EP1566513A2 - Security container - Google Patents
Security container Download PDFInfo
- Publication number
- EP1566513A2 EP1566513A2 EP05250145A EP05250145A EP1566513A2 EP 1566513 A2 EP1566513 A2 EP 1566513A2 EP 05250145 A EP05250145 A EP 05250145A EP 05250145 A EP05250145 A EP 05250145A EP 1566513 A2 EP1566513 A2 EP 1566513A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- security device
- mode
- period
- enters
- container
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000000977 initiatory effect Effects 0.000 claims abstract description 5
- 238000000034 method Methods 0.000 claims description 11
- 230000004913 activation Effects 0.000 claims 1
- 230000033001 locomotion Effects 0.000 description 14
- 230000007246 mechanism Effects 0.000 description 5
- 230000001934 delay Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005474 detonation Methods 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 101150031287 petH gene Proteins 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D11/00—Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
- G07D11/10—Mechanical details
- G07D11/12—Containers for valuable papers
- G07D11/125—Secure containers
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/10—Safes or strong-rooms for valuables with alarm, signal or indicator
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/005—Portable strong boxes, e.g. which may be fixed to a wall or the like
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1436—Mechanical actuation by lifting or attempted removal of hand-portable articles with motion detection
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/14—Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft
Definitions
- the present invention relates to a security container.
- a security container is, without limitation, suitable for the transport and delivery of valuable items.
- An automatic teller machine may contain a significant amount of money once it has been replenished, and indeed even a nominally empty cash cassette removed from an automatic teller machine may still contain substantial amounts of cash as the cassettes are often changed before they are strictly empty in order to ensure continuity of service.
- Automatic teller machines are generally provided with antitheft protection, such as a strong box or safe immediately surrounding the machine. Furthermore delivery of cash from a central secure facility to the automatic teller machine is generally performed by way of a high security delivery van having armoured sides and restricted access to the contents of the van. Nevertheless it is still generally necessary for the cash cassette to be walked from the van to the bank or ATM by a security guard, and this transportation by a man carrying the cash cassette represents a weak link in the security.
- the delivery from the security van to the bank or ATM machine should involve the use of a portable security container which typically encloses the cash cassette.
- the security container is provided with an internal spoiling system to spoil the contents of the cash cassette and a control system which monitors the progress of the container and which can activate the spoiling system in the event that it determines that a delivery has been interfered with.
- EP 0235103 discloses a cash cassette transport arrangement in which a timer within a cash-in-transit box is started when the cash-in-transit box is removed from its storage position within a cash delivery vehicle. At the end of the predetermined time period the timer initiates a spoiling mechanism or an alarm.
- EP 0699328 relates to a cash-in-transit container in which a timer is provided, and the timer is initiated when the container is removed from a cash-in-transit vehicle. However, rather than counting real time, the timer counts "movement time", which amounts to the time that the container is being carried. Once the end of the predetermined "movement time” has been reached the spoiling mechanism is operated.
- This arrangement has the advantage that inadvertent detonation of the spoiling mechanism can be inhibited merely by placing the security container on a stationary surface.
- a problem with the arrangement described in EP 0699328 is that the "movement time" needs to be set sufficiently long to allow the delivery guard to complete their walk and also to deal with any legitimate delays that might be encountered.
- Legitimate delays may, for example, arise because of road works or parking congestion in the vicinity of the delivery point which results in the cash delivery vehicle having to park further away than was originally intended. This however means that the "movement time" may need to be significantly longer than is strictly necessary and hence the container is still vulnerable to an attack carried out promptly after it has been removed from the delivery vehicle. There may still be sufficient time on the timer to enable the thief to move the container to a concealed location where more sophisticated attempts to open it may be performed.
- a security device for the transport of at least one item, where the security device is arranged upon initiation of transport to enter a first mode where it times a first period and if the security device has not received a signal indicating it can relinquish responsibility, the security device enters a second mode where it times a second period and at the end of the second period enters an alarm mode if the security device detects that it is moving.
- a security device such as a cash-in-transit container, which counts down a predetermined time period following initiation of a delivery, and at the end of that time period enters a second mode, thereby indicating to a delivery guard that the first period has ended. If, at the end of the second period the security device detects that it is moving it then enters an alarm mode. This enables the "walk time” which is the time that it is expected that the delivery will take, to be set to a value which does not include significant amounts of extra time to cope with additional distance or other contingencies within the delivery path from the cash-in-transit vehicle to the intended destination. Once this time has elapsed, a warning is given to the guard who can then place the container on a stationary surface thereby inhibiting entry into the alarm mode.
- the security device may re-enter the first mode.
- the security device preferably enters the third mode in which it times a third period. If the security device remains unmoved during the third period it preferably re-enters the first mode, whereas if motion is detected it re-enters the second mode.
