EP2861812A1 - Apparatus for transporting or storing valuable items - Google Patents

Apparatus for transporting or storing valuable items

Info

Publication number
EP2861812A1
EP2861812A1 EP13723941.4A EP13723941A EP2861812A1 EP 2861812 A1 EP2861812 A1 EP 2861812A1 EP 13723941 A EP13723941 A EP 13723941A EP 2861812 A1 EP2861812 A1 EP 2861812A1
Authority
EP
European Patent Office
Prior art keywords
image capture
capture device
processor
images captured
images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP13723941.4A
Other languages
German (de)
French (fr)
Inventor
Anthony Westington
Nick Tripp
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Secure Innovation Ltd
Original Assignee
Spinnaker International Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spinnaker International Ltd filed Critical Spinnaker International Ltd
Publication of EP2861812A1 publication Critical patent/EP2861812A1/en
Ceased legal-status Critical Current

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/005Portable strong boxes, e.g. which may be fixed to a wall or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/02Details
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/14Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/10Mechanical details
    • G07D11/12Containers for valuable papers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/20Controlling or monitoring the operation of devices; Data handling
    • G07D11/30Tracking or tracing valuable papers or cassettes
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1481Mechanical actuation by lifting or attempted removal of hand-portable articles with optical detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/149Mechanical actuation by lifting or attempted removal of hand-portable articles with electric, magnetic, capacitive switch actuation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves

Definitions

  • the present invention relates to an apparatus for transporting or storing valuable items.
  • bank notes To deter would-be thieves of bank notes in transit, it has become commonplace for bank notes to be stored and transported in secure containers which release an indelible dye or ink onto the bank notes in the event that the secure container is stolen or otherwise interfered with, to mark and stain the bank notes, thus rendering them worthless and unusable.
  • Some security systems use invisible markers such as DNA sprays to link the criminal to the crime to improve the chances of successfully identifying the criminal.
  • invisible markers such as DNA sprays
  • such systems rely on the criminal being apprehended by law enforcement authorities such as the police, and those authorities detecting the invisible marker on the criminal's person.
  • Tracking technologies used in some secure containers have also proved useful in leading law enforcement authorities to the site where the criminal has tried to open the secure container, allowing the secure container to be recovered and examined for forensic evidence.
  • tracking systems in secure containers have led the police to a criminal's home, leading to the arrest of the criminal. Whilst these systems can be effective if deployed in large enough quantities, arrests and recovery rates are lower than expected due to the speed with which criminals work and the ferocity of attacks in some cases.
  • the present application relates to an apparatus such as a secure container for transporting or storing valuable items such as bank notes.
  • the apparatus includes an image capture device, a processor and a memory for storing images captured by the image capture device.
  • the apparatus includes control means operative to cause the processor to commence storing images captured by the image capture device in response to a trigger signal received by the control means, to ensure that the processor is not constantly active and consuming power.
  • apparatus for transporting or storing valuable items, the apparatus comprising: an image capture device; a processor; and a memory, the processor being operative to receive images captured by the image capture device and to store the received images in the memory; and control means for causing the processor to commence receiving and storing the images captured by the image capture device in response to a trigger signal received by the control means.
  • the apparatus of the present invention provides an additional security feature in the form of the image capture device, by means of which images of or associated with an incident such as an attack on the apparatus can be recorded. Such images can assist in the identification of criminals involved in the attack on the apparatus.
  • the apparatus may further comprise a microphone, in which case the processor may be operative to receive signals representing sounds captured by the microphone and to store the received signals in the memory.
  • the image capture device may comprise a charge coupled device (CCD) or a CMOS image capture device.
  • CCD charge coupled device
  • CMOS image capture device a CMOS image capture device
  • the apparatus may further comprise an infra-red light source.
  • the apparatus may further comprise a light sensor which is operative to generate a trigger signal to cause the infra-red light source to be activated if the level of ambient light falls below a predetermined threshold.
  • the apparatus may further comprise a tracking device that is configured to generate a signal representing a position of the apparatus from signals received from a wireless network.
  • the processor may be configured to transmit images captured by the image capture device and/or audio captured by a microphone of the apparatus to the tracking device for transmission to a remote server over the wireless network.
  • the processor may be configured to transmit images captured by the image capture device and/or audio captured by a microphone of the apparatus to a local receiver using an RF transmitter of the apparatus.
  • the apparatus may further comprise an image enhancer which is configured to improve the quality of images captured by the image capture device.
  • the apparatus may further comprise an image encoder for compressing images captured by the image capture device.
  • the apparatus may further comprise a sensor for detecting interference with the apparatus, in which case the control means may be configured to cause the processor to commence receiving and storing the images captured by the image capture device in response to a signal received from the sensor indicating that interference with the apparatus has been detected.
  • the control means may be configured to cause the processor to commence receiving and storing the images captured by the image capture device in response to a signal received from a radio transmitter that is external to the apparatus.
  • the apparatus may further comprise a connector for connecting the apparatus to an external device to permit downloading of images or sounds stored in the memory of the apparatus.
  • the apparatus may be a secure container.
  • Figure 1 is a representation of a secure container, viewed from above;
  • Figure 2 is a schematic block diagram illustrating a processing system of the secure container of Figure 1;
  • Figure 3 is a schematic representation of a composite image generated by an audiovisual recording sub-system of the processing sub-system of Figure 2.
  • a secure container for storing or transporting valuable items such as cash is shown generally at 10, and comprises a lower part and an upper part connected by means of a hinge 12, such that the secure container can be opened to permit access to an interior compartment 14 which is configured to receive valuable items such as bank notes to be stored or transported in the secure container 10.
  • the secure container includes a security system having a plurality of sensors that are configured to detect an attack on, or unauthorised interference with, the secure container (e.g. attempts to force the secure container 10 open, to breach the secure container 10 etc.).
  • the security system triggers a spoiling agent dispensing system, which is configured to dispense a spoiling or degrading agent such as an indelible ink or dye, or an adhesive onto the contents of the interior compartment, to permanently spoil the contents, thereby rendering them worthless and unusable.
  • a spoiling agent dispensing system which is configured to dispense a spoiling or degrading agent such as an indelible ink or dye, or an adhesive onto the contents of the interior compartment, to permanently spoil the contents, thereby rendering them worthless and unusable.
  • the security system will not be described in detail here, as it is not relevant to the present invention.
  • FIG. 2 is a schematic block diagram illustrating a processing system 20 of the secure container 10. It is to be understood that the functional blocks illustrated in Figure 2 do not necessarily represent physical components used in a "real world" embodiment of the secure container 10, but are instead intended to represent functions performed by the processing system 20.
  • the processing system 20 includes a data logger sub-system 22, which includes a first microprocessor 24 that receives inputs from sensors 26 of the security system of the secure container 10.
  • the first microprocessor 24 also receives an input from a realtime clock 28, which is powered by its own battery 30.
  • the first microprocessor is connected via a two-way bus to a first memory 32.
  • the purpose of the data logger sub-system is to record the normal operation of the secure container 10 to facilitate identification of misuse of the case, or to confirm the reason why the security system was triggered and activated the spoiling agent dispensing system.
  • the first microprocessor 24 processes signals received from the sensors 26 and records information relating to these signals as discrete entries in the memory 32, with each memory entry being time and date stamped with a time and date generated by the real time clock 28.
  • the processing system 20 of the secure container 10 includes an audio visual recording sub-system 40, which can be activated to commence recording of sound and images which may subsequently be used to assist in the identification of criminals involved in an attack on the secure container 10.
  • the audio visual recording sub-system 40 includes, in the embodiment illustrated in Figure 2, first and second cameras 42, 44 which are mounted in or on the secure container 10.
  • the first and second cameras 42, 44 are covertly mounted (i.e. are hidden or disguised) to make it difficult from them to be detected and attacked by a criminal attacking the secure container 10.
  • the first and second cameras 42, 44 are preferably mounted on opposite ends of the secure container 10, so as to capture as much footage of or related to an attack as possible.
  • the use of two separate cameras 42, 44 in this way also provides the benefit of redundancy, in that it is unlikely that both cameras will fail at the same time, meaning that in the event of failure of one of the cameras 42, 44, the other camera 44, 42 will likely continue to function. Nevertheless, in other embodiments only a single camera may be provided. Alternatively, more than two cameras my be used, to provide additional images.
  • the first and second cameras 42, 44 may be, for example, CMOS or CCD image capturing devices, each coupled to a respective lens 46, 48, which may be a wide angle lens, to maximise the field of vision of each camera 42, 44, thereby maximising the size of the scene that can be captured by each camera 42, 44.
  • CMOS or CCD image capturing devices each coupled to a respective lens 46, 48, which may be a wide angle lens, to maximise the field of vision of each camera 42, 44, thereby maximising the size of the scene that can be captured by each camera 42, 44.
