CN1048103C - Counterfeit document detection apparatus - Google Patents

Counterfeit document detection apparatus Download PDF

Info

Publication number
CN1048103C
CN1048103C CN94191299A CN94191299A CN1048103C CN 1048103 C CN1048103 C CN 1048103C CN 94191299 A CN94191299 A CN 94191299A CN 94191299 A CN94191299 A CN 94191299A CN 1048103 C CN1048103 C CN 1048103C
Authority
CN
China
Prior art keywords
security
magnetic
value
signal
steps
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN94191299A
Other languages
Chinese (zh)
Other versions
CN1118631A (en
Inventor
G·P·麦金纳尼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GESICK SANDIFF RIENT AMERICAN CO
Original Assignee
GESICK SANDIFF RIENT AMERICAN CO
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/022,145 external-priority patent/US5430664A/en
Application filed by GESICK SANDIFF RIENT AMERICAN CO filed Critical GESICK SANDIFF RIENT AMERICAN CO
Publication of CN1118631A publication Critical patent/CN1118631A/en
Application granted granted Critical
Publication of CN1048103C publication Critical patent/CN1048103C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/10Mechanical details
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/10Mechanical details
    • G07D11/16Handling of valuable papers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/50Sorting or counting valuable papers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/60User-interface arrangements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/04Testing magnetic properties of the materials thereof, e.g. by detection of magnetic imprint
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/203Dispensing operations within ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/086Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by passive credit-cards adapted therefor, e.g. constructive particularities to avoid counterfeiting, e.g. by inclusion of a physical or chemical security-layer

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

An equipment for stock management (10) comprises a forged stock detecting system identifying doubtful forged stocks according to the magnetism of the stock (22). Every stock (22) is transmitted near a readout magnetic head (86) producing an electric signal (210), and a circuit adjustment (110) adjusts the electric signal (210) from the readout magnetic head (86), which makes the electric signal (210) compatible with a module or number switching device (304). The circuit adjustment (110) including one or a plurality of amplifiers (130), a filter (140), a rectifier (160) and an integraph (180) provides an adjustment signal (220) from an integraph (180) to the module or number switching device (304) and restricts the adjustment signal (220) to a compatible PWL. When detecting each stock (22), a plurality of sampling values are gained through the module or number switching device (304) and by accumulating the sampling values, one or a plurality of accumulative values (242, 274, 292, 404, 412) representing the stock (22) are produced. Compared the accumulative values with one or a plurality of predetermined reference values (263, 264, 276, 280, 282, 288, 402, 406, 410, 414) related to a true stock, one can make sure whether the stock (22) is a doubtful forged stock (22) or not.

