WO2016012604A1 - Method and apparatus for duplicating keys with electronic code - Google Patents

Method and apparatus for duplicating keys with electronic code Download PDF

Info

Publication number
WO2016012604A1
WO2016012604A1 PCT/EP2015/067033 EP2015067033W WO2016012604A1 WO 2016012604 A1 WO2016012604 A1 WO 2016012604A1 EP 2015067033 W EP2015067033 W EP 2015067033W WO 2016012604 A1 WO2016012604 A1 WO 2016012604A1
Authority
WO
WIPO (PCT)
Prior art keywords
reading
key
writing unit
control apparatus
original
Prior art date
Application number
PCT/EP2015/067033
Other languages
French (fr)
Inventor
Massimo Bianchi
David Rebuli
Alessandro ALPAGO
Luca BARATTI
Original Assignee
Keyline S.P.A.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Keyline S.P.A. filed Critical Keyline S.P.A.
Publication of WO2016012604A1 publication Critical patent/WO2016012604A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00865Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00888Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed programming by learning

Definitions

  • the present invention relates to a multipurpose station adapted to duplicate keys provided with mechanical encoding of traditional type and with electronic encryption, of the type also known in itself and which has generally been in use for several years in various technical applications.
  • the invention also relates to various methods for using said means which allow to reproduce one of such keys.
  • electronic key means any key provided with internal storage devices adapted to store at least one of the following three code types:
  • ID code an open identification code
  • all three types of keys are provided with means adapted to receive external radio signals, to process said radio-electric signals, to store them and to retransmit them to further radio-electric signals corresponding to the executed processing.
  • the first aspect is unquestionably that of security; the person who legitimately requires to have a duplicate of key they own must have the certainty that the key can be duplicated, and possibly sent/transmitted, without the duplicated key being intercepted or stolen by third parties and that the data necessary for producing the duplicated key cannot be intercepted or decrypted by third parties;
  • the second aspect is that of the rapidity and cost-effectiveness of the key duplicating service; usually the duplication request is urgent because the user has lost one of the keys they own or must provide one or more supplementary keys to a person of trust, such as a relative, the help etc.
  • the third aspect is that of practicality and real feasibility of the duplication service; in particular, the duplication service must be actually available in an undetermined plurality of duplication stations for such types of keys, favorably distributed in the area in which the vehicle normally circulates so that the user who desires to duplicate a key can very easily and rapidly access one of such stations equally rapidly to obtain the required duplicate of an original key which must thus be physically handed over to the center itself.
  • FIG. 1 symbolically shows a general construction and connection diagram between the various functional components according to a main embodiment of an apparatus and of the duplication method according to the invention
  • FIG. 2 symbolically shows a general construction and connection diagram between the various functional components according to an improved embodiment of an apparatus and of the duplication method according to the invention
  • figure 3 shows even more symbolically the combination of two alternatives shown in figures 1 and 2 in a single representation
  • FIG. 4 diagrammatically shows in the sequence of operations which must be executed to duplicate a type "A" electronic key
  • FIG. 5 diagrammatically shows in the sequence of operations which must be executed to duplicate a type "B" electronic key
  • FIG. 6 diagrammatically shows in the sequence of operations which must be executed to duplicate a type "C" electronic key
  • FIG. 7 shows an improved device used in the invention.
  • the invention is based on the making of an apparatus and a communication and processing network generally similar that disclosed in the aforementioned patent PCT/EP2007/060856, and thus with the similarities and differences explained below:
  • a reading and writing unit 1 adapted to detect the codes residing on an original electronic key 100, or to transmit them to a blank key 200 to be duplicated, as previously defined,
  • control and connection unit adapted to connect, with known means, to said reading and writing unit 1 and to an external telecommunications network, preferably the Internet;
  • said control and connection unit is preferably made by means of a normal computer, preferably a personal computer 6 (PC), provided with the necessary programs/instructions to connected to said reading and writing unit 1 ;
  • PC personal computer 6
  • control unit 1 is connected to said MF through the Internet, possibly with the assistance of a server for managing the inbound and outbound traffic to and from said MF according to message indexing criteria and procedures, known in themselves.
  • DIFFERENCES the fundamental difference refers to said residing code reading and writing unit 1 ; according to the invention, it is entirely free from devices which control the reading or writing of codes.
  • Figure 7 shows an external view of such a unit 1 for the sake of greater clarity; it substantially consists of a cup-shaped element which comprises the transmitting and receiving circuits of the signals either transmitted to or coming from a key introduced in said cup, not shown because it is comprised in the body of the unit 1 itself.
  • said unit 1 can execute the code reading and writing functions but is entirely free from devices or controls, generally buttons, which control such functions and from a display which provides information on the operating state of such a unit 1 to the operator.
  • said unit 1 which is normally provided with radio-electric circuits adapted to communicate with an original electronic key 100 or with a blank key 200 introduced in said cup, is exclusively activated by an appropriate control and by the transmission of software provided for this purpose and residing in said control and connection unit 10.
  • control and connection unit is provided with specific software for entirely controlling the communications from and to said unit 1 and also the connections from and to said MF 5.
  • the first improvement is in that the connection between said reading and writing unit 1 and said control and connection unit may be achieved by means of a normal electrical wire 1 1 , e.g. of the "USB" type, but may also be implemented with an exclusively radio-electric connection 12, as symbolically shown in Figures 2 and 3.
  • said control and connection unit may simply be a normal mobile phone of the smartphone 13 type, known in itself, or an equivalent device, such as for example a tablet, on which an appropriate application program (of the "app" type) adapted to execute connection and processing functions with said reading and writing unit 1 and to connect to said MF 5 through the Internet was previously loaded.
  • this improvement allows to completely eliminate the presence of a local computer, i.e. of said PC, and thus of the corresponding encumbrances, in terms of cost, connection and dimensions.
  • the radio-electric connection technique between the units 1 and the smartphone 13 does not display particular difficulties; indeed, an optimal technique for transmitting data for personal wireless networks which can be used on minimum distances is the Bluetooth standard, in its various versions, which is well known in itself and which will therefore not be described in further detail.
