US20050225432A1 - Method for transporting an alarmed container - Google Patents
Method for transporting an alarmed container Download PDFInfo
- Publication number
- US20050225432A1 US20050225432A1 US10/502,020 US50202005A US2005225432A1 US 20050225432 A1 US20050225432 A1 US 20050225432A1 US 50202005 A US50202005 A US 50202005A US 2005225432 A1 US2005225432 A1 US 2005225432A1
- Authority
- US
- United States
- Prior art keywords
- container
- code
- key
- electronic unit
- primary key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/10—Safes or strong-rooms for valuables with alarm, signal or indicator
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/005—Portable strong boxes, e.g. which may be fixed to a wall or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/14—Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7441—Key
- Y10T70/7446—Multiple keys
Definitions
- the present invention relates to a method concerning the transportation of an alarmed container in accordance with the preamble of the accompanying Claim 1 .
- the invention also relates to an arrangement.
- SE 0200169-1 teaches a solution to this problem that functions very efficiently in respect of fixed and regular delivery destinations.
- the container may be collected and delivered along different temporary transportation routes, making it sometimes impossible to use a stationary, anchored second key (customer key/secondary key). It is also desired to be able to block the use of a lost customer key when considered necessary, without remaining customers along the transportation route being affected by the block, while, at the same time, obviating the need to change the coding of a first key (primary key) for this reason.
- an object of the present invention is to provide a highly attractive and secure method or process that will, for instance, ensure that deactivation of the alarm system and/or the opening of a mobile/transportable container will be effected at the correct position along a transportation route. This object is achieved with the method having the characteristic features set forth in the accompanying Claims.
- said method provides a very high security level and also economic advantages. Even though an unauthorised person should obtain access to a customer key/secondary key, deactivation and/or opening of the mobile container can be prevented, for example, by remote blocking of the relevant customer key. This will prevent effectively so-called insider crime, meaning that a lost key will not constitute a security risk.
- the primary key can still be used as normal.
- FIG. 1 is a schematic perspective view of a primary key, a secondary key and a transportable container in the form of a security bag or case; and
- FIG. 2 is a schematic illustration of a transportation route between a central station and three different destinations.
- the transportation container 1 illustrated in FIG. 1 exemplifies a salable storage space that can be opened and/or its alarm system deactivated via the action of a code.
- the illustrated transportation container 1 forms a security container/security cassette whose outer casing is equipped with an alarm system such that any attempt to make a hole in the casing or to bend the casing apart or any other irregular attempt to open the casing can be indicated.
- Located in the container 1 is a first electronic unit 2 and its requisite power source.
- the electronic unit 2 is designed to activate a destruction agent or the like in the container immediately a signal current circuit/alarm current circuit is broken, for instance, so as to destroy or bring influence to bear on the valuable contents of the container storage space at that moment in time.
- the aforedescribed transportation container 1 may be used for the transportation of valuable objects between different places/destinations, wherewith after having placed valuable objects in the container, such as banknotes, documents, computer disks, etc., the container 1 is closed and the alarm system activated prior to transportation of the container to its intended destination, whereafter the container is opened at the delivery destination on the basis of a code, by deactivating the alarm system at said destination with the aid of a key but allows the container 1 to be opened without activation of the destruction agent and therewith without the destruction of the container contents. The container can then be emptied and reloaded with further objects or documents and so on.
- FIG. 1 Also shown in FIG. 1 is a first key/primary key 10 which is designed to enable the mobile container 1 to be deactivated and/or opened in combination with a secondary key 20 .
- the primary key 10 is encapsulated in an outer casing 11 which is provided with an alarm system that enables all types of unauthorised manipulation of the casing, such as an attempt to make a hole or to open the casing, to be indicated.
- the key casing 11 includes a second electronic unit 12 and possibly also a source of electric current.
- the primary key 10 may also include an operating button 13 .
- the key 10 also includes means 14 whereby the electronic unit 12 is able to communicate with the electronic unit 2 in the container 1 when necessary, for instance via electromagnetic waves (e. g. infrared light, so-called IR light).
- electromagnetic waves e. g. infrared light, so-called IR light
- the container 1 also includes means 3 , which enable the electronic unit 2 to communicate with the electronic unit 12 of the primary key 10 when necessary, for instance via electromagnetic waves (e. g. infrared light, so-called IR light).
- electromagnetic waves e. g. infrared light, so-called IR light
- the communication between the electronic unit 12 of the primary key 10 and the electronic unit 2 of the container 1 is illustrated by a double arrow 50 .
- the aforesaid communication may be a wireless communication, a range limited communication and based on IR light. Communication can also be achieved by means of a temporary male-female connection between concerned electronic units.
- a second key/secondary key 20 which is designed to enable the mobile container 1 to be deactivated and/or opened in combination with a primary key 10 .
- the illustrated secondary key 20 is encapsulated in an outer casing 21 which is equipped with an alarm system so that any type of unauthorised manipulation of the casing, such as an attempt to perforate the same or to open the same, can be indicated.
- Located in the key casing or encapsulation 21 is a third electronic unit 22 and also possibly a source of electric current. An attempt to perforate or to open the outer encapsulation 21 will result in the destruction of the code contained by the secondary key 20 .
- the secondary key 20 may also be provided with an operating button 23 , as shown.
- the electronic unit 22 of the secondary key 20 can be loaded with codes and possibly other information through the medium of an electric socket to which programming equipment can be connected temporarily.
- the key 20 also includes means which enable the electronic unit 22 to communicate with the electronic unit 2 of the container 1 , either directly or via the primary key 10 , for example with the aid of electromagnetic waves (e. g. infrared light, so-called IR light) or a temporary electrical power connection.
- electromagnetic waves e. g. infrared light, so-called IR light
- the secondary key 20 includes means for communicating with the primary key 10 .
- These communications means may consist of one or more electric conductors 28 which can be connected temporarily to the primary key 10 via a connection point 30 .
- the conductor/conductors 28 may also transmit operating current to the key 20 from the electric power source of the key 10 , thereby obviating the need to provide the key 20 with its own power source.