- At least one counter is provided to count the number of times that the security device enters the first, second or third modes during any delivery and once a respective limit is reached the security device can either immediately initiate the alarm mode or alternatively initiate the alarm mode as soon as it detects motion.
- Such an arrangement prevents the security container from being carried away in a theft where the thief has managed to conspire to perform the theft in a location where he has the opportunity to place the container on the ground and wait for it to time out the second and/or third periods before continuing with the removal of the security container to another location.
- the security device is programmable such that the time periods in the first mode, second mode and third mode together with the limits for the number of times that those nodes can be entered in a given delivery can be set by a suitably authorised person prior to use of the container for delivering valuable items.
- the security device comprises, or is included within, a cash-in-transit container.
- the alarm mode causes operation of a spoiling system for spoiling the valuable items protected by the security device.
- the spoiling system may comprise a dye pack such that ink can be delivered onto the bank notes in order to render them unusable.
- the security device includes a user interface to enable a delivery guard and/or a member of staff or a further security system at an intended destination to authenticate with the security device.
- a delivery guard may be in possession of a "guard tag" which he can place against a suitable reader within the security system to cause the security system to immediately re-enter the first mode of operation.
- This enables the guard to communicate to the system that all is well and allows him to continue his delivery of the cash-in-transit container without necessarily having to place it on the ground and wait for the second and third periods to time out.
- the security device reaches its destination it is necessary to be able to signal to it that it is no longer responsible for protecting the valuables. This can be achieved by a suitably authorised member of personnel introducing a "destination tag" into the vicinity of the security device or alternatively automatic authentication and negotiation may be performed by a security system at the destination, such as a security system embedded within an automatic teller machine.
- a method of protecting valuable items during transport of the items comprising the steps of placing the valuable items within a space protected by a security device, and where the security device is arranged to time a first period, and at the end of the first period to indicate that the first period has elapsed and then to time a second period, and at the end of the second period to enter an alarm mode if the security device detects that it is moving.
- FIG. 1 schematically illustrates a cash-in-transit security container, generally designated 2, which comprises a base portion 4 and a lid 6 which co-operate together to define a protected volume 8 in which valuable items to be transported, such as an ATM cash cassette carrying money, are placed.
- the lid 6 can be secured to the base 4 such that the container is locked shut.
- This is schematically illustrated by the provision of a hinge 10 and an electrically controllable lock 12.
- these components are shown for illustration only and that other closure mechanisms are well known to the person skilled in the art and can be used without the exercise of inventive merit.
- the cash-in-transit container 2 has a security system, generally designated 20, disposed within it.
- the security system includes a motion detector 22, a data processor 24, a power supply 26, timer 28 and a communications interface 40.
- the data processor 24 is also responsive to a user input device 30 and is arranged to control the operation of a spoiling system 32 and the electronic lock 12.
- the motion detector 22 is typically an accelerometer arranged to determine whether the cash-in-transit container is being carried from the vertical motion each time the guard takes a step or from any inadvertent swinging motion which may also occur when the guard carries the security container.
- the accelerometer 22 is preferably a three axis accelerometer as this provides enhanced security against the thief trying to defeat the accelerometer by holding the cash-in-transit container the wrong way up. Suitable technologies for implementing the motion detector are well known and need not be described further here.
- the data processor 24 is typically a programmable data processor which has non-volatile program memory associated with it together with either a scratch pad memory or some random access memory provided in order hold its working calculations.
- the memory can either be provided as separate modules or indeed may be implemented within the data processor.
- the power supply 26 comprises a battery with sufficient life time to ensure that the maximum permitted delivery time can be accommodated, together with time spent on the secure premises and the return from the premises to the cash-in-transit delivery vehicle will not result in discharge of the battery 26. Typically the battery will be able to power the security container for several days.
- a timer 28 is provided for counting the various time periods under the control of the data processor, although it will be appreciated that typically the counter 28 will be implemented within the data processor.
- the data processor may also include any analogue to digital or digital to analogue converters that it requires to interface with the accelerometer 22.
- the spoiling system 32 typically comprises a reservoir of ink which can be ejected under pressure along a delivery conduit 36 into the protected space 8.
- a canister of compressed gas is closed by an electrically detonatable valve such that gas pressure from the container of gas can be rapidly applied to the ink reservoir in order to cause ejection of the ink.
- a user interface 30 which could for example be a key pad.
- a preferred user interface comprises a RF ID tag reader as RF ID tags have become commercially commonplace, but each is a complex item containing inbuilt security and encryption features which make them very difficult to forge.