  • connection and control unit i.e. the PC 6 or the smartphone 13
  • programs adapted to receive the presence of a key in said reading and writing unit 1 in automatic manner, i.e. after they are switched on.
  • the duplication program of the original key 100 is activated in entirely automatic manner and the connection function between said control and connection unit, or said smartphone 13, and said MF 5 through the Internet is activated also automatically.
  • the entire apparatus can be operated in so-called "listening mode", i.e. in the mode in which the electronic key duplication process is automatically started as soon as the key to be duplicated is introduced in the reading and wiring unit 1 .
  • the third improvement consists in that, as shown in figure 7, said reading and writing unit 1 is provided with a given number of LEDs 20, 21 , 22, 23.... thus arranged and connected to the unit 1 itself, and thus ultimately to the PC 6 or to the smartphone 13, adapted to represent the state of the duplication procedure, so that their switching on and off, in accordance with the procedure, allows the operator to immediately and very easily follow the development and the sequence of the various operative steps, thus eliminating the need to hold and continuously control the smartphone 13, or to remain permanently in front of the PC until the procedure ends.
  • Figure 4 shows a logical flow in which each block represents a function or an operation or a sequence of operations executed automatically and sequentially by a same device.
  • the first operation (block 41 ) consists in the operator introducing the original key 100 in the reading and writing unit 1 ;
  • the second operation (block 42) consists in reading, either automatically or upon command as explained above, the respective secret code and storing it in the unit 6 (PC) or in the unit 13 (smartphone);
  • the third operation (block 43) consists in the operator removing the original key 100 and replacing it in the unit 1 with the blank key 200 to be duplicated;
  • the fourth operation (block 44) consists in automatically writing the previously stored secret code in the unit 6 or in the unit 13 on the blank code arranged in the unit 3.
  • a further useful improvement of the invention consists in guiding the operator's actions by providing step-by-step instructions on the operations to be performed; thus the operations in blocks 41 , 43 and 45 are accompanied by the respective instructions, indicated in the corresponding blocks, which are presented, with techniques known in themselves, on the displays of the PC or the unit 4, or on the display of the smartphone 13.
  • the duplication method only concerns the units 1 and 6 (or 13), and no Internet connection is activated, and thus no functionality by said MF 5 is required.
  • Figure 5 shows a flow similar to the one in figure 4 in which a type "B" key is duplicated instead.
  • the first operation (block 51 ) consists in the operator introducing the original key 100 in the reading and writing unit 1 ;
  • the second operation (block 52) consists in reading, either automatically or upon command as explained above, the respective encrypted secret code by the unit 6 or by the unit 13 or smartphone;
  • the third operation (block 53) consists in sending the encrypted secret code, through the Internet, to the central processing unit MF 5, possibly by means of a server 7;
  • the fourth operation (block 54) consists in reprocessing the secret code by the MF 5 and in retransmitting the decrypted secret code to the PC 6 and then verifying the code itself on the original key 100;
  • the fifth operation (block 55) consists in the operator removing the original key 100 and replacing it in the unit 1 with the blank key 200 to be duplicated;
  • the sixth operation (block 56) consists in automatically writing the previously stored secret code in the unit 6 or in the unit 13 on the blank key 200 arranged in the unit 1 .
  • a further useful improvement of the invention consists in guiding the operator's actions by providing step-by-step instructions on the operations to be performed; thus, the operations of blocks 51 and 55 are accompanied by the respective instructions indicated in the corresponding blocks, which are presented, with techniques known in themselves, on the display of the PC or unit 6, or on the display of the smartphone 13, or preferably by means of the corresponding signally of said LEDs 20, 21 , 22, 23....
  • Figure 6 shows a flow chart similar to the one shown in figure 5 in which a type "C" key is duplicated instead.
  • the first operation (block 61 ) consists in the operator introducing the original key 100 in the reading and writing unit 1 ; 2) the second operation (block 62) consists in reading, either automatically or upon command as explained above, the respective ID code by the unit 6 or by the unit 13 or smartphone;
  • the third operation (block 63) consists in removing the unit 1 , the original key and replacing it with the blank key 200 or copy key;
  • the fourth operation (block 64) consists in writing and storing said ID code in the blank key 200;
  • the fifth operation implements the interception of the encrypted secret code generated by the control unit of the vehicle (and which in the mentioned patent WO2010/142474 is named "vehicle processing unit 3"); such an operation is carried out as described in said patent and substantially consists of the elementary steps of:
  • sniffer previously arranged in the immediate proximity of the original key
  • the blank key 200 itself may be used instead of said sniffer because the blank key can intercept and store said encrypted secret code exactly like a specific external sniffer; such a variant was extensively described and disclosed in the aforementioned patent WO 2010/142474, so the explanation is omitted here for the sake of brevity;
  • the sixth operation (block 66) consists in removing the blank key 200 from the unit 1 and in replacing it with the original key;
  • the seventh operation (block 67) consists in sending the encrypted secret code to the PC 6, and from here, through the Internet, to said central processing unit MF 5, possibly by means of a server 7, and subsequently reprocessing the encrypted secret code by the unit MF 5, and retransmitting the encrypted secret code to the PC 6 and the respective verification;
  • the eighth operation (block 68) consists in transmitting the respective password by the original key 100 and subsequently processing and storing it on said PC 6;
  • the ninth operation (block 69) consists in the operator removing the original key 100 and replacing it in the unit 1 with the blank key 200 to be duplicated;
  • the tenth operation (block 70) consists in automatically writing the secret code, the ID and the respective password, previously stored in the unit 4 or in the unit 13, on the blank key 200 arranged in the unit 1 .
  • a further useful improvement of the invention consists in guiding the operator's actions by providing step-by-step instructions on the operations to be performed; thus the operations in blocks 61 , 63, 65, 67, 69 are accompanied by the respective instructions, indicated in the corresponding blocks, which are presented, with techniques known in themselves, on the displays of the PC or the unit 6, or on the display of the smartphone 13.
  • a further easy improvement consists in making said reading and writing unit 1 so that it can also work only with the energy supplied by built-in electric batteries so that said unit 1 becomes a totally autonomous device in terms of functional interface (or connectable by Bluetooth or equivalent) and in terms of power supply.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