- the modus operandi of the inventive method is, in principle, as follows. Let us assume that a complete code-set ABCD is required to initiate deactivation and/or opening of the transportable security container 1 . Because the electronic unit 12 of the primary key 10 contains a first code subset corresponding to codes AB, for instance, and because the electronic unit 22 of the secondary key 20 contains a second code subset corresponding to codes CD, for instance, the two keys 10 and 20 will together contain the full code ABCD required to initiate deactivation and/or opening of the transportable container 1 . Thus, both the primary key 10 and the secondary key 20 must be used simultaneously in order to enable the container 1 to be deactivated and/or lawfully opened.
- the container can only be deactivated and/or opened at specified destinations or geographical positions where an accepted secondary key 20 is kept. Because the primary key 10 contains solely the code subset AB when separate from the secondary key, the loss of the primary key 10 will not constitute a risk that unlawful access to the valuable contents of the container/case can be obtained solely by means of the key 10 .
- access to the container contents can only be achieved at the geographical positions at which the secondary key 20 is kept, at the same time as this destination is visited by a transportation responsible person in charge of the container 1 and the primary key 10 .
- the primary key 10 may be transported separately.
- communication between the primary key 10 and the secondary key 20 may be a wireless and range limited communication, if so desired.
- the secondary key 20 may be loaded with its code subset CD at a central station prior to separate distribution of said second key to its intended destination/place of use.
- the two keys 10 and 20 When the two keys 10 and 20 are coupled physically together with the container 1 in conjunction with deactivating and/or opening said container, the two keys may be supplied with electric current from the power source of container 1 if so desired.
- the keys 10 and 20 may operate in series and/or in parallel.
- a container 1 which is deactivated/opened by the code ABCD at destination/position 110 , and which can be deactivated/opened by the code ABEF at the destination/position 120 , and which can be DEACTIVATED/OPENED by the code ABGH at the destination/position 130 .
- a secondary key 20 is pre-distributed with the code subset CD in respect of the geographic position 110 , a secondary key 20 is loaded with the code subset EF in respect of the geographic position 120 , and a secondary key 20 is loaded with the code subset GH in respect of the geographic position 130 , said secondary keys 20 being kept by authorised persons in a secure manner.
- the electronic unit 2 of the container 1 is programmed for the transportation route concerned prior to transportation of the container from the central station 200 by means of a transport vehicle 300 , for instance.
- the full code set provided by the keys 10 and 20 in combination enable the container 1 to be deactivated/opened, provided that the container and/or said vehicle 300 arrive at the correct destination within a permitted time interval.
- the position of the container 1 and/or the vehicle 300 can be monitored, for instance, by means of a mobile telecommunications network, GPS, or by some other appropriate position indicating method. This enables route deviations and/or time deviations to be established and remedied.
- the level of security can be further heightened by successively informing the person transporting the container of the identity of one single collection station/delivery station at a time, so that solely one nearby interval (a given route selection interval) of the total transportation distance will be known to said person.
- Security can also be heightened by limitation of time windows, geographic windows, maximum permitted route deviations, and so on.
- the present invention may be supplemented with so-called real time protection, with which the container can only be opened at an intended delivery station during a specific time interval or time window.
- the security requirement may, of course, be adapted to correspond to risk assessments, and time requirements and position requirements may be excluded at times.
- the vehicle 300 leaves the central station 200 and delivers/collects at the geographic position 110 after travelling a route section 101 , wherewith the container 1 can be opened/deactivated by means of the vehicle-carried primary key 10 containing the code subset AB in co-action with a position-stored secondary key 20 containing the code subset CD, wherewith the container 1 can be emptied and/or loaded with valuable objects, whereafter the container is shut and its alarm system activated.
- Transportation then continues along route section 102 to the geographic position 120 , wherewith the container 1 is OPENED/DEACTIVATED by means of the vehicle-carried primary key 10 containing the code subset AB in co-action with the secondary key 20 containing the code subset EF and stored at position 120 .
- the container 1 is again closed and its alarm system activated for continued transportation along route section 103 to the geographic position 130 , wherewith the delivery/collection sequence is repeated by DEACTIVATING/OPENING the container 1 with the aid of the vehicle-carried primary key 10 containing the code subset AB in conjunction with the secondary key 20 containing the code subset GH and stored at the position 130 .
- the container 1 is closed and its alarm system activated, whereafter transportation is continued along a route section 104 to the central station 200 , and so on.
- the primary key 10 is programmed at the security central station 200 in respect of the customer or customers to be visited along a transportation route, wherewith the primary key 10 will normally contain a customer-specific code subset which is tied, for instance, to customer-destination security container 1 . If several customers are to be visited along one and the same transportation route, a second customer may be allocated a second security container 1 co-acting with a second primary key that has a customer-specific code subset, and so on.
- Respective security containers 1 thus have one single primary key that always contains the same code subset and therefore does not normally need to be reprogrammed between, for instance, mutually different transportation tasks for one and the same customer, therewith greatly facilitating handling and administration.
- a robbery carried out during transportation of the container will never be successful in opening the container without activating the alarm system, since only one code subset is found in the primary key 10 accompanying the transport vehicle.
- Lost secondary keys 20 can be blocked and replaced with another secondary key that contains a different code subset, and so on.
- the primary key may include GPS equipment for acceptance of opening destinations.
- the secondary key may consist of a memory card or board, a memory wire (e. g. a so-called 1-WIRE from Maxim Integrated Products) or some other memory device which, in use, is docked with or coupled temporarily to the primary key.
- a secondary key does not require its own current supply.