  • Outputs of the cameras 42, 44 are fed to an image enhancer 50, which is operative to improve the quality of images captured by the first and second cameras 42, 44, for example by adjusting parameters such as contrast and brightness.
  • the image enhancer 50 outputs streams of enhanced images from the two cameras 42, 44 to a compression encoder 52, which is operative to compress the enhanced images to reduce their size.
  • the compression encoder 52 may be operative to compress the images using the H.264 compression standard, for example.
  • the H.264 standard is particularly suitable for use by the compression encoder 52, as this standard provides a high level of compression with minimal loss in picture quality.
  • the compression encoder 52 outputs streams of the compressed images from the two cameras 42, 44 to a second microprocessor 54, which is operative to receive the streams of compressed images and combine them to create a single stream of compressed images, in which each frame of the stream consists of a composite image comprising an enhanced and compressed image from the first camera 42 concatenated or otherwise combined with an enhanced and compressed image taken by the second camera 44 at the same time as the image taken by the first camera 42.
  • Each composite image is associated by the second microprocessor 54 with a time and date received by the second microprocessor 54 from the real time clock 28 at the time that the images were captured by the first and second cameras 42, 44.
  • the secure container 10 may be provided with a standalone positioning system receiver 56, such as a GPS (global positioning system) receiver. Additionally or alternatively, a tracking device 58 may be provided in the secure container 10 to facilitate tracking of the secure container 10 in the event of an attack, theft or other incident.
  • the tracking device 58 may be configured to connect to a wireless network such as a GSM or 3G mobile telephone network and, from the signals received from the network, generate a signal representing the position of the secure container 10. Alternatively, the tracking device 58 may be based on a positioning system such as GPS.
  • this data may also be recorded and associated with the composite image by the second microprocessor 54.
  • An identifier such as the serial number of the secure container 10 is also associated with each composite image of the stream of images.
  • Each composite image of the single stream of composite images, and its associated time, date, container identifier and positioning data (if available) are written to a second memory 60 by the second microprocessor 54 in a single stream of images.
  • Generating a single stream of composite images and their associated data in this way minimises the processing burden on the second microprocessor 54, as only one stream of data need be written to the second memory 60 at one time, whilst also facilitating playback of the stream of composite images.
  • Figure 3 is a representation of a composite image 80, which is made up of a first image 82 taken by the first camera 42 arranged to be adjacent to a second image 84 taken by the second camera 44. Overlaid on the composite image 80 are the time 86 and date 88 as provided by the real time clock 28, positioning data 90 as provided by the positioning system receiver 56 or tracking device 58, the serial number 92 of the secure container 10 from which the images were taken and a watermark 94. By overlaying these data on the composite image 80 all of the available information associated with the composite image is presented together.
  • the audiovisual recording sub-system 40 may include one or more infra-red emitters such as infra-red LEDs 62 positioned near to the cameras to illuminate the area in the vicinity of the secure container 10.
  • the infra-red LEDs 62 may be associated with a light sensor 64 such as a phototransistor which is configured to transmit a signal to the second microprocessor 54 when the ambient light level falls below a predetermined threshold.
  • the second microprocessor 54 in turn switches the infra-red LEDs 62 on.
  • the CCD or CMOS imaging sensors of the cameras 42, 44 are able to detect infra-red light, which is not visible to the human eye.
  • infra-red light to illuminate the area in the vicinity of the secure container 10 allows the audio-visual recording sub-system to continue capturing images even in low light conditions, without alerting criminals to the operation of the audio visual recording sub-system 40 or the presence of the cameras 42, 44.
  • the audio visual recording sub-system 40 may include a microphone 62 for capturing sound in the vicinity of the secure container 10. Sound captured by the microphone 62 is added to the data stream written to the second memory 60 by the second microprocessor 54, and may be used subsequently to assist in identifying and convicting criminals involved in an attack on the secure container 10, e.g. by permitting identification of the criminals by their voices.
  • the capture and processing of image and audio data requires considerable processing resources, which implies the use of a high-performance processor, with the associated high power consumption.
  • size, weight and cost constraints of the secure container 10 restrict the capacity of any battery that can be used to power the audio-visual recording sub-system 40.
  • the audio-visual recording sub-system 40 is not active continuously. Instead, the processing system 20 of the secure container 10 is configured to trigger the audio-visual recording sub-system when predetermined conditions are fulfilled.
  • the first microprocessor 24 may be configured to trigger the second microprocessor 54 to activate the audio-visual recording sub-system 40 when an attack on the secure container 10 is detected by one of the sensors 26.
  • the first microprocessor 24 may be configured to trigger the second microprocessor 54 to activate the audio-visual recording sub-system 40 when a signal is received by tracker 58 of the secure container 10 from a remote monitoring centre.
  • the first microprocessor 24 may be configured to trigger the second microprocessor 54 to activate the audio-visual recording sub-system 40 when an external control signal is received by the secure container from a source external to the secure container 10.
  • the control signal may be received, for example, from an RF transmitter carried by a delivery guard responsible for delivery of the secure container 10, or from an RF transmitter operated by a police officer within range of the secure container 10.
  • the audio-visual sub-system 40 may be triggered at predetermined times or time intervals.
  • the composite images and their associated audio, time, date, container identifier and positioning data may be downloaded to a remote device such as a laptop computer, PC or the like from the second memory 60 by means of a connector 68 such as a serial (RS232) or USB connector that is connected to the second memory 60.
  • a wireless connection such as Bluetooth or Wi-Fi may be used to connect to the second memory 60 to download its contents to a remote device.
  • the second microprocessor 54 may also be configured to stream some or all of the captured images, audio and associated data to the tracking device 58 for transmission to a remote server over the wireless network to which the tracking device 58 is connected.
  • some or all of the captured images, audio and associated data may be streamed over a shorter distance by an RF transceiver 70 (e.g. a transceiver operating in accordance with a communications protocol such as Zigbee, IEEE802.1 1 or the like) to a more local receiver being operated by a recovery team or the police. Streaming the captured data in this way allows the images, audio and associated data to be retrieved from the secure container 10 without having to recover the secure container 10 itself.
  • RF transceiver 70 e.g. a transceiver operating in accordance with a communications protocol such as Zigbee, IEEE802.1 1 or the like
  • the second microprocessor 54 may be configured to stream only the captured audio to the tracking device 58 for transmission to the remote server to which the tracking device 58 is connected, and/or to the RF transceiver 70 for streaming to the more local receiver operated by the recovery team or the police.
  • the second microprocessor 54 may be configured to commence streaming the captured audio to the tracking device 58 and/or the RF transceiver 70 in response to a signal received from a sensor of the secure container 10, or when an external control signal is received by the secure container 10, for example a control signal received via the wireless network to which the tracker 58 is connected or received via the RF transceiver 70.
  • the image enhancer 50 and the compression encoder 52 may be implemented in a single integrated circuit (IC), or may each be implemented as a separate IC.
  • the image enhancement and compression functions may be implemented as part of the second microprocessor 54, or in software executed by the second microprocessor 54.
  • the processing system 20 may include a second real-time clock which provides a clock signal to the second microprocessor 54.
  • the first and second microprocessors 24, 54 may use a sequential numbering system to record events in the first and second memories 32, 60 respectively, to facilitate synchronisation of events stored in the respective memories in the event of any drift between the two real-time clocks.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The present application relates to an apparatus (10) such as a secure container for transporting or storing valuable items such as bank notes. The apparatus includes an image capture device (42, 44), a processor (54) and a memory (60) for storing images captured by the image capture device (42, 44). To reduce power consumption, the apparatus (10) includes control means (24) operative to cause the processor (54) to commence storing images captured by the image capture device (42, 44) in response to a trigger signal received by the control means (24), to ensure that the processor (54) is not constantly active and consuming power.