Description

Counterfeit document detection apparatus
The present invention relates to suspicious pseudo-certificate is carried out equipment and the method that magnetic detects.
Security counting and treatment facility that counting, check, heap are built the security (as, currency) of particular type are known.Wherein there are a kind of light that utilizes analog comparator check security and magnetic characteristic whether to drop on equipment in the threshold value of determining by the discrete electronic component of this comparator circuit of biasing.In order to adopt these unit counts and its light of check or magnetic characteristic security inequality, the biasing element of necessary manual adjustments analog comparator.Be suitable for one type of security (as, can realize examining the particular combinations of check in the security counting equipment of prior art American currency), but this specific combination can not be suitable for the security of other type, for example complimentary ticket, U.S. food stamp or other the national currency except that the U.S..Therefore, people wish for the security counting equipment provides a kind of control system, make counting equipment can examine feature and characteristic that check and selection check threshold value easily and step meet various security selectively.
We find, owing to there is the electrical noise from various noise sources in counting equipment, it is very difficult therefore accurately checking security according to the light of security and magnetic in high speed security counting equipment.In order to improve the reliability of the true security of check, expectation provides a kind of security checking system that can exempt the electrical noise influence basically.
Press one aspect of the present invention, for security countings and screening installation provide a control system of being controlled by programmable microprocessor.This microprocessor is linked a passage mould/number (A/D) converter, and this converter is to the analog sample from light and magnetic security checkout equipment.When handling each security, microprocessor is through A/D converter a plurality of sampling values from sensor that add up.Sampling value that this adds up and programmable threshold value and/or limit value compare, so that check each security when security transmit by equipment.Select to be used to check the threshold value and the limit value of security magnetic by the user, perhaps to these threshold values or limit value reprogramming (this is easy to accomplish), so that check dissimilar security at every turn.For example, upgrading non-volatile memory (comprising inspection parameter and control program that microprocessor is carried out) may convenient this reprogramming.
Press another aspect of the present invention, the security counting equipment comprises a security magnetic test system that is used to have the security of magnetic, and the feature of this system is to reduce The noise.Security magnetic test system has used a playback head, and it produces an electrical signal of reaction when passing through magnetic head in response to the security with magnetic.Magnetic head installs on the security guide plate rigidly.In one embodiment of the invention, a magnet of strengthening security magnetic also is contained on the playback head rigidly, makes the two become fixed relationship, thereby formed a single mechanical connection together with playback head.When security when guide plate transmits, the path constraint wheel that is positioned at the playback head top make security near playback head evenly near passing through.Circuit for signal conditioning is handled the electrical signal of reaction from playback head, so that the conditioning signal with low noise content to be provided.In a preferred embodiment, circuit for signal conditioning comprises a bandpass filter, is used to remove high frequency noise components and low-frequency noise component from the electrical signal of reaction of playback head.By during the playback head, by A/D converter processed signal is carried out the multiple signal sampling, at security so that produce a value that adds up by microprocessor.After security have passed through playback head, the value that adds up is asked on average, and same or a plurality of predetermined reference value relatively, so that test and examine to having security predetermined or acceptable magnetic characteristic or magnetic.
By an alternative embodiment of the invention, for the security counting equipment provides a pseudo-certificate detection system, so that can be used for checking security with different magnetic characteristics.If compare with American currency, its magnetic is more weak and/or magnetic area is littler for some security (for example 50 yuan of banknotes of People's Republic of China's distribution) like this.Detecting and examining in the process of quite little magnetizable security, for the pseudo-certificate detection system of a reinforcement provides a high-gain, low noise circuit for signal conditioning, so that connect the microprocessor of playback head and control usefulness.When each security transmitted by playback head, A/D converter took out a plurality of signal sampling values of conditioning signal under microprocessor control.With each sampling value all with one or more reference values relatively, microprocessor carries out accumulated counts with respect to reference value to the number of a plurality of sampling values in succession in the preset range that drops on reference value.The reference value that the counting that adds up is relevant with one or more and true certificate successively again compares, and determines whether processed security have acceptable magnetic.
Will be better understood following general introduction of the present invention and following detailed description of preferred embodiment when read in conjunction with the accompanying drawings, wherein:
Fig. 1 is the skeleton view by security counting of the present invention and screening installation;
Fig. 2 A is a sectional view, represents that cut open along the line 2A-2A of Fig. 1 and security Fig. 1 that part disconnects are counted and the structure arrangement of the structure member of screening installation;
Fig. 2 B is the security counting of and Fig. 1 that removed shell that get along the line 2B line of Fig. 1 and the side view of screening installation;
Fig. 2 C removes the security counting of Fig. 1 of decapsidate and the side view of screening installation, and section wherein is that the line 2C along Fig. 1 gets;
Fig. 2 D is the planimetric map of a signal, and the drive chain of presentation graphs 1 equipment has wherein been removed guide plate, disconnected side plate and separated lap, thereby made drawing clear;
Fig. 3 A is a fragmentary cross-sectional view, wherein represents light and the Magnetic Sensor position in the security of Fig. 2 A counting and screening installation, and represents that another kind peels off assembly, has wherein removed some part for the purpose of clear;
Fig. 3 B is the planimetric map of peeling off governor motion of peeling off assembly that Fig. 3 A 3B-3B along the line gets;
Fig. 3 C is the skeleton view of peeling off governor motion of Fig. 3 A;
Fig. 4 is a section plan of guide plate, represents the light of Fig. 3 that the direction of 4-4 along the line is observed and the position of Magnetic Sensor;
Fig. 5 A is a block schematic diagram according to magnetic signal regulating circuit of the present invention;
Fig. 5 B is a curve map, the input and output waveform of the circuit of presentation graphs 5A;
Fig. 5 C is a synoptic diagram of a preferred embodiment of circuit shown in Fig. 5 A;
Fig. 6 A is the block schematic diagram that is used for by a control system of security counting of the present invention and screening installation;
Fig. 6 B is the synoptic diagram that the electricity one machine timing wheel of timing signal is provided to the control system of Fig. 6 A;
Fig. 7 A-7E is several parts in succession of the logical flow chart of the control procedure carried out of the control system of Fig. 6 A, comprising the pseudo-certificate testing process of another kind;
Fig. 8 is a planimetric map of the control panel of equipment shown in Figure 1;
Fig. 9 is the synoptic diagram at the back side of 50 yuan of banknotes of China, wherein expresses the part with magnetic;
Figure 10 A is the synoptic diagram by another magnetic signal regulating circuit of the present invention;
Figure 10 B is the synoptic diagram of the power circuit that uses of the circuit with Figure 10 A; And
Figure 11 is a curve map by the signal waveform of the circuit for signal conditioning generation of Figure 10 A.
Fig. 1 represents a securities counting and screening installation 10.In equipment 10, securities are put into hopper 12, security are delivered in the equipment 10 counted or sorting whereby.Security overlay and stack on the plate 20 by stacking wheel 18 by equipment 10 back.The control panel of this equipment comprises display 16 (as, LCD display), shows counting, sum and status information to the user.With keyboard 14 to the manual input of control commands of equipment.
With regard to the securities conveying mechanism,, folded security 22 are put into hopper 12 and they are still on the hopper plate 24 referring now to Fig. 2 A.To a homogeneous LED65 and an optical sensor 64, detect in the hopper 12 whether have securities in the both sides of hopper 12.The a pair of letter sorting wheel of installation on letter sorting wheel shaft 28 (as, letter sorting wheel 26), axle 28 is positioned at the below of hopper plate 24.Friction-type letter sorting surface 30 is round the part of the periphery of letter sorting wheel 26.Letter sorting wheel 26 1 rotates, letter sorting surface 30 just pass a hole in the hopper plate 24, with bottom security 22 friction engagement, and force these security 22 to shift to supply roll assembly 32.
When supply roll 32 and security friction engagement bottom, the direction of peeling off assembly (totally representing with label 36) edge and supply roll 32 direction of rotation provides the effect of peeling off, extruding security bottom, make ground of these security by this equipment, to also doing more comprehensively to introduce below this.Peel off assembly 36 and drive, drive pulley 40 is housed on axle 48 by driving shaft 48.Drive pulley 40 rotates around drive pulley 40 and the idle pulley 42 that is contained on the idler shaft 44 with friction-type belt 38 engagements of peeling off assembly, belt 38.Select peeling off assembly belt 38, make the friction factor of the friction factor of itself and security 22 less than security and supply roll 32 periphery surfaces, therefore this effect of peeling off can not overcome the supply effect of supply roll 32.
Recurrent situation is, the rubbing characteristics of securities (as, cash) depends on the age and the state of security, and depends on environmental characteristics (as, humidity).Can regulate the rubbing action of peeling off that is added on the security 22 in security 22 adding equipment the time, provide rotating capacity eccentric bearing 46, can rotate this bearing 46 to regulate the position of idler shaft 44 with respect to driving shaft 48 for idler shaft 44.This regulating action has changed the tension force of peeling off in the assembly friction-type belt 38, and is added to normal acting force on the security 22 by peeling off assembly friction-type belt 38 can utilize this regulating action to change security to add in the equipment 10 time.
Fig. 3 A represents a preferred interchangeable assembly of peeling off, and is generally represented by label 36a.Tensioning idle pulley 70 is between drive pulley 40 and idle pulley cover 42a and peel off 38 engagements of assembly belt.When security are forced to when peeling off assembly belt 38 surperficial mobile, tensioning idle pulley 70 is out of shape the tension force that keeps peeling off in the assembly belt 38 inwards by stoping by what peel off loop that assembly belt 38 forms.This tensioning idle pulley 70 is installed on axle 72, and axle 72 is to be folded down from peeling off assembly driving shaft 48 by pivotable carriage 71.
By Fig. 3 B as seen, idle pulley cover 47 rotates freely on idler shaft 73a.By screw 113 idler shaft 73a is fastened on side plate 33 and 34.Get back to Fig. 3 A now, as seen from the figure, the surface of flange 63a contacts with the surface of supply roll 32, so security and supply roll still keep rubbing contact, and security are pushed to along guide path between flange 63a and supply roll 32 and advance.Get back to Fig. 3 B, illustrate one and be pivotally supported at carriage 114 on the idler shaft 73a with what label 114 was represented.Be fixed on the carriage 114 by the end of screw 115 minor axis 44a.By rotary way tension adjustment wheel 42a is installed on the minor axis 44a, its installation site is near that end relative with screw 115 of minor axis 44a.As high-visible by Fig. 3 A, tension adjustment wheel 42a and the lower end engages of peeling off assembly friction-type belt 38.
Referring now to Fig. 3 C,, carriage 114 wherein has a pair of clamping plate 106 and 107 at its place, opposite end with respect to the pivotable end on the idler shaft 73a.Cam 117 is installed on the regulating shaft 116 between clamping plate 106 and 107 prejudicially.Can know by Fig. 3 A and to see that cam 117 can be on axle 73a rotates the clamping plate end of carriage 114 around the pivotable end pivot of carriage 114 is moving in the rotation on the regulating shaft 116.When carriage 114 rotated, minor axis 44a relies on the installation between minor axis 44a and the carriage 114 to concern can upper and lower vertical moving.Minor axis 44a with the wheel 42a corresponding upper and lower mobile vertical translation, thereby can increase, subtract the tension force of peeling off in the assembly 38.Therefore should be realized that cam 117 is clamped or clamped by carriage,, except that the clamping plate end, can also utilize other device to come to clamp cam by carriage so carriage could rotate around idler shaft 73a pivot.
Get back to Fig. 3 B now, the regulating shaft 116 shown in it is fixed on the sidewall 34 by screw 119.Preferably come rotating cam 117 by rotating finger wheel 118, finger wheel 118 is free to rotate on regulating shaft 116, and finger wheel 118 can be installed on the cam 117 or with cam 117 monoblock types and is formed in.Stretch out so that approaching in the otch of finger wheel 118 in preferably can slave unit rear portion 31.In the time will peeling off assembly belt 38 and be adjusted to the tension force of expectation, by being installed on the regulating shaft 116 and the stage clip 121 between finger wheel 118 and sidewall 34 just can maintain the position of finger wheel 118 by means of friction force.
Just can understand the functional relationship between the structure member of equipment 10 from Fig. 2 A-2D.Shown in Fig. 2 A, security guide plate 50 is linked on side plate 33 and 34 by known mode, for example carries out this connection by L shaped carriage (carriage 35 is typical cases of this carriage).Provide two sorters 26 for letter sorting axle 28 in the thrust bearing 61 on side plate 33 and 34.On letter sorting axle 28 tooth 27 is arranged, idler gear 25 engagements on tooth 27 and the idler shaft 23 are in axle 23 bearings 29 that are assemblied on plate 33 and 34.
Idle gear 25 with peel off component gear 39 engagements on the assembly driving shaft 48 peeling off, in axle 48 bearings 49 that are assemblied on side plate 33 and 34.
Peel off assembly driving shaft 48 have one with the concentric locating of its keyed jointing peel off assembly drive pulley 40.Peel off idle pulley 42 engagements on assembly friction-type belt 38 and drive pulley 40, the regulating shaft 44.
A tensioning idle pulley 70 is installed on carriage 71, wheel 70 is supported by axle 48 but do not rotate the U.S. Patent No. 4,416 that its supporting way and on November 22nd, 1993 issue on axle 48, mode shown in 449 is similar, here with reference to the content of having introduced this patent disclosure.
Regulating shaft 44 connects with side plate 33 and 34 by the bearing part 46 of off-centre, and this bearing part 46 is bearing parts of known type, and is fixed on by rotary way on the position of expectation, thereby can peel off the tension force that obtains expecting on the assembly friction-type belt 38.
A pair of belt pulley 43 is arranged on driving shaft 48, and shown in Fig. 2 D, belt pulley 43 separates with belt pulley 40 and is keyed on the axle 48, the O shape ring 43a on belt pulley 43 and the paper friction engagement of security 22.Have the groove (not shown) on the security guide plate 50, O shape ring 43a is contacted with security 22.The rotation direction of belt pulley 43 is opposite with the direction that security add equipment, so O shape ring 43a can provide the additional effect of peeling off.
When at supply roll assembly 32 with peel off when not having any security between the assembly friction-type belt 38, the outside surface of this belt 38 just will come in contact with the idle pulley cover 132 in the supply roll assembly 32.Supply roll assembly 32 is keyed on the supply shaft 37, and axle 37 then is assemblied in the bearing 41 that is arranged in side plate 33 and 34.