- the serial number or manufacturing number of the secondary key may, in this case, consist of the code subset CD, etc.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
- Details Of Rigid Or Semi-Rigid Containers (AREA)
- Control And Other Processes For Unpacking Of Materials (AREA)
- Load-Engaging Elements For Cranes (AREA)
- Crystals, And After-Treatments Of Crystals (AREA)
- Purses, Travelling Bags, Baskets, Or Suitcases (AREA)
Abstract
The present invention relates to a method or process concerning the transportation of an alarmed container (1), particularly with regard to the transportation of valuable objects or valuable documents. The container (1) includes a first electronic unit (2) which functions to accept and permit deactivation and/or opening of the container, wherein the container is opened with the aid of a primary key (10) which includes a second electronic unit (12) that communicates with the first electronic unit (2) in respect of initiating opening of the container. The primary key (10) accompanies a person transporting the container (1) and the container is opened and/or its alarm system deactivated at its destination, with the aid of a code subset (AB) from the person-carried primary key (10) in co-action with a code subset (CD) obtained from a destination-located secondary key (20), therewith providing a total code-set (ABCD) required for initiating opening/deactivation of the container. When a transportation route (100) includes a number of delivery destinations/collection destinations (110, 120, 130), the secondary keys (20) having mutually varying code subsets are placed at said destinations, wherewith the aforesaid person-carried primary key (10) enables the container to be opened/deactivated in co-action with code subsets (CD, EF, GH) obtained from respective secondary keys (20) at respective destinations (110, 120, 130) over a chosen transportation route (100), for instance.
Description
- The present invention relates to a method concerning the transportation of an alarmed container in accordance with the preamble of the accompanying
Claim 1. The invention also relates to an arrangement. - Containers or so-called security bags or cases used for the transportation of valuable objects or valuable documents, for instance, require the addition of a code-based opening procedure of a high security level.
- Unfortunately, it is possible that a key by means of which the alarm system of the transportable container can be deactivated and/or the container opened will be stolen or come into wrong hands so that the alarm can be deactivated and/or the container opened at a geographical position other than that intended.
- SE 0200169-1 teaches a solution to this problem that functions very efficiently in respect of fixed and regular delivery destinations.
- However, the container may be collected and delivered along different temporary transportation routes, making it sometimes impossible to use a stationary, anchored second key (customer key/secondary key). It is also desired to be able to block the use of a lost customer key when considered necessary, without remaining customers along the transportation route being affected by the block, while, at the same time, obviating the need to change the coding of a first key (primary key) for this reason.
- Accordingly, an object of the present invention is to provide a highly attractive and secure method or process that will, for instance, ensure that deactivation of the alarm system and/or the opening of a mobile/transportable container will be effected at the correct position along a transportation route. This object is achieved with the method having the characteristic features set forth in the accompanying Claims.
- Among those advantages afforded by the present invention can be mentioned that said method provides a very high security level and also economic advantages. Even though an unauthorised person should obtain access to a customer key/secondary key, deactivation and/or opening of the mobile container can be prevented, for example, by remote blocking of the relevant customer key. This will prevent effectively so-called insider crime, meaning that a lost key will not constitute a security risk. The primary key can still be used as normal.
- The invention will now be described in more detail by way of example and with reference to the accompanying drawing, in which
FIG. 1 is a schematic perspective view of a primary key, a secondary key and a transportable container in the form of a security bag or case; andFIG. 2 is a schematic illustration of a transportation route between a central station and three different destinations. - The
transportation container 1 illustrated inFIG. 1 exemplifies a salable storage space that can be opened and/or its alarm system deactivated via the action of a code. The illustratedtransportation container 1 forms a security container/security cassette whose outer casing is equipped with an alarm system such that any attempt to make a hole in the casing or to bend the casing apart or any other irregular attempt to open the casing can be indicated. Located in thecontainer 1 is a firstelectronic unit 2 and its requisite power source. Theelectronic unit 2 is designed to activate a destruction agent or the like in the container immediately a signal current circuit/alarm current circuit is broken, for instance, so as to destroy or bring influence to bear on the valuable contents of the container storage space at that moment in time. Activation and deactivation of the alarm electric circuit/alarm system and the electronic unit is effected by means of a suitable high security code system. The aforedescribedtransportation container 1 may be used for the transportation of valuable objects between different places/destinations, wherewith after having placed valuable objects in the container, such as banknotes, documents, computer disks, etc., thecontainer 1 is closed and the alarm system activated prior to transportation of the container to its intended destination, whereafter the container is opened at the delivery destination on the basis of a code, by deactivating the alarm system at said destination with the aid of a key but allows thecontainer 1 to be opened without activation of the destruction agent and therewith without the destruction of the container contents. The container can then be emptied and reloaded with further objects or documents and so on. - Also shown in
FIG. 1 is a first key/primary key 10 which is designed to enable themobile container 1 to be deactivated and/or opened in combination with asecondary key 20. Theprimary key 10 is encapsulated in anouter casing 11 which is provided with an alarm system that enables all types of unauthorised manipulation of the casing, such as an attempt to make a hole or to open the casing, to be indicated. Thekey casing 11 includes a secondelectronic unit 12 and possibly also a source of electric current. - Any attempt to force a hole in the casing or to open said
casing 11 will result in the destruction of the code content of theprimary key 10. Theprimary key 10 may also include anoperating button 13. - In order to enable the
electronic unit 12 of theprimary key 10 to be loaded with codes and possibly other information, there is provided an electric socket to which programming equipment can be connected temporarily. Thekey 10 also includes means 14 whereby theelectronic unit 12 is able to communicate with theelectronic unit 2 in thecontainer 1 when necessary, for instance via electromagnetic waves (e. g. infrared light, so-called IR light). - To enable the