Description

APPARATUS FOR TRANSPORTING OR STORING VALUABLE ITEMS
Technical Field
The present invention relates to an apparatus for transporting or storing valuable items.
Background to the Invention
To deter would-be thieves of bank notes in transit, it has become commonplace for bank notes to be stored and transported in secure containers which release an indelible dye or ink onto the bank notes in the event that the secure container is stolen or otherwise interfered with, to mark and stain the bank notes, thus rendering them worthless and unusable.
Despite these measures, secure containers containing cash or other valuable items remain an attractive target for criminals. Identifying an individual involved in an attack (e.g. a theft or attempted theft) on such a secure container has historically been difficult without catching the individual in the act.
Some security systems use invisible markers such as DNA sprays to link the criminal to the crime to improve the chances of successfully identifying the criminal. However, such systems rely on the criminal being apprehended by law enforcement authorities such as the police, and those authorities detecting the invisible marker on the criminal's person.
Tracking technologies used in some secure containers have also proved useful in leading law enforcement authorities to the site where the criminal has tried to open the secure container, allowing the secure container to be recovered and examined for forensic evidence. In some cases tracking systems in secure containers have led the police to a criminal's home, leading to the arrest of the criminal. Whilst these systems can be effective if deployed in large enough quantities, arrests and recovery rates are lower than expected due to the speed with which criminals work and the ferocity of attacks in some cases.
Accordingly, a need exists for a secure container with additional security features to facilitate identification of criminals involved in an attack on the secure container, to assist in providing sufficient evidence to convict the criminals.
Summary of Invention
The present application relates to an apparatus such as a secure container for transporting or storing valuable items such as bank notes. The apparatus includes an image capture device, a processor and a memory for storing images captured by the image capture device. To reduce power consumption, the apparatus includes control means operative to cause the processor to commence storing images captured by the image capture device in response to a trigger signal received by the control means, to ensure that the processor is not constantly active and consuming power.
According to a first aspect of the present invention there is provided apparatus for transporting or storing valuable items, the apparatus comprising: an image capture device; a processor; and a memory, the processor being operative to receive images captured by the image capture device and to store the received images in the memory; and control means for causing the processor to commence receiving and storing the images captured by the image capture device in response to a trigger signal received by the control means.
The apparatus of the present invention provides an additional security feature in the form of the image capture device, by means of which images of or associated with an incident such as an attack on the apparatus can be recorded. Such images can assist in the identification of criminals involved in the attack on the apparatus. The apparatus may further comprise a microphone, in which case the processor may be operative to receive signals representing sounds captured by the microphone and to store the received signals in the memory.
The image capture device may comprise a charge coupled device (CCD) or a CMOS image capture device.
The apparatus may further comprise an infra-red light source.
The apparatus may further comprise a light sensor which is operative to generate a trigger signal to cause the infra-red light source to be activated if the level of ambient light falls below a predetermined threshold.
The apparatus may further comprise a tracking device that is configured to generate a signal representing a position of the apparatus from signals received from a wireless network.
The processor may be configured to transmit images captured by the image capture device and/or audio captured by a microphone of the apparatus to the tracking device for transmission to a remote server over the wireless network.
Additionally or alternatively, the processor may be configured to transmit images captured by the image capture device and/or audio captured by a microphone of the apparatus to a local receiver using an RF transmitter of the apparatus.
The apparatus may further comprise an image enhancer which is configured to improve the quality of images captured by the image capture device.
The apparatus may further comprise an image encoder for compressing images captured by the image capture device.
The apparatus may further comprise a sensor for detecting interference with the apparatus, in which case the control means may be configured to cause the processor to commence receiving and storing the images captured by the image capture device in response to a signal received from the sensor indicating that interference with the apparatus has been detected.
The control means may be configured to cause the processor to commence receiving and storing the images captured by the image capture device in response to a signal received from a radio transmitter that is external to the apparatus.
The apparatus may further comprise a connector for connecting the apparatus to an external device to permit downloading of images or sounds stored in the memory of the apparatus.
The apparatus may be a secure container. Brief Description of the Drawings
Embodiments of the invention will now be described, strictly by way of example only, with reference to the accompanying drawings, of which:
Figure 1 is a representation of a secure container, viewed from above;
Figure 2 is a schematic block diagram illustrating a processing system of the secure container of Figure 1;
Figure 3 is a schematic representation of a composite image generated by an audiovisual recording sub-system of the processing sub-system of Figure 2.
Description of the Embodiments
Referring first to Figure 1, a secure container for storing or transporting valuable items such as cash is shown generally at 10, and comprises a lower part and an upper part connected by means of a hinge 12, such that the secure container can be opened to permit access to an interior compartment 14 which is configured to receive valuable items such as bank notes to be stored or transported in the secure container 10.