As shown in figure 20, applicator wheel assembly 32 comprises the idle pulley cover 132 of central authorities and receives supply belt pulley 133 on the axle 37 at each side switch.Supplying with belt pulley 133 has external friction lining 32a, is used for when they advance by means of sorter assemblies 26 and the security friction engagement.Idle pulley cover 132 rotates freely on supply shaft 37, and the surface of idle pulley cover 132 is recessed with respect to supplying with belt pulley, so that adapt to the counter-rotation of peeling off assembly friction-type belt 38.
Supply shaft 37 has a pair of additional supply roll 135, and wheel 135 and axle 37 keyed jointings have O shape ring 136 on wheel 135, be used for and security 22 friction engagement.Gear 45 on the supply shaft 37 and idle gear 25 engagements.
Supply shaft 37 has a drive pulley 122 with its keyed jointing its with gear 45 relative ends.Timing belt 125 and drive pulley 122 engagements, and with the output shaft 323 of drive motor 321 on motor pulley 322 engagements, motor 321 is installed on the side plate 34, as apparent by Fig. 2 C.
Drive motor 321 shown in Fig. 2 D is a conventional type, and links on the power supply (not shown) by the following circuit for controlling motor that will introduce.
Timing belt 125 also meshes with the belt pulley 59 that quickens on the axle 56, and axle 56 is assemblied in the bearing that is arranged on side plate 33 and 34.Quickening has a pair of acceleration axle sleeve 52 on the axle 56, and axle sleeve 52 is keyed on the axle 56 and has smooth outer clamping surface 52a clamping and to quicken security, to also doing more comprehensively to introduce below this.The path is shunk wheel 62 and is keyed to the middle body that quickens axle 56.
Timing belt 125 is a ridge, provides reliable nonslipping transmission between motor 321 and belt pulley 122,59.
A pair of acceleration idle pulley 54 is provided, and they contact and are installed in the surperficial 52a of axle sleeve 52 and quicken on the idler shaft 58.These 58 bracket component 69 clampings of spring loading by being installed in security guide plate downside.
Promptly each is opened security and quickens each security to quicken axle sleeve 52 and wheel 54, thereby a gap is provided between security, and each security is added to successively stacks on the wheel 18.Path constraint wheel 62 forces security to be close to Magnetic Sensor, below this is remake more comprehensively and introduces.
Quickening to have on the axle 56 a known timing disk 74 with its keyed jointing, disk 74 has the LED/ optical sensor of known type to 75 and 78, and the LED/ optical sensor is installed near the disk 74 75 and 78, and can obtain from Honeywell.78 pairs of optical sensors regularly disk 74 scan, and each predetermined increment of disk 74 moved all provide a timing pip to the following central processing unit that will describe.The preferred distance of increment that moves during the timing pip that optical sensor 78 provides when disk 74 moves is equivalent to the surface of accelerating pulley 52a and moves about 1 millisecond.
The hypervelocity flywheel assembly 190 that a known type is arranged on idler shaft 23, assembly 190 comprises the belt pulley 190 of a known type, wheel 190 has a belt 192 with its engagement, is rotated further taking turns the 23 single channel clutch coupling (not shown) by means of the routine trailing wheel 190 that stops operating.
Belt 192 with in belt pulley 193 engagements that stack on the axle 194, axle 194 is assemblied in the bearing 95 that is arranged on side plate 33 and 34.
Stacking axle 194 has stacking of a pair of and its keyed jointing to take turns 18, is used for security D is overlayed heap plate 20.
Stacking wheel 18 has a drum type part 199, and this part is installed on the axle 194.Drum type part 199 has the finger piece 196 of a plurality of separated bendings, and finger piece 196 stretches out and raises from part 199 angularly, and finger piece 196 receives the security of autoacceleration axle sleeve 52 and ground of these security is overlayed on the plate 20.
Also will for stack plate 20 provide a pair of stack security, be separated from each other and vertically extending security stops 68.
Get back to Fig. 2 A now, as seen from the figure, after security have been applied the effect of peeling off, at supply roll 32 be contained in and promote security between the idle pulley 63 on the idler shaft 73 and move on.The effect of idle pulley 63 is that when the accelerating pulley 52 of supply roll 32 promotion security on being contained in acceleration axle 56 advanced, idle pulley 63 can keep the friction engagement of security and supply roll 32.Accelerating pulley 52 has formed a wheel crack with being contained in the idle pulley 54 that quickens on the idler shaft 58.Accelerating pulley 52 and acceleration idle pulley 54 have improved the translational speed of security, thereby provide a spacing between the security that advanced by supply roll 32.Determine the position of accelerating pulley 52 and 54, make them close to supply roll 32 and idle pulley 63 as far as possible along the direction of lower guide plate 50, make security can and supply roll 32 and idle pulley 63 between, the Continuous Contact successively of the wheel crack between the finger piece between the accelerating pulley 52 and 54 and that stack wheel 18.The dependence that such Continuous Contact has avoided the inertia to security to move provides the controlled transmission by this equipment.
Continuation was shifted to along lower guide plate 50 and is stacked wheel 18 after security quickened.Stack wheel 18 periphery and have a plurality of finger pieces that stretch out 196, finger piece 196 lifts security and these security are placed on from lower guide plate 50 and stacks on the wheel 20.LED 67 and optical sensor 66 are stacking on the wheel 20 whether have security in the both sides alignment that stacks wheel 20 to detect. Optical sensor 64 and 66 can be optical diode, optotransistor or other equivalent device.Ducoment sensor
With regard to the testing process of security security when the equipment, finish several Control and calculating operation during by equipment at security by device control network.For the accurate counting of acceptable security is provided, this equipment will comprise pick-up unit, is used to detect the security of misfeed or does not satisfy the predetermined adaptability or the security of reliability standard, is referred to as wrong security or suspicious pseudo-certificate below.This equipment one quits work when detecting security misfeed or underproof, and the user can remove this mistake security.When detecting wrong security, on display 16, show the information of representing type of error.The wrong security of misfeed comprise the security and the complete overlapping coincidence security of security of the partly overlapping adhesion of security.Detect the security of adhesion according to error in length, this error in length is because their the unusual length with respect to other security of the same type produces.Overlap security according to the light-proofness error-detecting, this light-proofness error is because the unusual light-proofness of their scope of selecting with respect to the operator produces.Adaptability mistake security comprise inaccurate security of size and suspicious pseudo-security.Size referring now to security 100 shown in Figure 4, " partly " error is defined as at the x direction of principal axis does not have to surpass a predetermined length threshold, " width departs from " error (being referred to as " short error " sometimes) is defined in the y direction of principal axis and fails to surpass a predetermined width threshold value, and is represented as the security 100 in conjunction with Fig. 4.
Near when using several sensors (part of apparatus control system) detection security passing through the accelerating pulley 52,54 of equipment magnetic characteristic.As shown in Figure 3A, light source of location positioning of close security guide path central authorities above lower guide plate 50 is as central LED81.Whether LED81 is luminous in central authorities, and this light is detected by an optical sensor (as master reference 80) of the below that is contained in lower guide plate 50, can detect existing security to carry out light between LED81 and sensor 80 thus.As shown in Figure 4, master reference 80 is contained in the hole 51 in the lower guide plate 50.Left side sensor 82 is contained in the hole 53 in left side of lower guide plate 50.Right sensor 84 is contained in the hole 55 on right side of lower guide plate 50.The existence and the light-proofness of the left and right side section (in Fig. 4, generally representing) of the security of sensor when transmitting with label 99,97 with near the lower guide plate 50 of left and right sensor 82,84 detection security sensor.Left and right sensor 82,84 will with corresponding left and right LED ' 83,85 coordinations.LED ' 83,85 is installed in the guide plate, its be provided with situation with combine described central LED81 of Fig. 3 A and master reference 80 that situation is set is similar.The relative position that it should be noted that the LED ' that is located at respectively in the upper and lower guide plate and optical sensor can reverse and can not influence detection to the security that wherein pass through.It shall yet further be noted that further the light source and the photodetector except that optotransistor that can use otherwise except that LED ' obtain measuring ability described here.Be also noted that at last left and right the and central optical sensor represented is to be positioned to cross or perpendicular on the straight line of security guide path in Fig. 4, but these sensors has different orientations.
Also will carry out magnetic to the security by this equipment detects.Get back to Fig. 3 now, a magnetic field detector is installed on a circular slab 90 below the guide plate 50, for example playback head 86, determine the position of magnetic field detection amount, and its surface at lower guide plate 50 is protruded a bit slightly.This playback head 86 is preferably by Michigan Magnetics Inc.ofVermontville, the full track single magnetic head that Michigan makes, and its nominal inductance is 300mH, and the impedance when 1KHz is 2k Ω, and direct current resistance is 270 Ω.Playback head 86 provides the magnetic characteristic of the security that representative advances along lower guide plate 50 and the electric signal of magnetic property.In order to strengthen the electric signal of induction, below lower guide plate 50, locate a sources of magnetic flux, for example permanent magnet 88, and security were just magnetized before passing through above the playback head 86.
Mechanical vibration have the trend of the variation that introducing is not expected in the electric signal of playback head 86 in the equipment, and this may be because vibration causes at magnet 88 playback heads 86 with in the fluctuation and change of passing through the relative position between the security above the playback head 86.For magnet 88 is reduced to minimum with respect to the vibration of playback head 86, magnet 88 and playback head 86 are installed by rigidity, fixing mutual relationship, form single structural unit.For example, in a preferred embodiment, circular slab 90 is fixed on the lower guide plate 50, and magnet 88 also is fixed on the lower guide plate 50 by rigidly fixing part (as, stud bolt 94) by rigidly fixing part (as, stud bolt 92).Playback head 86 and magnet 88 all be fixed to can retrain on the lower guide plate 50 between magnetic head 86 and the magnet 88 relative to vibration or move.Be also noted that in addition, magnet 88 can be rigidly fixed on the circular slab 90, also fixing playback head 86 on 90.
For the variable in distance between security and the playback head 86 being reduced to minimum, be with being keyed to path constraint wheel 62 paths of limiting the security of playback head 86 tops of quickening on the axle 56.The surface of path constraint wheel in stretching, extension below the last guide plate 60 in case near playback head 86 very narrow gap of formation.This narrow gap that forms between path constraint wheel 62 and playback head 80 can guarantee that playback head 86 can detect or scan the security that pass through basically equably above playback head 86, detect suspicious pseudo-certificate exactly.62 pairs of security of path constraint wheel carry out the magnetic inspection of uniformity, can not make the security of crimping produce the phenomenon that obstruction is blocked, and this situation are recurrent when use fixed path constraint component is finished the prior art equipment of similar functions.
Fig. 4 represents the position of playback head 86 with respect to optical sensor 80,82,84.Playback head 86 passes the hole 57 of a position that is positioned at lower guide plate 50 and comes out, and this position is more forward slightly than optical sensor 80,82 and 84 with respect to security direction of transfer (shown in arrow 101).A kind of securities (as the dollar banknote of totally representing with label 100) transmit along lower guide plate 50 in direction shown in the arrow 101.The feature of dollar (as dollar 100) is the peripheral printing ink part 102 that nonmagnetic middle body 104 and magnetic are arranged.Therefore, when dollar banknote 100 passed through magnetic head 86, the feature of the electrical signal of reaction that playback head 86 produces was exactly the cycle of two irregular intensity, and on behalf of the initial and end peripheral part of the magnetic ink part 102 of dollar banknote 100, they pass through magnetic head 86.
Handle according to the electric signal of the situation of the passing through generation of security by 110 pairs of playback heads 86 of the magnetic signal regulating circuit shown in Fig. 5 A.Regulating circuit 110 is finished several signal processing functions, and extraction and amplification make it become the form that is suitable for analog-to-digital conversion from the composition of the electric signal of playback head 86.Playback head 85 is connected with pick-up circuit 120.Pick-up circuit 120 produces a pickoff signals 210, and Fig. 5 B expresses one and typically picks up waveform.Pickoff signals 210 is mainly the 60Hz from device power supply (DPS), the leakage Vent noise of 200mv peak-to-peak value.For making expression clear, do not express among the figure owing to the noise component of vibration from the signal 210 of the electrical noise generation of motor.The leading edge that time t1 represents to have the security of magnetic ink peripheral part begins time of passing through on playback head 86.Ink logo on the security makes the frequency component of the low amplitude oscillation of pickoff signals 210 obviously surpass 60Hz.This low amplitude oscillation temporarily reduces during by playback head 86 at the nonmagnetic portion of security.After the nonmagnetic portion of security passed through, this low amplitude oscillation appearred in pickoff signals 210 once more.Time t3 represents the time that the trailing edge of security stops by playback head 86 and low amplitude oscillation.Be starkly lower than the frequency range of vibration noise and noise of motor by the frequency distribution of passing through caused low amplitude oscillation of security.Get back to Fig. 5 A now, pickoff signals 210 is added to preamplifier state 130, and this amplifier stage 130 is amplified to pickoff signals the level that is suitable for extracting the low amplitude oscillation that the magnetic ink by security partly causes.Be added to bandpass filter 140 through preposition amplifying signal.Upper and lower half-power frequency to bandpass filter is selected, to remove basically from the low-frequency power noise of the preposition amplifying signal of process and the vibration and the noise of motor of high frequency.We find that the passband from about 250Hz to about 1600Hz is suitable for this purpose.Bandpass filter 140 can be the two-stage amplifier of a high pass stage of serial connection and a lowpass stage, or a single-stage bandpass amplifier.
In case extract the desired frequency scope by bandpass filter 140, just will be added to one second amplifier stage 150 through the signal of filtering.Second amplifier stage 150 will be amplified to the level that is suitable for mould/number conversion and finally is suitable for the threshold values estimation through the signal of filtering.Second amplifier stage 150 preferably not only comprises variable gain stages 154 but also comprise fixed gain level 152.The purpose that variable gain stages 154 is provided is the variation of the gain of resonance-amplifier 150 with compensation pickoff signals amplitude.This variation may be caused by the variation of operation of equipment speed.