A method for duplicating keys with electronic code which uses a reading/writing unit which connects to an original electronic key and reads and writes data from and to said original electronic key, and to a blank electronic key to be duplicated. The process comprises the steps of acquiring the code of the original key and transmitting it to an external control apparatus, which processes said original code and transmits it to said reading/writing unit, which transmits said code to said blank key.

Description

METHOD AND APPARATUS FOR DUPLICATING KEYS WITH ELECTRONIC CODE
DESCRIPTION
The present invention relates to a multipurpose station adapted to duplicate keys provided with mechanical encoding of traditional type and with electronic encryption, of the type also known in itself and which has generally been in use for several years in various technical applications.
The invention also relates to various methods for using said means which allow to reproduce one of such keys.
Reference will be made hereinafter in the present description, and in the appended claims, to mechanical and electronic keys used in vehicles of the type normally marketed today, but it is understood that the invention applies in general also to other applications, such as for example armored doors, safes etc., in which a key provided with double mechanical and electronic encryption, a respective lock and a respective electronic control unit adapted to process the data contained in the electronic encryption of the key to be duplicated and transmitted by the electronic control unit itself are used.
Hereinafter and for the sake of clarity, the expression "electronic key" means any key provided with internal storage devices adapted to store at least one of the following three code types:
- an open identification code, hereinafter named ID code,
- a secret code, appropriately encrypted by an appropriate algorithm,
- a password.
In brief, as known by a person skilled in art, there can be three different types of electronic keys, i.e. :
- a key provided with ID only, which hereinafter will be indicated as type "A" key,
- a key provided with ID and also with said encrypted secret code, which hereinafter will be indicated as type "B" key,
- a key provided with ID, with an encrypted secret code and also with said password; indeed, one of said codes is used by the control unit to recognize the original key and the other code is used by the original key to recognize the control unit; hereinafter this type of key will be indicated as type "C" key.
Furthermore, all three types of keys are provided with means adapted to receive external radio signals, to process said radio-electric signals, to store them and to retransmit them to further radio-electric signals corresponding to the executed processing.
With regards to the duplication of type "B" and type "C" electronic keys, the availability of means, procedures and information adapted to duplicate them in simple, safe manner is known in the prior art; the following patents are indeed mentioned:
- PCT/EP2007/060856 particularly devoted to the duplication of type "B" keys, - WO 2010/142474 specifically devoted to the duplication of type "C" keys.
Both said patents were filed by the applicant of the present patent.
The duplication of type "A" keys is performed using a direct, simplified technique which is universally known and applied, and therefore a detailed description will be omitted; also because, as well known, this technique directly derives from the technique of duplicating a type "B" key of which it is a direct, yet simplified embodiment.
It is known that various aspects must be considered when it is desirable or necessary to duplicate in legitimate manner one of the either mechanical or electronic keys described above.
1 ) The first aspect is unquestionably that of security; the person who legitimately requires to have a duplicate of key they own must have the certainty that the key can be duplicated, and possibly sent/transmitted, without the duplicated key being intercepted or stolen by third parties and that the data necessary for producing the duplicated key cannot be intercepted or decrypted by third parties;
2) The second aspect is that of the rapidity and cost-effectiveness of the key duplicating service; usually the duplication request is urgent because the user has lost one of the keys they own or must provide one or more supplementary keys to a person of trust, such as a relative, the help etc.
3) The third aspect is that of practicality and real feasibility of the duplication service; in particular, the duplication service must be actually available in an undetermined plurality of duplication stations for such types of keys, favorably distributed in the area in which the vehicle normally circulates so that the user who desires to duplicate a key can very easily and rapidly access one of such stations equally rapidly to obtain the required duplicate of an original key which must thus be physically handed over to the center itself.
DUPLICATION OF TYPE "B" KEYS
As well documented in the mentioned patent PCT/EP2007/060856, a single processing center of a great number of codes of keys of the considered type is required in addition to telecommunications means, typically online (Internet), which are used to transmit and receive information (from a local station which must typically make and deliver the duplicated key and to which the user went) to and from such storing, processing, encrypting/decrypting center in order to duplicate an electronically encrypted type "B" key.
The teachings and information presented in such a document have been extensively implemented in a high number of units and thus their use and performance have been appreciated and they have been implemented on industrial scale and extensively distributed on the market also internationally.