- the delivery operation commences at step 100 where the security system of the cash-in-transit delivery vehicle signals to the data processor 24 via the communications interface 40 that the cash-in-transit container is being selected to perform a delivery and where internal counters within the security system are initialised. From step 100 control passes to step 102 where a test is made to see whether the container is open. This is because, in certain operational environments, it may be desirable to allow a guard access to the contents of the container, for example to load it with the item to be protected.
- Step 102 continually tests whether the container is open, and if it is, control is returned to step 102 until such time as the container is closed, when control passes to step 104.
- Step 104 initiates a "transit time” timer in order to count down the first time period, that is the "transit time” period which generally is set to be the period that the delivery company believe the guard should be able to complete the process of carrying the cash-in-transit container from the cash-in-transit delivery vehicle to the destination. From step 104, control is passed to step 106 where a test is made to see whether the transit time has elapsed.
- Step 108 may cause a "transit alarm" to be activated which may cause operation of some audio or visual indicator on the cash-in-transit security container or may cause the transmission of a signal from the cash-in-transit container to a head set worn by the security guard. Such a transmission may be performed over a radio communications channel which may use any suitable technology. From step 108 control is passed to step 110 where a test is made to see whether the container is moving.
- step 112 a further timer is initiated to time a time period "alarm 1" which sets up the time period in which the security system remains in its second mode of operation.
- the security system monitors whether the guard has authenticated with the container by use of the guard tag, or whether the container has stopped moving. These tests are performed at steps 114 and 116 respectively. If step 114 determines that the guard has presented his tag to the container, then control is passed immediately to step 132. However if the guard has not presented his tag, then control is passed to step 116 where the test is made to see if the container has stopped moving.
- step 116 determines that the container has not stopped moving
- control is passed to step 118 which constitutes entry to the alarm mode, which in this embodiment causes the spoiling system to be operated. From step 118 control is passed to step 120 where the method ends.
- step 116 if it is determined that the container has stopped moving then control is passed to step 122. Similarly, returning to step 110 if it was determined that the container was not moving at this stage then control was also passed directly to step 122.
- Step 122 constitutes the entry into a third mode in which a "pause extend" time is applied.
- a "pause extend" counter 122 is incremented. This counter counts the number of times that the pause extend has been entered during this delivery. Thus this counter, and other counters or timers had been initialised at step 100.
- control is passed to step 124 whether a test is made to see whether the content of the pause extend counter has now exceeded a pause extend threshold PETH which constitutes a limit on the number of times that the pause extend can be executed. If step 124 determines that the "pause extend" threshold has been exceeded then control is passed to step 126.
- Step 126 tests to see whether the container is moving, if it is not then step 126 is repeated, whereas if the container is moving control is passed to step 118.
- an intermediate step may be placed between steps 124 and 126 where the container may issue an alert to indicate that further motion of it will cause operation of its spoiling system.
- step 128 a pause extend timer is initiated in order to count a pause extend period, which corresponds to a third time period counted by the security system. During this period the data processor is arranged to monitor whether the guard has authenticated with the container or whether the container has moved during the pause extend period. These tests are performed at steps 130 and 134 respectively. Thus, from step 128 control is passed to step 130 where a test is made to see whether the guard has authenticated with the container. If step 130 determines that the guard has authenticated with the container, for example by presenting the guard tag to the tag reader then control is passed to step 132. Step 132 issues an indication that transport can proceed and then passes control from step 132 to step 104, marking the entry of the security system into its first mode.
- step 130 determines that the guard has not authenticated with the container then control is passed to step 134 where a test is made to see whether the container has moved during the third time period as counted by the pause extend time. If step 134 determines that movement has not occurred then control is passed to step 132 again initiating an indication that transport can be received and causing the first mode to be re-entered. However, if step 134 determines that movement did occur during the pause extend period then control is passed to step 112 causing re-entry into the second mode of operation.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Description
- The present invention relates to a security container. Such a container is, without limitation, suitable for the transport and delivery of valuable items.
- There is often a risk of theft when delivering high value items, such as bank notes, to financial institutions such as banks, or when delivering cash cassettes to automatic teller machines (ATM). An automatic teller machine may contain a significant amount of money once it has been replenished, and indeed even a nominally empty cash cassette removed from an automatic teller machine may still contain substantial amounts of cash as the cassettes are often changed before they are strictly empty in order to ensure continuity of service.
- Automatic teller machines are generally provided with antitheft protection, such as a strong box or safe immediately surrounding the machine. Furthermore delivery of cash from a central secure facility to the automatic teller machine is generally performed by way of a high security delivery van having armoured sides and restricted access to the contents of the van. Nevertheless it is still generally necessary for the cash cassette to be walked from the van to the bank or ATM by a security guard, and this transportation by a man carrying the cash cassette represents a weak link in the security.