After being amplified to the level that is suitable for digital conversion, being added to a rectifier 160 through amplifying signal, 160 pairs of these amplifying signals of rectifier carry out rectification so that integration subsequently can obtain one on the occasion of.Then, the signal of rectification is added to an integrator 180,180 pairs of these rectified signals of integrator carry out integration.This integrator design is become to have limited integral time.The limited sensitivity that will reduce regulating circuit 110 integral time of integrator 180, the digital sampling of therefore from integrated signal, gathering for the instantaneous fluctuation of rectified signal just can obtain representing the finite time cycle detection to the magnetic characteristic of security or the sampling value of magnetic property.The finite integral time of integrator 180 can also compensate cause along the swing of the relative position of lower guide plate 50 by playback head 86 and optical sensor 80,82,84, detect and the time lag of light between detecting at magnetic.To be integrated signal can not drop into zero to another benefit that is obtained by this integrator in the nonmagnetic portion of security appears at time on the playback head 86.The upper limit of acceptable integral time is determined by short intervals between the security that are added to this equipment.Integral time is must be enough short in permission signal attenuation, integrated signal amplitude between two security in succession is unlikely drags oversizely.We find, be suitable for the integral time about 2 milliseconds about 1200 security/minute the security counting rate.
Fig. 5 B represents that promptly conditioning signal 220 by the integrated signal of integrator generation.The feature of conditioning signal 220 is peak values that two about 4v are arranged, they be basically magnetization peripheral part with security on playback head 86 by the time produced simultaneously.By comparing pickoff signals 210 and conditioning signal 220 as can be seen, the influence of the power supply noise of 60Hz is reduced to the degree of sporadic spiking in conditioning signal 220.By the ascending, descending of conditioning signal 220 on a large scale, just can pick out security during passing through on the playback head 86 t1 and the time interval between the t3.The time of security above optical sensor 80,82 and 84 appears at the time interval between t2 and the t4.This light assay intervals lags behind the magnetic assay intervals between t1 and t3 slightly.The finite integral time of integrator 180 can guarantee: conditioning signal 220 has one and the simultaneous obviously reliable amplitude of light assay intervals always.
Fig. 5 C represents a detailed schematic circuit diagram of regulating circuit 110.Circuit 110 comprises several linear operational amplifier levels (preferably being made of the LM324 operational amplifier), to realize in conjunction with the described signal processing function of Fig. 5 B.Listed the preferred element numerical value relevant in the table 1 with regulating circuit 110.The detailed operation process of the regulating circuit 110 shown in Fig. 5 C is conspicuous for those of ordinary skills.In order further to strengthen and the buffer action of sources of electronic noise, a reference voltage is added to bandpass filtering level 142 and 144, amplifier stage 152 and 154 and rectifier 160 from a virtual earth (as, TLE2425 type virtual earth).Biasing is provided for playback head 86 by a voltage stabilizer (as, 5 volts of direct current stabilizers of the LM7805 type in the pick-up circuit 120).
The component value of table 1 circuit for signal conditioning 110
R1-20KΩ C1-.01μF D1-1N914
R2-10KΩ C2-1.0μF IC1-LM324
R3-330KΩ C3-.10μF IC2-TLE2425
R4-75KΩ L1-300Mh IC3-LM7805
R5-10KΩ
R6-47KΩ
R7-27KΩ
R8-220Ω
R9-100KΩpot
R10-1MΩ
R11-100KΩ
During security pass through the security treatment facility, by the A/D converter 304 shown in Fig. 6 A at each push-in stroke that increases progressively of timing wheel assembly 77 output signal 220 (as at the signal as shown in Fig. 5 A and the 5B) of this circuit for signal conditioning 110 of all will taking a sample, and will take a sample signal digitalized.In the digital value that adds up and obtain like this by CPU302 at interval by the time t2 of light sensors security and the detection time between the t4.For example can be by these digital values that add up that the value that obtains between detection period is sued for peace.In addition, the value that adds up can be represented the mean value of sampling value, perhaps represents a comparable statistical measures of the digital value that obtains between detection period.
After the t4 assay intervals finishes, allow the numerical value and the one or more reference value that add up compare, to verify that whether this numerical value that adds up is corresponding to the value with true security predetermined or acceptable magnetic characteristic or magnetic property.For example, this numerical value that adds up can compare with the reference value with lower threshold value and higher limit form, and this lower threshold value and higher limit have been determined a scope of acceptable accumulated value, and scope can distinguish whether security are acceptable or real security whereby.Below, in conjunction with Fig. 7 A-D a program is described in more detail, in this program, can realize the check of examining of magnetic characteristic in conjunction with some other function of security treatment facility.
A beneficial method that has been found that check security authenticity is to add up and the corresponding sampling value of magnetic characteristic of security, then a representational value and one or more reference value is compared.When the security that are verified had enough strong magnetic and/or have magnetic by space distribution, this program was particularly useful, was easy to true certificate and suspicious pseudo-certificate distinguished reliably come.Compare with American currency, the magnetic ink part of preparing some security of check may be confined to comparatively speaking a certain zone and/or magnetic characteristic a little less than.For example, as shown in Figure 9,50 yuan of banknotes 350 of Zhang Zhonghua people's republic distribution comprise a quite little zone 352, and great printing ink is magnetic in zone 352.The magnetic of the printing ink on 50 yuan of banknote remainders quite a little less than.The zone 352 that comprises the great printing ink of magnetic is in the back side bottom center near 50 yuan of banknotes 350.Also comprise a zone that has a qualification of the great printing ink of magnetic at the front of 50 yuan of banknotes 350 (not shown).In addition, the magnetic of the magnetic ink that uses on than American currency in the magnetic of the magnetic ink that uses on this 50 yuan of banknotes is low.The actual result that the magnetic of the printing ink on 50 yuan of banknotes reduces is: by as the response that provides in conjunction with the described circuit for signal conditioning 110 of Fig. 5 A-C lower than the response of handling the American currency gained.Therefore, by the resulting electric signal of magnetic that detects true 50 yuan of banknotes can not with 50 yuan of counterfeit moneys during by this counting equipment detected electrical noise distinguish reliably.
In order to check security reliably according to magnetic characteristic, as 50 yuan of banknotes, in this equipment, preferably use the magnetic of a reinforcement to detect and regulating system, the gain of this system is higher and with respect to the noise of circuit 110 less sensitivity is arranged.Figure 10 A and 10B schematically express the detection and the regulating system of such reinforcement, and this system comprises playback head 360 and regulating circuit 110a.In table 2, listed the preferred element value that relates to regulating circuit 110a.
The component value of table 2 circuit for signal conditioning 110a
R1-10KΩ C1-10μF D1-1N914
R2-10MΩ C2-.005μF D2-3.8V?Zener
R3-500KΩpot.?C3-.1μF IC1-LM324
R4-75KΩ IC2-MAX680
R5-150KΩ
R6-47KΩ
R7-100KΩ
R8-3KΩ
Playback head 360 is installed in this treatment facility, and is identical in conjunction with playback head 86 described mounting meanss among its mounting means and Fig. 3 A.Playback head 360 links to each other with the direct supply shown in Figure 10 B, and according to the magnetic security pass through provide pickoff signals on the state online 362.Playback head 360 is magnetoresistive transducer preferably, and for example by MurataErie North America of Smyrna, the model that Georgia makes is the money identification sensor of BS05NIHGAA.Playback head 360 does not need as before adding the external magnetic field in conjunction with permanent magnet 88 described in the security guide path.Owing to do not need independent magnet (as, magnet 88), so eradicated the influence of the relative vibration between playback head 360 and a kind of like this magnet.
In order further to reduce the influence of electrical noise, the installation site of circuit for signal conditioning 110a in equipment will be away from playback head 360 and away from motor 321.The electric signal that is added to line 362 is added to the circuit for signal conditioning 110a of device far end by shielded cable 364.Pickoff signals from line 362 is capacitively coupled to regulating circuit 110a, and is received by the fixed gain amplifier in the regulating circuit 366.Amplifier 366 preferably includes a LM324 type operational amplifier, and 10 volts of DC power supply circuit 369 of this amplifier and the bipolarity shown in Figure 10 B link to each other.This power circuit 368 preferably includes the Sunnyvale by MaximIntegrated Products of, and the model that California makes is the charge-pump converter of MAX680DC/DC.10 volts of power supplys of bipolarity link to each other with amplifier 366 as shown in the figure, and link to each other with other element among the circuit for signal conditioning 110a, therefore compare with the comparator circuit (shown in Fig. 5 A) of use single ended power supply in the regulating circuit 110, amplifier 366 can provide bigger change in voltage according to pickoff signals.Can operate bipolarity direct supply 369 easily with 5 volts direct current signals, and 5. volts direct current signal be with this treatment facility in other local logical circuit compatibility of using.
Be capacitively coupled to the input end of variable gain amplifier 368 according to the amplifying signal of pickoff signals generation by amplifier 366.Variable gain amplifier 368 preferably includes a potentiometer R3 who is used for the gain of resonance-amplifier 368, and the signal that comes from the security with different magnetic is compensated.For example, scalable potentiometer R3 makes the yield value of amplifier 368 quite low, is used to handle the currency of the U.S..In order to handle magnetic characteristic quite weak Chinese currency or other security, scalable potentiometer R3 makes this yield value quite high.In practice of the present invention, can use other device (as, gain-selector switch device) of the gain of resonance-amplifier 368, the ability that makes circuit for signal conditioning 110a can be adapted to the various particular type magnetic characteristics of security to be processed is provided for the user.
The output signal of variable gain amplifier 368 is added to the input end of Hi-pass filter 370, and Hi-pass filter 370 is removed the frequency component that is lower than preset frequency (as being lower than 300Hz) in the amplifying signal.To be capacitively coupled to a rectifier/integrator of combining 372 from the signal through filtering of wave filter 370.372 pairs of signals through filtering of rectifier/integrator carry out rectification and integration.The rectifier 160 of the course of work of rectifier/integrator 372 and previous combined circuit 110 and the course of work of integrator 180 are similar.
Because what regulating circuit 110a has comprise the operational amplifier that links to each other with 10 volts power supplys of bipolarity, so in this regulating circuit 110a, might produce signal up to 10 volts in the strong magnetic characteristic of response abnormality or when responding transient signal.Expectation can lie prostrate following level to the conditioning signal amplitude limit to 10 that circuit for signal conditioning produces, so that the low voltage compatibility that this conditioning signal can be used with other local logical circuit in this equipment.Voltage for the output terminal 376 of restricting signal regulating circuit 110a provides connects a clipping circuit 374 between rectifier/integrator 372 and output terminal 376, with the signal of restriction through rectification and integration.Clipping circuit preferably includes a Zener diode D2 who is connected between output terminal 376 and the ground.Zener diode is selected, so as output terminal 376 available voltage limit to the compatible mutually level of reference level that receives from the A/D converter of the conditioning signal of output terminal 376, as 3.8 volts or other desired voltage values.Resistor R 1 of serial connection between rectifier/integrator and Zener diode D2 is so that be restricted to a suitable numerical value to the electric current that flows in the diode D2.
Referring now to Figure 11, the various voltage waveforms representatives shown in it are by the pickoff signals 378 of playback head 360 generations, by the signal 380 that passes through filtering of Hi-pass filter 370 generations and the conditioning signal 382 that receives at output terminal 376.These signals represent security (as, 50 yuan of banknotes) along the security guide path by the time signal that produces.For the purpose of clear, not drawing in waveform shown in Figure 11 is present in noise component in these waveforms in the ordinary course of things.Time t1 is illustrated in the time of detecting the leading edge of security in the guide path with the central optical detecting device.At time t1, the pickoff signals 378 that is produced by playback head 360 temporarily slightly changes owing to the AC power coupling of magnetic head and treatment facility.Hi-pass filter 370 has stopped the 60Hz frequency of AC power effectively, and therefore signal 380 and the signal through overregulating 382 through filtering is straight at time t1 basically.
When security when guide path moves on, magnetic ink partly by playback head 360, makes pickoff signals 378 generation amplitudes be about several higher-orders of oscillation of 200 μ v peak-to-peak values.This higher-order of oscillation is amplified by amplifier 366 and 368 and is added to Hi-pass filter 370, produces thus to have amplitude and be about 1 volt of peak-to-peak value oscillatory signal 380.The vibration of this signal 380 is about a lasting pulse of 2 volts conditioning signal 382 again through rectification, integration in the interim generation amplitude from time t2 to time t3.After the time t3, the magnetic ink of security part is by playback head 360, so waveform 378,380 and 382 does not significantly continue pulse.At time t4, therefore the trailing edge of security has obtained the security assay intervals by the central optical detecting device.
According to binding signal treatment circuit 110 described methods, can use circuit for signal conditioning 110a to check security.Also can use circuit 110a in the practice of the another kind of method that is described below on the other hand.
As seen from Figure 11, conditioning signal 382 the time t2 in lasting pulse period and the interval between the time t3 are arranged and if the whole assay intervals t1-t4 of photodetector detection security to compare be ofer short duration.The of short duration relatively character of the lasting pulse in the conditioning signal 382 between time t2 and time t3 for true security by during by the accumulated value of taking a sample this signal 382 and the value summation of sampling being obtained scope dictates a upper limit.This restricted portion of accumulated value is true to reliable differentiation, the ability of pseudo-security has produced adverse influence again.In addition, quite of short duration with the interval of passing through the lasting pulse height in the relevant waveform of state of such security, this just makes adding up of sampling value responsive more to the influence of spurious signal, and this is for the security that processing has stronger and/or bigger magnetic ink part.For example, as shown in figure 11, for pickoff signals 382, a noise spike signal takes place in the t5 place in the time of assay intervals.The final pulse that causes by spiking at time t5 place in conditioning signal 382 may to the sampling value of waveform 382 add up and value produce significantly influence, these sampling values are to obtain in the sample interval of representing along a plurality of little perpendicular thick sticks of the usefulness on the following time shaft of Figure 11.
Have the weak magnetic and/or the difficulty of security aspect of the magnetic of limitation highly for overcoming aforesaid check, another kind of method that can the service test security, counting wherein is that the of short duration characteristic according to conditioning signal 382 adds up.By this method, the conditioning signal of assay intervals regulating circuit 110a is surpassed predetermined lower threshold value V LThose sample intervals in succession count, thereby obtain a count value (or accumulated value).Then, the duration counting that will add up at the segment pulse of a conditioning signal compares with one or more reference values corresponding with true security.