electronic unit 2 of thecontainer 1 to be loaded with codes and possibly other information, there is provided an electric socket to which programming equipment may be connected temporarily. Thecontainer 1 also includesmeans 3, which enable theelectronic unit 2 to communicate with theelectronic unit 12 of theprimary key 10 when necessary, for instance via electromagnetic waves (e. g. infrared light, so-called IR light). - The communication between the
electronic unit 12 of theprimary key 10 and theelectronic unit 2 of thecontainer 1 is illustrated by adouble arrow 50. The aforesaid communication may be a wireless communication, a range limited communication and based on IR light. Communication can also be achieved by means of a temporary male-female connection between concerned electronic units. - Also shown in
FIG. 1 is a second key/secondary key 20 which is designed to enable themobile container 1 to be deactivated and/or opened in combination with aprimary key 10. The illustratedsecondary key 20 is encapsulated in anouter casing 21 which is equipped with an alarm system so that any type of unauthorised manipulation of the casing, such as an attempt to perforate the same or to open the same, can be indicated. Located in the key casing orencapsulation 21 is a thirdelectronic unit 22 and also possibly a source of electric current. An attempt to perforate or to open theouter encapsulation 21 will result in the destruction of the code contained by thesecondary key 20. Thesecondary key 20 may also be provided with anoperating button 23, as shown. - The
electronic unit 22 of thesecondary key 20 can be loaded with codes and possibly other information through the medium of an electric socket to which programming equipment can be connected temporarily. Thekey 20 also includes means which enable theelectronic unit 22 to communicate with theelectronic unit 2 of thecontainer 1, either directly or via theprimary key 10, for example with the aid of electromagnetic waves (e. g. infrared light, so-called IR light) or a temporary electrical power connection. - The
secondary key 20 includes means for communicating with theprimary key 10. These communications means may consist of one or moreelectric conductors 28 which can be connected temporarily to theprimary key 10 via aconnection point 30. In addition to code communication between thekey 10 and thekey 20, the conductor/conductors 28 may also transmit operating current to thekey 20 from the electric power source of thekey 10, thereby obviating the need to provide thekey 20 with its own power source. - The modus operandi of the inventive method is, in principle, as follows. Let us assume that a complete code-set ABCD is required to initiate deactivation and/or opening of the
transportable security container 1. Because theelectronic unit 12 of theprimary key 10 contains a first code subset corresponding to codes AB, for instance, and because theelectronic unit 22 of thesecondary key 20 contains a second code subset corresponding to codes CD, for instance, the twokeys transportable container 1. Thus, both theprimary key 10 and thesecondary key 20 must be used simultaneously in order to enable thecontainer 1 to be deactivated and/or lawfully opened. It is thus necessary to obtain a code interplay and/or dialog-like communication between thekeys secondary key 20 is kept. Because theprimary key 10 contains solely the code subset AB when separate from the secondary key, the loss of theprimary key 10 will not constitute a risk that unlawful access to the valuable contents of the container/case can be obtained solely by means of thekey 10. - Thus, access to the container contents can only be achieved at the geographical positions at which the
secondary key 20 is kept, at the same time as this destination is visited by a transportation responsible person in charge of thecontainer 1 and theprimary key 10. When necessary, theprimary key 10 may be transported separately. - It will be understood that communication between the
primary key 10 and thesecondary key 20 may be a wireless and range limited communication, if so desired. For example, thesecondary key 20 may be loaded with its code subset CD at a central station prior to separate distribution of said second key to its intended destination/place of use. - It will also be understood that communication between the
keys bag 1 may be highly advanced, involving a number of reciprocal code interchanges and code conversions. A central feature of the invention, however, is that thekeys container 1. - When the two
keys container 1 in conjunction with deactivating and/or opening said container, the two keys may be supplied with electric current from the power source ofcontainer 1 if so desired. - It will be understood that many variations are possible within the scope of the invention with regard to the structural design and code contents of the
keys keys - In the case of a
transportation route 100 according toFIG. 2 that includes, for instance, atransportation centre 200 and three depositing stations and/orcollection stations container 1 which is deactivated/opened by the code ABCD at destination/position 110, and which can be deactivated/opened by the code ABEF at the destination/position 120, and which can be DEACTIVATED/OPENED by the code ABGH at the destination/position 130. In this regard, asecondary key 20 is pre-distributed with the code subset CD in respect of thegeographic position 110, asecondary key 20 is loaded with the code subset EF in respect of thegeographic position 120, and asecondary key 20 is loaded with the code subset GH in respect of thegeographic position 130, saidsecondary keys 20 being kept by authorised persons in a secure manner. - The
electronic unit 2 of thecontainer 1 is programmed for the transportation route concerned prior to transportation of the container from thecentral station 200 by means of atransport vehicle 300, for instance. The full code set provided by thekeys container 1 to be deactivated/opened, provided that the container and/or saidvehicle 300 arrive at the correct destination within a permitted time interval. The position of thecontainer 1 and/or thevehicle 300 can be monitored, for instance, by means of a mobile telecommunications network, GPS, or by some other appropriate position indicating method. This enables route deviations and/or time deviations to be established and remedied. - The level of security can be further heightened by successively informing the person transporting the container of the identity of one single collection station/delivery station at a time, so that solely one nearby interval (a given route selection interval) of the total transportation distance will be known to said person.
- Security can also be heightened by limitation of time windows, geographic windows, maximum permitted route deviations, and so on.
- The choice of roads/routes and route patterns may, of course, be varied from time to time, etc. Such measures can be taken in order to make so-called insider crime more difficult to carry out.
- For example, in order to further heighten the security level against robbery, for instance, the present invention may be supplemented with so-called real time protection, with which the container can only be opened at an intended delivery station during a specific time interval or time window. The security requirement may, of course, be adapted to correspond to risk assessments, and time requirements and position requirements may be excluded at times.