However, since the trend in the sector is to obtain duplication devices which maintain their initial performance but are increasingly more competitive, it has been found that the means described in the aforementioned patent PCT/EP2007/060856 encounter increasing difficulty, above all because of the overall cost of the reading/writing unit identified in the aforesaid patent PCT/EP2007/060856; in particular, reference is made to the cost of the display (20), of the reading and writing buttons (21 and 22), and naturally of the necessary electric and electronic devices associated therewith.
DUPLICATION OF TYPE "C" KEYS
Similar considerations apply to the duplication of type "C" keys with the necessary variations naturally due to the partially different nature of the implemented hardware and the different method of use; in brief, it is worth noting that:
- although the duplication process is entirely "local", i.e. without requiring an external connection, typically through the Internet and the use of a supercomputer
26;
- however the need to incorporate the complete hardware and software functions in the reading/writing unit 13 in the measure necessary to execute the processing previously executed by the supercomputer (26), and thus to transform said reading/writing unit 13 into a new device, named "DUPLICATION MEANS 4" in the second mentioned patent WO 2010/142474;
makes the final cost of said "DUPLICATION MEANS 4" increasingly less acceptable, in particular in a progressively more competitive market, which rewards the duplication of type "C" keys, and thus of keys having maximum performance, above all.
Finally, to complete the overview, it is worth noting that said "DUPLICATION MEANS 4" is generally used in very partial manner, which make the economic investment required to decide to purchase it even less convenient.
It would thus be desirable, and is the main object of the present invention, to make a duplication apparatus and method adapted to duplicate all the described key types but which allows a significant saving in terms of cost and implementation simplicity of the duplication process.
Such an object is reached by an apparatus for duplicating keys made according to the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
Features and advantages of the invention will be apparent from the following description provided by way of non-limiting example with reference to the accompanying drawings in which:
- figure 1 symbolically shows a general construction and connection diagram between the various functional components according to a main embodiment of an apparatus and of the duplication method according to the invention,
- figure 2 symbolically shows a general construction and connection diagram between the various functional components according to an improved embodiment of an apparatus and of the duplication method according to the invention,
- figure 3 shows even more symbolically the combination of two alternatives shown in figures 1 and 2 in a single representation,
- figure 4 diagrammatically shows in the sequence of operations which must be executed to duplicate a type "A" electronic key,
- figure 5 diagrammatically shows in the sequence of operations which must be executed to duplicate a type "B" electronic key,
- figure 6 diagrammatically shows in the sequence of operations which must be executed to duplicate a type "C" electronic key,
- figure 7 shows an improved device used in the invention.
DETAILED DESCRIPTION OF THE INVENTION
With reference to figures from 1 to 3, the invention is based on the making of an apparatus and a communication and processing network generally similar that disclosed in the aforementioned patent PCT/EP2007/060856, and thus with the similarities and differences explained below:
SIMILARITIES: these derive from the fact that also here there is:
- a reading and writing unit 1 adapted to detect the codes residing on an original electronic key 100, or to transmit them to a blank key 200 to be duplicated, as previously defined,
- a control and connection unit adapted to connect, with known means, to said reading and writing unit 1 and to an external telecommunications network, preferably the Internet; in a first embodiment said control and connection unit is preferably made by means of a normal computer, preferably a personal computer 6 (PC), provided with the necessary programs/instructions to connected to said reading and writing unit 1 ;
- a powerful calculation center 5 with a large memory, which hereinafter will be identified by the acronym "MF" (MAIN FRAME); said control unit 1 is connected to said MF through the Internet, possibly with the assistance of a server for managing the inbound and outbound traffic to and from said MF according to message indexing criteria and procedures, known in themselves.
DIFFERENCES: the fundamental difference refers to said residing code reading and writing unit 1 ; according to the invention, it is entirely free from devices which control the reading or writing of codes.
Figure 7 shows an external view of such a unit 1 for the sake of greater clarity; it substantially consists of a cup-shaped element which comprises the transmitting and receiving circuits of the signals either transmitted to or coming from a key introduced in said cup, not shown because it is comprised in the body of the unit 1 itself. According to the invention, said unit 1 can execute the code reading and writing functions but is entirely free from devices or controls, generally buttons, which control such functions and from a display which provides information on the operating state of such a unit 1 to the operator.
Indeed, said unit 1 , which is normally provided with radio-electric circuits adapted to communicate with an original electronic key 100 or with a blank key 200 introduced in said cup, is exclusively activated by an appropriate control and by the transmission of software provided for this purpose and residing in said control and connection unit 10.
In brief, it is worth noting that:
- the control function of the duplication process of the electronic key 100 is transferred from the unit 1 (as in the previous solution) to the control and connection unit,
