EP0024630A2 - Dispositif de protection contre le vol d'un récipient pour le transport d'objets de valeur - Google Patents

Dispositif de protection contre le vol d'un récipient pour le transport d'objets de valeur Download PDF

Info

Publication number
EP0024630A2
EP0024630A2 EP80104771A EP80104771A EP0024630A2 EP 0024630 A2 EP0024630 A2 EP 0024630A2 EP 80104771 A EP80104771 A EP 80104771A EP 80104771 A EP80104771 A EP 80104771A EP 0024630 A2 EP0024630 A2 EP 0024630A2
Authority
EP
European Patent Office
Prior art keywords
information
receiver
transport
transmitter
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP80104771A
Other languages
German (de)
English (en)
Other versions
EP0024630B1 (fr
EP0024630A3 (en
Inventor
Walter Hamann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AT80104771T priority Critical patent/ATE16862T1/de
Publication of EP0024630A2 publication Critical patent/EP0024630A2/fr
Publication of EP0024630A3 publication Critical patent/EP0024630A3/de
Application granted granted Critical
Publication of EP0024630B1 publication Critical patent/EP0024630B1/fr
Expired legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0263System arrangements wherein the object is to detect the direction in which child or item is located
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • G08B15/02Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/14Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft

Definitions

  • the invention relates to a device for theft protection of a valuables transport container over a given short distance, in particular a money bag between a bank safe and a waiting money transport vehicle, with means for marking or destroying the contents of the container or for issuing an alarm in the event of theft.
  • banknotes or other valuable items are transported using special vehicles in which security devices are available in large numbers.
  • the storage of valuables such as banknotes and the like as well as the filling and emptying of the transport containers takes place in adequately secured rooms.
  • Safety on these transport routes is exclusively in the hands of humans, i.e. e.g. given by the cashier.
  • the transport containers used have options for making the contents of the containers unusable for a possible attacker by labeling or destruction, and they also have options for triggering an alarm. The triggering of these security devices in the transport containers is left to the transporting person and thus exposed to the risk of omission under the threat of blackmail or conspiracy.
  • the aim of the invention is also to equip the transport routes mentioned with monitoring so that the safety of the transport on these transport routes becomes independent of people.
  • At least one stationary transmitter is provided for scanning the route and a receiver located on or in the container and that the means are triggered by the receiver output, if the receiver on the route does not have an agreed information pattern emitted by the transmitter receives.
  • the device according to the invention is designed so that it adapts to the various forms of the transport routes without additional effort and without difficulty.
  • the device according to the invention connects to the existing means for securing such transports and uses them. This makes it possible to achieve a very large securing effect with relatively little effort.
  • the double arrow 1 designates the transport path to be protected, over which the container 2 with the contents in need of protection is transported.
  • the transport route 1 can e.g. are in the courtyard of a financial institution and there represent the connection between the exit of the financial institution and the motor vehicle to be loaded. In principle, however, the transport route can also lead streets and squares that are accessible to the public in the same way. Finally, the transport route can also affect interior spaces, from the space in which container 2 is filled or emptied to the exit of the building.
  • the stationary transmitter system 3 generates a high-frequency field 4 which, with the aid of suitable antenna and reflector arrangements, fulfills the entire transport route 1.
  • suitable antenna and reflector arrangements fulfills the entire transport route 1.
  • Such arrangements can be implemented according to the prior art. Inside the building, the experience of securing space with high frequency can be used. On the exterior of the building, suitable mirror arrangements or the like can be used to ensure that the high-frequency field is limited only to the path taken by the transport route.
  • the information transmission during the entire security process can be carried out by different types of energy such as high frequency, ultrasound and light e.g. Infrared.
  • Relay stations which consist of a receiver and a transmitter with the appropriate antennas, are expediently used in the interior of buildings and on angled or built-up external lines.
  • Relay stations of this type can be permanently installed in the transport routes. But they can also be portable and e.g. be carried by the transport vehicle in order to then be set up during the unloading process.
  • a distribution option within the building that can be used with all forms of transmission energy uses known methods of message transmission.