- In the case of the transportation route exemplified in
FIG. 2 , thevehicle 300 leaves thecentral station 200 and delivers/collects at thegeographic position 110 after travelling aroute section 101, wherewith thecontainer 1 can be opened/deactivated by means of the vehicle-carriedprimary key 10 containing the code subset AB in co-action with a position-stored secondary key 20 containing the code subset CD, wherewith thecontainer 1 can be emptied and/or loaded with valuable objects, whereafter the container is shut and its alarm system activated. Transportation then continues alongroute section 102 to thegeographic position 120, wherewith thecontainer 1 is OPENED/DEACTIVATED by means of the vehicle-carriedprimary key 10 containing the code subset AB in co-action with the secondary key 20 containing the code subset EF and stored atposition 120. Upon completion of the work required, thecontainer 1 is again closed and its alarm system activated for continued transportation alongroute section 103 to thegeographic position 130, wherewith the delivery/collection sequence is repeated by DEACTIVATING/OPENING thecontainer 1 with the aid of the vehicle-carriedprimary key 10 containing the code subset AB in conjunction with the secondary key 20 containing the code subset GH and stored at theposition 130. Upon completion of the work involved, thecontainer 1 is closed and its alarm system activated, whereafter transportation is continued along aroute section 104 to thecentral station 200, and so on. - In the case of the illustrated embodiment, the
primary key 10 is programmed at the securitycentral station 200 in respect of the customer or customers to be visited along a transportation route, wherewith theprimary key 10 will normally contain a customer-specific code subset which is tied, for instance, to customer-destination security container 1. If several customers are to be visited along one and the same transportation route, a second customer may be allocated asecond security container 1 co-acting with a second primary key that has a customer-specific code subset, and so on. -
Respective security containers 1 thus have one single primary key that always contains the same code subset and therefore does not normally need to be reprogrammed between, for instance, mutually different transportation tasks for one and the same customer, therewith greatly facilitating handling and administration. A robbery carried out during transportation of the container will never be successful in opening the container without activating the alarm system, since only one code subset is found in theprimary key 10 accompanying the transport vehicle. Lostsecondary keys 20 can be blocked and replaced with another secondary key that contains a different code subset, and so on. - It will be seen that the physical construction of the primary key and the secondary key/secondary keys can be varied widely within the scope of the invention.
- For example, the primary key may include GPS equipment for acceptance of opening destinations.
- In a simple form, the secondary key may consist of a memory card or board, a memory wire (e. g. a so-called 1-WIRE from Maxim Integrated Products) or some other memory device which, in use, is docked with or coupled temporarily to the primary key. Such a secondary key does not require its own current supply. The serial number or manufacturing number of the secondary key may, in this case, consist of the code subset CD, etc.
- As will be understood, it lies within the scope of the invention to give the primary key a simple construction and to place the complexity and/or the intelligence in the secondary key or keys.
- It will thus be understood that many variations are possible within the scope of the present invention.
Claims (20)
1. A method pertaining to the transportation of an alarmed container, particularly with respect to the transportion of valuable objects or valuable documents for instance, wherein the container (1) includes a first electronic unit (2) which can function to accept and permit deactivation and/or opening of the container, and wherein a primary key (10) by means of which the container can be opened includes a second electronic unit (12) for communication with the first electronic unit (2) so as to initiate opening of the container, characterised in that a person transporting the container (1) carries the primary key (10), wherein opening and/or deactivation of the container (1) at an intended destination is effected with the aid of a code subset (AB) from said person-carried primary key (10) in co-action with a code subset (CD) from a secondary key (20) located at said intended destination, said co-action providing a complete code-set (ABCD) for initialising opening/deactivation of said container.
2. A method according to claim 1 , characterised in that the secondary key (20) includes a third electronic unit (22) that contains a subset (CD) of the complete code-set (ABCD) required to initiate deactivation and/or opening of the container (1).
3. A method according to claim 1 , characterised in that in the case of a transportation route (100) that includes a number of delivery destinations/collecting destinations (110, 120, 130) there is placed at said destinations secondary keys (20) that have mutually varying code subsets; and that said person-carried primary key (10) in co-action with code subsets (CE, EF, GH) from respective secondary keys (20) enables the container to be opened/deactivated at respective destination places (110, 120, 130) along a transportation route (100), for instance.
4. A method according to claim 1 , characterised in that opening/deactivation of the container in respect of a given destination (110, 120, 130) is limited to a given time interval.
5. A method according to claim 1 characterised in that opening/deactivation of a container in respect of a given destination (110, 120, 130) is limited to a limited geographical area.
6. A method according to claim 1 , characterised by blocking a lost primary key (10) and replacing the lost key with a new primary key (10) containing a new code subset, and by modifying the opening code/deactivation code of the container (1) at the same time.
7. A method according to claim 1 , characterised by blocking a lost secondary key (20) and replacing said lost key with a new secondary key (20) that contains a new code subset, and by modifying the opening code/deactivaation code-set of the container (1) at the same time.
8. An arrangement for carrying out the method according to claim 1 , characterised in that the arrangement comprises a primary key (10) that includes an electronic unit (12) in which said code-subset is stored; and in that said electronic unit (12) is encapsulated in a first casing (11).
9. An arrangement according to claim 8 , characterised in that said arrangement further comprises a secondary key (20) which includes an electronic unit (22) or a memory unit for storing a code subset; and in that said electronic unit (22) or memory unit is encapsulated in a second casing (21).
10. An arrangement according to claim 8 , characterised in that the arrangement comprises a secondary key (20) that includes a memory unit in the form, e.g., of a memory card or a wire memory for storage of relevant code subsets, wherein e.g. the serial number of said memory unit constitutes a relevant code subset (CD, EF, GH, etc.).
11. The use of a primary key (10) and a number of secondary keys (20) in accordance with claim 1 characterised in that the keys (10, 20) are used in conjunction with security transport to different geographical destinations.
12. A method according to claim 2 , characterised in that in the case of a transportation route (100) that includes a number of delivery destinations/collecting destinations (110, 120, 130) there is placed at said destinations secondary keys (20) that have mutually varying code subsets; and that said person-carried primary key (10) in co-action with code subsets (CE, EF, GH) from respective secondary keys (20) enables the container to be opened/deactivated at respective destination places (110, 120, 130) along a transportation route (100), for instance.
13. An arrangement according to claim 9 , characterised in that the arrangement comprises a secondary key (20) that includes a memory unit in the form, e.g., of a memory card or a wire memory for storage of relevant code subsets, wherein e.g. the serial number of said memory unit constitutes a relevant code subset (CD, EF, GH, etc.).
14. An arrangement for carrying out the method according to claim 2 , characterised in that the arrangement comprises a primary key (10) that includes an electronic unit (12) in which said code-subset is stored; and in that said electronic unit (12) is encapsulated in a first casing (11).
15. An arrangement for carrying out the method according to claim 3 , characterised in that the arrangement comprises a primary key (10) that includes an electronic unit (12) in which said code-subset is stored; and in that said electronic unit (12) is encapsulated in a first casing (11).
