 could also be rearranged, omitted, oradded, if desired. For example, it should be noted that the depictedprocess used by an employee does not involve payment for the duplicationprocess. That is, the employee may be allowed to duplicate a keyregardless of payment being received. It is contemplated, however, thatsteps similar to steps 540 and 545 may be followed by the employee, ifdesired.

The disclosed key making machine 12 may allow for the making of agreater variety of keys by a broader spectrum of users. Specifically,customers may utilize machine 12 to make non-transponder types of keyshaving any configuration available in inventory 14. In addition, salesemployees may utilize machine 12 to make the same keys available to acustomer, as well as transponder keys. This may reduce a floor spaceconsumed by machine 12 within the retail environment, and help to boostprofitability and customer satisfaction. In addition, because thevariety of keys that machine 12 may duplicate is not limited to a numberof key blanks that can be stored inside of machine 12, the use ofmachine 12 may be expanded.

It will be apparent to those skilled in the art that variousmodifications and variations can be made to the disclosed key makingmachine. Other embodiments will be apparent to those skilled in the artfrom consideration of the specification and practice of the disclosedkey making machine. For example, although the two operating modes ofmachine 12 are described as being selectively implemented based on inputfrom a user, it is contemplated that machine 12 could be configured toonly operate in the customer mode, only operate in the associated mode,and/or to only operate in a hybrid mode (i.e., a combination of modesrequiring input from the customer and the associate). It is intendedthat the specification and examples be considered as exemplary only,with a true scope being indicated by the following claims and theirequivalents.

What is claimed is:
 1. A method of duplicating features of an existingkey within a key blank, comprising: capturing at least one image of theexisting key using an imaging system of an identification module;extracting, using the identification module, data associated with thefeatures of the existing key from the at least one image; fabricatingthe features in the key blank based on the data using a fabricationmodule; receiving input from a user, the input indicating whether theuser is a customer or a store employee; and selectively implementing afirst mode of operation when the user is the customer and implementing asecond mode of operation when the user is the store employee.
 2. Themethod of claim 1, further comprising: determining, using theidentification module, whether the existing key has a transponder. 3.The method of claim 2, wherein during operation in the first mode, themethod further comprises: inhibiting duplication of the existing keywhen the existing key has a transponder.
 4. The method of claim 3,further including providing user instruction indicating that theexisting key cannot be duplicated.
 5. The method of claim 1, wherein theat least one image includes a plurality of images and capturing the atleast one image further comprises: selectively switching on or off oneor more light sources associated with the imaging system; obtaining theplurality of images by switching on different combinations of the one ormore light sources.
 6. The method of claim 1, wherein capturing the atleast one image further comprises: switching on at least one lightsource configured to shine light directly or indirectly on the existingkey; and capturing the at least one image as a silhouette image of theexisting key.
 7. The method of claim 1, wherein the at least one imagemay be a transverse stripe image.
 8. The method of claim 1, furthercomprising: obtaining at least a portion of the data by scanning theexisting key using a laser.
 9. The method of claim 1, furthercomprising: determining a cost associated with duplicating the existingkey; and fabricating the features in the key blank during operation inthe first mode after payment in an amount at least equal to the cost isreceived from the user.
 10. The method of claim 9, further comprising:fabricating the features in the key blank during operation in the secondmode regardless of payment being received.
 11. The method of claim 1,wherein during operation in the second mode, the method furthercomprises: prompting the user to provide input indicative of whether theexisting key has the transponder.
 12. The method of claim 1, furtherincluding: instructing the user to select the key blank from among aplurality of available key blanks based on the data; reading an indexassociated with the key blank; and determining whether the selected keyblank corresponds to the existing key based on the index; andselectively implementing the first mode of operation or the second modeof operation when the selected key blank corresponds to the existingkey.
 13. A machine for duplicating features of an existing key within akey blank, the machine comprising: an identification module comprisingan imaging system configured to capture at least one image of theexisting key, the identification module being configured to extract dataassociated with the features of the existing key from the at least oneimage; a fabrication module configured to cut the features in the keyblank based on the data; a user input device; and a controller incommunication with the identification module, the fabrication module,and the user input device, the controller being configured to: receive,via the user input device, an input indicating whether a user is acustomer or a store employee; and selectively implement a first mode ofoperation when the user is the customer and implementing a second modeof operation when the user is the store employee.
 14. The machine ofclaim 13, further comprising: one or more light sources configured toilluminate the existing key, wherein the controller is furtherconfigured to: selectively switch on or off the one or more lightsources; and obtain, using the imaging system, a plurality of imagesusing different combinations of the one or more light sources.
 15. Themachine of claim 13, further comprising: a light source configured toshine light directly or indirectly on the existing key, wherein thecontroller is further configured to: obtain, using the imaging system,the at least one image as a silhouette image of the existing key. 16.The machine of claim 13, further comprising: a side light sourceconfigured to shine light at an oblique side angle on the existing key,wherein the controller is further configured to: obtain, using theimaging system, the at least one image including an interior edgeoutline of notches in the existing key.
 17. The machine of claim 13,further comprising: a laser configured to scan the existing key; and theimaging system is configured to obtain the at least one image as atransverse stripe image.
 18. The machine of claim 13, further including:a sensor configured to detect whether the existing key has atransponder, wherein, when the existing key has a transponder, thecontroller is further configured to: inhibit duplication of the existingkey with the fabrication module during the first mode of operation; andcontrol the fabrication module to duplicate the existing key during thesecond mode of operation.
 19. The machine of claim 13, wherein: theexisting key is a first existing key; the key blank is a first key blankcorresponding to the first existing key; and the controller isconfigured to: inhibit the identification module from capturing dataassociated with a second existing key during cutting of the first keyblank during the first mode of operation; and allow the identificationmodule to capture data associated with a second existing key duringcutting of the first key blank during the second mode of operation. 20.The machine of claim 13, further including: a display; and a reader,wherein the controller is further configured to: instruct the user viathe display to select the key blank from among a plurality of availablekey blanks based on the data captured by the identification module;control the reader to read an index associated with the key blank;confirm that the user has selected the key blank corresponding to theexisting key based on signals from the reader; and regulate operation ofthe fabrication module to cut the features in the key blank based on thedata when the key blank corresponds to the existing key.