- said control and connection unit is provided with specific software for entirely controlling the communications from and to said unit 1 and also the connections from and to said MF 5.
It is thus apparent that such a solution reaches the fundamental object of the invention because, in principle:
- with respect to the solution disclosed in aforementioned PCT/EP2007/060856, the presence and cost of reading and writing controls, i.e. of the respective buttons, associated circuit components and respective display is eliminated while maintaining the cost-effectiveness of the entire process at the same time because the operation of the entire apparatus, and in particular of the MF 5, is activated only on demand;
- with respect to the solution disclosed in WO 2010/142474, the economic advantage is even greater because a certain economy is achieved the new residing code reading and writing unit 1 being totally free from devices which control the reading or writing of the codes, but an even higher economy is obtained as such new unit 1 is entirely free from complex and costly storing and processing circuits for encrypting/decrypting the secret codes, the password and the ID.
The solution described below allows some advantageous improvements: the first improvement is in that the connection between said reading and writing unit 1 and said control and connection unit may be achieved by means of a normal electrical wire 1 1 , e.g. of the "USB" type, but may also be implemented with an exclusively radio-electric connection 12, as symbolically shown in Figures 2 and 3.
In this case, said control and connection unit may simply be a normal mobile phone of the smartphone 13 type, known in itself, or an equivalent device, such as for example a tablet, on which an appropriate application program (of the "app" type) adapted to execute connection and processing functions with said reading and writing unit 1 and to connect to said MF 5 through the Internet was previously loaded.
In brief, this improvement allows to completely eliminate the presence of a local computer, i.e. of said PC, and thus of the corresponding encumbrances, in terms of cost, connection and dimensions.
The radio-electric connection technique between the units 1 and the smartphone 13 does not display particular difficulties; indeed, an optimal technique for transmitting data for personal wireless networks which can be used on minimum distances is the Bluetooth standard, in its various versions, which is well known in itself and which will therefore not be described in further detail.
The second improvement consists in that said connection and control unit, i.e. the PC 6 or the smartphone 13, are provided with programs adapted to receive the presence of a key in said reading and writing unit 1 in automatic manner, i.e. after they are switched on.
Following such a presence detection, the duplication program of the original key 100 is activated in entirely automatic manner and the connection function between said control and connection unit, or said smartphone 13, and said MF 5 through the Internet is activated also automatically.
In practice, as the person skilled in the art will have understood, the entire apparatus can be operated in so-called "listening mode", i.e. in the mode in which the electronic key duplication process is automatically started as soon as the key to be duplicated is introduced in the reading and wiring unit 1 .
Obviously, such a procedure may continue in entirely automatic manner as long as the operator performs the correct sequence of operations; such a matter will be described in greater detail hereinafter in the present description.
The third improvement consists in that, as shown in figure 7, said reading and writing unit 1 is provided with a given number of LEDs 20, 21 , 22, 23.... thus arranged and connected to the unit 1 itself, and thus ultimately to the PC 6 or to the smartphone 13, adapted to represent the state of the duplication procedure, so that their switching on and off, in accordance with the procedure, allows the operator to immediately and very easily follow the development and the sequence of the various operative steps, thus eliminating the need to hold and continuously control the smartphone 13, or to remain permanently in front of the PC until the procedure ends.
With regards to the duplication procedure of an electronic key, the intrinsically different cases for duplicating a type "A" key, or a type "B" key or a type "C" will be considered.
DUPLICATION OF A TYPE "A" KEY
Figure 4 shows a logical flow in which each block represents a function or an operation or a sequence of operations executed automatically and sequentially by a same device.
1 ) The first operation (block 41 ) consists in the operator introducing the original key 100 in the reading and writing unit 1 ;
2) the second operation (block 42) consists in reading, either automatically or upon command as explained above, the respective secret code and storing it in the unit 6 (PC) or in the unit 13 (smartphone);
3) the third operation (block 43) consists in the operator removing the original key 100 and replacing it in the unit 1 with the blank key 200 to be duplicated;
4) the fourth operation (block 44) consists in automatically writing the previously stored secret code in the unit 6 or in the unit 13 on the blank code arranged in the unit 3.
It is thus apparent that the operator's operations are those of blocks 41 , 43 and 45, while the reading operations with concurrent storing of the secret code and of its writing and the operations in blocks 42 and 44.
A further useful improvement of the invention consists in guiding the operator's actions by providing step-by-step instructions on the operations to be performed; thus the operations in blocks 41 , 43 and 45 are accompanied by the respective instructions, indicated in the corresponding blocks, which are presented, with techniques known in themselves, on the displays of the PC or the unit 4, or on the display of the smartphone 13.