16. An arrangement for carrying out the method according to claim 4 , characterised in that the arrangement comprises a primary key (10) that includes an electronic unit (12) in which said code-subset is stored; and in that said electronic unit (12) is encapsulated in a first casing (11).
17. An arrangement for carrying out the method according to claim 5 , characterised in that the arrangement comprises a primary key (10) that includes an electronic unit (12) in which said code-subset is stored; and in that said electronic unit (12) is encapsulated in a first casing (11).
18. The use of a primary key (10) and a number of secondary keys (20) in accordance with claim 2 , characterised in that the keys (10, 20) are used in conjunction with security transport to different geographical destinations.
19. The use of a primary key (10) and a number of secondary keys (20) in accordance with claims 3, characterised in that the keys (10, 20) are used in conjunction with security transport to different geographical destinations.
20. The use of a primary key (10) and a number of secondary keys (20) in accordance with claim 4 , characterised in that the keys (10, 20) are used in conjunction with security transport to different geographical destinations.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0200169-1 | 2002-01-22 | ||
SE0200169A SE520944C2 (en) | 2002-01-22 | 2002-01-22 | Method of opening a transportable container and apparatus for carrying out the method |
PCT/SE2003/000104 WO2003062577A1 (en) | 2002-01-22 | 2003-01-22 | Method for transporting an alarmed container |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050225432A1 true US20050225432A1 (en) | 2005-10-13 |
Family
ID=20286723
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/502,020 Abandoned US20050225432A1 (en) | 2002-01-22 | 2003-01-22 | Method for transporting an alarmed container |
US10/502,018 Expired - Fee Related US8193907B2 (en) | 2002-01-22 | 2003-01-22 | Method for opening a transportable container |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/502,018 Expired - Fee Related US8193907B2 (en) | 2002-01-22 | 2003-01-22 | Method for opening a transportable container |
Country Status (12)
Country | Link |
---|---|
US (2) | US20050225432A1 (en) |
EP (2) | EP1474584A1 (en) |
JP (2) | JP4520152B2 (en) |
CN (2) | CN100564787C (en) |
AT (1) | ATE349596T1 (en) |
BR (2) | BR0307068B1 (en) |
DE (1) | DE60310684T2 (en) |
DK (1) | DK1474585T3 (en) |
ES (1) | ES2279955T3 (en) |
RU (2) | RU2343262C2 (en) |
SE (1) | SE520944C2 (en) |
WO (2) | WO2003062577A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007106584A2 (en) * | 2006-03-15 | 2007-09-20 | Angel Secure Networks, Inc. | Secure panel with remotely controlled embedded devices |
US20070229285A1 (en) * | 2006-03-15 | 2007-10-04 | Angel Secure Networks, Inc. | Secure panel with remotely controlled embedded devices |
US8344885B2 (en) | 2008-01-22 | 2013-01-01 | Angel Secure Networks Inc. | Container with interior enclosure of composite material having embedded security element |
US8952780B2 (en) | 2011-05-05 | 2015-02-10 | ShadowTrack 247, LLC | Security case |
US9355228B2 (en) | 2012-07-13 | 2016-05-31 | Angel Secure Networks, Inc. | System and method for policy driven protection of remote computing environments |
US9390280B2 (en) | 2012-09-16 | 2016-07-12 | Angel Secure Networks, Inc. | System and method for obtaining keys to access protected information |
US9928387B2 (en) | 2013-03-15 | 2018-03-27 | Charles Hallinan | Security case |
US10553133B2 (en) * | 2015-12-08 | 2020-02-04 | Harting It Software Development Gmbh & Co,. Kg | Apparatus and method for monitoring the manipulation of a transportable object |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2872613B1 (en) * | 2004-06-30 | 2007-03-30 | Axytrans Sa | METHOD OF SECURELY TRANSPORTING DOCUMENTS OR OBJECTS OF VALUES AND CAISSETTE USABLE IN THE IMPLEMENTATION OF SAID METHOD |
EP1832355A4 (en) * | 2004-12-27 | 2008-07-23 | Orient Instr Comp Co Ltd | Method for discarding data recording medium |
GB2462831A (en) * | 2008-08-20 | 2010-02-24 | Robert Charles Maurice Watson | Secure container with spoiler system delay timer running during transit |
BE1018379A3 (en) * | 2008-12-04 | 2010-09-07 | Catteeuw Kurt | SECURE STORAGE SYSTEM. |
DE102010016808A1 (en) * | 2010-05-05 | 2011-11-10 | Wincor Nixdorf International Gmbh | Device for transporting and / or storing notes of value |
AU2013358877B2 (en) * | 2012-12-14 | 2017-08-17 | Andrew HAMRA | Latch and carry detachable messenger bag and shoulder strap assembly for personal electronic devices |
US10204465B2 (en) * | 2014-06-30 | 2019-02-12 | Ebay Inc. | Handshake authenticated coded locked container |
RU2016149640A (en) * | 2016-12-19 | 2018-06-20 | Яков Васильевич Глущенко | Method (options) and system (options) of organization, implementation and control of freight |
RU182977U1 (en) * | 2018-03-26 | 2018-09-06 | Александр Анатольевич Булавкин | STORAGE FOR TRANSPORTATION OF INFORMATION CARRIERS WITH LIMITED ACCESS OR CASH EQUIPMENT, EQUIPPED WITH AN UNAUTHORIZED ACCESS CONTROL OF THE SHELL INTEGRITY |
CN109610976A (en) * | 2018-12-27 | 2019-04-12 | 苏州浪潮智能软件有限公司 | A kind of guard method of split type cash side cabinet |