- It is known that the delivery from the security van to the bank or ATM machine should involve the use of a portable security container which typically encloses the cash cassette. The security container is provided with an internal spoiling system to spoil the contents of the cash cassette and a control system which monitors the progress of the container and which can activate the spoiling system in the event that it determines that a delivery has been interfered with.
- EP 0235103 discloses a cash cassette transport arrangement in which a timer within a cash-in-transit box is started when the cash-in-transit box is removed from its storage position within a cash delivery vehicle. At the end of the predetermined time period the timer initiates a spoiling mechanism or an alarm.
- EP 0699328 relates to a cash-in-transit container in which a timer is provided, and the timer is initiated when the container is removed from a cash-in-transit vehicle. However, rather than counting real time, the timer counts "movement time", which amounts to the time that the container is being carried. Once the end of the predetermined "movement time" has been reached the spoiling mechanism is operated. This arrangement has the advantage that inadvertent detonation of the spoiling mechanism can be inhibited merely by placing the security container on a stationary surface. A problem with the arrangement described in EP 0699328 is that the "movement time" needs to be set sufficiently long to allow the delivery guard to complete their walk and also to deal with any legitimate delays that might be encountered. Legitimate delays may, for example, arise because of road works or parking congestion in the vicinity of the delivery point which results in the cash delivery vehicle having to park further away than was originally intended. This however means that the "movement time" may need to be significantly longer than is strictly necessary and hence the container is still vulnerable to an attack carried out promptly after it has been removed from the delivery vehicle. There may still be sufficient time on the timer to enable the thief to move the container to a concealed location where more sophisticated attempts to open it may be performed.
- According to a first aspect of the present invention there is provided a security device for the transport of at least one item, where the security device is arranged upon initiation of transport to enter a first mode where it times a first period and if the security device has not received a signal indicating it can relinquish responsibility, the security device enters a second mode where it times a second period and at the end of the second period enters an alarm mode if the security device detects that it is moving.
- It is thus possible to provide a security device, such as a cash-in-transit container, which counts down a predetermined time period following initiation of a delivery, and at the end of that time period enters a second mode, thereby indicating to a delivery guard that the first period has ended. If, at the end of the second period the security device detects that it is moving it then enters an alarm mode. This enables the "walk time" which is the time that it is expected that the delivery will take, to be set to a value which does not include significant amounts of extra time to cope with additional distance or other contingencies within the delivery path from the cash-in-transit vehicle to the intended destination. Once this time has elapsed, a warning is given to the guard who can then place the container on a stationary surface thereby inhibiting entry into the alarm mode.
- Advantageously if at the end of the second period the security device has stopped moving, it may re-enter the first mode. However, the security device preferably enters the third mode in which it times a third period. If the security device remains unmoved during the third period it preferably re-enters the first mode, whereas if motion is detected it re-enters the second mode.
- It is thus possible to provide a security device which automatically re-enters the first mode, that is the mode where the guard should be carrying it between the cash-in-transit vehicle and the delivery destination, after the expiry of a preceding first time period provided that the container has been immobile for a while. Such a system allows flexibility for the guard who knows and understands that in the event of some unexpected but legitimate delay he would still be able to complete his delivery without a spoiling mechanism within the security container operating, whilst at the same time giving protection against theft because during a theft the thief would periodically have to stop moving and place the container on the ground whilst the second and/or third modes timed out. This repeated interruption during the theft and escape with the container would severely hamper the thief's progress and render him much more vulnerable to capture by the authorities or alternatively force him to flee without taking the security container.
- Preferably at least one counter is provided to count the number of times that the security device enters the first, second or third modes during any delivery and once a respective limit is reached the security device can either immediately initiate the alarm mode or alternatively initiate the alarm mode as soon as it detects motion. Such an arrangement prevents the security container from being carried away in a theft where the thief has managed to conspire to perform the theft in a location where he has the opportunity to place the container on the ground and wait for it to time out the second and/or third periods before continuing with the removal of the security container to another location.
- Preferably the security device is programmable such that the time periods in the first mode, second mode and third mode together with the limits for the number of times that those nodes can be entered in a given delivery can be set by a suitably authorised person prior to use of the container for delivering valuable items.
- Preferably the security device comprises, or is included within, a cash-in-transit container.
- Preferably the alarm mode causes operation of a spoiling system for spoiling the valuable items protected by the security device. Thus, if the security device is within a cash-in-transit container for delivering bank notes the spoiling system may comprise a dye pack such that ink can be delivered onto the bank notes in order to render them unusable.