Since in the present case the code residing on the original key of type "A" is not an encrypted secret code and consequently does not need to be processed, the duplication method only concerns the units 1 and 6 (or 13), and no Internet connection is activated, and thus no functionality by said MF 5 is required.
DUPLICATION OF A TYPE "B" KEY
Figure 5 shows a flow similar to the one in figure 4 in which a type "B" key is duplicated instead.
1 ) The first operation (block 51 ) consists in the operator introducing the original key 100 in the reading and writing unit 1 ;
2) the second operation (block 52) consists in reading, either automatically or upon command as explained above, the respective encrypted secret code by the unit 6 or by the unit 13 or smartphone;
3) the third operation (block 53) consists in sending the encrypted secret code, through the Internet, to the central processing unit MF 5, possibly by means of a server 7;
4) in brief, the fourth operation (block 54) consists in reprocessing the secret code by the MF 5 and in retransmitting the decrypted secret code to the PC 6 and then verifying the code itself on the original key 100;
5) the fifth operation (block 55) consists in the operator removing the original key 100 and replacing it in the unit 1 with the blank key 200 to be duplicated;
6) the sixth operation (block 56) consists in automatically writing the previously stored secret code in the unit 6 or in the unit 13 on the blank key 200 arranged in the unit 1 .
It is thus apparent that the operator's operations are those of blocks 51 and 55, while the reading operations with concurrent storing of the secret code, its decryption and its writing are the operations in blocks 52, 53, 54 and 56.
Also in this case, a further useful improvement of the invention consists in guiding the operator's actions by providing step-by-step instructions on the operations to be performed; thus, the operations of blocks 51 and 55 are accompanied by the respective instructions indicated in the corresponding blocks, which are presented, with techniques known in themselves, on the display of the PC or unit 6, or on the display of the smartphone 13, or preferably by means of the corresponding signally of said LEDs 20, 21 , 22, 23....
DUPLICATION OF A TYPE "C" KEY
Figure 6 shows a flow chart similar to the one shown in figure 5 in which a type "C" key is duplicated instead.
1 ) The first operation (block 61 ) consists in the operator introducing the original key 100 in the reading and writing unit 1 ; 2) the second operation (block 62) consists in reading, either automatically or upon command as explained above, the respective ID code by the unit 6 or by the unit 13 or smartphone;
3) the third operation (block 63) consists in removing the unit 1 , the original key and replacing it with the blank key 200 or copy key;
4) the fourth operation (block 64) consists in writing and storing said ID code in the blank key 200;
5) the fifth operation (block 65) implements the interception of the encrypted secret code generated by the control unit of the vehicle (and which in the mentioned patent WO2010/142474 is named "vehicle processing unit 3"); such an operation is carried out as described in said patent and substantially consists of the elementary steps of:
- inserting the original key 100 in the lock of the vehicle and turning until the control unit of said vehicle is activated,
- intercepting the secret code by a device, named sniffer, previously arranged in the immediate proximity of the original key,
- inserting said sniffer in said reading and writing unit 1 .
It is worth noting that the blank key 200 itself may be used instead of said sniffer because the blank key can intercept and store said encrypted secret code exactly like a specific external sniffer; such a variant was extensively described and disclosed in the aforementioned patent WO 2010/142474, so the explanation is omitted here for the sake of brevity;
6) the sixth operation (block 66) consists in removing the blank key 200 from the unit 1 and in replacing it with the original key;
7) the seventh operation (block 67) consists in sending the encrypted secret code to the PC 6, and from here, through the Internet, to said central processing unit MF 5, possibly by means of a server 7, and subsequently reprocessing the encrypted secret code by the unit MF 5, and retransmitting the encrypted secret code to the PC 6 and the respective verification;
8) the eighth operation (block 68) consists in transmitting the respective password by the original key 100 and subsequently processing and storing it on said PC 6;
9) the ninth operation (block 69) consists in the operator removing the original key 100 and replacing it in the unit 1 with the blank key 200 to be duplicated;
10) the tenth operation (block 70) consists in automatically writing the secret code, the ID and the respective password, previously stored in the unit 4 or in the unit 13, on the blank key 200 arranged in the unit 1 .
Similarly to the previous cases, it is worth noting that the operator's operations are those in blocks 61 , 63, 65, 67, 69, while the reading operations with concurrent transmission of the ID, secret code, of its decryption, of its writing and of the password are the operations in blocks 62, 64, 66, 68 and 70.
Also in this case, a further useful improvement of the invention consists in guiding the operator's actions by providing step-by-step instructions on the operations to be performed; thus the operations in blocks 61 , 63, 65, 67, 69 are accompanied by the respective instructions, indicated in the corresponding blocks, which are presented, with techniques known in themselves, on the displays of the PC or the unit 6, or on the display of the smartphone 13.
A further easy improvement consists in making said reading and writing unit 1 so that it can also work only with the energy supplied by built-in electric batteries so that said unit 1 becomes a totally autonomous device in terms of functional interface (or connectable by Bluetooth or equivalent) and in terms of power supply.