The sampling value that the last this method of check security preferably includes the output signal of regulating circuit 110a surpasses upper limit V HThe sample interval count the step that adds up.In order to identify the counting of true security, greater than V HThe counting of sampling value must be less than predetermined maximum reference value, and greater than V LThe counting of sampling value in succession must be greater than predetermined minimum reference value.The mode of this method of realization is described and with the mode of other function combinations of this method and security treatment facility below in conjunction with the logical flow chart of Fig. 7 E.Control Network
Monitor and control the operation of counting and screening installation by the Control Network 301 shown in Fig. 6 A.Microprocessor (as, CPU 302) carry out be stored in a non-volatile memory (as, ROM 318) in control program.Control program is coordinated following function: counting, sorting, security check, Electric Machine Control, demonstration control, user's input with the communicating by letter of external unit.The μ PD78C10 that CPU 302 is preferably made by Nippon Electric Company.CPU 302 links a random access memory ram 319, and RAM319 has a series of registers, is used for storage and retrieving information during executive control program.RAM 319 can be an external RAM, perhaps can or integrate with the microprocessor monolithic.CPU 302 links a hyperchannel mould/number (A/D) change-over circuit 304.In a preferred embodiment, A/D circuit 304 and CPU 302 monolithics integrate.A/D circuit 304 autobiography sensors 66,64,80,82,84 and magnetic signal regulating circuit 110 receive simulating signal and provide the digital signal corresponding with each simulating signal to CPU 302.
Between CPU 302 and LED 83,85, connect a LED control circuit 306.The LED control circuit is a hyperchannel D/A, according to the brightness of the Signal Regulation LED that receives from CPU 302.The variation of LED brightness size is particularly important to left and right sensor circuit 82,84, and this is because will use these circuit to determine to pass through the existence and the light-proofness of the security of this equipment.The required luminance brightness of light-proofness check may be more much bigger than detecting the required luminance brightness of security existence.Because the reliability of LED reduces with the increase of brightness, so wish only when needs light-proofness data, just under the high brightness situation, to operate left and right LED.Determine that the required certain luminance of security light-proofness depends on the type that will count with the security of sorting, therefore wish to allow the user stipulate the size of used brightness.LED control circuit 306 is returned CPU 302 ability that can be transformed into LED security sensed luminance level when equipment is in halted state is provided.
Keyboard interface circuit 308 is connected to CPU 302 and keyboard 14, makes the user can be in executive control program period stipulation or retouching operation parameter.Display interface 310 is connected to CPU, drives the display 16 that counting and status information are provided to the user.RS-232 type interface driver 314 also is connected to CPU 302, and this counting and screening installation can be connected with external unit 316.External unit 316 can be a kind of general calculation machine.This computing machine is programmed so that control this equipment with this devices communicating and by serial communication protocol.External unit 316 can also be a printer alternatively, and thermal printer for example is used to print the amount of money sum of the security of fragmentation count, denomination counting, unit count.CPU 302 is programmed, make its wiring or bonding line of being provided with on can serial line interface tell dissimilar external units according to equipment externally.Can use the user command of replenishing or replacing directly importing through keyboard 14 through the exterior I/O of RS-232 type interface 314.
Circuit for controlling motor 312 is connected to CPU 302, and is used to provide the programming Control of motor 321.This circuit for controlling motor can perhaps change the speed of motor by the signal switching motor from CPU 302.
CPU 302 comprises an interrupting input end INT, and input end INT links timing wheel assembly 77 through interrupt line 79.The timing wheel assembly that schematically illustrates in Fig. 6 B provides timing signal to CPU302, is used to coordinate the accumulation function of counting operation and sensing data during transmitting security by this counting and screening installation.Timing wheel 74 is contained in and quickens on the axle 56, so timing wheel 74 rotates synchronously with accelerating pulley 56.
As discussed previously, relative both sides location LED 75 and optical sensor 78 at timing wheel 74, and make their alignings so that sensor biasing circuit 76 can produce a pulse when wheel 74 rotates, the time that this pulse occurs and each radial opening are identical by the time between LED 75 and the sensor 78.The interruptive port of CPU 302 is delivered in the output of sensor biasing circuit 76 by interrupt line 79.In timing wheel 74 number of radial opening preferably can make security between accelerating pulley 52,54 by the time can produce about 66 interruption pulses.With regard to distance, the timing wheel assembly will produce an interruption pulse with respect to about every millimeter periphery rotation of accelerating pulley 52.
In Fig. 7 A-7D process flow diagram, express a preferred control program of the operation of this equipment of control.This control program comprises following function: order I/O, sensing data add up, sensing data is estimated and the security counting.Referring now to Fig. 7 A, carry out initial step 224, determine the mode of operation and the structure of this equipment.In 224 steps, CPU determines whether to have connected an external unit through RS-232 type interface.If detect an external unit, then checking R S-232 line is to determine whether to exist bonding line, and promptly whether this external unit is and CPU 302 interactional computing machines that perhaps whether this external unit is the printer that 302 of CPU send output.Should note, if determine: detected the such external unit that in this system, connects, then to also can be used for from the input of external unit with to the output of external unit through user's input of keyboard with through the benchmark of this regulation of the output of display in 224 steps.
With start to select in the 226 relevant steps, will all be input to this control procedure such as denomination, sorting or the counting mode selection of the security of preparing counting, batch size, operating speed, check system selection etc.The user also can be by show circuit in the circulation of 226 steps, with fragmentation count, denomination counting and/or the total demonstration that obtains adding up.Counting that adds up and/or sum can printed on the printer or be added on the main frame selectively, and condition is that this equipment is connected on more such external units through the RS-232 port.The counting and/or the total demonstration that add up are filed a request, just can revise counting and/or the sum that adds up according to an operation counting.The operation counting stores the security number that begins to count from nearest demonstration request in this register in a register.Show request back operation count resets at each sum.No matter when ask total charge counting, CPU 302 will calculate the total charge value from each denomination that may deposit RAM 319 in or deposit the innernal CPU register in.
Also to select to be used for several threshold values of error-detecting by user input or the data that before deposited ROM in 226 steps.The user can also select the size of security light-proofness during step 226.The size of selected light-proofness has determined the size of the brightness that left and right LED of light-proofness inspection period 83,85 is luminous.Can allow or not allow suspicious pseudo-certificate is carried out magnetic detecting operation and/or light-proofness evaluation operation 226 step users.If selected suspicious pseudo-certificate to detect (CFS), selected to be used for the threshold value of comparison magnetic data by CPU operating speed according to the rules.Must be according to security by carrying out such selection by the size of the electric signal of playback head 86 generations with speed near playback head 86.In a preferred embodiment, the user can select between high operating speed (about 1200 security/minute) and low operating speed (about 600 security/minute).Provide low speed to select, make the user when the counting security, just can determine whether to exist suspicious pseudo-certificate in visual mode by observing security.This visual suspicious pseudo-certificate determines that method can replenish or replace the magnetic of pseudo-certificate to determine method.Have been found that 600 security/minute about the security counting rate be enough low, can carry out visual verification to security.
Start and select and can add through RS-232 type interface, perhaps the keyboard of representing in detail through Fig. 8 14 is manually imported.Keyboard 14 comprises a plurality of switches, can import in conjunction with 226 of control procedure by these switches user and go on foot described order and selection schemes.Keyboard 14 comprises a plurality of keys, is designated as: start/stop, continuation, sorting, denomination selection, denomination sum, total charge, removing sum, speed, suspicious pseudo-certificate detect and double check.Startup/stop key is a momentary switch, presses the operation that this switch can start, stop this equipment.Continuing key is a momentary switch, and being used for has no progeny in operation restarts counting and screening installation.The operation that continues key can provide a signal to this counting and screening installation, restarts operation, and continues existing counting in detection with after removing suspicious pseudo-certificate or behind operation start/stop key.During 226 steps, be chosen in the denomination of the banknote that will count in the specific operation, perhaps be used for stipulating a fragmentation count and regardless of the size of denomination with the denomination options button by form and menu round-robin control procedure.Show the cumulative total of each denomination of being counted or total fragmentation count with denomination sum key.Press the summation that the total charge key shows the accumulating sum of each denomination.Removing total key can be with the cumulative total reset-to-zero that shows.If remove total key in demonstration total charge manipulate, then all denomination sums all are reset.
Suspicious pseudo-certificate detects (CFS) key and is used to make the magnetic of suspicious pseudo-certificate detect " connection " or " disconnection " during 226 steps.Select to be used for the size of the LED brightness of light-proofness check in 226 steps with the double check key, forbid that perhaps light-proofness checks.Between high operating speed and low operating speed, select with the speed key in 226 steps.Select to divide the size of a selection operation and an amount with the sorting key in 226 steps.When finishing the selection of start-up parameter in 226 steps, starter motor, and this control procedure advanced to for 228 steps when pressing start key.
In 228 steps, will check relevant several variablees to be arranged to zero with security.When each security when this equipment, measure the length of security by the counting and timing pulse, these timing pips are that master reference 80 produces when detecting the existence of each security.If counted the timing pip of unusual big number when master reference is covered (this also represents to exist security), then stopped this counting and screening installation.To reset by two during each security countings (length counting and idle count) in 228 steps.Be used to check two signs (right sensor sign and left sensor sign) of the security that width departs from also will reset in 228 steps.
Program advanced to for 230 steps from 228 steps, and several registers of the RAM 319 of the security check data that is used to add up reset.During each security passes through, the operation sum of the left and right sensor signal that in the corresponding registers of RAM 319, adds up, the output of magnetic signal regulating circuit and the number of detected interruption pulse.At 230 steps, the sum that in these registers, stores during each security that reset pass through.
Program advanced to for 232 steps from 230 steps, detected the existence of security according to the value with master reference 80 corresponding about A/D passages.If the master reference signal value is lower than the preset detection threshold value, then control procedure was branched off into for 234 steps, waited for the interruption pulse from timing wheel.When receiving an interruption pulse in 234 steps, then control procedure continues to 236, makes idle count add 1.Then, in 238 steps, this idle count and a predetermined limit value are relatively.If be no more than this limit value in 238 step idle count, then control procedure turned back to for 232 steps.If surpassed idle limit value really in 238 step idle count, then control advances to 268, makes this equipment hang up, advances to for 270 steps then again, and control procedure continues to wait for input.Since 270 steps, this control procedure is branch possibly, is branched off into for 226 steps when receiving the continuation startup command, perhaps is branched off into for 228 steps when detecting the security of putting into hopper.Generally speaking, depend on the character that is directed to the action that 270 status conditions that go on foot and user take or since the control paths in 270 steps by the input of external unit.
If deposited the existence of security really at central Ducoment sensor of 232 steps, then control procedure advances to 233 steps (continuous mark B represents with the court of a feudal ruler) of Fig. 7 B.In 233 steps, check two conditions to determine whether motor should stop.First condition is to stack counting whether to have reached the whole numerical value that stacks box that expression is less than security.Because operation of equipment speed is very high, so the security connecting gear can not stop at once.Therefore, will pile, and then must when detecting the first edge of every security, make such decision if stack box.Similarly, if equipment by batch mode operation, then 233 steps to determine by master reference at present just detected security whether be last security in a collection of security.If satisfy a condition in these two conditions, then control procedure advanced to for 235 steps, and circuit for controlling motor brings into use known braking technology to close power machine in 235 steps.When circuit for controlling motor began braking motor, when perhaps condition did not satisfy in 233 steps, control procedure advanced to for 240 steps.
240 steps were first steps of data accumulation circulation 200, all produced the operation sum of sensing data during this period during by this equipment when each security.
When 240 steps detected an interruption pulse, control procedure went to for 242 steps, made security length counting add 1.Control procedure forwards 244 to from 242 steps and goes on foot.In 244 steps, check that expression had before detected the sign of the right sensor of security.During first iterative operation of data accumulation circulation 200, right sign is not also set, and control advanced to for 246 steps.In 246 steps, inquiry and that A/D passage that should right side sensor signal correspondence are so that determine along the security existence on the right side of lower guide plate 50.If detect security, then control procedure advanced to for 248 steps, go on foot 248 and make right sensor flag set, and according to the brightness of the light-proofness size of selecting in 226 steps by LED control circuit 306 definite right LED, control procedure advanced to for 252 steps.If do not detect security in 246 steps along the right side of lower guide plate 50, then control procedure directly advanced to for 252 steps, and right LED still remains on the brightness size of security when detecting.If left sensor sign or right sensor sign do not have set, the width that security then take place departs from detection during securities data accumulation loop 200.In case in right sensor flag set of 248 steps, 244 steps of then carrying out subsequently were branched off into for 250 steps with control procedure.In 250 steps, sampling and that A/D passage that should right side sensor correspondence also are accumulated in the register of RAM 319, and control procedure went to for 252 steps.The variation range of the light-proofness data of getting from right sensor at 250 step A/D converters is generally all quite little.In order clearly to delineate the more security of normal security and shading (as the security of a bilayer), preferably the light-proofness data are quantized into several wide scopes roughly, these scopes are carried out numerical weighted, to reduce the influence of light-proofness variation among a small circle.Only use 4 grades of light-proofness data-measurings just to be enough to finish discriminating between single security and the dual security.