- Preferably the security device includes a user interface to enable a delivery guard and/or a member of staff or a further security system at an intended destination to authenticate with the security device. Thus, a delivery guard may be in possession of a "guard tag" which he can place against a suitable reader within the security system to cause the security system to immediately re-enter the first mode of operation. This enables the guard to communicate to the system that all is well and allows him to continue his delivery of the cash-in-transit container without necessarily having to place it on the ground and wait for the second and third periods to time out. Similarly, when the security device reaches its destination it is necessary to be able to signal to it that it is no longer responsible for protecting the valuables. This can be achieved by a suitably authorised member of personnel introducing a "destination tag" into the vicinity of the security device or alternatively automatic authentication and negotiation may be performed by a security system at the destination, such as a security system embedded within an automatic teller machine.
- According to a second aspect of the present invention there is provided a method of protecting valuable items during transport of the items, the method comprising the steps of placing the valuable items within a space protected by a security device, and where the security device is arranged to time a first period, and at the end of the first period to indicate that the first period has elapsed and then to time a second period, and at the end of the second period to enter an alarm mode if the security device detects that it is moving.
- The present invention will further be described, by way of example, with reference to the accompanying drawings, in which:
- Figure 1 is a schematic illustration of a cash-in-transit container incorporating a security device constituting an embodiment of the present invention;
- Figure 2 is a flow chart illustrating part of the operation of the security device shown in Figure 1;
- Figure 3 is a flow chart illustrating a further part of the operation of the security device shown in Figure 1; and
- Figure 4 is a further flow chart illustrating part of the operation of the security device shown in Figure 1.
-
- Figure 1 schematically illustrates a cash-in-transit security container, generally designated 2, which comprises a
base portion 4 and alid 6 which co-operate together to define a protectedvolume 8 in which valuable items to be transported, such as an ATM cash cassette carrying money, are placed. Thelid 6 can be secured to thebase 4 such that the container is locked shut. This is schematically illustrated by the provision of ahinge 10 and an electricallycontrollable lock 12. However it should be appreciated that these components are shown for illustration only and that other closure mechanisms are well known to the person skilled in the art and can be used without the exercise of inventive merit. - The cash-in-
transit container 2 has a security system, generally designated 20, disposed within it. The security system includes amotion detector 22, adata processor 24, apower supply 26,timer 28 and acommunications interface 40. Thedata processor 24 is also responsive to auser input device 30 and is arranged to control the operation of aspoiling system 32 and theelectronic lock 12. - The
motion detector 22 is typically an accelerometer arranged to determine whether the cash-in-transit container is being carried from the vertical motion each time the guard takes a step or from any inadvertent swinging motion which may also occur when the guard carries the security container. Theaccelerometer 22 is preferably a three axis accelerometer as this provides enhanced security against the thief trying to defeat the accelerometer by holding the cash-in-transit container the wrong way up. Suitable technologies for implementing the motion detector are well known and need not be described further here. Thedata processor 24 is typically a programmable data processor which has non-volatile program memory associated with it together with either a scratch pad memory or some random access memory provided in order hold its working calculations. The memory can either be provided as separate modules or indeed may be implemented within the data processor. Thepower supply 26 comprises a battery with sufficient life time to ensure that the maximum permitted delivery time can be accommodated, together with time spent on the secure premises and the return from the premises to the cash-in-transit delivery vehicle will not result in discharge of thebattery 26. Typically the battery will be able to power the security container for several days. Atimer 28 is provided for counting the various time periods under the control of the data processor, although it will be appreciated that typically thecounter 28 will be implemented within the data processor. Furthermore, the data processor may also include any analogue to digital or digital to analogue converters that it requires to interface with theaccelerometer 22. Thespoiling system 32 typically comprises a reservoir of ink which can be ejected under pressure along adelivery conduit 36 into the protectedspace 8. Typically a canister of compressed gas is closed by an electrically detonatable valve such that gas pressure from the container of gas can be rapidly applied to the ink reservoir in order to cause ejection of the ink. Such systems are well known to the person skilled in the art. - Finally, it is necessary for the guard to be able to communicate with the data processor.