Claims

1 ) A method for duplicating keys provided with electronic code recognition means which uses a reading/writing unit (1 ) adapted to connect to an original electronic key (100) and to execute a process for reading and writing data from and to said original electronic key, and to a blank electronic key to be duplicated (200), which process comprises the following steps:
- said unit (1 ) acquires the code of the original key (100) to be duplicated,
- said unit (1 ) transmits said code of the original key to an external data processing and transmitting control apparatus (6, 13),
- said external control apparatus (6, 13) processes said received original code and transmits it to said reading/writing unit (1 ),
- said reading/writing unit (1 ) transmits said code to said blank key (200),
characterized in that
- said external control apparatus (6, 13) transmits a specific operating and querying instruction to said reading/writing unit (1 ),
and in that, subsequently and in reply to said specific operating and querying instruction, said reading/writing unit (1 ) acquires the code of the original key (100) to be duplicated.
2) A method according to claim 1 , characterized in that said original code is a secret code, and in that after having received said secret code from said reading/writing unit (1 ) said external control apparatus (6, 13) processes said secret code and transmits it to an external telecommunications network connected to a central processing unit (7, 5) which processes said secret code and retransmits the processed codes to said external control apparatus (6, 13) through said external telecommunications network.
3) A method according to claim 1 or 2, characterized in that it comprises the following steps:
- inserting an original key (100) in said reading/writing unit (1 ), - recognizing the secret code residing on said original key (100) by said external control apparatus (6, 13) and storing it,
- removing said original key from said reading/writing unit (1 ) and inserting the blank key (200) in said reading/writing unit (1 ), - transmitting and automatically writing the previously stored secret code on said blank key (200).
4) A method according to claim 1 or 2, characterized in that said secret code is encrypted, and in that it comprises the following steps;
- introducing the original key (100) in said reading/writing unit (1 ),
- reading either automatically or upon command, the respective encrypted secret code residing on said original key (100) by said external control apparatus (6, 13),
- transmitting said encrypted secret code, preferably through the Internet, to said central processing unit (5), possibly by means of a server (7),
- reprocessing the encrypted secret code by said central processing unit (5) and retransmitting the decrypted secret code to said external control apparatus (6, 13), and subsequently verifying the code itself on the original key (100),
- removing said original key from said reading/writing unit (1 ) and inserting the blank key (200) in said reading/writing unit (1 ),
- automatically transmitting and writing the previously stored secret code on said blank key (200).
5) A method according to claim 1 or 2, characterized in that it comprises the following steps:
- introducing the original key (100) in said reading/writing unit (1 ) by the operator, - reading, either automatically or upon command, the respective identification code
(ID) by said external control apparatus (6, 13),
- removing the original key from the unit 1 and replacing it with the blank key (200),
- writing and storing said identification code (ID) on said blank key (200),
- intercepting the encrypted secret code generated by a control unit of the vehicle, which comprises the following steps:
a) inserting the original key (100) in the vehicle lock and turning until the control unit of the vehicle is activated,
b) intercepting the secret code by said blank key (200) or by an equivalent device (sniffer),
c) inserting said blank key or said equivalent device (sniffer) in said reading/writing unit (1 ),
- removing said blank key (200) from the unit 1 and replacing it with the original key
- transmitting the encrypted secret code to said external control apparatus (6, 13), and from there to said central processing unit (MF 5), possibly by means of a server (7), and subsequently reprocessing the encrypted secret code by said central processing unit (MF 5), and retransmitting the decrypted secret code to said external control apparatus (6, 13) and respective verification,
- transmitting the respective password (100) by the original key and subsequently transmitting and storing it in said external control apparatus (6, 13),
- removing the original key (100) and replacing it in said reading/writing unit (1 ) with said blank key (200),
- automatically writing said secret code, the ID and the respective password, previously stored in said external control apparatus (6, 13), on said blank key (200) placed in said reading/writing unit (1 ).
6) A method according to one of the preceding claims, characterized in that said reading/writing unit (1 ) is adapted to work in "listening" mode, which comprises automatically transmitting an appropriate activation signal by said external control apparatus (6, 13) when an original key (100) is connected/introduced to/in said reading/writing unit (1 ).
7) A system for duplicating keys provided with electronic recognition means adapted to operate according to one of the preceding claims, characterized in that it comprises:
- a reading/writing unit (1 ), free from autonomous control or actuating devices or buttons, adapted to connect to an original electronic key (100) and to execute a data reading and writing process from and to said original electronic key and to a blank electronic key to be duplicated (200),
- an external control apparatus (6, 13) adapted to include the steps of:
- storing a program to connect to said reading and writing unit (1 ),
- processing the code received by said reading/writing unit (1 ),
- a powerful external processing center (5),
- connecting means for transmitting an electric (Internet) or radio-electric communication from said external control apparatus (6, 13) to said external processing center (5), wherein said external control apparatus (13) is a radio-electric device of the mobile phone or "smartphone" type comprising a residing program adapted to activate said reading/writing unit (1 ), and which for this reason is provided with radio- electric transmitting and receiving means, preferably of the "Bluetooth" type adapted to receive and decode the radio-electric signals coming from said external control apparatus (13) and to encrypt and transmit the signals coming from said original key (100) or from said blank key (200) to be duplicated.
8) A system for duplicating keys provided with electronic recognition means adapted to operate according to one of the claims from 1 to 6, characterized in that it comprises:
- a reading/writing unit (1 ) adapted to connect to an original electronic key (100) and to execute a data reading/writing process from and to said original electronic key, and to a blank electronic key to be duplicated (200),
- an external control apparatus (6, 13) adapted to include the steps of:
- storing a program to connect to said external reading and writing unit (1 ),
- processing the code received by said reading/writing unit (1 ),
- a powerful external processing center (5),
- connecting means for transmitting an electric (Internet) or radio-electric communication from said external control apparatus (6, 13) to said external processing center (5),
wherein said external control apparatus (6) is a computing device, preferably a personal computer (PC), comprising a residing program adapted to activate said reading/writing unit (1 ), which is provided with transmitting and receiving means adapted to receive signals coming from said external control apparatus (6) and to encode and transmit thereto the signals coming from said original key (100) or from said blank key (200) to be duplicated, wherein said signals exchanged between said reading/writing unit (1 ) and said external control apparatus (6) are conveyed by means of an electric connection, preferably by a USB cable
9) A system according to one of either claim 7 or claim 8, characterized in that said reading/writing unit (1 ) may be powered autonomously, preferably by portable batteries.
10) A system according to one of the claims from 7 to 9, characterized in that said reading/writing unit (1 ) is externally provided with a plurality of light indicators (21 , 22, 23....) adapted to supply luminous signals corresponding to the various operating steps of the duplication method.
PCT/EP2015/067033 2014-07-24 2015-07-24 Method and apparatus for duplicating keys with electronic code WO2016012604A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITPN2014A000037 2014-07-24
ITPN20140037 2014-07-24

