`
`PATENT COOPERATION TREATY
`
`From the INTERNATIONAL SEARCHING AUTHORITY
`
`
`
`To: DILLON DURNFORD
`BYRNE POH LLP
`
`
`11 BROADWAY, SUITE 814
`NEW YORK, NY 10004
`
`
`
`PCT
`
`NOTIFICATION OF TRANSMITTAL OF
`THE INTERNATIONAL SEARCH REPORT AND
`THE WRITTEN OPINION OF THE INTERNATIONAL
`SEARCHING AUTHORITY, OR THE DECLARATION
`
`
`
`(PCT Rule 44.1)
`
`
`
`Applicant KEYME, INC.
`
`
`
`I 4 MAR 20B
`833.333.73.335
`
`
`
`Applicant’s or agent’s file reference
`
`
`FOR FURTHER ACTION Sec paragraphs 1 and 4 below
`
`1105250.121-WO1
`
`
`
`
`International filing date
`International application No.
`
`
`
`04 January 2013
`(day/manth/year)
`PCT/U32013/020231
`
`
`
`
`
`
`
`
`
`
`
`1. IE The applicant is hereby notified that the international search report and the written opinion olithe International Searching
`Authority have been established and are transmitted herewith.
`Filing of amendments and statement under Article 19:
`The applicant is entitled, if he so wishes. to amend the claims of the international application (see Rule 46):
`When? The time limit for filing such amendments is normally two months from the date of transmittal of the
`international search report.
`Where? Directly to the International Bureau of WIPO, 34 chemin des Colombettes
`1211 Geneva 20, Switzerland, Facsimile No.2 +41 22 338 82 70
`For more detailed instructions, see PCT AppIicanl ‘s Guide, International Phase, paragraphs 9.004 —- 9.01 l.
`
`2. E] The applicant is hereby notified that no international search report will be established and that the declaration under
`Article l7(2)(a) to that effect and the written opinion of the International Searching Authority are transmitted herewith.
`
`
`
`The applicant may submit comments on an informal basis on the written opinion of the International Searching Authority to the
`International Bureau. The International Bureau will send a copy of such comments to all designated Offices unless an
`international preliminary examination report has been or is to be established. Following the expiration of 30 months from the
`priority date, these comments will also be made available to the public.
`Shonly after the expiration of 18 months from the priority date, the international application will be published by the
`International Bureau.
`If the applicant wishes to avoid or postpone publication, a notice of withdrawal of the international
`application, or of the priority claim, must reach the International Bureau before the completion of the technical preparations for
`international publication (Rules 90bis.1 and 90bis.3).
`Within 19 months from the priority date, but only in respect of some designated Offices, a demand for international preliminary
`examination must be filed if the applicant wishes to postpone the entry into the national phase until 30 months from the priority
`date (in some Offices even later); otherwise, the applicant must, within 20 months from the priority date, perform the prescribed
`acts for entry into the national phase before those designated Offices.
`In respect of other designated Offices, the time limit of 30 months (or later) will apply even if no demand is filed within 19
`months.
`
`
`
`the applicable time limits, Office by Office, see www.wipo.int/pct/cn/texts/time_limits.html and the
`For details about
`PCT Applicant ’3 Guide, National Chapters.
`
`Authorized officer
`
`
`
`
`
`3. D With regard to any protest against payment of (an) additional fee(s) under Rule 40.2, the applicant is notified that:
`
`
`D the protest together with the decision thereon has been transmitted to the lntemational Bureau together with any
`request to forward the texts of both the protest and the decision thereon to the designated Offices.