The secure container includes a security system having a plurality of sensors that are configured to detect an attack on, or unauthorised interference with, the secure container (e.g. attempts to force the secure container 10 open, to breach the secure container 10 etc.). On detection of an attack on, or unauthorised interference with, the secure container 10, the security system triggers a spoiling agent dispensing system, which is configured to dispense a spoiling or degrading agent such as an indelible ink or dye, or an adhesive onto the contents of the interior compartment, to permanently spoil the contents, thereby rendering them worthless and unusable. The security system will not be described in detail here, as it is not relevant to the present invention.
Figure 2 is a schematic block diagram illustrating a processing system 20 of the secure container 10. It is to be understood that the functional blocks illustrated in Figure 2 do not necessarily represent physical components used in a "real world" embodiment of the secure container 10, but are instead intended to represent functions performed by the processing system 20.
The processing system 20 includes a data logger sub-system 22, which includes a first microprocessor 24 that receives inputs from sensors 26 of the security system of the secure container 10. The first microprocessor 24 also receives an input from a realtime clock 28, which is powered by its own battery 30. The first microprocessor is connected via a two-way bus to a first memory 32.
The purpose of the data logger sub-system is to record the normal operation of the secure container 10 to facilitate identification of misuse of the case, or to confirm the reason why the security system was triggered and activated the spoiling agent dispensing system. For example, the first microprocessor 24 processes signals received from the sensors 26 and records information relating to these signals as discrete entries in the memory 32, with each memory entry being time and date stamped with a time and date generated by the real time clock 28.
In addition to the data logging sub-system 22, the processing system 20 of the secure container 10 includes an audio visual recording sub-system 40, which can be activated to commence recording of sound and images which may subsequently be used to assist in the identification of criminals involved in an attack on the secure container 10.
The audio visual recording sub-system 40 includes, in the embodiment illustrated in Figure 2, first and second cameras 42, 44 which are mounted in or on the secure container 10. The first and second cameras 42, 44 are covertly mounted (i.e. are hidden or disguised) to make it difficult from them to be detected and attacked by a criminal attacking the secure container 10. The first and second cameras 42, 44 are preferably mounted on opposite ends of the secure container 10, so as to capture as much footage of or related to an attack as possible. The use of two separate cameras 42, 44 in this way also provides the benefit of redundancy, in that it is unlikely that both cameras will fail at the same time, meaning that in the event of failure of one of the cameras 42, 44, the other camera 44, 42 will likely continue to function. Nevertheless, in other embodiments only a single camera may be provided. Alternatively, more than two cameras my be used, to provide additional images.
The first and second cameras 42, 44 may be, for example, CMOS or CCD image capturing devices, each coupled to a respective lens 46, 48, which may be a wide angle lens, to maximise the field of vision of each camera 42, 44, thereby maximising the size of the scene that can be captured by each camera 42, 44.
Outputs of the cameras 42, 44 are fed to an image enhancer 50, which is operative to improve the quality of images captured by the first and second cameras 42, 44, for example by adjusting parameters such as contrast and brightness. The image enhancer 50 outputs streams of enhanced images from the two cameras 42, 44 to a compression encoder 52, which is operative to compress the enhanced images to reduce their size. The compression encoder 52 may be operative to compress the images using the H.264 compression standard, for example. The H.264 standard is particularly suitable for use by the compression encoder 52, as this standard provides a high level of compression with minimal loss in picture quality.
The compression encoder 52 outputs streams of the compressed images from the two cameras 42, 44 to a second microprocessor 54, which is operative to receive the streams of compressed images and combine them to create a single stream of compressed images, in which each frame of the stream consists of a composite image comprising an enhanced and compressed image from the first camera 42 concatenated or otherwise combined with an enhanced and compressed image taken by the second camera 44 at the same time as the image taken by the first camera 42.
Each composite image is associated by the second microprocessor 54 with a time and date received by the second microprocessor 54 from the real time clock 28 at the time that the images were captured by the first and second cameras 42, 44.
The secure container 10 may be provided with a standalone positioning system receiver 56, such as a GPS (global positioning system) receiver. Additionally or alternatively, a tracking device 58 may be provided in the secure container 10 to facilitate tracking of the secure container 10 in the event of an attack, theft or other incident. The tracking device 58 may be configured to connect to a wireless network such as a GSM or 3G mobile telephone network and, from the signals received from the network, generate a signal representing the position of the secure container 10. Alternatively, the tracking device 58 may be based on a positioning system such as GPS. If data from either or both a positioning system receiver 56 or a tracking device 58 is available, this data, indicating the geographical location at which the images making up the composite image of the stream of compressed images, may also be recorded and associated with the composite image by the second microprocessor 54. An identifier such as the serial number of the secure container 10 is also associated with each composite image of the stream of images.
Each composite image of the single stream of composite images, and its associated time, date, container identifier and positioning data (if available) are written to a second memory 60 by the second microprocessor 54 in a single stream of images. Generating a single stream of composite images and their associated data in this way minimises the processing burden on the second microprocessor 54, as only one stream of data need be written to the second memory 60 at one time, whilst also facilitating playback of the stream of composite images.
Figure 3 is a representation of a composite image 80, which is made up of a first image 82 taken by the first camera 42 arranged to be adjacent to a second image 84 taken by the second camera 44. Overlaid on the composite image 80 are the time 86 and date 88 as provided by the real time clock 28, positioning data 90 as provided by the positioning system receiver 56 or tracking device 58, the serial number 92 of the secure container 10 from which the images were taken and a watermark 94. By overlaying these data on the composite image 80 all of the available information associated with the composite image is presented together.
To permit the cameras 42, 44 to capture images in low light conditions, the audiovisual recording sub-system 40 may include one or more infra-red emitters such as infra-red LEDs 62 positioned near to the cameras to illuminate the area in the vicinity of the secure container 10. The infra-red LEDs 62 may be associated with a light sensor 64 such as a phototransistor which is configured to transmit a signal to the second microprocessor 54 when the ambient light level falls below a predetermined threshold. The second microprocessor 54 in turn switches the infra-red LEDs 62 on. The CCD or CMOS imaging sensors of the cameras 42, 44 are able to detect infra-red light, which is not visible to the human eye. Thus, the use of infra-red light to illuminate the area in the vicinity of the secure container 10 allows the audio-visual recording sub-system to continue capturing images even in low light conditions, without alerting criminals to the operation of the audio visual recording sub-system 40 or the presence of the cameras 42, 44.
In addition to the cameras 42, 44, the audio visual recording sub-system 40 may include a microphone 62 for capturing sound in the vicinity of the secure container 10. Sound captured by the microphone 62 is added to the data stream written to the second memory 60 by the second microprocessor 54, and may be used subsequently to assist in identifying and convicting criminals involved in an attack on the secure container 10, e.g. by permitting identification of the criminals by their voices.
As will be appreciated by those skilled in the art, the capture and processing of image and audio data requires considerable processing resources, which implies the use of a high-performance processor, with the associated high power consumption. However, size, weight and cost constraints of the secure container 10 restrict the capacity of any battery that can be used to power the audio-visual recording sub-system 40. To meet these competing demands, the audio-visual recording sub-system 40 is not active continuously. Instead, the processing system 20 of the secure container 10 is configured to trigger the audio-visual recording sub-system when predetermined conditions are fulfilled.
For example, the first microprocessor 24 may be configured to trigger the second microprocessor 54 to activate the audio-visual recording sub-system 40 when an attack on the secure container 10 is detected by one of the sensors 26.
Additionally or alternatively, the first microprocessor 24 may be configured to trigger the second microprocessor 54 to activate the audio-visual recording sub-system 40 when a signal is received by tracker 58 of the secure container 10 from a remote monitoring centre.
Additionally or alternatively, the first microprocessor 24 may be configured to trigger the second microprocessor 54 to activate the audio-visual recording sub-system 40 when an external control signal is received by the secure container from a source external to the secure container 10. The control signal may be received, for example, from an RF transmitter carried by a delivery guard responsible for delivery of the secure container 10, or from an RF transmitter operated by a police officer within range of the secure container 10.
It will be appreciated that other trigger conditions may be employed to activate the audio-visual recording sub-system 40. For example, the audio-visual sub-system 40 may be triggered at predetermined times or time intervals. The composite images and their associated audio, time, date, container identifier and positioning data (if available) may be downloaded to a remote device such as a laptop computer, PC or the like from the second memory 60 by means of a connector 68 such as a serial (RS232) or USB connector that is connected to the second memory 60. Alternatively, a wireless connection such as Bluetooth or Wi-Fi may be used to connect to the second memory 60 to download its contents to a remote device.
As well as storing the captured images, audio and associated data in the second memory 60, the second microprocessor 54 may also be configured to stream some or all of the captured images, audio and associated data to the tracking device 58 for transmission to a remote server over the wireless network to which the tracking device 58 is connected. Alternatively, some or all of the captured images, audio and associated data may be streamed over a shorter distance by an RF transceiver 70 (e.g. a transceiver operating in accordance with a communications protocol such as Zigbee, IEEE802.1 1 or the like) to a more local receiver being operated by a recovery team or the police. Streaming the captured data in this way allows the images, audio and associated data to be retrieved from the secure container 10 without having to recover the secure container 10 itself.
Alternatively, the second microprocessor 54 may be configured to stream only the captured audio to the tracking device 58 for transmission to the remote server to which the tracking device 58 is connected, and/or to the RF transceiver 70 for streaming to the more local receiver operated by the recovery team or the police. The second microprocessor 54 may be configured to commence streaming the captured audio to the tracking device 58 and/or the RF transceiver 70 in response to a signal received from a sensor of the secure container 10, or when an external control signal is received by the secure container 10, for example a control signal received via the wireless network to which the tracker 58 is connected or received via the RF transceiver 70.
It will be appreciated that numerous minor modifications may be made to the processing system illustrated in Figure 2. For example, the image enhancer 50 and the compression encoder 52 may be implemented in a single integrated circuit (IC), or may each be implemented as a separate IC. Alternatively, the image enhancement and compression functions may be implemented as part of the second microprocessor 54, or in software executed by the second microprocessor 54.
Similarly, the processing system 20 may include a second real-time clock which provides a clock signal to the second microprocessor 54. In this case, the first and second microprocessors 24, 54, may use a sequential numbering system to record events in the first and second memories 32, 60 respectively, to facilitate synchronisation of events stored in the respective memories in the event of any drift between the two real-time clocks.
Although the invention has been described herein by reference to a secure container 10, it will be appreciated that the principles of the invention are equally applicable to other containers that are vulnerable to attack by criminals, such as safes, point of sale devices such as tills or cash registers and the like.