Publications (1)

Publication Number Publication Date
WO2016012604A1 true WO2016012604A1 (en) 2016-01-28

Family

ID=51589425

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2015/067033 WO2016012604A1 (en) 2014-07-24 2015-07-24 Method and apparatus for duplicating keys with electronic code

Country Status (1)

Country Link
WO (1) WO2016012604A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220139139A1 (en) * 2018-03-18 2022-05-05 Hy-Ko Products Company Llc Distributed cloning tool assembly, system, and method for replication of vehicle access devices
WO2024141895A1 (en) * 2022-12-29 2024-07-04 Emanuele Godio S.R.L.S. Method and system for the remote duplication of control devices, preferably electronic keys for vehicles

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080143478A1 (en) * 2006-12-19 2008-06-19 Denso Corporation Mobile unit and electronic key system using the same
WO2008145199A1 (en) * 2007-05-29 2008-12-04 Bianchi 1770 S.P.A. Method for the duplication of electronic-code keys
WO2010142474A1 (en) 2009-06-10 2010-12-16 Keyline S.P.A. Duplication means for an electronically coded key and related method
US20130120113A1 (en) * 2008-07-10 2013-05-16 Honda Motor Co., Ltd. Antitheft system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080143478A1 (en) * 2006-12-19 2008-06-19 Denso Corporation Mobile unit and electronic key system using the same
WO2008145199A1 (en) * 2007-05-29 2008-12-04 Bianchi 1770 S.P.A. Method for the duplication of electronic-code keys
US20130120113A1 (en) * 2008-07-10 2013-05-16 Honda Motor Co., Ltd. Antitheft system
WO2010142474A1 (en) 2009-06-10 2010-12-16 Keyline S.P.A. Duplication means for an electronically coded key and related method
US20110064224A1 (en) * 2009-06-10 2011-03-17 Keyline S.P.A. Duplication means for an electronically coded key and related method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220139139A1 (en) * 2018-03-18 2022-05-05 Hy-Ko Products Company Llc Distributed cloning tool assembly, system, and method for replication of vehicle access devices
WO2024141895A1 (en) * 2022-12-29 2024-07-04 Emanuele Godio S.R.L.S. Method and system for the remote duplication of control devices, preferably electronic keys for vehicles

Similar Documents

Publication Publication Date Title
KR101889495B1 (en) Wireless configuration using passive near field communication
US10154018B2 (en) Method and system for facilitating network joining
CN102460517B (en) Duplication means for an electronically coded key and related method
CN103875006A (en) Radio frequency identification technology incorporating cryptographics
CN108762791A (en) Firmware upgrade method and device
CN102438242A (en) Authentication control system, especially for motor vehicles
CN104661219A (en) Communication method of wireless equipment, wireless equipment and server
WO2015162127A1 (en) Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device
CN104507080A (en) File processing method and terminal
CN105006051A (en) Wireless communication method and system of intelligent remote control door lock
CN103840942A (en) Data protection system and method
KR20120090148A (en) Method and system for controlling a car using smart phone
CN104244237A (en) Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
CN104527576A (en) WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal
KR20150074515A (en) Network system and method for networking
CN104554143A (en) Car starting control method and mobile terminal
WO2016012604A1 (en) Method and apparatus for duplicating keys with electronic code
JPWO2016035466A1 (en) COMMUNICATION SYSTEM, SERVER DEVICE PROGRAM AND RECORDING MEDIUM RECORDING THE SAME, COMMUNICATION DEVICE PROGRAM AND RECORDING MEDIUM RECORDING THE SAME, TERMINAL DEVICE PROGRAM AND RECORDING MEDIUM RECORDING THE SAME
US11368295B2 (en) Communication system using a random code as an encryption code
CN105827403B (en) Security method, security gate and server
CN109075974A (en) The binding authentication method and fingerprint recognition system in fingerprint algorithm library and fingerprint sensor
US20190075454A1 (en) Transceiver system
CN104519047A (en) Methods and systems for secure communication between wireless electronic devices and vehicles
KR101172876B1 (en) System and method for performing mutual authentication between user terminal and server
JP2014197761A (en) Authentication system and authentication method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15754125

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15754125

Country of ref document: EP

Kind code of ref document: A1