`
`
`
`the applicant will be notified as soon as a decision is made. [:1 no decision has been made yet on the protest;
`
`4. Reminders
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Name and mailing address of the [SN
`Mail Stop PCT, Attn: ISA/US
`Elaine R. Copenheaver
`
`
`
`Commissioner for Patents
`
`PCT Helpdesk: 571 -272-4300
`P.O. Box 1450. Alexandria. Virqinia 22313-1450
`
`
`Facsimile No. 571-273-3201
`Telephone No_ PCT OSP: 571-272-7774
`
`Form PC[VISA/220 (July 2010)
`
`
`
`PCT/U32013I020231 1 4.03.2013
`
`PATENT COOPERATION TREATY
`
`PCT
`
`INTERNATIONAL SEARCH REPORT
`
`(PCT Article 18 and Rules 43 and 44)
`
`
`
`Applicant’s or agent’s file reference
`
`FOR FURTHER
`see Form PCT/lSA/ZZO
`
`1105250.121-WO1
`as well as, where applicable, item 5 below. ACTION
`
`
`
`(Earliest) Priority Date (day/monIh/year)
`
`lntemational application No.
`lntemational filing date (day/month/year)
`
`
`
`04 January 2012
`04 January 2013
`PCT/USZO13/020231
`
`
`
`
`a. With regard to the language, the international search was carried out on the basis of:
`the international application in the language in which it was filed.
`
`
`which is the language of
`E] a translation ofthe international application into
`a translation furnished for the purposes ofintemational search (Rules 12.3(a) and 23.1(b)).
`b. D This international search report has been established taking into account the rectification of an obvious mistake
`authorized by or notified to this Authority under Rule 91 (Rule 43.6bis(a)).
`c. D With regard to any nucleotide and/or amino acid sequence disclosed in the international application, see Box No. l.
`
`2.
`
`3.
`
`[:1 Certain claims were found unsearchable (see Box No.11).
`
`El Unity of invention is lacking (see Box No. 111).
`
`
`
`
`This international search report has been prepared by this International Searching Authority and is transmitted to the applicant
`according to Article 18. A copy is being transmitted to the lntemational Bureau.
`This international search report consists ofa total of 7/ sheets.
`
`
`E] It is also accompanied by a copy of each prior art document cited in this report.
`
`1. Basis of the report
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4. With regard to the title,
`lZl the text is approved as submitted by the applicant.
`El the text has been established by this Authority to read as follows:
`
`
`
`
`5. With regard to the abstract,
`
`
`v
`the text is approved as submitted by the applicant.
`
`
`[3 the text has been established, according to Rule 38.2, by this Authority as it appears in Box No. IV. The applicant
`
`
`may, within one month from the date of mailing ofthis international search report, submit comments to this Authority.
`
`
`6. With regard to the drawings,
`
`a.
`the figure ofthe drawings to be published with the abstract is Figure No.
`l2 as suggested by the applicant.
`D as selected by' this Authority, because the applicant failed to suggest a figure.
`El as selected by this Authority, because this figure better characterizes the invention.
`
`
`b. D none ofthe figures is to be published with the abstract.
`
`Form PCT/lSA/210 (first sheet) (July 2009)
`
`
`
`
`1
`
`
`
`
`
`
`PCT/USZO1 3/020231 1 4.03.201 3
`
`INTERNATIONAL SEARCH REPORT
`
`
`International application No.
`PCT/USZO13/020231
`
`
` A. CLASSIFICATION OF SUBJECT MATTER
`
`IPC(8) - 823C 3/35 (2013.01)
`
`
`USPC - 409/81
`
`
`According to lntemational Patent Classification (IPC) or to both national classification and lPC
`B.
`FIELDS SEARCHED
`
`
`
`
`Minimum documentation searched (classification system followed by classification symbols)
`
`
`
`IPC(8) — B21D 53/42; 8230 1/16, 3/35 (2013.01)
`USPC - 76/110; 409/81 ,82,83; 700/161
`
` Documentation searched other than minimum documentation to the extent that such documents are included in the fields searched
`
`CPC - B23C 3/35, 2235/32 (2013.01)
`
`
`Electronic data base consulted during the international search (name of data base and, where practicable, search terms used)
`PatBase, Google Scholar
`
`C. DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Citation of document, with indication, where appropriate, of the relevant passages
`
`Relevant to claim No.