CN110718005B (en) * | 2019-09-30 | 2021-12-21 | 浙江大搜车软件技术有限公司 | Garage key management method and device, server and readable storage medium |
US20220398884A1 (en) * | 2021-06-09 | 2022-12-15 | Ashten Gilliard | Retail Point of Sale Security System |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4567741A (en) * | 1983-02-14 | 1986-02-04 | Trempala Dohn J | Safety key holder |
US4649833A (en) * | 1983-06-30 | 1987-03-17 | Cummins Peter S B | Security system for safes |
US4750197A (en) * | 1986-11-10 | 1988-06-07 | Denekamp Mark L | Integrated cargo security system |
US4851652A (en) * | 1988-04-20 | 1989-07-25 | Datatrak, Inc. | Electronic lock box, access card, system and method |
US4884507A (en) * | 1988-11-21 | 1989-12-05 | Levy Isy R | Security container |
US5164718A (en) * | 1987-09-30 | 1992-11-17 | Global Security Ab | Separate lock and unlock codes for a security box |
US5701828A (en) * | 1994-09-14 | 1997-12-30 | Diebold, Incorporated | Electronic security system |
US5705991A (en) * | 1992-01-09 | 1998-01-06 | Supra Products, Inc. | Access control device featuring key ordering or key simultaneity |
US6384709B2 (en) * | 1997-05-30 | 2002-05-07 | Intellikey Corporation | Access control system for mobile platform using electronic key-embedded location verification data |
US6538557B1 (en) * | 1998-03-19 | 2003-03-25 | Siemens Aktiengesellschaft | Device and method for securing a motor vehicle against unauthorized use |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3654880A (en) * | 1970-11-10 | 1972-04-11 | Leroy R Schesso | Portable safe |
US4236463A (en) * | 1979-05-14 | 1980-12-02 | Westcott Randy L | Tamper proof case for the protection of sensitive papers |
SE460734B (en) * | 1985-11-08 | 1989-11-13 | Folke Sigholm | DEVICE FOR STORAGE AND TRANSPORT OF VALUE OBJECTS AND OPENING DEVICE FOR THIS |
JPH01213796A (en) * | 1988-02-22 | 1989-08-28 | Nec Corp | Damage detector for maintenance system, its keeping means, alarm system, transportation means and keeping means |
DE3929122A1 (en) * | 1989-09-01 | 1991-03-07 | Morgenroth Gerhard Dipl Kaufm | LOCKABLE CASE |
JPH07180409A (en) * | 1993-12-24 | 1995-07-18 | Wanbishi Aakaibuzu:Kk | Article storage box |
FR2751111B1 (en) * | 1996-07-10 | 1998-10-09 | Axytrans | SYSTEM FOR SECURE TRANSPORT OF OBJECTS IN TAMPER-PROOF CONTAINERS OF WHICH AT LEAST ONE DESTINATION STATION IS MOBILE AND TRANSPORTABLE |
FR2764690B1 (en) * | 1997-06-11 | 1999-09-03 | Val Protect Sa | DETONATOR FOR MOUNTING IN AN ENCLOSURE AND SECURITY CONTAINER COMPRISING SAME |
JP2001028080A (en) * | 1999-07-15 | 2001-01-30 | Fujitsu Ltd | System and method for prevention against cash cassette theft |
FR2804994B1 (en) * | 2000-02-16 | 2003-06-27 | Cpr Billets | DEVICE AND METHOD FOR SECURE TRANSPORT OF AN OBJECT |
JP2001234656A (en) * | 2000-02-22 | 2001-08-31 | Yuuseidaijin | Case having locking device |
JP3769664B2 (en) * | 2000-06-08 | 2006-04-26 | 有限会社モモンガー | Locking lock and distribution box with security lock mechanism using it |
US7212098B1 (en) * | 2000-09-21 | 2007-05-01 | Myspace, Llc | Portable security container |
-
2002
- 2002-01-22 SE SE0200169A patent/SE520944C2/en unknown
-
2003
- 2003-01-22 DE DE2003610684 patent/DE60310684T2/en not_active Expired - Lifetime
- 2003-01-22 WO PCT/SE2003/000104 patent/WO2003062577A1/en active Application Filing
- 2003-01-22 ES ES03734928T patent/ES2279955T3/en not_active Expired - Lifetime
- 2003-01-22 US US10/502,020 patent/US20050225432A1/en not_active Abandoned
- 2003-01-22 AT AT03734928T patent/ATE349596T1/en active
- 2003-01-22 EP EP03705577A patent/EP1474584A1/en not_active Withdrawn
- 2003-01-22 CN CNB038025736A patent/CN100564787C/en not_active Expired - Fee Related
- 2003-01-22 BR BR0307068A patent/BR0307068B1/en not_active IP Right Cessation
- 2003-01-22 JP JP2003564379A patent/JP4520152B2/en not_active Expired - Fee Related
- 2003-01-22 JP JP2003562430A patent/JP4426847B2/en not_active Expired - Fee Related
- 2003-01-22 BR BR0307064A patent/BR0307064B1/en not_active IP Right Cessation
- 2003-01-22 DK DK03734928T patent/DK1474585T3/en active
- 2003-01-22 US US10/502,018 patent/US8193907B2/en not_active Expired - Fee Related
- 2003-01-22 EP EP03734928A patent/EP1474585B1/en not_active Expired - Lifetime
- 2003-01-22 RU RU2004124245A patent/RU2343262C2/en not_active IP Right Cessation
- 2003-01-22 CN CNB038025728A patent/CN1328467C/en not_active Expired - Fee Related
- 2003-01-22 RU RU2004124246A patent/RU2306394C2/en active
- 2003-01-22 WO PCT/SE2003/000103 patent/WO2003064799A1/en active IP Right Grant
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4567741A (en) * | 1983-02-14 | 1986-02-04 | Trempala Dohn J | Safety key holder |
US4649833A (en) * | 1983-06-30 | 1987-03-17 | Cummins Peter S B | Security system for safes |
US4750197A (en) * | 1986-11-10 | 1988-06-07 | Denekamp Mark L | Integrated cargo security system |
US5164718A (en) * | 1987-09-30 | 1992-11-17 | Global Security Ab | Separate lock and unlock codes for a security box |
US4851652A (en) * | 1988-04-20 | 1989-07-25 | Datatrak, Inc. | Electronic lock box, access card, system and method |
US4884507A (en) * | 1988-11-21 | 1989-12-05 | Levy Isy R | Security container |
US5705991A (en) * | 1992-01-09 | 1998-01-06 | Supra Products, Inc. | Access control device featuring key ordering or key simultaneity |
US5701828A (en) * | 1994-09-14 | 1997-12-30 | Diebold, Incorporated | Electronic security system |
US6384709B2 (en) * | 1997-05-30 | 2002-05-07 | Intellikey Corporation | Access control system for mobile platform using electronic key-embedded location verification data |
US6538557B1 (en) * | 1998-03-19 | 2003-03-25 | Siemens Aktiengesellschaft | Device and method for securing a motor vehicle against unauthorized use |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007106584A2 (en) * | 2006-03-15 | 2007-09-20 | Angel Secure Networks, Inc. | Secure panel with remotely controlled embedded devices |
US20070229285A1 (en) * | 2006-03-15 | 2007-10-04 | Angel Secure Networks, Inc. | Secure panel with remotely controlled embedded devices |
WO2007106584A3 (en) * | 2006-03-15 | 2008-11-06 | Angel Secure Networks Inc | Secure panel with remotely controlled embedded devices |
US7576653B2 (en) * | 2006-03-15 | 2009-08-18 | Angel Secure Networks, Inc. | Secure panel with remotely controlled embedded devices |
US8344885B2 (en) | 2008-01-22 | 2013-01-01 | Angel Secure Networks Inc. | Container with interior enclosure of composite material having embedded security element |
US8917177B2 (en) | 2008-01-22 | 2014-12-23 | Angel Secure Networks, Inc. | Security structure of composite material having embedded security elements |
US8952780B2 (en) | 2011-05-05 | 2015-02-10 | ShadowTrack 247, LLC | Security case |
US20150150349A1 (en) * | 2011-05-05 | 2015-06-04 | Rollaguard Security, Llc | Security case |
US9681722B2 (en) * | 2011-05-05 | 2017-06-20 | Charles Hallinan | Security case |
US9355228B2 (en) | 2012-07-13 | 2016-05-31 | Angel Secure Networks, Inc. | System and method for policy driven protection of remote computing environments |
US9390280B2 (en) | 2012-09-16 | 2016-07-12 | Angel Secure Networks, Inc. | System and method for obtaining keys to access protected information |
US9928387B2 (en) | 2013-03-15 | 2018-03-27 | Charles Hallinan | Security case |
US10553133B2 (en) * | 2015-12-08 | 2020-02-04 | Harting It Software Development Gmbh & Co,. Kg | Apparatus and method for monitoring the manipulation of a transportable object |
Also Published As
Publication number | Publication date |
---|---|
WO2003062577A1 (en) | 2003-07-31 |
RU2343262C2 (en) | 2009-01-10 |
CN1620543A (en) | 2005-05-25 |
US20050122228A1 (en) | 2005-06-09 |
CN1328467C (en) | 2007-07-25 |
BR0307064B1 (en) | 2013-01-22 |
CN1620544A (en) | 2005-05-25 |
JP2005515337A (en) | 2005-05-26 |
DE60310684D1 (en) | 2007-02-08 |
BR0307068A (en) | 2004-12-28 |
RU2004124245A (en) | 2005-05-20 |
DE60310684T2 (en) | 2007-10-04 |
ES2279955T3 (en) | 2007-09-01 |
BR0307064A (en) | 2004-12-28 |
BR0307068B1 (en) | 2013-05-28 |
CN100564787C (en) | 2009-12-02 |
EP1474585B1 (en) | 2006-12-27 |
JP2005516137A (en) | 2005-06-02 |
JP4520152B2 (en) | 2010-08-04 |
SE0200169D0 (en) | 2002-01-22 |
US8193907B2 (en) | 2012-06-05 |
DK1474585T3 (en) | 2007-04-10 |
RU2306394C2 (en) | 2007-09-20 |
ATE349596T1 (en) | 2007-01-15 |
SE520944C2 (en) | 2003-09-16 |
JP4426847B2 (en) | 2010-03-03 |
WO2003064799A1 (en) | 2003-08-07 |
EP1474584A1 (en) | 2004-11-10 |
RU2004124246A (en) | 2005-05-27 |
EP1474585A1 (en) | 2004-11-10 |
SE0200169L (en) | 2003-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050225432A1 (en) | Method for transporting an alarmed container | |
ES2249412T3 (en) | DEVICE AND PROCEDURE OF INSURED TRANSPORTATION OF AN OBJECT. | |
EP0692599B1 (en) | A system for the secure transportation of articles | |
US5907286A (en) | Transport container and transport container managing system | |
ES2276705T3 (en) | SECURE DELIVERY OR COLLECTION SYSTEM. | |
US20180211069A1 (en) | Security case | |
US9681722B2 (en) | Security case | |
CN1611060B (en) | Radio identification system | |
US7707950B2 (en) | Multifunctional, portable security system | |
CA2405967C (en) | Method for closing and opening a container | |
GB2280056A (en) | A security container | |
US5315656A (en) | System for protecting documents or objects enclosed in a tamper-proof container | |
US20080115703A1 (en) | Security Case, Security System, And Security Complex | |
EP1961903A2 (en) | Rack for transporting valuables | |
SK38896A3 (en) | Device for taking over, transporting and storing valuables | |
WO1993016261A1 (en) | A method for transporting valuables | |
AU601212B2 (en) | Security box and security system | |
SE528559C2 (en) | Procedure for transporting an alarmed container | |
JP2825764B2 (en) | Goods safety transportation system | |
ITVR940036U1 (en) | SAFETY METHOD FOR THE DISTRIBUTION AND COLLECTION OF OBJECTS BETWEEN ONE OR MORE SORTING CENTERS AND A PLURALITY OF PERIPHERAL STATIONS | |
CZ4781U1 (en) | Device for reception, transportation and storage of valuable objects |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SQS SECURITY QUBE SYSTEM AB, SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LINDSKOG, KJELL;REEL/FRAME:016583/0381 Effective date: 20040802 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |