PCT/USZO1 3I020231 14.03.2013
`
`PATENT COOPERATION TREATY
`
`From the INTERNATIONAL SEARCHING AUTHORITY
`
`
`
`To: DILLON DURNFORD
`BYRNE POH LLP
`
`
`11 BROADWAY, SUITE 814
`NEW YORK, NY 10004
`
`
`
`PCT
`
`NOTIFICATION OF TRANSMITTAL OF
`THE INTERNATIONAL SEARCH REPORT AND
`THE WRITTEN OPINION OF THE INTERNATIONAL
`SEARCHING AUTHORITY, OR THE DECLARATION
`
`
`
`(PCT Rule 44.1)
`
`
`
`Applicant KEYME, INC.
`
`
`
`I 4 MAR 20B
`833.333.73.335
`
`
`
`Applicant’s or agent’s file reference
`
`
`FOR FURTHER ACTION Sec paragraphs 1 and 4 below
`
`1105250.121-WO1
`
`
`
`
`International filing date
`International application No.
`
`
`
`04 January 2013
`(day/manth/year)
`PCT/U32013/020231
`
`
`
`
`
`
`
`
`
`
`
`1. IE The applicant is hereby notified that the international search report and the written opinion olithe International Searching
`Authority have been established and are transmitted herewith.
`Filing of amendments and statement under Article 19:
`The applicant is entitled, if he so wishes. to amend the claims of the international application (see Rule 46):
`When? The time limit for filing such amendments is normally two months from the date of transmittal of the
`international search report.
`Where? Directly to the International Bureau of WIPO, 34 chemin des Colombettes
`1211 Geneva 20, Switzerland, Facsimile No.2 +41 22 338 82 70
`For more detailed instructions, see PCT AppIicanl ‘s Guide, International Phase, paragraphs 9.004 —- 9.01 l.
`
`2. E] The applicant is hereby notified that no international search report will be established and that the declaration under
`Article l7(2)(a) to that effect and the written opinion of the International Searching Authority are transmitted herewith.
`
`
`
`The applicant may submit comments on an informal basis on the written opinion of the International Searching Authority to the
`International Bureau. The International Bureau will send a copy of such comments to all designated Offices unless an
`international preliminary examination report has been or is to be established. Following the expiration of 30 months from the
`priority date, these comments will also be made available to the public.
`Shonly after the expiration of 18 months from the priority date, the international application will be published by the
`International Bureau.
`If the applicant wishes to avoid or postpone publication, a notice of withdrawal of the international
`application, or of the priority claim, must reach the International Bureau before the completion of the technical preparations for
`international publication (Rules 90bis.1 and 90bis.3).
`Within 19 months from the priority date, but only in respect of some designated Offices, a demand for international preliminary
`examination must be filed if the applicant wishes to postpone the entry into the national phase until 30 months from the priority
`date (in some Offices even later); otherwise, the applicant must, within 20 months from the priority date, perform the prescribed
`acts for entry into the national phase before those designated Offices.
`In respect of other designated Offices, the time limit of 30 months (or later) will apply even if no demand is filed within 19
`months.
`
`
`
`the applicable time limits, Office by Office, see www.wipo.int/pct/cn/texts/time_limits.html and the
`For details about
`PCT Applicant ’3 Guide, National Chapters.
`
`Authorized officer
`
`
`
`
`
`3. D With regard to any protest against payment of (an) additional fee(s) under Rule 40.2, the applicant is notified that:
`
`
`D the protest together with the decision thereon has been transmitted to the lntemational Bureau together with any
`request to forward the texts of both the protest and the decision thereon to the designated Offices.
`
`
`
`the applicant will be notified as soon as a decision is made. [:1 no decision has been made yet on the protest;
`
`4. Reminders
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Name and mailing address of the [SN
`Mail Stop PCT, Attn: ISA/US
`Elaine R. Copenheaver
`
`
`
`Commissioner for Patents
`
`PCT Helpdesk: 571 -272-4300
`P.O. Box 1450. Alexandria. Virqinia 22313-1450
`
`
`Facsimile No. 571-273-3201
`Telephone No_ PCT OSP: 571-272-7774
`
`Form PC[VISA/220 (July 2010)
`
`