`
`
`
`
`
`
`1, 3-6, 10, 11, 16, 18—21,
`US 2007/0003388 A1 (DOONG) 04 January 2007 (04.01.2007) entire document
`25, 26, 31, 33—36, 40, 46,
`48-51, 55
`
`
`
`
`
`2, 7-9, 12, 17, 22-24, 27,
`32, 37-39, 41-45, 47,
`52-54, 56-60
`
`US 2001/0033781 A1 (WILLS et al) 25 October 2001 (25.10.2001 ) entire document
`
`13—15. 28-30
`
`
`57-60
`
`US 2011/0297691 A1 (FREEMAN) 08 December 2011 (08.12.2011) entire document
`38, 39, 42—45, 53, 54,
`US 2009/0074528 A1 (HADAD) 19 March 2009 (19.03.2009) entire document 2,17, 32,37, 43, 47, 52.
`
`58
`
`
`
`US 200810145163 A1 (FREEMAN et al) 19 June 2008 (19.06.2008) entire document
`7, 8, 12, 22, 23. 27
`
`
`US 2007/0224008 A1 (BASS et al) 27 September 2007 (27.09.2007) entire document
`9. 24
`
`
`
`“T"
`
`“E”
`“L”
`
`
` El
`D Further documents are listed in the continuation of Box C.
`riority
`later document published after the international filing date or
`*
`Special categories 0f Cited documents:
`
`
`date and not in conflict with the ap lieation but cited to un erstand
`“A" document defining the general state ofthe art which is not considered
`
`
`the principle or theory underlying t e Invention
`to be of particular relevance
`
`
`“X” document of particular relevance; the claimed invention cannot be
`earlier application or patent but published on or after the international
`considered novel or cannot be considered to involve an inventive
`filIng date
`steP when the document 15 taken alone
`document which may throw doubts on priority claim(s) or which is
`
`
`“Y” document of particular relevance;_the claimed invention cannot be
`gl‘SgaKlorgggglgs éhgcpglggfanon date 0f another Citation or other
`conSIdered to Involve an InventIve step when the document
`Is
`p
`p
`
`
`combined with one or more other such documents, such combination
`“0” document referring to an oral disclosure, use, exhibition or other
`
`
`being obvious to a person skilled in the art
`means
`
`
`“P”
`“8:" document member of the same patent family
`document published‘prior to the international filing date but later than
`
`the priorIty date claimed
`
`Date ofmailing ofthe international search report
`
`
`Date of the actual completion of the international search
`
` 26 February 2013
`14 MAR 2013
`
`
`Authorized officer:
`Name and mailing address of the ISA/US
`
`
`Blaine R. Copenheaver
`
`
`Mail Stop PCT, Attn: ISA/US, Commissioner for Patents
`
`P.O. Box 1450, Alexandria, Virginia 22313-1450
`PCT Helpdesk: 571-272-4300
`
`
`PCT OSP: 571-272-7774
`571-273-3201
`Facsimile No.
`
`
`
`Form PCT/ISA/ZIO (second sheet) (July 2009)
`
`
`
`PCT/USZO13I020231 14.03.2013
`
`From the
`INTERNATIONAL SEARCHING AUTHORITY
`
`PATENT COOPERATION TREATY
`
`T0: DILLON’DURNFORD
`BYRNE POH LLP
`11 BROADWAY, SUITE 814
`NEW YORK, NY 10004
`
`Applicant’s or agent’s file reference
`1 105250.121 -WO1
`
`WRITTEN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`(PCT Rule 43bis.l)
`
`Date ofmailing
`(day/momh/year)
`FOR FURTHER ACTION
`See paragraph 2 below
`
`,
`..
`1 4 M A R 2013
`
` PCT
`
`
`
`
`
`
`
`
`
`International Patent Classification (IPC) or both national classification and [PC
`IPC(8) - 823C 3/35 (2013.01)
`
`
`USPC - 409/81
`Applicant KEYME, INC.
`
`
`
`
`lntemational application No.
`
`International filing date (day/montIi/year)
`
`Priority date (day/month/year)
`
`PCT/US2013/020231
`
`04 January 2013
`
`04 January 2012
`
`I. This opinion contains indications relating to the following items:
`
`Box No.