Claims

1. Apparatus for transporting or storing valuable items, the apparatus comprising: an image capture device;
a processor; and
a memory, the processor being operative to receive images captured by the image capture device and to store the received images in the memory; and
control means for causing the processor to commence receiving and storing the images captured by the image capture device in response to a trigger signal received by the control means.
2. Apparatus according to claim 1 further comprising a microphone, wherein the processor is operative to receive signals representing sounds captured by the microphone and to store the received signals in the memory.
3. Apparatus according to claim 1 or claim 2 wherein the image capture device comprises a charge coupled device (CCD) or a CMOS image capture device.
4. Apparatus according to claim 3 further comprising an infra-red light source.
5. Apparatus according to claim 4 further comprising a light sensor which is operative to generate a trigger signal to cause the infra-red light source to be activated if the level of ambient light falls below a predetermined threshold.
6. Apparatus according to any one of the preceding claims further comprising a tracking device that is configured to generate a signal representing a position of the apparatus from signals received from a wireless network.
7. Apparatus according to claim 6 wherein the processor is configured to transmit images captured by the image capture device and/or audio captured by a microphone of the apparatus to the tracking device for transmission to a remote server over the wireless network.
8. Apparatus according to any one of the preceding claims wherein the processor is configured to transmit images captured by the image capture device and/or audio captured by a microphone of the apparatus to a local receiver using an RF transmitter of the apparatus.
9. Apparatus according to any one of the preceding claims further comprising an image enhancer which is configured to improve the quality of images captured by the image capture device.
10. Apparatus according to any one of the preceding claims further comprising an image encoder for compressing images captured by the image capture device.
11. Apparatus according to any one of the preceding claims further comprising a sensor for detecting interference with the apparatus, wherein the control means is configured to cause the processor to commence receiving and storing the images captured by the image capture device in response to a signal received from the sensor indicating that interference with the apparatus has been detected.
12. Apparatus according to any one of the preceding claims wherein the control means is configured to cause the processor to commence receiving and storing the images captured by the image capture device in response to a signal received from a radio transmitter that is external to the apparatus.
13. Apparatus according to any one of the preceding claims further comprising a connector for connecting the apparatus to an external device to permit downloading of images or sounds stored in the memory of the apparatus.
14. Apparatus according to any one of the preceding claims wherein the apparatus is a secure container.
EP13723941.4A 2012-06-15 2013-05-20 Apparatus for transporting or storing valuable items Ceased EP2861812A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1210670.4A GB2503030A (en) 2012-06-15 2012-06-15 A secure container having an image capture device
PCT/GB2013/051299 WO2013186524A1 (en) 2012-06-15 2013-05-20 Apparatus for transporting or storing valuable items

Publications (1)

Publication Number Publication Date
EP2861812A1 true EP2861812A1 (en) 2015-04-22

Family

ID=46641006

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13723941.4A Ceased EP2861812A1 (en) 2012-06-15 2013-05-20 Apparatus for transporting or storing valuable items

Country Status (3)

Country Link
EP (1) EP2861812A1 (en)
GB (1) GB2503030A (en)
WO (1) WO2013186524A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647235A (en) * 2019-09-06 2020-01-03 Oppo广东移动通信有限公司 Data processing method and device based on terminal equipment and terminal equipment