`

`PCT/U32013I020231 1 4.03.2013
`
`PATENT COOPERATION TREATY
`
`PCT
`
`INTERNATIONAL SEARCH REPORT
`
`(PCT Article 18 and Rules 43 and 44)
`
`
`
`Applicant’s or agent’s file reference
`
`FOR FURTHER
`see Form PCT/lSA/ZZO
`
`1105250.121-WO1
`as well as, where applicable, item 5 below. ACTION
`
`
`
`(Earliest) Priority Date (day/monIh/year)
`
`lntemational application No.
`lntemational filing date (day/month/year)
`
`
`
`04 January 2012
`04 January 2013
`PCT/USZO13/020231
`
`
`
`
`a. With regard to the language, the international search was carried out on the basis of:
`the international application in the language in which it was filed.
`
`
`which is the language of
`E] a translation ofthe international application into
`a translation furnished for the purposes ofintemational search (Rules 12.3(a) and 23.1(b)).
`b. D This international search report has been established taking into account the rectification of an obvious mistake
`authorized by or notified to this Authority under Rule 91 (Rule 43.6bis(a)).
`c. D With regard to any nucleotide and/or amino acid sequence disclosed in the international application, see Box No. l.
`
`2.
`
`3.
`
`[:1 Certain claims were found unsearchable (see Box No.11).
`
`El Unity of invention is lacking (see Box No. 111).
`
`
`
`
`This international search report has been prepared by this International Searching Authority and is transmitted to the applicant
`according to Article 18. A copy is being transmitted to the lntemational Bureau.
`This international search report consists ofa total of 7/ sheets.
`
`
`E] It is also accompanied by a copy of each prior art document cited in this report.
`
`1. Basis of the report
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4. With regard to the title,
`lZl the text is approved as submitted by the applicant.
`El the text has been established by this Authority to read as follows:
`
`
`
`
`5. With regard to the abstract,
`
`
`v
`the text is approved as submitted by the applicant.
`
`
`[3 the text has been established, according to Rule 38.2, by this Authority as it appears in Box No. IV. The applicant
`
`
`may, within one month from the date of mailing ofthis international search report, submit comments to this Authority.
`
`
`6. With regard to the drawings,
`
`a.
`the figure ofthe drawings to be published with the abstract is Figure No.
`l2 as suggested by the applicant.
`D as selected by' this Authority, because the applicant failed to suggest a figure.
`El as selected by this Authority, because this figure better characterizes the invention.
`
`
`b. D none ofthe figures is to be published with the abstract.
`
`Form PCT/lSA/210 (first sheet) (July 2009)
`
`
`
`
`1
`
`
`
`
`

`

`PCT/USZO1 3/020231 1 4.03.201 3
`
`INTERNATIONAL SEARCH REPORT
`
`
`International application No.
`PCT/USZO13/020231
`
`
` A. CLASSIFICATION OF SUBJECT MATTER
`
`IPC(8) - 823C 3/35 (2013.01)
`
`
`USPC - 409/81
`
`
`According to lntemational Patent Classification (IPC) or to both national classification and lPC
`B.
`FIELDS SEARCHED
`
`
`
`
`Minimum documentation searched (classification system followed by classification symbols)
`
`
`
`IPC(8) — B21D 53/42; 8230 1/16, 3/35 (2013.01)
`USPC - 76/110; 409/81 ,82,83; 700/161
`
` Documentation searched other than minimum documentation to the extent that such documents are included in the fields searched
`
`CPC - B23C 3/35, 2235/32 (2013.01)
`
`
`Electronic data base consulted during the international search (name of data base and, where practicable, search terms used)
`PatBase, Google Scholar
`
`C. DOCUMENTS CONSIDERED TO BE RELEVANT
`
`Citation of document, with indication, where appropriate, of the relevant passages
`
`Relevant to claim No.
`
`
`
`
`
`
`1, 3-6, 10, 11, 16, 18—21,
`US 2007/0003388 A1 (DOONG) 04 January 2007 (04.01.2007) entire document
`25, 26, 31, 33—36, 40, 46,
`48-51, 55
`
`
`
`
`
`2, 7-9, 12, 17, 22-24, 27,
`32, 37-39, 41-45, 47,
`52-54, 56-60
`
`US 2001/0033781 A1 (WILLS et al) 25 October 2001 (25.10.2001 ) entire document
`
`13—15. 28-30
`
`
`57-60
`
`US 2011/0297691 A1 (FREEMAN) 08 December 2011 (08.12.2011) entire document
`38, 39, 42—45, 53, 54,
`US 2009/0074528 A1 (HADAD) 19 March 2009 (19.03.2009) entire document 2,17, 32,37, 43, 47, 52.
`
`58
`
`
`
`US 200810145163 A1 (FREEMAN et al) 19 June 2008 (19.06.2008) entire document
`7, 8, 12, 22, 23. 27
`
`
`US 2007/0224008 A1 (BASS et al) 27 September 2007 (27.09.2007) entire document
`9. 24
`
`
`
`“T"
`
`“E”
`“L”
`
`
` El
`D Further documents are listed in the continuation of Box C.
`riority
`later document published after the international filing date or
`*
`Special categories 0f Cited documents:
`
`
`date and not in conflict with the ap lieation but cited to un erstand
`“A" document defining the general state ofthe art which is not considered
`
`
`the principle or theory underlying t e Invention
`to be of particular relevance
`
`
`“X” document of particular relevance; the claimed invention cannot be
`earlier application or patent but published on or after the international
`considered novel or cannot be considered to involve an inventive
`filIng date
`steP when the document 15 taken alone
`document which may throw doubts on priority claim(s) or which is
`
`
`“Y” document of particular relevance;_the claimed invention cannot be
`gl‘SgaKlorgggglgs éhgcpglggfanon date 0f another Citation or other
`conSIdered to Involve an InventIve step when the document
`Is
`p
`p
`
`
`combined with one or more other such documents, such combination
`“0” document referring to an oral disclosure, use, exhibition or other
`
`
`being obvious to a person skilled in the art
`means
`
`
`“P”
`“8:" document member of the same patent family
`document published‘prior to the international filing date but later than
`
`the priorIty date claimed
`
`Date ofmailing ofthe international search report
`
`
`Date of the actual completion of the international search
`
` 26 February 2013
`14 MAR 2013
`
`
`Authorized officer:
`Name and mailing address of the ISA/US
`
`
`Blaine R. Copenheaver
`
`
`Mail Stop PCT, Attn: ISA/US, Commissioner for Patents
`
`P.O. Box 1450, Alexandria, Virginia 22313-1450
`PCT Helpdesk: 571-272-4300
`
`
`PCT OSP: 571-272-7774
`571-273-3201
`Facsimile No.
`
`
`
`Form PCT/ISA/ZIO (second sheet) (July 2009)
`
`

`

`PCT/USZO13I020231 14.03.2013
`
`From the
`INTERNATIONAL SEARCHING AUTHORITY
`
`PATENT COOPERATION TREATY
`
`T0: DILLON’DURNFORD
`BYRNE POH LLP
`11 BROADWAY, SUITE 814
`NEW YORK, NY 10004
`
`Applicant’s or agent’s file reference
`1 105250.121 -WO1
`
`WRITTEN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`(PCT Rule 43bis.l)
`
`Date ofmailing
`(day/momh/year)
`FOR FURTHER ACTION
`See paragraph 2 below
`
`,
`..
`1 4 M A R 2013
`
` PCT
`
`
`
`
`
`
`
`
`
`International Patent Classification (IPC) or both national classification and [PC
`IPC(8) - 823C 3/35 (2013.01)
`
`
`USPC - 409/81
`Applicant KEYME, INC.
`
`
`
`
`lntemational application No.
`
`International filing date (day/montIi/year)
`
`Priority date (day/month/year)
`
`PCT/US2013/020231
`
`04 January 2013
`
`04 January 2012
`
`I. This opinion contains indications relating to the following items:
`
`Box No.
`
`I
`
`Basis of the opinion
`
`Box No. II
`
`Priority
`
`Box No. [II
`
`Non-establishment of opinion with regard to novelty, inventive step and industrial applicability
`
`Box No. IV
`
`Lack ofunity ofinvention
`
`DEE]REESE Box No. Vlll Certain observations on the international application
`
`FURTHER ACTION
`
`Ifa demand for international preliminary examination is made, this opinion will be considered to be a written opinion of the
`lntemational Preliminary Examining Authority (“lPEA") except that this does not apply where the applicant chooses an Authority
`other than this one to be the lPEA and the chosen lPEA has notified the International Bureau under Rule 66. lbis(b) that written
`opinions ofthis lntemational Searching Authority will not be so considered.
`Ifthis opinion is, as provided above. considered to be a written opinion ofthe lPEA, the applicant is invited to submit to the lPEA
`a written reply together, where appropriate, with amendments. before the expiration of3 months from the date ofmailing of Form
`PCT/lSA/ZZO or before the expiration of22 months from the priority date, whichever expires later.
`For firrther options, see Form PCT/ISA/220.
`
`Name and mailing address ofthe ISA/US Date of completion of this opinion
`Commissioner for Patents
`Mail Stop PCT. Attn: ISA/US
`P.O. Box 1450. Alexandria. Virginia 22313-1450
`Facsimile No. 571-273-3201
`
`26 February 2013
`
`Authorized officer:
`Blaine R Copenheaver
`
`PCT osp; 571-272-7774
`
`Form PCT/lSA/237 (cover sheet) (July 201 I)
`
`
`
`Box No. V
`
`Box No. Vl
`
`Reasoned statement under Rule 43bis. l(a)(i) with regard to novelty, inventive step or industrial applicability:
`citations and explanations supporting such statement
`Certain documents cited
`
`Box No. Vll Certain defects in the international application
`
`PCT Helpdeslr: 571-272-4300
`
`

`

`PCT/USZO13I020231 14.03.201 3
`
`\VRI'I'I‘EN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`lntemational application No.
`PCT/US2013/020231
`
`Box No. I
`
`Basis of this opinion
`
`1. With regard to the language, this opinion has been established on the basis of:
`
`'2 the international application in the language in which it was filed.
`which is the language of a
`[:l
`a translation ofthe international application into
`translation furnished for the purposes ofinternational search (Rules l2.3(a) and 23. l(b)).
`
`2‘ E]
`
`This opinion has been established taking into account the rectification of an obvious mistake authorized by or notified
`to this Authority under Rule 91 (Rule 43bis. 1(a))
`
`
`
`
`
`
`
`
`3. With regard to any nucleotide and/or amino acid sequence disclosed in the international application, this opinion has been
`
`established on the basis ofa sequence listing filed or furnished:
`
`a.
`
`(means)
`on paper
`
`in electronic form
`
`
`
`
`
`together with the international application in electronic form
`
`in the international application as filed
`
`
`
`subsequently to this Authority for the purposes of search
`
`In addition, in the case that more than one version or copy ofa sequence listing has been filed or furnished, the required
`
`
`statements that the information in the subsequent or additional copies is identical to that in the application as filed or
`
`does not go beyond the application as filed, as appropriate, were furnished.
`
`5. Additional comments:
`
`
`
`Form PCT/lSA/237 (Box No. I) (July 20l l)
`
`

`

`PCT/USZO13I020231 14.03.2013
`
`WRITTEN OPINION OF THE
`
`INTERNATIONAL SEARCHING AUTHORITY
`
`lntemational application No.
`
`PCT/USZO13/020231
`
`Box No. V
`
`Reasoned statement under Rule 43bis.l(a)(i) with regard to novelty, inventive step or industrial applicability;
`citations and explanations supporting such statement
`
`Statement
`
`Novelty (N)
`
`Claims
`Claims
`
`2, 7-9, 12, 17, 22-24, 27, 32, 37-39, 41-45, 47, 52-54, 56-60
`1, 3-6, 10,11, 13-16,18-21, 25, 26, 28-31, 33-36, 40, 46, 48-51, 55
`
`receiver (paragraph [0013]).
`
`inventive step (IS)
`
`Industrial applicability (IA)
`
`Claims
`Claims
`
`Claims
`Claims
`
`None
`1'50
`
`1-60
`None
`
`Citations and explanations:
`2.
`Claims 1, 3-6, 10, 11, 16, 18-21, 25,26, 31, 33-36, 40, 46, 48-51 and 55 lack novelty under PCT Article 33(2) as being anticipated by
`Doong.
`-
`
`Referring to claim 1. Doong discloses a system for creating keys (Abstract; Fig. 1), the system comprising: at least one hardware
`processor (some form of processor inherently accesses memory 50) (paragraphs [00121-[0015]; Figs. 1-4) that: receives security
`information (identifier data 10) from the user (paragraphs [0012]-[0015]; Figs. 1—4); and receives geometric information (key data 40) about
`a first key associated with the security information from a storage device (memory 50) (paragraphs [0012]-[0015]; Figs. 1-4); and a key
`shaping device (80) that creates a second key using the geometric information (paragraphs [0012]—[0015]; Figs. 14).
`
`Referring to claim 3, Doong discloses that as applied to claim 1. Doong further a system wherein the storage device is a portable
`electronic device (memory is portable) (paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 4, Doong discloses that as applied to claim 1. Doong further discloses a system wherein the at least one hardware
`processor also: receives the security information from an input device (magnetic scanner, key pads) (paragraph [0013]): validates the
`security information (paragraphs [0014], [0015]; Figs. 14); indicates (displays) to the user and identity of one or more keys associated with
`the security information (paragraphs [0014], [0015]; Figs. 1—4); and receives an identification from the input device of a key to create from
`the one or more keys associated with the security information (paragraphs [0014], [0015]; Figs. 1—4).
`
`Referring to claim 5, Doong discloses that as applied to claim 4. Doong further discloses a system wherein the input device further
`comprises at least one of: a biometric sensor, a keypad, a keyboard, a touchscreen, an image sensor, and a near—field communication
`receiver (paragraph [0013]).
`‘
`
`Referring to claim 6, Doong discloses that as applied to claim 4. Doong further discloses a system wherein the security information
`comprises at least one of the following: a usemame, a password, biometricinformation of the user, a barcode, a Quick Response Code, a
`radio signal encoded with account information, and a light signal encoded with account information (paragraph [0013]).
`
`Referring to claim 10, Doong discloses that as applied to claim 1. Doong further discloses a system wherein the key shaping device
`comprises an additive manufacturing device (80) (paragraph [0012]; Fig. 1), and wherein the second key is created from material (blank)
`used by the additive manufacturing device (paragraphs [0012], [0015]; Fig. 1).
`
`Referring to claim 11, Doong discloses that as applied to claim 1. Doong further discloses a system wherein a material used to create the
`second key includes at ieast one of the following: key blanks, plastic, and stock material (paragraphs [0012], [0015]; Fig. 1).
`
`Referring to claim 16, Doong discloses a method of creating keys (Abstract; Fig. 1), the method comprising: receiving security information
`(identifier data 10) from a user (paragraphs [00121-[0015]; Figs. 1-4): receiving geometric information (key data 40) about a first key
`associated with the security information from a storage device (memory 50) (paragraphs [00121-[0015]; Figs. 1-4); and creating a second
`key (paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 18, Doong discloses that as applied to claim 16. Doong further a method wherein the storage device is a portable
`electronic device (memory is portable) (paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 19, Doong discloses that as applied to claim 16. Doong further discloses a method further comprising: receiving the
`security information from an input device (magnetic scanner, key pads) (paragraph [0013]); validating the security information (paragraphs
`[0014], [0015]; Figs. 1-4); indicating (displays) to the user and identity of one or more keys associated with the security information
`(paragraphs [0014], [0015]; Figs. 1-4); and receiving an identification from the input device ofa key to create from the one or more keys
`associated with the security information (paragraphs [0014], [0015]; Figs. 1-4).
`
`Referring to claim 20, Doong discloses that as applied to claim 19. Doong further discloses a method wherein the input device further
`comprises at least one of: a biometric sensor. a keypad, a keyboard, a touchscreen. an image sensor, and a near-field communication
`
`Form PCT/lSA/237 (Box No. V) (July 201 l)
`
`

`

`PCT/USZO13I020231 14.03.201 3
`
`WRI'I'I‘EN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`lntemational application No.
`PCT/U32013/020231
`
`Supplemental Box
`
`In case the space in any of the preceding boxes is not sufficient.
`Continuation of:
`
`Referring to claim 21, Doong discloses that as applied to claim 19. Doong further discloses a method wherein the security information
`comprises at least one of the following: a username, a password, biometric information of the user, a barcode, a Quick Response Code, a
`radio signal encoded with account information, and a light signal encoded with account information (paragraph [0013]).
`
`Referring to claim 25, Doong discloses that as applied to claim 16. Doong further discloses a method wherein the second key is created
`using an additive manufacturing device (80) (paragraph [0012]; Fig. 1), and wherein the second key is created from material (blank) used
`by the additive manufacturing device (paragraphs [0012], [0015]; Fig. 1).
`
`Referring to claim 26, Doong discloses that as applied to claim 16. Doong further discloses a method wherein a material used to create the
`second key includes at least one of the following: key blanks, plastic, and stock material (paragraphs [0012]. [0015]; Fig. 1).
`
`Referring to claim 31, Doong discloses a system for managing key information (Abstract; Fig. 1). the system comprising: at least one
`hardware processor (some form of processor inherently accesses memory 50) (paragraphs [0012]-[0015]; Figs. 1-4) that: receives security
`information (identifier data 10) from a user (paragraphs [00121-[0015]; Figs. 1-4); receives an image (via optical scanner) ofa first key
`(paragraphs [0012]—[0015]; Figs. 1-4);Vdetermines geometric information (40) about the first key based on the image (paragraphs
`[0012]-[0015]; Figs. 1-4); causes the geometric information about the first key to be stored in a storage device (memory 50) in association
`with at least a portion of the security information from the user (paragraphs [0012]—[0015]; Figs. 1—4); and causes the geometric information
`about the first key to be retrieved from the storage device upon validation at least the portion of the security information for use in the
`creating a second key (paragraphs [0012]—[0015]; Figs. 1-4).
`
`Referring to claim 33, Doong discloses that as applied to claim 31. Doong further discloses a system further comprising an image sensor
`(optical scanner) that captures the image of the first key (paragraph [0015]).
`
`Referring to claim 34, Doong discloses that as applied to claim 31. Doong further discloses a system wherein the hardware processor also
`causes the retrieved geometric information to be presented (displayed) to the user (paragraph [0015]).
`
`Referring to claim 35, Doong discloses that as applied to claim 31. Doong further discloses a system wherein the hardware processor also
`transmits the geometric information to a key duplicator (80) in association with an instruction to create the second key (paragraphs
`[0012]—[0015]; Figs. 1-4).
`
`Referring to claim 36, Doong discloses that as applied to claim 35. Doong further discloses a system wherein the key duplicator comprises
`a key fabricating device configured to create the second key based on the geometric information retrieved from the storage device
`(paragraphs [00121-[0015]; Figs. 1-4).
`
`Referring to claim 40. Doong discloses that as applied to claim 31. Doong further discloses a system wherein the geometric information
`about the key includes at least one of: a bitting pattern of the first key. and a key type of the first key (paragraph [0015]).
`
`Referring to claim 46, Doong discloses a method for managing key information (Abstract; Fig. 1), the method comprising: receiving, using a
`hardware processor (some form of processor inherently accesses memory 50) (paragraphs [0012]—[0015]; Figs. 1-4), security information
`(identifier data 10) from a user (paragraphs [0012]—[0015]; Figs. 1-4); receiving, use the hardware processor, and image (via optical
`scanner) of a first key (the processor inherently accesses the image data from memory 50) (paragraphs [0012]—[0015]; Figs. 1—4);
`determining, using the hardware processor, geometric information (40) about the first key based on the image (the processor inherently
`uses the image data from 50 to transfer the geometric information from the first key to the second key) (paragraphs [00121-[0015]; Figs.
`14); causing, using the hardware processor, the geometric information about the first key to be stored in a storage device (memory 50) in
`association with at least a portion of the security information from the user (the processor inherently accesses memory 50) (paragraphs
`[00121-[0015]; Figs. 1—4); and causing, using the hardware processor, the geometric information about the first to key to be retrieved from
`the storage device upon validation at least the portion of the security information for use in creating a second key (the processor inherently
`accesses memory 50) (paragraphs [0012]-[0015]; Figs. 1—4).
`
`about the key includes at least one of: a bitting pattern of the first key, and a key type of the first key (paragraph [0015]).
`
`Referring to claim 48. Doong discloses that as applied to claim 46. Doong further discloses a method further comprising capturing the
`image of the first key using an image sensor (optical scanner) (paragraph [0015]).
`
`Referring to claim 49, Doong discloses that as applied to claim 46. Doong further discloses a method further comprising causing, using the
`hardware processor, the retrieved geometric information to be presented (displayed) to the user (paragraph [0015]).
`
`Referring to claim 50, Doong discloses that as applied to claim 46. Doong further discloses a method further comprising transmitting, using
`the hardware processor, the geometric information to a key duplicator (80) in association with an instruction to create a second key
`(paragraphs [0012]-[0015]; Figs. 1-4).
`
`Referring to claim 51, Doong discloses that as applied to claim 50. Doong further discloses a method wherein the key duplicator comprises
`a key fabricating device configured to create the second key based on the geometric information retrieved from the storage device
`(paragraphs [00121-[0015]; Figs. 1-4).
`
`Referring to claim 55, Doong discloses that as applied to claim 46. Doong further discloses a method wherein the geometric information
`
`Form PCT/lSA/237 (Supplemental Box) (July 201 l)
`
`

`

`PCT/USZO1 3I020231 14.03.2013
`
`WRITTEN OPINION OF THE
`INTERNATIONAL SEARCHING AUTHORITY
`
`
`
`international application No.
`PCT/U32013/020231
`
`Supplemental Box
`
`
`
`in case the space in any of the preceding boxes is not sufficient.
`Continuation of:
`Claims 13—15 and 28-30 lack novelty under PCT Article 33(2) as being anticipated by Wills et al.
`
`Referring to claim 13, Wills et al. disclose a system for creating keys (Abstract; Fig. 4), the system comprising: a Key receiver (30) that
`
`
`
`receives a first key (master key) (paragraphs [00831-[0087]; Fig. 4); a key scanner (28) that captures geometric information about the first
`key (paragraphs [00831-[0087]; Fig. 4); a hardware processor (16) that determines a key type and bitting pattern of the first key based on
`the geometric information (paragraphs [0068], [0069], [0136], [0147]; Figs. 4, 5); and a key shaping device (10) that creates a second key
`
`
`based on the key type and bitting pattern determined by the processor (paragraph [0069]; Figs. 4, 5).
`
`Referring to claim 14, Wills et al. disclose that as applied to claim 13. Wills et al. further disclose a system wherein the key scanner
`
`
`
`comprises at least one of: a camera, laser—based measuring device, a bitting detection finger, a plurality of mechanical pins, and a plurality
`of light sources and light detectors (paragraphs [0083]-[0087]; Fig. 4).
`
`Referring to claim 15, Wills et al. disclose that as applied to claim 13. Wills et al. further disclose a system wherein the hardware processor
`
`
`also determines the key type and Dining pattern using machine learning techniques to recognize features of the key (paragraphs [0068],
`[0069]. [0136], [0147]; Figs. 4, 5).
`
` Referring to claim 28, Wills et al. disclose a method for creating keys (Abstract; Fig. 4), the method comprising: receive a first key (master
`
`
`key) (paragraphs [0083]-[0087]; Fig. 4); scanning (via 28) geometric information about the first key (paragraphs [0083]-[0087]; Fig. 4);
`determining a key type and bitting pattern of the first key based on the geometric information (paragraphs [0068], [0069], [0136], [0147];
`
`Figs. 4, 5); and creating a second key based on the key type and bitting pattern determined by a processor (16) (paragraphs [0068],
`
`[0069], [0136], [0147]; Figs. 4, 5).
`
`
`
`
`
`
`
`
`Referring to claim 29, Wills et al. disclose that as applied to claim 28. Wills et al. further disclose a method wherein scanning the geometric
`information further comprises, capturing the geometric information using at least one of: a camera, laser-based measuring device, a bitting
`detection finger, a plurality of mechanical pins, and a plurality of light sources and light detectors (paragraphs [00831-[0087]; Fig. 4).
`
`
` Referring to claim 30, Wills et al. disclose that as applied to claim 28. Wills et al. further disclose a method further comprising determining
`the key type and bitting pattern using machine learning techniques to recognize features of the key (paragraphs [0068], [0069], [0136],
`[0147]; Figs. 4, 5).
`
`Claims 38, 39, 42, 44, 45, 53, 54, 57, 59 and 60 lack an inventive step under PCT Article 33(3) as being obvious over Doong in View of US
`
`2011/0297691 A1 to Freeman hereinafter referred to as Freeman ‘691.
`
`
`
`Referring to claim 38, Doong discloses that as applied to claim 35. However, Doong does not show a system wherein a hardware
`processor also transmits payment information to a key duplicator in association with an instruction to create a second key. However,
`Freeman ‘691 teaches a system (Abstract; Figs. 3, 61) wherein a hardware processor (24) also transmits payment information (via 12) to a
`
`
`key duplicator (10) in association with an instruction to create a second key (paragraphs [0066], [0069]; Figs. 1, 3). Therefore, it would be
`
`
`obvious to one of ordinary skill in the art at the time of invention to modify the invention of Doong to include a system wherein a hardware
`
`
`processor also transmits payment information to a key duplicator in association with an instruction to create a second key as taught by
`Freeman ‘691 for the purpose of increasing the security of the device.
`
`Referring to claim 39, Doong discloses that as applied to claim 35. However, Doong does not show a system wherein a hardware
`
`
`processor also transmits to a key duplicator an instruction to deliver a second key to the user. However, Freeman ‘691 teaches a system
`
`
`(Abstract; Fig. 1) wherein a hardware processor (24, 25) also transmits to a key duplicator (10) an instruction to deliver (via 15) a second
`
`key to the user (paragraphs [0062], [0066], [0101]; Figs. 1, 3). Therefore, it would be obvious to one of ordinary skill in the art at the time of
`
`
`invention to modify the invention of Doong to include a system wherein a hardware processor also transmits to a key duplicator an
`
`instruction to deliver a second key to the user as taught by Freeman ‘691 for the purpose of increasing the security of the device.
`
`
`
`
`
`
`
`
`
`
`
`Referring to claim 42, Doong discloses a system for managing key information (Abstract; Fig. 1), the system comprising: an image sensor
`(optical scanner) (paragraph [0015]); and a hardware processor (some form of processor inherently accesses memory 50) (paragraphs
`[0012]-[0015]; Figs. 1-4) that: receives security information (identifier data 10) from a user (paragraphs [0012]-[0015]; Figs. 1-4); receives
`an image (via optical scanner) of a key from the image sensor (paragraphs [00121-[0015]; Figs. 1-4); and transmits a request to generate
`geometric information (40) about the key based on the image of the key to the device (paragraphs [0012]-[0015]; Figs. 1—4), wherein the
`request includes the image of the key and at least a portion of the security information received from the user (paragraphs [0012]-[0015];
`Figs. 1—4). However, Doong does not show a system for managing key information, the system comprising: a hardware processor that:
`communicates with a remote device. However, Freeman “691 teaches a system for managing key information (Abstract; Figs. 3, 61 ), the
`system comprising: a hardware processor (24) that: communicates with a remote device (201) (paragraphs [0066], [0067], [0131]; Figs. 3,
`61). Therefore, it would be obvious to one of ordinary skill in the art at the time of invention to modify the invention of Doong to include a
`system for managing key information, the system comprising: a hardware processor that: communicates with a remote device as taught by
`Freeman ‘691 for the purpose of increasing the security of the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Referring to claim 44, the modified Doong discloses that as applied to claim 42.

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

PTO Denying Access

Refresh this Document
Go to the Docket