`
`I
`
`Basis of the opinion
`
`Box No. II
`
`Priority
`
`Box No. [II
`
`Non-establishment of opinion with regard to novelty, inventive step and industrial applicability
`
`Box No. IV
`
`Lack ofunity ofinvention
`
`DEE]REESE Box No. Vlll Certain observations on the international application
`
`FURTHER ACTION
`
`Ifa demand for international preliminary examination is made, this opinion will be considered to be a written opinion of the
`lntemational Preliminary Examining Authority (“lPEA") except that this does not apply where the applicant chooses an Authority
`other than this one to be the lPEA and the chosen lPEA has notified the International Bureau under Rule 66. lbis(b) that written
`opinions ofthis lntemational Searching Authority will not be so considered.
`Ifthis opinion is, as provided above. considered to be a written opinion ofthe lPEA, the applicant is invited to submit to the lPEA
`a written reply together, where appropriate, with amendments. before the expiration of3 months from the date ofmailing of Form
`PCT/lSA/ZZO or before the expiration of22 months from the priority date, whichever expires later.
`For firrther options, see Form PCT/ISA/220.
`
`Name and mailing address ofthe ISA/US Date of completion of this opinion
`Commissioner for Patents
`Mail Stop PCT. Attn: ISA/US
`P.O. Box 1450. Alexandria. Virginia 22313-1450
`Facsimile No. 571-273-3201
`
`26 February 2013
`
`Authorized officer:
`Blaine R Copenheaver
`
`PCT osp; 571-272-7774
`
`Form PCT/lSA/237 (cover sheet) (July 201 I)
`
`
`
`Box No. V
`
`Box No. Vl
`
`Reasoned statement under Rule 43bis. l(a)(i) with regard to novelty, inventive step or industrial applicability:
`citations and explanations supporting such statement
`Certain documents cited
`
`Box No. Vll Certain defects in the international application
`
`PCT Helpdeslr: 571-272-4300
`
`
`
`PCT/USZO13I020231 14.03.201 3
`
`\VRI'I'I‘EN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`lntemational application No.
`PCT/US2013/020231
`
`Box No. I
`
`Basis of this opinion
`
`1. With regard to the language, this opinion has been established on the basis of:
`
`'2 the international application in the language in which it was filed.
`which is the language of a
`[:l
`a translation ofthe international application into
`translation furnished for the purposes ofinternational search (Rules l2.3(a) and 23. l(b)).
`
`2‘ E]
`
`This opinion has been established taking into account the rectification of an obvious mistake authorized by or notified
`to this Authority under Rule 91 (Rule 43bis. 1(a))
`
`
`
`
`
`
`
`
`3. With regard to any nucleotide and/or amino acid sequence disclosed in the international application, this opinion has been
`
`established on the basis ofa sequence listing filed or furnished:
`
`a.
`
`(means)
`on paper
`
`in electronic form
`
`
`
`
`
`together with the international application in electronic form
`
`in the international application as filed
`
`
`
`subsequently to this Authority for the purposes of search
`
`In addition, in the case that more than one version or copy ofa sequence listing has been filed or furnished, the required
`
`
`statements that the information in the subsequent or additional copies is identical to that in the application as filed or
`
`does not go beyond the application as filed, as appropriate, were furnished.
`
`5. Additional comments:
`
`
`
`Form PCT/lSA/237 (Box No. I) (July 20l l)
`
`
`
`PCT/USZO13I020231 14.03.2013
`
`WRITTEN OPINION OF THE
`
`INTERNATIONAL SEARCHING AUTHORITY
`
`lntemational application No.
`
`PCT/USZO13/020231
`
`Box No. V
`
`Reasoned statement under Rule 43bis.l(a)(i) with regard to novelty, inventive step or industrial applicability;
`citations and explanations supporting such statement
`
`Statement
`
`Novelty (N)
`
`Claims
`Claims
`
`2, 7-9, 12, 17, 22-24, 27, 32, 37-39, 41-45, 47, 52-54, 56-60
`1, 3-6, 10,11, 13-16,18-21, 25, 26, 28-31, 33-36, 40, 46, 48-51, 55
`
`receiver (paragraph [0013]).
`
`inventive step (IS)
`
`Industrial applicability (IA)
`
`Claims
`Claims
`
`Claims
`Claims
`
`None
`1'50
`
`1-60
`None
`
`Citations and explanations:
`2.
`Claims 1, 3-6, 10, 11, 16, 18-21, 25,26, 31, 33-36, 40, 46, 48-51 and 55 lack novelty under PCT Article 33(2) as being anticipated by
`Doong.
`-
`
`Referring to claim 1. Doong discloses a system for creating keys (Abstract; Fig. 1), the system comprising: at least one hardware
`processor (some form of processor inherently accesses memory 50) (paragraphs [00121-[0015]; Figs. 1-4) that: receives security
`information (identifier data 10) from the user (paragraphs [0012]-[0015]; Figs. 1—4); and receives geometric information (key data 40) about
`a first key associated with the security information from a storage device (memory 50) (paragraphs [0012]-[0015]; Figs. 1-4); and a key
`shaping device (80) that creates a second key using the geometric information (paragraphs [0012]—[0015]; Figs. 14).
`
`Referring to claim 3, Doong discloses that as applied to claim 1. Doong further a system wherein the storage device is a portable
`electronic device (memory is portable) (paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 4, Doong discloses that as applied to claim 1. Doong further discloses a system wherein the at least one hardware
`processor also: receives the security information from an input device (magnetic scanner, key pads) (paragraph [0013]): validates the
`security information (paragraphs [0014], [0015]; Figs. 14); indicates (displays) to the user and identity of one or more keys associated with
`the security information (paragraphs [0014], [0015]; Figs. 1—4); and receives an identification from the input device of a key to create from
`the one or more keys associated with the security information (paragraphs [0014], [0015]; Figs. 1—4).
`
`Referring to claim 5, Doong discloses that as applied to claim 4. Doong further discloses a system wherein the input device further
`comprises at least one of: a biometric sensor, a keypad, a keyboard, a touchscreen, an image sensor, and a near—field communication
`receiver (paragraph [0013]).
`‘
`
`Referring to claim 6, Doong discloses that as applied to claim 4. Doong further discloses a system wherein the security information
`comprises at least one of the following: a usemame, a password, biometricinformation of the user, a barcode, a Quick Response Code, a
`radio signal encoded with account information, and a light signal encoded with account information (paragraph [0013]).
`
`Referring to claim 10, Doong discloses that as applied to claim 1. Doong further discloses a system wherein the key shaping device
`comprises an additive manufacturing device (80) (paragraph [0012]; Fig. 1), and wherein the second key is created from material (blank)
`used by the additive manufacturing device (paragraphs [0012], [0015]; Fig. 1).
`
`Referring to claim 11, Doong discloses that as applied to claim 1. Doong further discloses a system wherein a material used to create the
`second key includes at ieast one of the following: key blanks, plastic, and stock material (paragraphs [0012], [0015]; Fig. 1).
`
`Referring to claim 16, Doong discloses a method of creating keys (Abstract; Fig. 1), the method comprising: receiving security information
`(identifier data 10) from a user (paragraphs [00121-[0015]; Figs. 1-4): receiving geometric information (key data 40) about a first key
`associated with the security information from a storage device (memory 50) (paragraphs [00121-[0015]; Figs. 1-4); and creating a second
`key (paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 18, Doong discloses that as applied to claim 16. Doong further a method wherein the storage device is a portable
`electronic device (memory is portable) (paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 19, Doong discloses that as applied to claim 16. Doong further discloses a method further comprising: receiving the
`security information from an input device (magnetic scanner, key pads) (paragraph [0013]); validating the security information (paragraphs
`[0014], [0015]; Figs. 1-4); indicating (displays) to the user and identity of one or more keys associated with the security information
`(paragraphs [0014], [0015]; Figs. 1-4); and receiving an identification from the input device ofa key to create from the one or more keys
`associated with the security information (paragraphs [0014], [0015]; Figs. 1-4).
`
`Referring to claim 20, Doong discloses that as applied to claim 19. Doong further discloses a method wherein the input device further
`comprises at least one of: a biometric sensor. a keypad, a keyboard, a touchscreen. an image sensor, and a near-field communication
`
`Form PCT/lSA/237 (Box No. V) (July 201 l)
`
`
`
`PCT/USZO13I020231 14.03.201 3
`
`WRI'I'I‘EN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`lntemational application No.
`PCT/U32013/020231
`
`Supplemental Box
`
`In case the space in any of the preceding boxes is not sufficient.
`Continuation of:
`
`Referring to claim 21, Doong discloses that as applied to claim 19. Doong further discloses a method wherein the security information
`comprises at least one of the following: a username, a password, biometric information of the user, a barcode, a Quick Response Code, a
`radio signal encoded with account information, and a light signal encoded with account information (paragraph [0013]).
`
`Referring to claim 25, Doong discloses that as applied to claim 16. Doong further discloses a method wherein the second key is created
`using an additive manufacturing device (80) (paragraph [0012]; Fig. 1), and wherein the second key is created from material (blank) used
`by the additive manufacturing device (paragraphs [0012], [0015]; Fig. 1).
`
`Referring to claim 26, Doong discloses that as applied to claim 16. Doong further discloses a method wherein a material used to create the
`second key includes at least one of the following: key blanks, plastic, and stock material (paragraphs [0012]. [0015]; Fig. 1).
`
`Referring to claim 31, Doong discloses a system for managing key information (Abstract; Fig. 1). the system comprising: at least one
`hardware processor (some form of processor inherently accesses memory 50) (paragraphs [0012]-[0015]; Figs. 1-4) that: receives security
`information (identifier data 10) from a user (paragraphs [00121-[0015]; Figs. 1-4); receives an image (via optical scanner) ofa first key
`(paragraphs [0012]—[0015]; Figs. 1-4);Vdetermines geometric information (40) about the first key based on the image (paragraphs
`[0012]-[0015]; Figs. 1-4); causes the geometric information about the first key to be stored in a storage device (memory 50) in association
`with at least a portion of the security information from the user (paragraphs [0012]—[0015]; Figs. 1—4); and causes the geometric information
`about the first key to be retrieved from the storage device upon validation at least the portion of the security information for use in the
`creating a second key (paragraphs [0012]—[0015]; Figs. 1-4).
`
`Referring to claim 33, Doong discloses that as applied to claim 31. Doong further discloses a system further comprising an image sensor
`(optical scanner) that captures the image of the first key (paragraph [0015]).
`
`Referring to claim 34, Doong discloses that as applied to claim 31. Doong further discloses a system wherein the hardware processor also
`causes the retrieved geometric information to be presented (displayed) to the user (paragraph [0015]).
`
`Referring to claim 35, Doong discloses that as applied to claim 31. Doong further discloses a system wherein the hardware processor also
`transmits the geometric information to a key duplicator (80) in association with an instruction to create the second key (paragraphs
`[0012]—[0015]; Figs. 1-4).
`
`Referring to claim 36, Doong discloses that as applied to claim 35. Doong further discloses a system wherein the key duplicator comprises
`a key fabricating device configured to create the second key based on the geometric information retrieved from the storage device
`(paragraphs [00121-[0015]; Figs. 1-4).
`
`Referring to claim 40. Doong discloses that as applied to claim 31. Doong further discloses a system wherein the geometric information
`about the key includes at least one of: a bitting pattern of the first key. and a key type of the first key (paragraph [0015]).
`
`Referring to claim 46, Doong discloses a method for managing key information (Abstract; Fig. 1), the method comprising: receiving, using a
`hardware processor (some form of processor inherently accesses memory 50) (paragraphs [0012]—[0015]; Figs. 1-4), security information
`(identifier data 10) from a user (paragraphs [0012]—[0015]; Figs. 1-4); receiving, use the hardware processor, and image (via optical
`scanner) of a first key (the processor inherently accesses the image data from memory 50) (paragraphs [0012]—[0015]; Figs. 1—4);
`determining, using the hardware processor, geometric information (40) about the first key based on the image (the processor inherently
`uses the image data from 50 to transfer the geometric information from the first key to the second key) (paragraphs [00121-[0015]; Figs.
`14); causing, using the hardware processor, the geometric information about the first key to be stored in a storage device (memory 50) in
`association with at least a portion of the security information from the user (the processor inherently accesses memory 50) (paragraphs
`[00121-[0015]; Figs. 1—4); and causing, using the hardware processor, the geometric information about the first to key to be retrieved from
`the storage device upon validation at least the portion of the security information for use in creating a second key (the processor inherently
`accesses memory 50) (paragraphs [0012]-[0015]; Figs. 1—4).
`
`about the key includes at least one of: a bitting pattern of the first key, and a key type of the first key (paragraph [0015]).
`
`Referring to claim 48. Doong discloses that as applied to claim 46. Doong further discloses a method further comprising capturing the
`image of the first key using an image sensor (optical scanner) (paragraph [0015]).
`
`Referring to claim 49, Doong discloses that as applied to claim 46. Doong further discloses a method further comprising causing, using the
`hardware processor, the retrieved geometric information to be presented (displayed) to the user (paragraph [0015]).
`
`Referring to claim 50, Doong discloses that as applied to claim 46. Doong further discloses a method further comprising transmitting, using
`the hardware processor, the geometric information to a key duplicator (80) in association with an instruction to create a second key
`(paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 51, Doong discloses that as applied to claim 50. Doong further discloses a method wherein the key duplicator comprises
`a key fabricating device configured to create the second key based on the geometric information retrieved from the storage device
`(paragraphs [00121-[0015]; Figs. 1-4).
`
`Referring to claim 55, Doong discloses that as applied to claim 46. Doong further discloses a method wherein the geometric information
`
`Form PCT/lSA/237 (Supplemental Box) (July 201 l)
`
`
`
`PCT/USZO1 3I020231 14.03.2013
`
`WRITTEN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`
`
`international application No.
`PCT/U32013/020231
`
`Supplemental Box
`
`
`
`in case the space in any of the preceding boxes is not sufficient.
`Continuation of:
`Claims 13—15 and 28-30 lack novelty under PCT Article 33(2) as being anticipated by Wills et al.
`
`Referring to claim 13, Wills et al. disclose a system for creating keys (Abstract; Fig. 4), the system comprising: a Key receiver (30) that
`
`
`
`receives a first key (master key) (paragraphs [00831-[0087]; Fig. 4); a key scanner (28) that captures geometric information about the first
`key (paragraphs [00831-[0087]; Fig. 4); a hardware processor (16) that determines a key type and bitting pattern of the first key based on
`the geometric information (paragraphs [0068], [0069], [0136], [0147]; Figs. 4, 5); and a key shaping device (10) that creates a second key
`
`
`based on the key type and bitting pattern determined by the processor (paragraph [0069]; Figs. 4, 5).
`
`Referring to claim 14, Wills et al. disclose that as applied to claim 13. Wills et al. further disclose a system wherein the key scanner
`
`
`
`comprises at least one of: a camera, laser—based measuring device, a bitting detection finger, a plurality of mechanical pins, and a plurality
`of light sources and light detectors (paragraphs [0083]-[0087]; Fig. 4).
`
`Referring to claim 15, Wills et al. disclose that as applied to claim 13. Wills et al. further disclose a system wherein the hardware processor
`
`
`also determines the key type and Dining pattern using machine learning techniques to recognize features of the key (paragraphs [0068],
`[0069]. [0136], [0147]; Figs. 4, 5).
`
` Referring to claim 28, Wills et al. disclose a method for creating keys (Abstract; Fig. 4), the method comprising: receive a first key (master
`
`
`key) (paragraphs [0083]-[0087]; Fig. 4); scanning (via 28) geometric information about the first key (paragraphs [0083]-[0087]; Fig. 4);
`determining a key type and bitting pattern of the first key based on the geometric information (paragraphs [0068], [0069], [0136], [0147];
`
`Figs. 4, 5); and creating a second key based on the key type and bitting pattern determined by a processor (16) (paragraphs [0068],
`
`[0069], [0136], [0147]; Figs. 4, 5).
`
`
`
`
`
`
`
`
`Referring to claim 29, Wills et al. disclose that as applied to claim 28. Wills et al. further disclose a method wherein scanning the geometric
`information further comprises, capturing the geometric information using at least one of: a camera, laser-based measuring device, a bitting
`detection finger, a plurality of mechanical pins, and a plurality of light sources and light detectors (paragraphs [00831-[0087]; Fig. 4).
`
`
` Referring to claim 30, Wills et al. disclose that as applied to claim 28. Wills et al. further disclose a method further comprising determining
`the key type and bitting pattern using machine learning techniques to recognize features of the key (paragraphs [0068], [0069], [0136],
`[0147]; Figs. 4, 5).
`
`Claims 38, 39, 42, 44, 45, 53, 54, 57, 59 and 60 lack an inventive step under PCT Article 33(3) as being obvious over Doong in View of US
`
`2011/0297691 A1 to Freeman hereinafter referred to as Freeman ‘691.
`
`
`
`Referring to claim 38, Doong discloses that as applied to claim 35. However, Doong does not show a system wherein a hardware
`processor also transmits payment information to a key duplicator in association with an instruction to create a second key. However,
`Freeman ‘691 teaches a system (Abstract; Figs. 3, 61) wherein a hardware processor (24) also transmits payment information (via 12) to a
`
`
`key duplicator (10) in association with an instruction to create a second key (paragraphs [0066], [0069]; Figs. 1, 3). Therefore, it would be
`
`
`obvious to one of ordinary skill in the art at the time of invention to modify the invention of Doong to include a system wherein a hardware
`
`
`processor also transmits payment information to a key duplicator in association with an instruction to create a second key as taught by
`Freeman ‘691 for the purpose of increasing the security of the device.
`
`Referring to claim 39, Doong discloses that as applied to claim 35. However, Doong does not show a system wherein a hardware
`
`
`processor also transmits to a key duplicator an instruction to deliver a second key to the user. However, Freeman ‘691 teaches a system
`
`
`(Abstract; Fig. 1) wherein a hardware processor (24, 25) also transmits to a key duplicator (10) an instruction to deliver (via 15) a second
`
`key to the user (paragraphs [0062], [0066], [0101]; Figs. 1, 3). Therefore, it would be obvious to one of ordinary skill in the art at the time of
`
`
`invention to modify the invention of Doong to include a system wherein a hardware processor also transmits to a key duplicator an
`
`instruction to deliver a second key to the user as taught by Freeman ‘691 for the purpose of increasing the security of the device.
`
`
`
`
`
`
`
`
`
`
`
`Referring to claim 42, Doong discloses a system for managing key information (Abstract; Fig. 1), the system comprising: an image sensor
`(optical scanner) (paragraph [0015]); and a hardware processor (some form of processor inherently accesses memory 50) (paragraphs
`[0012]-[0015]; Figs. 1-4) that: receives security information (identifier data 10) from a user (paragraphs [0012]-[0015]; Figs. 1-4); receives
`an image (via optical scanner) of a key from the image sensor (paragraphs [00121-[0015]; Figs. 1-4); and transmits a request to generate
`geometric information (40) about the key based on the image of the key to the device (paragraphs [0012]-[0015]; Figs. 1—4), wherein the
`request includes the image of the key and at least a portion of the security information received from the user (paragraphs [0012]-[0015];
`Figs. 1—4). However, Doong does not show a system for managing key information, the system comprising: a hardware processor that:
`communicates with a remote device. However, Freeman “691 teaches a system for managing key information (Abstract; Figs. 3, 61 ), the
`system comprising: a hardware processor (24) that: communicates with a remote device (201) (paragraphs [0066], [0067], [0131]; Figs. 3,
`61). Therefore, it would be obvious to one of ordinary skill in the art at the time of invention to modify the invention of Doong to include a
`system for managing key information, the system comprising: a hardware processor that: communicates with a remote device as taught by
`Freeman ‘691 for the purpose of increasing the security of the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Referring to claim 44, the modified Doong discloses that as applied to claim 42.