  • the electricity network in the buildings is supplied in a known manner with the information from the transmitting device and connected directly to the sockets or the like of the power network transmitter at suitable points, the transport route, which in addition to their energy requirements also obtain the information to be transmitted from the power network.
  • the container 2 is equipped with securing means by which in the case a robbery or the like, the sensitive content of the container receives, for example, a label that makes it unusable for further unauthorized use.
  • the security means can also serve to completely destroy the contents and they can finally trigger an alarm device fitted in the container 2, by means of which the purpose of the robbery or theft can be prevented.
  • Such securing means are known. They are generally constructed in such a way that they have to be triggered manually by the carrier of the container 2 in the event of danger. The disadvantages of this method have already been pointed out.
  • Known devices can also be used as securing means which contain a direction finder transmitter, which enables the container to be tracked down without the user noticing it, by means of high-frequency bearing.
  • the container 2 in the context of this invention is additionally equipped with a receiver 5 provided with an antenna.
  • the radio-frequency signal received by this receiver 5 is evaluated in an evaluation device 6, which can also contain a demodulation stage.
  • a command is then available at the output 7 of the evaluation device 6, which is used to trigger the built-in securing means discussed or to suppress the effect of these securing means.
  • the transmitter 3 is shown schematically in detail in one embodiment in FIG.
  • the transmitter stage 10 connected to an antenna device adapted to the local conditions is modulated by a modulator 11.
  • the modulator 11 receives the information from the information store 12 which serves for modulation.
  • the information store 12 is expediently designed as a ring store so that it is able to deliver a repeating information in an uninterrupted sequence.
  • the bridging switch 18 When the bridging switch 18 is open, the information provided by the information store 12 is subjected to various computing processes in a coding device 19 before entering the modulator 11 with the aim of ciphering.
  • the key memories e.g. programmable semiconductor memories
  • the key memories that determine the encryption are exchangeable.
  • the modulator 11 can also be acted upon by a command transmitter 15, which makes it possible to transmit certain defined commands to the receiver.
  • a method of AC telegraphy can be used, in which the two values L and ⁇ of the information memory 12 are represented by two different modulation frequencies.
  • a third frequency for the command transmission that is to say to equip the command transmitter 15 with a generator for this third frequency.
  • the information output from the information memory 12 is, depending on the position of the clock switch 17 from controlled by the slow clock 13 or by the fast clock 14.
  • a random number generator 16 is used to fill the information store 12.
  • sequence control is easy to set up by a person skilled in the art using known technical means. Their mode of action is explained below.
  • the receiving and evaluating device 5, 6 accommodated in the container 2 is shown schematically in more detail in FIG.
  • the reception stage 20 is followed by the demodulator 21, which is able to emit several different signals.
  • the z. T. are shown in detail in Figure 4.
  • the transmitting device operates according to a method of alternating current telegraphy, then the pulse sequences shown in lines 30 and 31 arise in the demodulator 21 for one of the two frequencies used for alternating current telegraphy.
  • the pulse train 3o is fed to the comparator 24 via the information line 23.
  • the pulse train 32 is obtained from the two pulse trains in the demodulator 21 and is supplied to the information memory 25 as the clock frequency via the clock line 22.
  • the switch 28 When the switch 28 is not closed, the information emerging from the information memory 25 is fed to the comparator 24 via a decoding device 29.
  • the comparator 24 compares the information arriving via the information line 23 and the information transmitted from the decoding device 29 bit by bit and always switches a command signal to the output line 7 when the blocking switch 27 is closed when it detects that these two items of information do not match.
  • An additional demodulation stage namely the command evaluation 26, is connected to the receiving stage 20, which evaluates commands emitted by the transmitter and forwards them to the internal central control of the receiving device.
  • the container 2 has triggerable built-in securing means according to the prior art. While these safety devices are generally triggered manually today, it is advisable to reverse the mode of action of the trigger devices for the automatic triggering provided for in the invention: the built-in safety devices are basically constructed and switched so that their action is triggered, if not by special ones Means the triggering is prevented. The suppression of the triggering is carried out by the device described in the invention on the transport routes to be protected by the invention. The prevention of triggering outside these transport routes, that is to say in particular at the point at which the containers 2 are filled, in the transport vehicles and at the point at which the container 2 is emptied, is carried out by other devices which, according to the current state of the art, are easy to implement.
  • Such suppression devices of a mechanical or electromechanical type can easily be implemented, for example, in combination with the known mechanical locking devices of the containers 2 in the transport vehicle. In the simplest form, these mechanical locking devices can also be transferred to the rooms in which the containers 2 are filled or emptied. Are, as described, these locking devices with the suppression of triggering the built in the container 2 Securing means firmly coupled, it follows that the built-in securing means can not be effective as long as the containers are either mechanically locked at the filling location or in the transport vehicle or at the emptying location.
  • Such a mechanical or electromechanical device combined with the mechanical locking device for suppressing the triggering of the built-in securing means increases the security of such transports considerably. It is assumed in the following functional description of the system according to the invention.
  • Another possibility is to accommodate the receiving system 5, 6, 7 in the lid of the container 2 for the content in need of protection and to design the lock switch 27 so that it is only closed after the lid has been placed on the container and a command from the transmitting device.
  • the lids of such containers are usually closed and opened with keys that are only accessible to certain people in the filling and emptying rooms. If a container is opened in an emptying room, the lid is disarmed and can be put down without any special device: a special locking device, as described above, is then not necessary. The arming of the switch 27 takes place again when the lid is put on and closed, in accordance with the procedure described below.
  • the transmitter is switched to the "program transfer" mode.
  • the central command control (not shown) first gives a signal generated by the command transmitter 15 to the receiving station in the container 2, which is evaluated there in the command evaluation 26 and fed to the central control of the receiving station.
  • the central control of the receiving station causes the switch 28 to be closed, as a result of which the received information from the demodulator 21 is fed to the information store 25 for storage.
  • the lock switch 27 is closed, but the triggering of the built-in securing means is still prevented by the mechanical locking of the container at the filling location.
  • the switch 28 remains closed for about 1 second, which is either caused by maintaining the command issued by the command transmitter 15 during the subsequent information transmission or by the command transmitter 15 having two different commands, a start command and an end command, for which now following information transfer is given.
  • the information memory 12 controlled by the fast clock 14, supplies its information via the coding device 19 to the modulation stage 11 and the transmission stage 10.
  • the information received by the receiving stage 20 is demodulated in the demodulator 21 and stored in the information memory 25 via the closed switch 28.
  • the associated control clock 32 for the information memory is transmitted from the demodulator 21 to the information memory 25 via the clock line 22.
  • the information store 25 contains all of the information from the information store 12, albeit encrypted by the coding device 19.
  • the operating mode "operation” is now switched on in the transmitting device.
  • the slow clock of the clock 13 is applied by switching the clock switch 17 to the information memory 12.
  • the bypass switch 18 Coding device 19 rendered ineffective for the information transmitted to the transmitter.
  • the transmission speed is e.g. 10 pulses / sec. reduced.
  • the information broadcast by the transmission stage 10 and received by the reception stage 20 is demodulated in the demodulator 21 and the L pulses 30 are fed to the comparator 24 via the information line 23.
  • the clock frequency 32 obtained simultaneously in the demodulator 21 is fed via the clock line 22 to the information memory 25, which likewise outputs the information stored in it to the comparator 24 via the decoder 29.
  • the decoder 29 uses the information from the information store 25 to generate information that corresponds bit by bit to the original information of the information store 12, i.e. the encoder 19 and decoder 29 use the same algorithm and the same key information in the opposite direction.
  • the comparator 24 compares these two pieces of information bit by bit and gives no signal via the blocking switch 27 if the comparison is positive, so that the triggering of the built-in securing means in the container 2 is prevented.
  • the container 2 can be released from its mechanical lock without fear that the built-in by the elimination of this lock security devices could be triggered.
  • the container 2 is now moved over the transport route 1, where it is continuously in the high-frequency field of the transmitting device 3, so that a triggering of the built-in securing means is prevented by the devices shown in FIGS. 2 and 3. If, on the other hand, the container is brought out of the high-frequency field of the transport route 1, the information which is emitted by the transmitting device 3 is omitted. Then the comparator 24 detects a mismatch, gives a signal via the blocking switch 27 and the built-in securing means are triggered. The method is shown again schematically in FIG. 4.
  • the information 30 arriving via the information line 23 is compared with the information 33 supplied by the decoding device 29.
  • FIG. 4 it has been assumed that a bit of the information 33 was not matched by a corresponding bit of the information 30 and therefore the trigger command 34 for the built-in securing means is triggered has been.
  • the memory content of the two information memories 12 and 25 of 10 kbit also selected as an example is sufficient for a transport time of approximately 15 minutes, which should cover most of the transport processes.
  • the completion of the described transport process be indicates the introduction of the container 2 in the secured transport vehicle.
  • the container 2 is inserted into the locking devices described above, thereby simultaneously preventing the built-in securing means from being triggered mechanically or electromechanically.
  • the transmitting device 1 can be switched off.
  • suitable positioning of the transport vehicle and possibly suitable electronic aids - also in the vehicle - must ensure that the high-frequency field reaches the container until it is installed in the locking devices in the transport vehicle, since otherwise there is a risk of there is an early interruption of reception.
  • the transmitter 2 is switched on before filling or emptying or immediately after the arrival of the vehicle and remains in during the whole process Business.
  • the information store 12 is loaded.
  • the transmitting device 2 switches to the "operation" mode, which is automatically interrupted at short intervals by the "program transfer” mode.
  • the information contained in the information memory 12 (which, as stated above is in the form of a ring memory) is sent out after the preparatory command described, starting with the information part that would have been sent out in the "operating" operating mode, if the interruption had not taken place.
  • the command "end of transmission” follows and then the system returns to the "operation” mode and sends the information from the information store 12, starting from the point at which the interruption took place.
  • a receiving system which was made ready for reception in the manner described above by placing and closing the lid on the container 2, ignores the received program until the preparation signal appears and then takes over the information from the information store 12, as described earlier, into the information store 25.
  • the end command triggers the described processes for the "Operation" operating mode in the receiving system and at the same time releases the previously blocked switch 27.
  • the container 2 is therefore subject to transport protection. At the same time, a further evaluation of the preparation command is prevented.
  • This state of the receiving system 5, 6, 7 is retained until the container in the transport vehicle is inserted into the locking device in the vehicle or the lid is opened.
  • the unloading process takes place in the reverse order. It is assumed that there is a transmission device according to FIG. 2 at the unloading location, which secures the entire transport route from the transport vehicle to the emptying location. After the corresponding placement has been received and, if appropriate, the transport vehicle has been opened, this transmitting device is switched on and now, in the manner already described, the information memory 12 is also loaded with a program.
  • the transmitting and receiving mode is then established and the triggering of the built-in safety means is prevented via the blocking switch 27.
  • the container 2 can now be removed from its latching device from the transport vehicle and carried over the transport route until it engages again in a latching device in the emptying space.
  • the transmitting device can be switched off again.
  • Transport vehicles of this type often have a keyboard which can be operated by the driver and with which individual containers can be released for removal from their locking. After the transmitter is switched on, this keyboard is advantageously activated by a release command. With an appropriately structured organization, the keyboard can even be skipped and the containers provided for unloading can be released by commands from the transmission device.
  • the vehicle In order to effectively switch the vehicle on to secure the transport route, it is advisable to provide it with an antenna and an on-board receiver.
  • the containers in the locking frame can be supplied via cable from this on-board receiver.
  • the restriction to sending only one memory content during the transport time is expedient in order to use the content of the information store only once. In practice, however, longer transport times can be allowed because the two information stores are connected as ring stores and continuously repeat the information content they contain.
  • FIGS. 5 and 6 Another exemplary embodiment is shown in FIGS. 5 and 6.
  • the devices shown use the same monitoring principle and also numerous of the sub-devices shown in FIGS. 2 and 3, so that the explanation given for FIGS. 2 and 3 can be used to explain this variant.
  • the transmission device shown in FIG. 5 differs from that in FIG. 2 primarily by the omission of the coding device 19. Furthermore, it does not require a random generator 16.
  • the fast clock 14 has been replaced by the word clock 30, which stores the information memory 12 for delivery a bit sequence of a certain length.
  • the decoding device 29 is omitted compared to the receiving device according to FIG. 3.
  • the information store 31, like the information store 25, is connected as a ring store. It differs in that it has a parallel output 32 for a certain number of bits, that is to say for a word, which leads to a word comparator 33.
  • the information memory 31 can also be clocked by a fast clock 36.
  • An information switch 35 has been switched into the output of the demodulator 21 and permits the information to be fed to a word memory 34 instead of the comparator 24, which also has a parallel output to the word comparator 33.
  • the word comparator 33 finally has a command output with which the fast clock 36 can be interrupted.
  • the variant shown in Figs. 5 and 6 differs from the previously described above all in that the information content of the information storage is not formed anew with each transport process, but e.g. in the form of programmable semiconductor memories with the same information content is used in the memories, namely for all devices involved in a transport process, that is to say as a minimum for the transmitting device at the filling location, the transmitting device at the empty location and for the receiving device in container 2.
  • the information transmission mode is replaced by the synchronization mode, which, in the same way as described earlier, is triggered by a special command via command transmitter 15 and command evaluation 26, in which the central control system, which is not shown in these circuit diagrams, is triggered.
  • the information switch 35 is switched so that the transmitted word is recorded in the word memory 34.
  • the same operating mode means that the content of the information memory 31 is moved in rapid succession with the aid of the fast clock 36. Assuming the numbers given earlier, all information is cycled in less than a second.
  • the word comparator 33 continuously checks whether the word pending at the parallel output 32 matches the word transmitted into the word memory 34 by the transmitting device.
  • the stochastic information which is used in the form of programmed semiconductor memories in the information memories 12 and 31, if possible, is expediently carried out at a fixed rhythm - e.g. daily - exchanged by exchanging the semiconductor components. It is important to ensure that all transmitters and receivers belonging to a system receive the same information.
  • the variant just described is simplified if the information sequence used for securing the transport is divided into sections (not necessarily of the same length) and each section is preceded by a section number. This section number must stand out clearly from the rest of the information. All section numbers must be different from each other. For this, e.g. It is possible to use a special coding for the entry of the section numbers that is not used in the remaining information or to clearly mark the section numbers by prefixing a command on another frequency.
  • the transmission of information from the transmitting device begins with a section number.
  • the same section number in the information store 31 also means the start of the transmission.
  • the variant of the invention described last has various advantages and disadvantages compared to the variant described earlier.
  • a disadvantage is that the information used for the transmission security has to be produced in advance in the form of semiconductor components, and there is therefore a risk of duplication of the components and of improper use.
  • One advantage is that no transmission process is necessary outside of the actual transmission process used to secure the transport.
  • the expansion of the high-frequency field used for security can be of particular importance.
  • known technical methods in particular from guide beam technology, can be used to improve the concentration of the high-frequency field.
  • Such methods are known to consist of a certain path curve - generally an axis of symmetry of the antenna system used - on which there is a constant field strength despite the switching over of individual antennas of an antenna system.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Burglar Alarm Systems (AREA)
  • Packages (AREA)
EP80104771A 1979-08-22 1980-08-12 Dispositif de protection contre le vol d'un récipient pour le transport d'objets de valeur Expired EP0024630B1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AT80104771T ATE16862T1 (de) 1979-08-22 1980-08-12 Vorrichtung zur diebstahlsicherung eines wertsachen-transportbehaelters.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE2933893A DE2933893C2 (de) 1979-08-22 1979-08-22 Transportsicherung
DE2933893 1979-08-22

Publications (3)

Publication Number Publication Date
EP0024630A2 true EP0024630A2 (fr) 1981-03-11
EP0024630A3 EP0024630A3 (en) 1981-03-25
EP0024630B1 EP0024630B1 (fr) 1985-12-04

Family

ID=6078986

Family Applications (1)

Application Number Title Priority Date Filing Date
EP80104771A Expired EP0024630B1 (fr) 1979-08-22 1980-08-12 Dispositif de protection contre le vol d'un récipient pour le transport d'objets de valeur

Country Status (4)

Country Link
US (1) US4352097A (fr)
EP (1) EP0024630B1 (fr)
AT (1) ATE16862T1 (fr)
DE (1) DE2933893C2 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2182183A (en) * 1985-10-26 1987-05-07 Robert Peter Andow Child vicinity radio alarm system
GB2202066A (en) * 1987-02-24 1988-09-14 Liu Ching Kuei Theft-alarm system for briefcase
EP0355404A2 (fr) * 1988-07-23 1990-02-28 Karl-Heinz Bradavka Dispositif de protection des biens contre le vol
DE102014215750A1 (de) * 2014-08-08 2016-02-25 Sp Sicherheitsprodukte Vertriebs Gmbh Sicherheitssystem für ein Wertbehältnis

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4573042A (en) * 1983-03-14 1986-02-25 Sensormatic Electronics Corporation Electronic article surveillance security system
US4511888A (en) * 1983-06-29 1985-04-16 U.S. Currency Protection Corp. Dual signal electromagnetic article theft detector
US4737760A (en) * 1984-12-06 1988-04-12 Huang Chung Siung Tire pressure warning device
US4860351A (en) * 1986-11-05 1989-08-22 Ibm Corporation Tamper-resistant packaging for protection of information stored in electronic circuitry
EP0284351A1 (fr) * 1987-03-27 1988-09-28 Cardgard Ltd. Dispositif de sécurité
US4922229A (en) * 1989-05-11 1990-05-01 Gary Guenst System for retrieving and preventing the loss or theft of keys
GB9206974D0 (en) * 1992-03-31 1992-05-13 Lawson Mardon Group Uk Ltd Improvements in or relating to bags
US5283550A (en) * 1992-06-04 1994-02-01 Wild's - Wild Things, Inc. Shopping cart receiver alarm system
US5708417A (en) * 1993-12-16 1998-01-13 Phone Alert Corp. Monitoring system for remote units
US5615247A (en) * 1994-10-11 1997-03-25 Mills; Thomas O. Security device for the protection of cargo transport containers
EP0735472A3 (fr) * 1995-03-31 2000-01-19 Sun Microsystems, Inc. Méthode et appareil pour conspiration entre des objets
US5936523A (en) * 1998-04-24 1999-08-10 West; Joe F. Device and method for detecting unwanted disposition of the contents of an enclosure
JP2001028080A (ja) * 1999-07-15 2001-01-30 Fujitsu Ltd 現金カセット盗難防止システム及び現金カセット盗難防止方法
FR2821382B1 (fr) * 2001-02-28 2006-11-24 Brinks France Dispositif de controle-commande en vue de la surveillance de la neutralisation et/ou la destruction de valeurs, de documents et/ou d'objets
DE10123382A1 (de) * 2001-05-14 2003-01-16 Giesecke & Devrient Gmbh Sicherungssystem für Kassetten
EP1952363A1 (fr) * 2005-11-24 2008-08-06 Consensum As Méthode de traitement d'un billet de banque et système correspondant
EP1843000B1 (fr) * 2006-04-03 2018-10-31 Peter Villiger Système de sécurité doté d'une mise en réseau ad hoc de composants isolés
US9024722B2 (en) * 2008-06-16 2015-05-05 Bank Of America Corporation Remote identification equipped self-service monetary item handling device
US7982604B2 (en) * 2008-06-16 2011-07-19 Bank Of America Tamper-indicating monetary package
US8094021B2 (en) * 2008-06-16 2012-01-10 Bank Of America Corporation Monetary package security during transport through cash supply chain
US8210429B1 (en) 2008-10-31 2012-07-03 Bank Of America Corporation On demand transportation for cash handling device
GB2487201B (en) * 2011-01-12 2014-04-30 S & T Systems Ltd Protection of articles against theft
US10217084B2 (en) 2017-05-18 2019-02-26 Bank Of America Corporation System for processing resource deposits
US10515518B2 (en) 2017-05-18 2019-12-24 Bank Of America Corporation System for providing on-demand resource delivery to resource dispensers
US10275972B2 (en) 2017-05-18 2019-04-30 Bank Of America Corporation System for generating and providing sealed containers of traceable resources

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2301054A1 (fr) * 1975-02-12 1976-09-10 Attia Chaouki Dispositif electronique de protection
FR2325790A1 (fr) * 1975-09-29 1977-04-22 Apieel Sa Dispositif de securite pour transport de valeurs
FR2351461A1 (fr) * 1976-05-12 1977-12-09 Holzer Walter Dispositif d'avertissement

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1112934A (en) * 1964-11-06 1968-05-08 Georges Olivier A device for transporting bank notes
US3618067A (en) * 1969-11-04 1971-11-02 Donald P Devale Movement detector
US4023138A (en) * 1975-11-17 1977-05-10 Joseph Ballin Vehicle theft prevention system
DE2647453A1 (de) * 1976-10-21 1978-04-27 Wolfgang Ing Grad Weil Verfahren und vorrichtung zur ueberwachung einer beweglichen sache oder person

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2301054A1 (fr) * 1975-02-12 1976-09-10 Attia Chaouki Dispositif electronique de protection
FR2325790A1 (fr) * 1975-09-29 1977-04-22 Apieel Sa Dispositif de securite pour transport de valeurs
FR2351461A1 (fr) * 1976-05-12 1977-12-09 Holzer Walter Dispositif d'avertissement

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2182183A (en) * 1985-10-26 1987-05-07 Robert Peter Andow Child vicinity radio alarm system
GB2202066A (en) * 1987-02-24 1988-09-14 Liu Ching Kuei Theft-alarm system for briefcase
EP0355404A2 (fr) * 1988-07-23 1990-02-28 Karl-Heinz Bradavka Dispositif de protection des biens contre le vol
EP0355404A3 (en) * 1988-07-23 1990-03-07 Karl-Heinz Bradavka Anti-theft device for protecting valuables
DE102014215750A1 (de) * 2014-08-08 2016-02-25 Sp Sicherheitsprodukte Vertriebs Gmbh Sicherheitssystem für ein Wertbehältnis

Also Published As

Publication number Publication date
DE2933893A1 (de) 1981-03-26
US4352097A (en) 1982-09-28
DE2933893C2 (de) 1983-03-17
EP0024630B1 (fr) 1985-12-04
ATE16862T1 (de) 1985-12-15
EP0024630A3 (en) 1981-03-25

Similar Documents

Publication Publication Date Title
DE2933893C2 (de) Transportsicherung
DE10341358B4 (de) Fernsteuersystem zur Steuerung eines Fahrzeugs mit Priorität des Steuerzugriffs, welche dem letzten Verwender des Fahrzeugs zugeordnet wurde
DE3440379C2 (fr)
DE2909134C2 (de) Vorrichtung zum ferngesteuerten Betätigen eines Kraftfahrzeugschlosses
DE60114827T2 (de) Schliesssystem
DE2910016C2 (de) Notrufvorrichtung
DE19745953C2 (de) Diebstahl-Sicherungssystem sowie Verfahren zur automatischen Detektion und Identifikation eines Warensicherungsetiketts durch eine Basisstation
DE4204463C2 (de) Identifikations-Informations-Sende-/Empfangsvorrichtung
DE19610116C2 (de) Diebstahlschutzsystem für ein Kraftfahrzeug
DE19825821B4 (de) Steuern eines Türzugangs durch drahtlose Kommunikation
CH640297A5 (de) Sicherheitseinrichtung an einem schloss oder einer sicherheitsschaltung zur verhinderung einer unbefugten manipulation.
DE102019120207A1 (de) Passives schlüsselloses Zugangssystem
DE60310332T2 (de) Fernsteuerungssystem zum Schließen/Öffnen von Fahrzeugen
WO2003102878A1 (fr) Procede de controle d'autorisation d'utilisation
EP1041224A2 (fr) Dispositif et procédé de libération d'un système de sécurité, en particulier d'un système d'accès pour véhicule automobile
DE3918052C1 (fr)
DE60102616T2 (de) Handfreies Zugangs- und/oder Startsystem für Kraftfahrzeuge
EP0877333B1 (fr) Appareil pour le transfert d'énergie sans fil et exécution d'une action
WO1989000520A1 (fr) Poste de radio pour vehicules automobiles avec dispositif anti-vol
DE4433499C2 (de) Elektronisches Diebstahlschutzsystem für ein Kraftfahrzeug
EP1081000B1 (fr) Dispositif de sécurité
DE4039690C2 (de) Vorrichtung zum Identifizieren eines Gegenstandes
DE19807066A1 (de) Sicherungseinrichtung zum globalen Schutz von Gegenständen mit elektronischen Komponenten
DE19941350A1 (de) Vorrichtung und Verfahren zur Freigabe einer Sicherheitseinrichtung, insbesondere einer Zuganseinrichtung für ein Kraftfahrzeug
DE3324956A1 (de) Schaltungsanordnung zur elektronischen ver- und entriegelung von sicherheitsanlagen

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Designated state(s): AT BE CH FR GB IT LI LU NL SE

AK Designated contracting states

Designated state(s): AT BE CH FR GB IT LI LU NL SE

17P Request for examination filed

Effective date: 19810907

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Designated state(s): AT BE CH FR GB IT LI LU NL SE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Effective date: 19851204

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.

Effective date: 19851204

Ref country code: BE

Effective date: 19851204

REF Corresponds to:

Ref document number: 16862

Country of ref document: AT

Date of ref document: 19851215

Kind code of ref document: T

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Effective date: 19860131

ET Fr: translation filed
NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Effective date: 19860812

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 19860831

Ref country code: LI

Effective date: 19860831

Ref country code: CH

Effective date: 19860831

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 19880812

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 19890428

GBPC Gb: european patent ceased through non-payment of renewal fee
REG Reference to a national code

Ref country code: FR

Ref legal event code: ST