Since 252 steps, evidence certificate detecting device is carried out and in 244-250 similar definite step of definite step to right detecting device execution in the step.If find that in 252 steps left side sign is set, then control procedure forwarded for 258 steps to, in 258 steps the signal magnitude of left sensor was measured, was quantized and adds up.If find that in 252 steps left mark does not have set, then control procedure advanced to for 254 steps.In 254 steps, to the sampling of left sensor, and and a threshold ratio to determine whether there are security in the left side of guide plate.If detect security in 254 steps, then control procedure advanced to for 256 steps, made left flag set.Also to send a signal at 256 step CPU 302, so that the brightness of left LED 83 is brought up to the level of the light-proofness detection of selecting in 226 steps to LED control circuit 306.Control procedure goes to 260 from 256 steps and goes on foot.If do not detect security in 254 steps at left optical sensor, then control procedure directly went to for 260 steps.
In 260 steps, to taking a sample and add up with the A/D passage of the output correspondence of magnetic signal regulating circuit 110.Then, control procedure forwarded for 262 steps to, once more the A/D passage of master reference was taken a sample in 262 steps, to determine the existence of security.If central detector also detects security, then control procedure turned back to for 240 steps, proceeded data accumulation circulation 200.When 262 steps did not detect security, then finish this data accumulation circulation 200, control procedure was branched off into for 263 steps, began to carry out the data evaluation phase of the control procedure shown in Fig. 7 C, as represented by the mark C that continues.
Since 263 steps, carry out first check in a series of checks according to data accumulated during the data accumulation.It should be noted that and except that the program shown in Fig. 7 B, also can carry out the data assessment check by other logical program.In 263 steps, length counting and the length threshold that reaches during the data accumulation circulation 200 compared.If length numerical value is less than threshold value, then control procedure advanced to for 265 steps, showed " partly " error through display 16 to the user in 265 steps.Since 278 steps, control procedure forwards the step of 267 shown in Fig. 7 D to shown in the mark D2 as continuing, and the operation counting resets; Advancing to for 269 steps then stops motor.Afterwards in 271 steps, control procedure is waited for from the expression that stacks the box optical sensor from the signal of security that stacked the box emptying.If the 263 step-length degree counting at Fig. 7 C has surpassed lower threshold value, then control procedure advanced to for 264 steps.
In 264 steps, the length counting of getting during the data accumulation circulation 200 is compared with a length higher limit.If the length counting has surpassed the length higher limit, then show the information of expression adhesion error, and/or this information is outputed to the RS-232 port in 266 steps by display.Since 266 steps, control procedure goes to the step of 267 shown in Fig. 7 D shown in the mark D2 as continuing, and resets in 267 steps and moves counting.Advanced to for 269 steps then, stop motor.Then in 271 steps, control program is waited for from the expression that stacks the box optical sensor from the signal of security that stacked the box emptying.If the 264 step-length degree counting at Fig. 7 C does not surpass the length higher limit, then control procedure advanced to for 272 steps, revised length threshold and higher limit in 272 steps according to a predetermined adaptability factor.Preferably all regulate the upper and lower limit of length, so that the length of the security that will measure recently in a predetermined ratio is categorized in together for each security.This ratio adaptability of length upper and lower limit makes this equipment can adapt to the variation of motor speed and the subtle change of security length continuously.
After having revised security length limit value in 272 steps, remove the magnetic data that adds up with length counting, thereby produce an average magnetic test value in 274 steps.Then, appraisal procedure advanced to for 276 steps, checked right sign in 276 steps.If right sign does not have set during data accumulation circulation 200, then program advanced to for 278 steps, announced security width biased error by appropriate display to the user in 278 steps.Since 278 steps, control procedure forwards 267 steps of Fig. 7 D to shown in the mark D2 as continuing, and resets in 267 steps and moves counting, forwards for 269 steps then to, stops motor in 269 steps.Then in 271 steps, control procedure is waited for from stacking the box optical sensor and being represented from the signal of security that stacked the box emptying.If 276 steps at Fig. 7 C find that the right side indicates set, then this program begins to check left side sign in 280 steps, does not have set that similar result is then arranged if find left side sign.If left flag set, then control procedure advanced to for 282 steps.
In 282 steps, content in the left and right light-proofness data accumulation register and their the corresponding threshold value of determining in 226 steps are compared.If the counting of each light-proofness data accumulation register all surpasses corresponding threshold value, then there is an error, as a double error 284 steps announcement user.Since 284 steps, control procedure goes on foot the operation counting that resets as going to shown in the mark D2 with continuing 267 steps of Fig. 7 D 267, goes to for 269 steps then, stops motor in 269 steps.In 271 steps, control procedure is waited for and is represented that from stacking the box optical sensor security are from stacking the signal of box emptying then.If in 282 steps of Fig. 7 C, the counting relevant with the register of the light-proofness data that add up is less than corresponding threshold value, if perhaps forbid double check in 226 steps, then control procedure advances to 286 steps of Fig. 7 D shown in the mark D1 as continuing.
In 286 steps, appraisal procedure determines whether to allow to carry out suspicious pseudo-certificate check (CFS).If allow CFS to detect, then control procedure advanced to for 288 steps.In 288 steps, will compare in magnetic test mean value and predetermined threshold value that 274 steps were determined.If magnetic test mean value is not more than predetermined threshold value, then provides suspicious pseudo-certificate error to show to the user, and stop motor in 290 steps.Because the security connecting gear can not stop immediately, therefore the next security (if any) in pseudo-certificate suspicious when 290 steps stopped motor and input stack all are sent to and stack box.Control procedure went to for 291 steps then, and in 291 steps, box takes out suspicious pseudo-certificate and next is opened security, next security is put back to hopper and pressed the continuation key from stacking, thereby has recovered normal running.291 steps press continue key after, control procedure turns back to 228 steps as Fig. 7 A shown in the mark A that continues, and has therefore got around being sent to the suspicious pseudo-certificate that stacks plate or the counting operation of these security subsequently.
If find that in 286 steps the CFS detection is under an embargo, perhaps if find to have surpassed the CFS threshold value in 288 steps, then control procedure advanced to for 292 steps.
In 292 steps, make the operation numeration and stack counting to add 1.Use stacks counting and guarantees to be no more than the box capacity that stacks.In case got rid of stacked security from stacking box, stacking counting will reset.The operation counting is the detected security number of 226 steps beginning from the last execution graph 7A.
When advancing to for 294 steps from 292 steps, if being set to by the sorting mode, this equipment moves, then be branched off into for 296 steps.If count the batch size that has reached regulation at 296 step security, then provide the demonstration of finishing a batch to the user in 298 steps.Be near completion because detect this batch security in 233 steps before reaching for 298 steps, so motor fully slows down, therefore existing security are exactly to be sent to last security that stacks plate.Control procedure continues to 271 from 298 steps and goes on foot, and waits for from stacking this batch of plate emptying security.
If be not confirmed as operating by the sorting mode at 294 these equipment of step, if perhaps do not detect finishing of this batch in 296 steps, then control procedure went to for 295 steps, and check stacks counting to determine whether stack plate is filled up to its capacity in 295 steps.Do not fill up if determine to stack plate in 295 steps, then control procedure turned back to for 298 steps, for next security cumulative data is got ready.If stacking plate fills up, then control procedure went to for 297 steps, provided and stacked the suitable demonstration of having filled up.Control procedure goes to 271 from 297 steps and goes on foot, and waits for from stacking box emptying security.
In case just arrived for 271 steps when having finished a batch, it is full stacking box, has perhaps detected an error except that suspicious pseudo-certificate.During 271 steps, give user's (or main control system) with the state notifying of equipment.In order to remove this error or to recover counting otherwise, must remove security from stacking box.Compare with the suspicious pseudo-certificate of detection, detect other error and also will in counting, cause uncertainty.For example, if owing to exist double error to reach for 271 steps, the operator can not determine from hopper, should remove two could enabling or should remove three security.Double error may be by causing by two security, perhaps by causing by the unusual security of light-proofness simultaneously.For fear of the integrality of destroying accumulated counts and sum, so the detection of the error except that pseudo-false error will make the operation count resets and will remove all security (in 271 steps) from stacking the box plate, and make them or turn back to hopper, perhaps stop counting.Similarly, other two conditions (finish a batch, or finished a whole box that stacks) that can be directed to for 271 steps also require to remove all security from stacking the box plate.Represent when stacking the box optical sensor: security are from stacking the box plate when removing, operation recovery, and control procedure forwarded for 273 steps to.
273 steps were that guaranteed security counting is not in the process of " latent security " condition.Latent security are last security in the hopper, and it was added to from hopper during the motor shut-down operation before 271 steps and stacks the box, rather than are sent to and stack in the box.Whether because the operator cannot see such security, and do not have remaining other security in hopper, so will test in 273 steps, be empty as being determined by the hopper optical sensor to determine hopper.If hopper is empty, restart motor, and make the time out of a sky of motor operation, latent security are offered stack the box plate.Then, in 275 steps, owing to removed all security from stacking the box plate, so stack box plate count resets, control procedure turned back to for 226 steps.
Can partly make amendment to the aforesaid control procedure that detects suspicious pseudo-certificate,, when binding signal regulating circuit 110a discusses, once mention this alternative method so that realize detecting the another kind of method of suspicious pseudo-certificate.In the scheme of the modification of the control procedure of implementing this alternative method, CPU adds up: the magnetic that (i) surpasses first pre-determined reference value detects one first counting of the sampling value in succession of conditioning signal; And second counting that (ii) surpasses the sampling value of second pre-determined reference value.The reference value that each first, second accumulated counts is relevant with one or more and true certificate compares, so that check each security.Specifically, this alternative Process utilized the counter register of accumulated counts and instrument to order whether by or fail by check flag register relatively.Before assay intervals, in 228 steps and 230 steps of control procedure, make the initial zero clearing of these registers.
In this alternative security method of inspection, 260 steps of Fig. 7 B control procedure are replaced by a process shown in Fig. 7 E, and are designated as 260a.
Referring now to Fig. 7 E,, obtain the sampling value of conditioning signal from regulating circuit 110a at 400 step controller function A/D converters.Then, in 402 steps, the controller comparison is at 400 steps a sampling value that obtains and a pre-determined reference value V who represents minimum threshold LIf sampling value is no more than V L, then control program was branched off into for 418 steps, was used for greater than V LThe counter register of sampling value in succession counting reset.Controller advanced to for 414 steps then, and to this, the back is illustrated again.
If determine that in 402 steps sampling value is greater than V L, then controller advanced to for 404 steps.In 404 steps, be used for greater than V LThe counter register that keeps of counting of sampling in succession add 1.Claim that below this register is " low counting " register.Then, controller advanced to for 406 steps.
In 406 steps, relatively be contained in value and a predetermined reference value in the low counter register, this reference value is corresponding to surpassing V LThe minimum number of corresponding sampling, and V LBe to confirm that security are the needed value of true certificate.If the accumulated value of low counter register surpasses predetermined reference value, then control procedure advanced to for 408 steps, make flag register set in 408 steps, thereby show: surpassed necessary least count value and for the value of low counter register these security passed through to examine check.Controller then advanced to for 410 steps.
If the value of low counter register is no more than necessary minimum value in 406 steps, then controller advanced to for 410 steps.
In 410 steps, the sampling value and a predetermined limit value V that will obtain in 400 steps HCompare.If find that sampling value is greater than V H, then controller advanced to for 412 steps, made another register (" high counting " register) add 1.This controller is then to 414 steps.
If find that in 410 steps sampling value is not more than V H, then controller entered for 414 steps.
In 414 steps, the value that will add up in high counter register and predetermined reference value or maximal value compare, and the security that are higher than this reference value are confirmed to be suspicious pseudo-certificate.If determine: the content of high counter register is greater than this predetermined maximum value, and then controller entered for 416 steps, made by flag register set, and this represents a suspicious pseudo-certificate.Controller advanced to for 262 steps (seeing the control procedure shown in Fig. 7 B) then.If be no more than this predetermined maximum value in 414 values that add up of step in high counter register, then controller is from 414 262 steps that step to Fig. 7 B, and the program that makes as discussed previously continues to carry out.
By the process shown in Fig. 7 E as can be seen, represent once successful check by flag register to real security.If by not set of flag register, such condition represents that these security are suspicious pseudo-certificates.If sampling values in succession few in number between the security detection period are greater than lower threshold value V L, or the sampling value of predetermined number greater than higher limit V H, represent that then these security are pseudo-certificates.It should be noted that these two standards can realize as the mode by combination described here, if but any one in these two test stones also can be individually used in expectation.
It should be noted that in the practice of this alternative security method of inspection can make amendment to detecting step 288 in conjunction with the described pseudo-certificate of Fig. 7 D, making its main function is exactly to determine whether to represent by sign the testing result of a suspicious pseudo-certificate.
From above-mentioned open and accompanying drawing as can be seen, the invention provides some novelty and useful feature, these features all are should be clearly for the ordinary skill of association area.Specifically, a kind of improved security counting and screening installation have been described here, optics wherein and the check of examining magnetic all are to carry out according to the programmable digital formula threshold value of sensor signal, and by reducing electrical noise the influence of sensor signal have been improved reliability.
Used term and words and phrases are only with explaining rather than in order to limit; the use of not expecting these terms and words and phrases has been got rid of represented here and the feature described and the equivalent of component (or its part); should be realized that various improvement all are possible within the present invention's scope required for protection and design.