This is typically by way of auser interface 30 which could for example be a key pad. However a preferred user interface comprises a RF ID tag reader as RF ID tags have become commercially commonplace, but each is a complex item containing inbuilt security and encryption features which make them very difficult to forge. - The operation of the security device, within the context of a cash-in-transit delivery container, will now be described with reference to Figures 2, 3 and 4. The delivery operation commences at
step 100 where the security system of the cash-in-transit delivery vehicle signals to thedata processor 24 via thecommunications interface 40 that the cash-in-transit container is being selected to perform a delivery and where internal counters within the security system are initialised. Fromstep 100 control passes to step 102 where a test is made to see whether the container is open. This is because, in certain operational environments, it may be desirable to allow a guard access to the contents of the container, for example to load it with the item to be protected. Step 102 continually tests whether the container is open, and if it is, control is returned to step 102 until such time as the container is closed, when control passes to step 104. Step 104 initiates a "transit time" timer in order to count down the first time period, that is the "transit time" period which generally is set to be the period that the delivery company believe the guard should be able to complete the process of carrying the cash-in-transit container from the cash-in-transit delivery vehicle to the destination. Fromstep 104, control is passed to step 106 where a test is made to see whether the transit time has elapsed. If the transit time has not elapsedstep 106 is repeated, whereas if it has elapsed control is passed to step 108 where an indication that the transit time has elapsed is asserted. Step 108 may cause a "transit alarm" to be activated which may cause operation of some audio or visual indicator on the cash-in-transit security container or may cause the transmission of a signal from the cash-in-transit container to a head set worn by the security guard. Such a transmission may be performed over a radio communications channel which may use any suitable technology. Fromstep 108 control is passed to step 110 where a test is made to see whether the container is moving. If the container is moving control is then passed to step 112 where a further timer is initiated to time a time period "alarm 1" which sets up the time period in which the security system remains in its second mode of operation. During this second period as counted by the timer "alarm 1" the security system monitors whether the guard has authenticated with the container by use of the guard tag, or whether the container has stopped moving. These tests are performed atsteps step 114 determines that the guard has presented his tag to the container, then control is passed immediately to step 132. However if the guard has not presented his tag, then control is passed to step 116 where the test is made to see if the container has stopped moving. Ifstep 116 determines that the container has not stopped moving, then control is passed to step 118 which constitutes entry to the alarm mode, which in this embodiment causes the spoiling system to be operated. From step 118 control is passed to step 120 where the method ends. Returning to step 116, if it is determined that the container has stopped moving then control is passed to step 122. Similarly, returning to step 110 if it was determined that the container was not moving at this stage then control was also passed directly to step 122. - Step 122 constitutes the entry into a third mode in which a "pause extend" time is applied. Initially a "pause extend" counter 122 is incremented. This counter counts the number of times that the pause extend has been entered during this delivery. Thus this counter, and other counters or timers had been initialised at
step 100. From step 122 control is passed to step 124 whether a test is made to see whether the content of the pause extend counter has now exceeded a pause extend threshold PETH which constitutes a limit on the number of times that the pause extend can be executed. Ifstep 124 determines that the "pause extend" threshold has been exceeded then control is passed to step 126. Step 126 tests to see whether the container is moving, if it is not then step 126 is repeated, whereas if the container is moving control is passed to step 118. Optionally an intermediate step may be placed betweensteps - Returning to step 124, if it is determined that the number of pause extends has not exceeded the pause extend threshold then control is passed to step 128 where a pause extend timer is initiated in order to count a pause extend period, which corresponds to a third time period counted by the security system. During this period the data processor is arranged to monitor whether the guard has authenticated with the container or whether the container has moved during the pause extend period. These tests are performed at
steps step 128 control is passed to step 130 where a test is made to see whether the guard has authenticated with the container. Ifstep 130 determines that the guard has authenticated with the container, for example by presenting the guard tag to the tag reader then control is passed to step 132. Step 132 issues an indication that transport can proceed and then passes control fromstep 132 to step 104, marking the entry of the security system into its first mode. - However, if
step 130 determines that the guard has not authenticated with the container then control is passed to step 134 where a test is made to see whether the container has moved during the third time period as counted by the pause extend time. Ifstep 134 determines that movement has not occurred then control is passed to step 132 again initiating an indication that transport can be received and causing the first mode to be re-entered. However, ifstep 134 determines that movement did occur during the pause extend period then control is passed to step 112 causing re-entry into the second mode of operation. - It is thus possible to provide a security system which would cause a thief to have to repeatedly stop during the theft of valuables protected by such a system and hence would significantly increase the chances of capture of the thief, whilst also providing a security system which gives the guard flexibility to cope with unexpected but non-malicious delays during transportation of items between a delivery vehicle and a secure area.
Claims (21)
- A security device (20) for protecting at least one item being transported, wherein the security device is arranged upon initiation of transport to enter a first mode (104) where it times a first period, characterised in that if the security device has not received a signal before the end of the first period indicating it can relinquish responsibility, the security device enters a second mode (112) where it times a second period, and at the end of the second period enters an alarm mode (118) if the security device detects that it is moving.
- A security device (20) as claimed in claim 1, in which if at the end of the second period the security device does not detect that it is moving, the security device enters a third mode (128) where it times a third period, and if the security device detects that it is moving during the third period it enters the second mode (112).
- A security device (20) as claimed in claim 2, wherein if the security device does not detect that it has moved during the third period it enters the first mode (104).
- A security device (20) as claimed in claim 2 or 3, which is programmable to set the duration of the first, second and third periods.
- A security device (20) as claimed in any one of the preceding claims, in which a counter counts the number of times the security device enters the first, second and/or third mode.
- A security device (20) as claimed in claim 5, in which when the counter reaches a limit value, the security device enters the alarm mode (118).
- A security device (20) as claimed in claim 5, in which when the counter reaches a limit value, the security device enters the alarm mode (118) if it detects that it is moving.
- A security device (20) as claimed in claim 6 or 7, which is programmable to set the limit value.
- A security device (20) as claimed in claim 1, in which if at the end of the second period the security device does not detect that it is moving, it enters the first mode (104).
- A security device (20) as claimed in any one of the preceding claims, in which the alarm mode causes activation of a spoiling system (32) to spoil the at least one item.
- A security device (20) as claimed in any one of the preceding claims, which includes a user interface (30) such that the user can instruct the security device to enter the first mode (104).
- A security device (20) as claimed in claim 11, in which a user can use the user interface (30) to signal the security device that it can relinquish responsibility for protecting the at least one item.
- A security device (20) as claimed in any one of the preceding claims, in which the at least one item comprises a plurality of bank notes.
- A cash in transit container (2) including a security device (20) as claimed in any one of the preceding claims.
- A method of protecting items during transport of the items, the method comprising the steps of placing the items within a space (8) protected by a security device (20), and wherein the security device is arranged in a first mode to time a first period, characterised in that the security device is further arranged at the end of the first period to indicate that the first period has elapsed and then to enter a second mode (112) to time a second period and at the end thereof to enter an alarm mode (118) if the security device detects that it is moving.
- A method as claimed in claim 15, in which the security device (20) is further arranged, if at the end of the second period it does not detect that it is moving, to enter a third mode (128) where it times a third period, and if the security device detects that it is moving during the third period, it enters the second mode (112).
- A method as claimed in claim 16, in which if the security device (20) does not detect that it has moved during the third period, it enters the first mode (104).
- A method as claimed in claim 15, in which the security device (20) counts the number of times it enters the first and/or second mode, and enters the alarm mode (118) if a limit is reached.
- A method as claimed in any one of claims 16 or 17, in which the security device (20) counts the number of times it enters the third mode, and enters the alarm (118) mode if a limit is reached.
- A method as claimed in claim 18 or 19, in which the security device (20) enters the alarm mode (118) when the limit is reached only when it detects that it is moving.
- A security container (2) characterised by including a security device as claimed in any one of claims 1 to 13.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0403866A GB2411274B (en) | 2004-02-20 | 2004-02-20 | Security container |
GB0403866 | 2004-02-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1566513A2 true EP1566513A2 (en) | 2005-08-24 |
EP1566513A3 EP1566513A3 (en) | 2008-03-05 |
Family
ID=32040128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05250145A Withdrawn EP1566513A3 (en) | 2004-02-20 | 2005-01-13 | Security container |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1566513A3 (en) |
GB (1) | GB2411274B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102008035915A1 (en) * | 2008-07-31 | 2010-02-04 | Wincor Nixdorf International Gmbh | Tamper detection system for cash dispensers deployable in ATMs |
CN101126298B (en) * | 2006-08-15 | 2010-06-09 | 张云山 | Safe |
DE102010016807A1 (en) * | 2010-05-05 | 2011-11-10 | Wincor Nixdorf International Gmbh | Device for transporting and / or storing notes of value |
DE102010016810A1 (en) * | 2010-05-05 | 2011-11-10 | Wincor Nixdorf International Gmbh | Device for temporarily storing at least one bill of goods transport container |
WO2012126937A1 (en) * | 2011-03-21 | 2012-09-27 | Wincor Nixdorf International Gmbh | Method for operating a cash box with customer-specific keys |
EP2463831A3 (en) * | 2010-12-07 | 2013-10-16 | Wincor Nixdorf International GmbH | Method for commissioning and operating a cash box |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2462831A (en) * | 2008-08-20 | 2010-02-24 | Robert Charles Maurice Watson | Secure container with spoiler system delay timer running during transit |
CN101975011A (en) * | 2010-10-23 | 2011-02-16 | 张一伟 | Safe for storing keys |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0235103A2 (en) | 1986-02-25 | 1987-09-02 | S P C Swedish Protection & Consulting AB | A system for transporting valuable documents |
EP0699328A1 (en) | 1992-01-10 | 1996-03-06 | SWEDISH PROTECTION & CONSULTING AB | An anti-theft device |
US5515032A (en) * | 1995-02-08 | 1996-05-07 | Ici Americas Inc. | Alarm device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2280056A (en) * | 1993-07-17 | 1995-01-18 | Transalarm Ltd | A security container |
GB2367173A (en) * | 2000-09-25 | 2002-03-27 | Julian Claude Peck | Security system for an electrical or electronic device |
-
2004
- 2004-02-20 GB GB0403866A patent/GB2411274B/en not_active Expired - Fee Related
-
2005
- 2005-01-13 EP EP05250145A patent/EP1566513A3/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0235103A2 (en) | 1986-02-25 | 1987-09-02 | S P C Swedish Protection & Consulting AB | A system for transporting valuable documents |
EP0699328A1 (en) | 1992-01-10 | 1996-03-06 | SWEDISH PROTECTION & CONSULTING AB | An anti-theft device |
US5515032A (en) * | 1995-02-08 | 1996-05-07 | Ici Americas Inc. | Alarm device |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101126298B (en) * | 2006-08-15 | 2010-06-09 | 张云山 | Safe |
DE102008035915A1 (en) * | 2008-07-31 | 2010-02-04 | Wincor Nixdorf International Gmbh | Tamper detection system for cash dispensers deployable in ATMs |
US8665092B2 (en) | 2008-07-31 | 2014-03-04 | Wincor Nixdorf International Gmbh | Manipulation detection system for cash boxes that can be inserted in and removed from automatic teller machines |
DE102010016807A1 (en) * | 2010-05-05 | 2011-11-10 | Wincor Nixdorf International Gmbh | Device for transporting and / or storing notes of value |
DE102010016810A1 (en) * | 2010-05-05 | 2011-11-10 | Wincor Nixdorf International Gmbh | Device for temporarily storing at least one bill of goods transport container |
US8875993B2 (en) | 2010-05-05 | 2014-11-04 | Wincor Nixdorf International Gmbh | Apparatus for temporarily storing at least one banknote transport container |
US9269209B2 (en) | 2010-05-05 | 2016-02-23 | Wincor Nixdorf International Gmbh | Apparatus for transporting and/or storing banknotes |
EP2463831A3 (en) * | 2010-12-07 | 2013-10-16 | Wincor Nixdorf International GmbH | Method for commissioning and operating a cash box |
WO2012126937A1 (en) * | 2011-03-21 | 2012-09-27 | Wincor Nixdorf International Gmbh | Method for operating a cash box with customer-specific keys |
CN103460260A (en) * | 2011-03-21 | 2013-12-18 | 德利多富国际有限责任公司 | Method for operating a cash box with customer-specific keys |
CN103460260B (en) * | 2011-03-21 | 2016-01-27 | 德利多富国际有限责任公司 | By the method for the specific cipher key operation money box of client |
Also Published As
Publication number | Publication date |
---|---|
EP1566513A3 (en) | 2008-03-05 |
GB0403866D0 (en) | 2004-03-24 |
GB2411274A (en) | 2005-08-24 |
GB2411274B (en) | 2007-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1566513A2 (en) | Security container | |
CA2315195C (en) | Security system | |
EP1891610B1 (en) | Security box, security container and security system | |
AU682037B2 (en) | A system for the secure transportation of articles | |
US20120247373A1 (en) | Protection and Tracking System for Valuables | |
US7707950B2 (en) | Multifunctional, portable security system | |
US7696871B2 (en) | Security system having ad hoc networking of individual components | |
RU2523966C2 (en) | Protection device | |
GB2353067A (en) | Security cabinet | |
WO2016132120A1 (en) | Secure transport system for articles of value | |
WO2003065316A1 (en) | Document handling | |
EP1961903A2 (en) | Rack for transporting valuables | |
WO2001029786A1 (en) | A container for valuables | |
US20080115703A1 (en) | Security Case, Security System, And Security Complex | |
WO2019193465A1 (en) | Kit for safe deposit box and method of use | |
US10957142B2 (en) | Security cassette, complete device with a security cassette and method for handling valuable papers | |
ES2248560T3 (en) | SECURITY SYSTEM FOR CASSETS. | |
RU2758204C2 (en) | Container for carrying valuable things and method for processing valuable things in response to fast movement of such a container | |
EP2626841A1 (en) | System and method for the secured transport of valuable goods, and corresponding vehicle | |
WO2012061853A1 (en) | Cash in transit system and vehicle | |
JP2000306145A (en) | Cash handling device system and cash handling method for the system | |
JPH09134463A (en) | Burglarproof device for cash dispenser | |
WO2018235048A1 (en) | Security container | |
EP2216758A1 (en) | A fuel dispensing unit having a bank note acceptor and a method for emptying the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
17P | Request for examination filed |
Effective date: 20080731 |
|
AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
17Q | First examination report despatched |
Effective date: 20101129 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20140603 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20140801 |