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10190358B2 (en) 2015-11-12 2019-01-29 Ford Global Technologies, Llc Vehicle safe and authentication system
CN106170162A (en) * 2016-06-27 2016-11-30 武克易 A kind of intelligent voice control lamp system
TR201811119A2 (en) * 2018-08-01 2018-08-27 Gabay Albert A NEW MOBILE SECURITY SYSTEM

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19642583A1 (en) * 1996-10-15 1998-05-07 Sistec Sicherheitstechnik Gmbh Protected safe with cabinet body and door for valuables
WO2003036581A1 (en) * 2001-10-23 2003-05-01 Vistar Telecommunications Inc. Method of monitoring an enclosed space over a low data rate channel
US20070271596A1 (en) * 2006-03-03 2007-11-22 David Boubion Security, storage and communication system
CN201053270Y (en) * 2007-02-06 2008-04-30 杨树东 Safe cabinet with video recording function
WO2010106552A2 (en) * 2009-03-10 2010-09-23 Krishna Dharma Bharathraj Secure logistic system
CN202047700U (en) * 2011-05-13 2011-11-23 毛文池 Intelligent alarming cash case

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2235001Y (en) * 1994-06-28 1996-09-11 东台市稀土合金厂 Multi-function anti-theft safe
US20030093805A1 (en) * 2001-11-15 2003-05-15 Gin J.M. Jack Dual camera surveillance and control system
US7292159B2 (en) * 2004-07-14 2007-11-06 Spectrum Tracking Systems, Inc. Method and system for providing tracking services to locate an asset
CN201087655Y (en) * 2007-08-28 2008-07-16 中山市奥敏电子有限公司 Mobile network monitoring safe case
GB2463672A (en) * 2008-09-19 2010-03-24 George Baillie A security box with location tracking and remote control
CN101761285A (en) * 2008-12-23 2010-06-30 任立蓬 Money transportation box using commercial communication network
CN201896533U (en) * 2010-05-13 2011-07-13 安普国际 Safe
CN202139953U (en) * 2011-06-22 2012-02-08 翔德电子科技(深圳)有限公司 Image recording device of safe box

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19642583A1 (en) * 1996-10-15 1998-05-07 Sistec Sicherheitstechnik Gmbh Protected safe with cabinet body and door for valuables
WO2003036581A1 (en) * 2001-10-23 2003-05-01 Vistar Telecommunications Inc. Method of monitoring an enclosed space over a low data rate channel
US20070271596A1 (en) * 2006-03-03 2007-11-22 David Boubion Security, storage and communication system
CN201053270Y (en) * 2007-02-06 2008-04-30 杨树东 Safe cabinet with video recording function
WO2010106552A2 (en) * 2009-03-10 2010-09-23 Krishna Dharma Bharathraj Secure logistic system
CN202047700U (en) * 2011-05-13 2011-11-23 毛文池 Intelligent alarming cash case

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2013186524A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647235A (en) * 2019-09-06 2020-01-03 Oppo广东移动通信有限公司 Data processing method and device based on terminal equipment and terminal equipment

Also Published As

Publication number Publication date
WO2013186524A1 (en) 2013-12-19
GB201210670D0 (en) 2012-08-01
GB2503030A (en) 2013-12-18

Similar Documents

Publication Publication Date Title
US10257434B2 (en) Multiview body camera system with environmental sensors and alert features
US10542222B2 (en) Multiview body camera system with environmental sensors and alert features
US20080061991A1 (en) System and method for remote Audio/Video capture of weapon use
KR200448955Y1 (en) Movable monitoring system
JP2009500743A (en) Portable handheld security device
EP2861812A1 (en) Apparatus for transporting or storing valuable items
KR20130132022A (en) Communication capabilities of mobile devices using the remote control and security systems of the safe deposit box and using the same method of remote control and security
US20150373308A1 (en) Real-time mobile video reporting device
US20110128346A1 (en) System of deploying videophone and early warning
US11417214B2 (en) Vehicle to vehicle security
US20110316682A1 (en) Method for enhancing security of a vehicle
JP2005301962A (en) Regional crime prevention support system
JP2008065427A (en) Theft monitoring device for automatic vending machine
JP4673242B2 (en) Monitoring system
US20210281886A1 (en) Wearable camera system for crime deterrence
US20110090082A1 (en) Video guardian protector system
US8179439B2 (en) Security system
JP2004302605A (en) Antitheft system for vending machine
KR101519145B1 (en) Apparatus and method of surveillance in car
JP2004094696A (en) Vehicle warning device and system
CN2639097Y (en) Radio monitoring positioning equipment on vehicle for escorting criminals
US20100013974A1 (en) Remote image processing for wireless communication and personal safety applications
KR20140003696U (en) Self-coordinated system with smart phones
KR100367965B1 (en) A position intensive shooting system of watching camera by wireless remote control
JP4200200B2 (en) Vehicle monitoring system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20141119

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20170317

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

APBK Appeal reference recorded

Free format text: ORIGINAL CODE: EPIDOSNREFNE

APBN Date of receipt of notice of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA2E

APBR Date of receipt of statement of grounds of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA3E

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

APBT Appeal procedure closed

Free format text: ORIGINAL CODE: EPIDOSNNOA9E

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20211021