Claims (20)

1. a check has the equipment of authenticity of the security of magnetic, comprising:
A security guide path is used for guiding security at this equipment;
A Magnetic Sensor of installing along the security guide path is used to detect the magnetic of the security that move along said security guide path, and when said Magnetic Sensor detected the magnetic of security, said Magnetic Sensor produced a sensor signal of representing security magnetic;
Digital switching device, response produce the representational digital value of representative sensor signal from the signal of Magnetic Sensor;
Adding up device is used for producing an accumulated value according to the digital value from digital switching device; And
Comparison means responds said accumulated value so that the predetermined value of said accumulated value with the magnetic of the true security of representative compared, and can determine to have the security of acceptable magnetic thus.
2. equipment as claimed in claim 1, wherein said adding up device comprises first counting assembly, is used to provide the counting of one first accumulated value as the digital value that surpasses first pre-determined reference value.
3. equipment as claimed in claim 2, wherein said adding up device comprises second counting assembly, is used to provide the counting of one second accumulated value as the digital value that surpasses one second pre-determined reference value.
4. equipment as claimed in claim 3, wherein said comparison means comprises:
First comparison means is used for more said first accumulated value and first pre-determined reference value, and this first pre-determined reference value is relevant with the security with true magnetic characteristic:
Second comparison means is used for more said second accumulated value and second pre-determined reference value, and this second pre-determined reference value is relevant with the security with true magnetic; And
Indicating device responds said first and second comparison means, is used to indicate whether these security are suspicious pseudo-certificate.
5. equipment as claimed in claim 1, wherein said comparison means comprises the device of more said accumulated value and at least two predetermined values, these two predetermined values have been determined a predetermined scope of the value of the true security of representative.
6. equipment as claimed in claim 1 wherein further comprises the magnetizing assembly that is used to magnetize security.
7. equipment as claimed in claim 6, wherein said magnetizing assembly and said Magnetic Sensor are installed rigidly.
8. equipment as claimed in claim 1 wherein further comprises a circuit for signal conditioning, and this circuit responds said sensor signal and provides a conditioning signal to digital switching device.
9. equipment as claimed in claim 8, wherein said circuit for signal conditioning comprises an integrator, the said signal that is used to respond from Magnetic Sensor produces an integrated signal.
10. equipment as claimed in claim 8, wherein said circuit for signal conditioning comprises:
An amplifier is used to amplify from the said signal of Magnetic Sensor and produces one first amplifying signal, and
A wave filter is to the said first amplifying signal filtering and produce a filtering signal.
11. as the equipment of claim 10, wherein said circuit for signal conditioning further comprises:
A fairing is used for said first amplifying signal of rectification and provides a rectified signal to said wave filter; And
Amplitude limiter connects said wave filter and said digital switching device, is used for amplitude peak with said filtering signal and is restricted to a level with said digital switching device compatibility.
12. equipment as claimed in claim 1 wherein further comprises restraint device, be used for the security guide path constrain in said Magnetic Sensor near, therefore can detect magnetic equably by any security of said Magnetic Sensor.
13. as the equipment of claim 12, wherein said restraint device comprises rotating a wheel.
14. a check has the method for authenticity of the security of magnetic, comprises the steps:
Transmit security along a guide path;
During said transmission, detect the magnetic of security;
Produce the detection signal of a representative in the said magnetic of the security of said detection step detection;
To said detection signal sampling and generation sampling value;
The sampling value that adds up is so that produce an accumulated value at least;
The predetermined value of more said accumulated value and the true security magnetic of representative can be determined the security with acceptable magnetic thus.
15., wherein further comprise the step that before said accumulation step, detection signal is limited in a predetermined maximum level as the method for claim 14.
16. as the method for claim 14, wherein said accumulation step comprises that the said accumulated value that adds up is as said sampling value sum.
17. as the method for claim 14, wherein said accumulated value step comprises the counting of one first accumulated value as the said sampling value that surpasses a predetermined threshold that add up.
18. as the method for claim 17, wherein said accumulation step comprises the counting of said first accumulated value as the sampling value in succession that surpasses said predetermined threshold that add up.
19. as the method for claim 18, wherein said accumulation step comprises the counting of one second accumulated value as the sampling value that surpasses a preset limit value that add up.
20. as the method for claim 19, wherein said comparison step comprises:
More said first accumulated value and one and the relevant predetermined minimum value of security with true magnetic;
More said second accumulated value and one and the relevant predetermined maximum of security with true magnetic; And
Show that according to relatively result magnetic values that security are in it represents the time in the state of true security.
CN94191299A 1993-02-25 1994-02-25 Counterfeit document detection apparatus Expired - Fee Related CN1048103C (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US08/022,145 1993-02-25
US08/022,145 US5430664A (en) 1992-07-14 1993-02-25 Document counting and batching apparatus with counterfeit detection
AUPCT/US93/06313 1993-07-02
PCT/US1993/006313 WO1994001837A2 (en) 1992-07-14 1993-07-02 Document counting and batching apparatus with counterfeit detection
CN93116487.7 1993-07-13
CN93116487A CN1035456C (en) 1992-07-14 1993-07-13 Document counting and batching apparatus with counterfeit detection

Publications (2)

Publication Number Publication Date
CN1118631A CN1118631A (en) 1996-03-13
CN1048103C true CN1048103C (en) 2000-01-05

Family

ID=27179050

Family Applications (1)

Application Number Title Priority Date Filing Date
CN94191299A Expired - Fee Related CN1048103C (en) 1993-02-25 1994-02-25 Counterfeit document detection apparatus

Country Status (7)

Country Link
EP (1) EP0686292B1 (en)
CN (1) CN1048103C (en)
AT (1) ATE194876T1 (en)
AU (1) AU6290294A (en)
DE (1) DE69425321T2 (en)
ES (1) ES2151548T3 (en)
WO (1) WO1994019773A1 (en)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5652802A (en) * 1990-02-05 1997-07-29 Cummins-Allison Corp. Method and apparatus for document identification
US5870487A (en) * 1990-02-05 1999-02-09 Cummins-Allison Corp. Method and apparatus for discriminting and counting documents
US6539104B1 (en) 1990-02-05 2003-03-25 Cummins-Allison Corp. Method and apparatus for currency discrimination
US5724438A (en) * 1990-02-05 1998-03-03 Cummins-Allison Corp. Method of generating modified patterns and method and apparatus for using the same in a currency identification system
US5751840A (en) * 1990-02-05 1998-05-12 Cummins-Allison Corp. Method and apparatus for currency discrimination
US5640463A (en) * 1994-10-04 1997-06-17 Cummins-Allison Corp. Method and apparatus for authenticating documents including currency
US5633949A (en) * 1990-02-05 1997-05-27 Cummins-Allison Corp. Method and apparatus for currency discrimination
US5875259A (en) * 1990-02-05 1999-02-23 Cummins-Allison Corp. Method and apparatus for discriminating and counting documents
US5704491A (en) * 1995-07-21 1998-01-06 Cummins-Allison Corp. Method and apparatus for discriminating and counting documents
US5687963A (en) * 1994-11-14 1997-11-18 Cummison-Allison Corp. Method and apparatus for discriminating and counting documents
DE69529454T2 (en) * 1994-10-04 2003-09-25 Cummins Allison Corp METHOD AND DEVICE FOR DOCUMENT RECOGNITION, AUTHENTICATION AND / OR COUNTING
US6748101B1 (en) 1995-05-02 2004-06-08 Cummins-Allison Corp. Automatic currency processing system
US6363164B1 (en) 1996-05-13 2002-03-26 Cummins-Allison Corp. Automated document processing system using full image scanning
US5938044A (en) * 1996-03-11 1999-08-17 Cummins-Allison Corp. Method and apparatus for discriminating and off-sorting currency by series
US8162125B1 (en) 1996-05-29 2012-04-24 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US7903863B2 (en) 2001-09-27 2011-03-08 Cummins-Allison Corp. Currency bill tracking system
US7187795B2 (en) 2001-09-27 2007-03-06 Cummins-Allison Corp. Document processing system using full image scanning
US20050276458A1 (en) 2004-05-25 2005-12-15 Cummins-Allison Corp. Automated document processing system and method using image scanning
US6021883A (en) * 1996-11-25 2000-02-08 Cummins Allison, Corp. Funds processing system
US8478020B1 (en) 1996-11-27 2013-07-02 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US7103206B2 (en) 2000-02-08 2006-09-05 Cummins-Allison Corp. Method and apparatus for detecting doubled bills in a currency handling device
US8701857B2 (en) 2000-02-11 2014-04-22 Cummins-Allison Corp. System and method for processing currency bills and tickets
US7647275B2 (en) 2001-07-05 2010-01-12 Cummins-Allison Corp. Automated payment system and method
US8437530B1 (en) 2001-09-27 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8944234B1 (en) 2001-09-27 2015-02-03 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8433123B1 (en) 2001-09-27 2013-04-30 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8428332B1 (en) 2001-09-27 2013-04-23 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8437529B1 (en) 2001-09-27 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US6896118B2 (en) 2002-01-10 2005-05-24 Cummins-Allison Corp. Coin redemption system
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US8627939B1 (en) 2002-09-25 2014-01-14 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US7980378B2 (en) 2006-03-23 2011-07-19 Cummins-Allison Corporation Systems, apparatus, and methods for currency processing control and redemption
JP5116133B2 (en) 2006-08-22 2013-01-09 株式会社ユニバーサルエンターテインメント Banknote handling equipment
US8417017B1 (en) 2007-03-09 2013-04-09 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8538123B1 (en) 2007-03-09 2013-09-17 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
CA2677714C (en) 2007-03-09 2014-12-23 Cummins-Allison Corp. Document imaging and processing system
US8929640B1 (en) 2009-04-15 2015-01-06 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8391583B1 (en) 2009-04-15 2013-03-05 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
US8437528B1 (en) 2009-04-15 2013-05-07 Cummins-Allison Corp. Apparatus and system for imaging currency bills and financial documents and method for using the same
CN102219129B (en) * 2010-04-19 2014-09-17 中国人民银行印制科学技术研究所 Paper receiving wheel used for small-sized printing product quality inspection and screening machine and paper receiving device
US9141876B1 (en) 2013-02-22 2015-09-22 Cummins-Allison Corp. Apparatus and system for processing currency bills and financial documents and method for using the same
CN106780954A (en) * 2016-12-01 2017-05-31 深圳怡化电脑股份有限公司 A kind of method and device of paper money recognition
CN111445617B (en) * 2018-12-30 2021-12-14 沈阳中钞信达金融设备有限公司 High-precision full-width magnetic image detection processing system
CN117218761B (en) * 2023-08-07 2024-04-19 广州康艺电子有限公司 Cash inspecting machine performance test system based on data analysis

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4054092A (en) * 1975-09-30 1977-10-18 Brandt-Pra, Inc. Document counter
US4114804A (en) * 1976-08-04 1978-09-19 Brandt-Pra, Inc. Counterfeit detection means for paper counting
JPS55124886A (en) * 1979-03-20 1980-09-26 Laurel Bank Machine Co Paper documents processing unit
US4381447A (en) * 1980-09-19 1983-04-26 Brandt, Inc. Method and apparatus for evaluating and sorting sheets in a high speed manner
EP0056116B1 (en) * 1980-12-16 1986-03-19 Kabushiki Kaisha Toshiba Pattern discriminating apparatus
US4416449A (en) * 1981-12-09 1983-11-22 Technitrol, Inc. Document separating apparatus and method
US4593184A (en) * 1983-08-19 1986-06-03 Brandt, Incorporated Counterfeit detection circuit
US4617458A (en) * 1985-02-11 1986-10-14 Brandt, Inc. Counterfeit detection circuit
US4761002A (en) * 1986-01-21 1988-08-02 Brandt, Inc. Document handling and counting apparatus
SE458315B (en) * 1987-06-12 1989-03-13 Inter Innovation Ab DEVICE FOR THE DETECTION OF DOCUMENTS
EP0348140B1 (en) * 1988-06-23 1994-03-09 Nippon Conlux Co., Ltd. Device for validating and accumulating bills and coins
US5295196A (en) * 1990-02-05 1994-03-15 Cummins-Allison Corp. Method and apparatus for currency discrimination and counting
AU1680892A (en) * 1991-03-27 1992-11-02 Brandt Inc. Currency note width detector

Also Published As

Publication number Publication date
CN1118631A (en) 1996-03-13
DE69425321T2 (en) 2001-03-01
ES2151548T3 (en) 2001-01-01
DE69425321D1 (en) 2000-08-24
ATE194876T1 (en) 2000-08-15
WO1994019773A1 (en) 1994-09-01
EP0686292B1 (en) 2000-07-19
AU6290294A (en) 1994-09-14
EP0686292A1 (en) 1995-12-13
EP0686292A4 (en) 1996-05-01

Similar Documents

Publication Publication Date Title
CN1048103C (en) Counterfeit document detection apparatus
CN1035456C (en) Document counting and batching apparatus with counterfeit detection
US6351551B1 (en) Method and apparatus for discriminating and counting document
US5938044A (en) Method and apparatus for discriminating and off-sorting currency by series
US6628816B2 (en) Method and apparatus for discriminating and counting documents
US6866134B2 (en) Method and apparatus for document processing
EP0805408B1 (en) Method and apparatus for discriminating and counting documents
CA2188701C (en) Method and apparatus for authenticating documents
US8052145B2 (en) Document handling apparatus
WO1999023601A1 (en) Currency evaluation and recording system
CN101511503B (en) Document handling apparatus
CN101121472A (en) Document sorting machine
UA73732C2 (en) Method for determining authenticity, nominal value, and wear and tear of bank notes; device for sorting and counting bank notes
EP1205886A2 (en) Coin sorting machine
WO2008139125A2 (en) Document handling apparatus
CA2215857C (en) Method and apparatus for discriminating and counting documents
WO2020184608A1 (en) Paper sheet detection device, paper sheet detection method, and paper sheet processing device
CA2379146C (en) Currency evaluation and discrimination
CA2178199C (en) Method and apparatus for discriminating, authenticating and/or counting documents
EP1261943A2 (en) Document evaluation apparatus and method
WO2002093505A1 (en) Sheet handling apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: TECHNITROL, INC. TO: GIESECKE SAINT MICHIO RELIANT AMERICA CO., LTD.

CP03 Change of name, title or address

Address after: Virginia

Applicant after: Gesick Sandiff Rient American Co.

Address before: American Pennsylvania

Applicant before: Technitrol, Inc.

C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee