US20060139147A1 - Portable security container - Google Patents
Portable security container Download PDFInfo
- Publication number
- US20060139147A1 US20060139147A1 US10/524,416 US52441603A US2006139147A1 US 20060139147 A1 US20060139147 A1 US 20060139147A1 US 52441603 A US52441603 A US 52441603A US 2006139147 A1 US2006139147 A1 US 2006139147A1
- Authority
- US
- United States
- Prior art keywords
- container
- port
- host computer
- data
- container manager
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/005—Portable strong boxes, e.g. which may be fixed to a wall or the like
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/10—Safes or strong-rooms for valuables with alarm, signal or indicator
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D11/00—Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
- G07D11/10—Mechanical details
- G07D11/12—Containers for valuable papers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00761—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C2009/0092—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
Definitions
- FIGS. 12 and 13 are flowcharts that illustrate the operation of an embodiment of the present invention while the container is in an open mode
- FIG. 23 illustrates the transport of a portable container of FIG. 20 to 21 ;
- FIG. 25 is a diagram showing various methods of the operation of the invention.
- container 110 may be fitted with a visual or aural status indicator 182 such as a light-emitting diode that either flashes, is intermittently illuminated or is illuminated with different colors to indicate the status such as “no fault” or, no unauthorized movement or to indicate an unauthorized attempt to gain access to the contents of container 110 .
- a touch memory port 184 may also be fitted into container 110 to enhance security, byway of example, to enable controller 120 to obtain a thumb print or a finger print from a prospective user and compare the print obtained via touch memory port 184 with a print of the prospective user that is stored in memory 124 . Additionally, and as illustrated in FIG.
- S 126 the reader will see that the major function of choice for the user is to retrieve history or set parameters. Determination if of data coupling is described in S 500 , while S 504 describes use of serial or USB connections, while S 506 describes infrared and RF or cellular connection.
- S S 08 determines that the variable data interface of the container is of a type compatible with the coupled graphical user interface/input unit.
- S 512 indicates that the security status of the container shown on the coupled graphical user interface/input unit is secure. The determination of this condition is the present state of input switches reflecting position of the latching mechanism and the container cover as read by the micro-controller as shown in S 510 .
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
A process and security container that enable local protection and remote transportation of items found with the environment of a contemporary office, while generating a log of users who have gained access to the container. e container may be constructed with one or more sidewalls bearing a removable lid. The container may have a closed interior while the lid is in complete engagement with the sidewalls, and have an open interior able to removably receive items within the interior while the lid is dislodged from its complete engagement. A port is exposed through one of said sidewalls to receive data signals and a control stage with a non-volatile a memory, is mounted within the container and operationally coupled to a host computer to provide communication with the interior of the container via the port. A microprocessor based host computer sited externally to the container, has a keyboard initiating formation of the data signals and a monitor driven by the host computer to visually display video images. The host computer is operationally coupled to the port to participate in the communication by generating the data signals. The controller may generate a control signal and allow access to the interior of the container in response to occurrence of a coincidence between a data key received From the host computer among the data signals via the port and a data sequence obtained by the control stage in dependence upon information stored within the memory.
Description
- 1. Field of the Invention
- The present invention relates to processes and containers for controlling access to valuable items and, more particularly, to processes and systems for managing the security, access, use, siting and transportation of containers.
- 2. Background Art
- In general, the need for protection and storage of valuables, sensitive information and controlled substances has increased over the past decade, particularly with the introduction of new forms of valuable tangible property such as the higher density optical and magnetic storage media. Contemporary offices rely upon one or more security devices such as mechanical locks placed upon cabinets, safes, doors and buildings to provide physical security for the interior of the office as well as the contents distributed throughout the office during normal working hours. We have noticed however, that these approaches to office security do not provide any audit information about either the use of the security devices or about the personnel who use the devices. The need to control access as well as to provide an accurate record of personnel having access and the time of their access requires both physical and electronic security measures. In an office environment for example, items such as confidential papers, diskettes, engineering documents, and intrinsically valuable materials (such as, by way of example, gold electrical contacts) other tangible items are most conveniently left exposed upon a counter, in an insecure state, during normal working hours. Although these items may be stored in cabinets or desk drawers after hours, the degree of the security provided is poor. Office fixtures are typically only secure temporarily and, in most cases, unauthorized access cannot be detected. Efforts such as the Electronic Interlock For Storage. Assembles of E. O. Warren, U.S. Pat. No. 5,22S,825, and the Locker Unit Comprising A Plurality Of Lockers of K. Kletzmaier, et al., U.S. Pat. No. 5,219,386 are examples of recent efforts in the art to electronically control access, albeit pay access to stationary objects such as doors and safes, and to provide both physical security and audit information about the use of the security devices. Although some electronic access control systems do endeavor to provide access control and audit capabilities, others such as the Portable Authentication System of L. C. Puhl, et al., U.S. Pat. No. 5,131,038; the Electronic Lock And Key System of F. Rode, et al., U.S. Pat. No. 4,727,369, the Fast Access Electronic Locking System of J. C. Spitzer, U.S. Pat. No. 5,299,436; and the Portable Electronic Access Controlled System For parting Meters Or The Like of Paul Benezet, U.S. Pat. No. 5,278,395 do not consistently, inexpensively and reliably address the need for transportation of assets between remote locations in a secure manner. We have found that the unauthorized and undetected access to sensitive information or materials during transit, or during storage, is a concern that has not previously been adequately addressed by the art.
- It is therefore an object of the present invention to provide an improved security process and container.
- It is another object to provide a simplified security process and portable container that conforms to contemporary business office practice by securing valuable items for both storage and transportation to remote locations.
- It is yet another object to provide a security process and portable container that is readily and repeatedly usable to quickly receive, store and transport valuable items, while providing a log of the users who gain access to the container.
- It is still another object to provide a process and portable container to enhance the security of contemporary offices.
- It is still yet another object to provide a process and security container that readily conforms to habits and customs common to a contemporary business office while enabling local protection and remote transportation of items found within the environment of the contemporary office.
- It is a further object to provide a process and security container that readily conforms to habits and customs common to a broad spectrum of contemporary business offices while generating a log of users who have gained access to the container.
- It is also an object to provide processes and systems for easily and reliably managing the security, access, use, siting and transportation of containers.
- These and other objects may be attained with a process that uses a data key to control access to a portable container. The container may be constructed with a housing having one or more walls supporting either a removable lid, or other panel providing access to the interior of the container. The container has a closed interior while that panel is in engagement with one or more walls of the housing, and an open interior able to removably receive items while the panel is dislodged from its engagement with the housing. A port is accessible through one or more of the walls of the container to receive data signals, and a control stage incorporating a non volatile memory is operationally coupled to provide communication with the interior of the container via the port. The controller generates a control signal in response to the occurrence of a coincidence between a data key received via the port and a data sequence obtained by the control stage in dependence upon information stored within the memory. An electromechanical moving element is positioned to engage the lid and hinder removal of the lid from its engagement, and to respond to the control signal by releasing the lid from its engagement to allow access to the interior of the container. A host computer sited externally to the container, communicates with the controller via the port, and drives the container as a peripheral device. In response to a request for access entered via an input device such as a keyboard coupled to the host computer and transmitted by one, or more, of the ports provided by the container, the controller makes a determination of whether to grant the access requested by generating a control signal that allows the moving element lock to release the access panel on the basis of, inter alia, the disposition of the port relative to a source of the data signals, on the basis of the disposition of the container within a scheme for generation of the data signals, and in response to occurrence of a coincidence between a data key received by the controller among the data signals via the port and a data sequence obtained by the controller in dependence upon the information stored within the memory. In addition to the coincidence between the data key and memory, the physical location of the container, via GPS or other determining factors may factor in to the determination of whether to grant access. These and other objects may also be attained with the control stage being operationally coupled to provide communication with the interior of the container via the port, and generate an alarm signal in response to an unauthorized interruption of the communication via the port. An alarm is driven by the controller to broadcast an indication of the unauthorized interruption in response to the alarm signal. The alarm may be located either within the container or driven directly by a host computer that is external to the container and that absent the interruption, communicates with the controller via the port.
- It is also an object to provide processes and systems for easily and reliably docking the container and electromechanically fixing or releasing it from its docking location, with or without providing access to the interior of the container in dependence on data signals.
- A more complete appreciation of this invention, and many of the attendant advantages thereof, will be readily apparent as the same becomes better understood by reference to the following detailed description when considered in conjunction with the accompanying drawings in which like reference symbols indicate the same or similar components, wherein:
-
FIG. 1 is a block diagram of one embodiment of a container management system that may be constructed in accordance with the principles of the present invention; -
FIG. 2 is a perspective view of a portable container that may be constructed in accordance with the principles of the present invention; -
FIG. 3 illustrates the transport of a portable container between a host computer sited at an origin and a host computer sited at a destination; -
FIG. 4 illustrates a typical implementation of a host computer connected to a container during the practice of the principles of the present invention; -
FIG. 5 illustrates the implementation ofFIG. 4 , with the access panel removed to provide access to the interior of the container; -
FIG. 6 illustrates the transport of a portable container between a host computer sited at an origin connected by a network to a host computer sited at a destination of the portable container; -
FIG. 7 illustrates an alternative implementation of the principles of the present invention with a host computer directly driving peripheral components that include a biometric scanner, a card reader and a portable container; -
FIG. 8 illustrates an alternative implementation with a cellular telephone controlling access to a portable container. -
FIG. 9 is a schematic block diagram illustrating an alternative embodiment of the present invention; -
FIG. 10 is a flowchart that illustrates one mode of operation of an embodiment of the present invention; -
FIG. 11 is a flowchart that illustrates another mode of operation of an embodiment of the present invention; -
FIGS. 12 and 13 are flowcharts that illustrate the operation of an embodiment of the present invention while the container is in an open mode; and -
FIG. 14 is a flowchart that illustrates additional aspects of the operation of an embodiment of the present invention. -
FIG. 15 illustrates another embodiment of a portable container in a closed state; -
FIG. 16 a illustrates the portable container ofFIG. 15 connected to a host computer in a first accessible state; -
FIG. 16 b illustrates the portable container ofFIG. 15 in connection with a portable computer in a second accessible state; -
FIG. 17 illustrates the portable container ofFIG. 15 in a third accessible state; -
FIG. 18 illustrates the transport of the portable container ofFIG. 16 a to sites with a remote control according toFIG. 16 b andFIG. 17 , respectively. -
FIG. 19 illustrates an implementation of the portable container of FIGS. 15 to 18 in a hospital. -
FIGS. 20 a and 20 b each illustrate the current state of the art of portable container cassettes in an ATM machine, further illustrating the outside container in a closed and open state, respectively. -
FIG. 21 a illustrates the open state of the ATM ofFIG. 20 b during the removal of a portable cassette container from its use position; -
FIG. 21 b illustrates the portable container ofFIG. 21 a; -
FIG. 22 a illustrates a mechanical key for the containers ofFIG. 20 to 21; -
FIG. 22 b illustrates an alternative lead seal used to secure the containers ofFIG. 20 to 21; -
FIG. 23 illustrates the transport of a portable container ofFIG. 20 to 21; - Removal of the container from it's anchoring point and data connections by a host computer and by a handheld GUI device;
-
FIG. 24 a and 24 b each illustrate communication with the portable container ofFIG. 23 at a control point in a docking bay at the office and by handheld GUI device in field; -
FIG. 25 is a diagram showing various methods of the operation of the invention. - Turing now to the drawings,
FIGS. 1 and 2 illustrate one embodiment of a container management system that may be constructed in accordance with the principles of the present invention, with ahost computer 100 driving avideo monitor 90 to display varying visual images and symbols, and akeyboard 98 that enables a user to manually enter information and commands intocomputer 100. Adata cable 102 such as a serial cable, a parallel multi-lead cable, a small computer system interface (i.e., a SCSI) cable, a universal serial bus (i. e., a USB) cable, or one or more optical fibers, is coupled at one end into a conforming socket operationally connected to the motherboard ofcomputer 100, and terminated at the opposite end by aplug 104 that may be removably inserted into asocket 128 that is operationally coupled, by for example, aribbon cable 130 that provides a data bus, to a microprocessor basedcontroller 120. Information received by the controller fromhost computer 100 may be written into and read from anon-volatile memory 121 that is addressed bycontroller 120. Alternately,Infrared port 152 may be driven by the motherboard ofcomputer 100 to send data to and receive data frominfrared port 154 which is controlled bycontroller 120. In certainembodiments RF device 106 may send data viaantenna 108 toRF device 136 viaantenna 134.Device - A
motion sensor 170 may be mounted either uponcircuit board 122, or withincontainer 110, to provide motion signals tocontroller 120 wheneversensor 170 detects movement ofcontainer 110.Sensor 170 may be implemented with a spring loaded switch designed to provide motion signals that exhibit one logic state whencontainer 110 is stationary upon a desktop, for example, with the juxtaposition of the container and the desktop holding the actuator of the switch depressed, and a second and different logic state whencontainer 110 is lifted above the desktop and the actuator of the switch is released. Alternatively,motion sensor 170 may detect changes in inertia and provide a motion signal tocontroller 120 whenevercontainer 110 is in motion. - A location sensor such as, by way of example, a global position
satellite receiver stage 172 and itsantenna 174 mounted to extend externally tocontainer 110, may be periodically polled bycontroller 120 to furnish a relatively accurate indication of the geographic location ofcontainer 110.Controller 120 may be programmed to refuse to deny access tocontainer 110, by way of example, refusing to release an electro-mechanical latch wheneverreceiver stage 172 fails to indicate thatcontainer 110 is located at an assigned location. - As illustrated in
FIG. 2 , theportable container 110 may be constructed with one or more sidewalls 112 forming anouter casement 109 closed at one end by acontinuous bottom surface 116. Aninner casement 118 forcontainer 80 may be constructed with one or more sidewalls 84 jointed together and closed at one end by acontinuous bottom surface 82. The upper rim 86 ofcontainer 110 may be extended outward to engage the inner surfaces 88 andsidewalls 112, thereby providing a cavity 19 between the spaced apart sidewalls 84 and inner surfaces 88 that may be used to accommodate acircuit board 122,lead cable 130 andsocket 128. Anaperture 114 formed on one of thesidewalls 112 exposessocket 128 to an environment external to acontainer 110. A lid, orother panel 84 encloses both the inner and outer containers, onceinner container 118 has been inserted betweensidewalls 112 of outer container 70, and controls access to the interior ofinner casement 80 and thuscontainer 110. Whenpanel 84 completely engages thesidewalls 112 ofouter casement 109, access to the interior ofcontainer 110 may be utterly denied; whenpanel 84 is dislodged from this complete engagement however, full access may be permitted into the interior. - An electro-
mechanical latch 163 operated bycontroller 120 may be mounted withincontainer 110 to restrict removal ofaccess panel 84, and thereby preserve the unrestricted access to the contents ofcontainer 110 whilepanel 84 remains undisturbed in its complete engagement of lower container whether the contact wiper of the switch S1 component of relay R1 is opened or closed, and whether electrical current is applied to solenoid L1. In the absence of electrical current trough solenoid L1, that is, when switch S1 is in its electrically open state, aspring 167 may be used to bias thearmature 168 to extend axially outward along the central axis defined by the coil winding of solenoid L1, and engage theaperture 168 formed in a hasp 169 mounted on the underside ofpanel 84. Whencontroller 120 directs relay R1 to close switch S1 and apply an electrical current to the winding of solenoid L1, the armature of solenoid L1 is withdraw fromaperture 168, as is shown inFIG. 1 , to release hasp 169 and allow removal ofpanel 84. Optionally, inmechanical lock 162 such as a cylinder lock rotatably operated with a bitted key, may be mounted on the outer casement 70 at alocation enabling lock 162 to engagelid 84 and thereby provide an additional degree of security whenlock 162 is turned into its locked position. It should be noted that althoughcircuit board 122 is mounted upon one of theseveral sidewalls 84 of theinner casement 80, it is also feasible to mountcircuit board 122 beneathfloor 82, and betweenouter floor 116 andinner floor 82, or, alternatively, to distribute the components mounted uponcircuit board 122 into various distinct and different locations within the container, and even upon an underside ofaccess panel 84. - Nominally,
circuit board 122 may be powered directly by apower cord 50 with ajack 52 received within a socket 54 mounted uponcircuit board 122. Apower supply 56 coupled to socket 54, may be used to rectify, filter, attenuate and distribute electrical power torechargeable battery 58 mounted uponcircuit board 122, as well as toelectromechanical latch 163,controller 120 andtransceiver 136,alarm 162,motion sensor 170 andlocation sensor 172, among other elements supported bycircuit board 122. - Turning now to
FIGS. 3 through 8 , communication betweenhost computer 100 andcontroller 120, or alternatively, alocal computer 100 or acomputer 101 sited at a remote location to whichcontainer 110 has been transported, may be conducted in various modalities, depending upon which aperture withincontainer 110 is serving as a port (e.g., an industry standard personal computer socket 128 (e.g, a serial port socket, a parallel port socket, a SCSI I or SCSI II socket, or a universal serial bus socket), infrared transmitter andreceiver unit 154, radio ormicrowave length antenna 134, or global positioning satellite antenna 174) to accommodate transmission of data signals between a host external tocontainer 110, such ascomputer controller 120 encased withincontainer 110. Amulti-lead data cable 102 terminated byplug 104 may couple either a parallel port, a serial port, a small computer system interface port, or universal serial bus port ofcomputer 100 tobus 130 andcontrollers 120 viasocket 128. Alternatively, adata cable 150 coupled to aninfrared transmitter 152 may communicate via line-of-site toinfrared transmitter 154 that may be mounted inaperture 114, or within a different aperture, to receive communications frominfrared transmitter 152. Preferably, an infrared transmitter andinfrared receiver unit 152 would be used to communicate with an infrared transmitter andinfrared receiver unit 154 coupled tocontroller 120 viadata bus 150. Alternatively,computer 100 may drive radio frequency or microwave transmitter andreceiver unit 106 viadata cable 105, to propagate radio frequency or microwave signals viaantenna 108.Portable container 110 may be fitted withantenna 134 to receive the radio frequency wave signals propagated fromantenna 108, or alternatively, a microwave antenna to receive microwave signals.Antenna 134 may be coupled tocontroller 120 via transmitter andreceiver unit 136. Consequently, and regardless of whetherdata cable 102 is simply a direct electrical or optical connection with an output port ofcomputer port 128 is dependent upon the disposition ofcontainer 110 relative to the source (e. g,personal computer 110, 101) of the data signals. By way of example, ifcontainer 110 is moved away from the neighborhood ofdata cable 102, the limited length ofdata cable 102 will ultimately causejack 104 to unplug fromsocket 128, thereby interrupting the conduction of transmission of data signals viaport 128. Assuming that infrared transmitter andreceiver unit 154 is serving as the port however, movement ofcontainer 110 relative tohost computer infrared units port 154. Shouldantenna 134 serve as the port for communications betweencomputer container 110 relative tocomputer antenna 134 from the field ofantenna 108 will cause an interruption in the conduction of transmission of data signals viaport 134. - The interruption of the conduction of transmission of data signals via the selected port, or ports, provided by
container 110 may be used, together with one or more schemes for transmission of data signals (including transmission of a data key to authorize access to the interior of container 110), as well as the content of the data signals transmitted, to restrict and control access to the interior ofcontainer 110. If, for example,antenna 174 is serving as the port accommodating conduction of transmission of data signals, movement ofcontainer 110 to a geographic location outside of the authorized range of siting (e.g., assuming that the global positioning system has a range of ‡ 30 feet, movement ofcontainer 110 to a location more than thirty feet from the location authorized bycomputer 100 will be readily discernable bycontroller 120 from the position signal provided by GPS stage 172) is a factor that may be used bycontroller 120, in conjunction withhost computer 100, in a scheme to control access to the interior ofcontainer 110. Accordingly, in response to a request for access entered via keyboard 96 and transmitted by one, or more, of theports container 110, controller makes a determination of whether to grant the access requested by generating a control signal that allowslock 162 to release theaccess panel 84 on the basis of, inter alia, the disposition of the port relative to a source of the data signals, on the basis of the disposition of the container within a scheme for generation of the data signals, and in response to occurrence of a coincidence between a data key received bycontroller 120 among the data signals via the port and a data sequence obtained bycontroller 120 in dependence upon the information stored withinmemory 121. - Interruption of communications between
computer 100 andcontroller 120 mounted on, or within,container 110, regardless of whether the interruption of communication occurs by removal ofplug 104 from socket 124, severance ofdata cable 102, movement ofcontainer 110 to prevent transmission of signals betweeninfrared units antennas alarm unit 160 driven directly bycomputer 100, oralarm 162 mounted on, or withincontainer 110 and driven directly bycontroller 120, or alternatively, by bothalarm units - Although
FIG. 1 showscontainer 110 fitted withseparate data socket 128 and power socket 54, these sockets may be combined into asingle socket 128 receiving both electrical power and either optical or electrical signals fromplug 104. Additionally,container 110 may be fitted with a keypad or other manuallyoperable switches 180 to enablecontainer 110 to communicate withcontroller 120 independently ofkeyboard 98 andcomputer 100. This may be useful, for example, to power-upcontroller 120 or alternatively, to initiate a transmission fromcontroller 120 tocomputer 100. Additionally,container 110 may be fitted with a visual oraural status indicator 182 such as a light-emitting diode that either flashes, is intermittently illuminated or is illuminated with different colors to indicate the status such as “no fault” or, no unauthorized movement or to indicate an unauthorized attempt to gain access to the contents ofcontainer 110. Atouch memory port 184 may also be fitted intocontainer 110 to enhance security, byway of example, to enablecontroller 120 to obtain a thumb print or a finger print from a prospective user and compare the print obtained viatouch memory port 184 with a print of the prospective user that is stored in memory 124. Additionally, and as illustrated inFIG. 7 , either or bothhost computer 100, or thecomputer 101 sited at the designation ofcontainer 110 may be operationally coupled to maintain communications withportable container 110 via line-of-sightinfrared transmissions 55. Abiometric scanner 188 may be connected tocomputer 100 as a peripheral unit to provide an enhanced degree of security, particularly when used together with a magnetic oroptical strip cardreader 186. Together,biometric scanner 188,card reader 186 andkeyboard 98 allow the input of the three items of security information from each prospective user ofcontainer 110 essential to a rigid security scheme, namely who the prospective user is (e.g., via biometric scanner 188), what the prospective user has possession of (e.g., namely an access card bearing a magnetic or optical strip confirming the authorization of the bearer to obtain access to the interior of container 110), and what the prospective user knows (e.g., a data key known to the prospective user that may be entered via keyboard 98). Authentication of these items of information bycomputer controller 120 borne bycontainer 110 and authorizecontroller 120 to allow the user to gain access to the interior ofcontainer 110, as, for example, by energizing solenoid L1 to releaseaccess panel 84. Alternately,computer 100 may act only as an input output device which communicates a form of data containing all or part of the attributes of the user, data in possession of the user and data known to the user directly tocontroller 120. -
FIG. 8 illustrates an alternative implementation with a telephone, such as a handheld portablecellular telephone handset 190 that is in communication via itsantenna 192 with a central office (CO) 196 via a cellular tower antenna 194.Host computer 100 may either have an internal modem or be operationally coupled withlead 104 to anexternal modem 198, that is in turn coupled as a subscriber of thecentral office 196. Alternately, themodem 198,computer 100 may be self-contained in TX/RX device connected tocontroller 120 in the form of a self-contained cellular engine capable of communication withcell phone 190 via antenna 194 andcentral office 196. This configuration enables the user oftelephone 190 to control access tocontainer 110 viahost computer 100, even though the user andtelephone 190 are located several miles away from the site ofcontainer 110. Themultifunction keypad 191 ofcellular telephone 190 serves the user as a substitute forkeyboard 98, while the liquidcrystal display screen 193 serves the user as a substitute formonitor 90, and permits the user to indirectly, and remotely enter information intocontroller 120 and to receive information fromcontroller 120. - The system may be implemented with one or more
portable containers 110, each having space for storage of valuables. Eachportable container 110 has alocking mechanism 160 that is used to control access to the contents of the container. Thelocking mechanism 160 electro-mechanical in design and controlled by electronic circuitry mounted oncircuit board 122 that is located inside the portable container. The portable container electronic circuitry will respond to a communications link with an outside control point through the use of a communications port on the container. Access to the contents of the container is controlled through a verification scheme communicated between a control point device, which may be apersonal computer portable container 110. - Power for operation of the portable container electronic circuitry and
electromechanical lock 160 will be normally supplied at the control point; however in one application, the power supply may be anauxiliary unit 58 that is contained within the container.Portable container 110 may be used in a stationary mode where the container is connected to apersonal computer 100 for the purpose of communicating between the electronic logic circuits oncircuit board 122 in the container locking mechanism and the software application used to control access to the container. Thecontainer 110 maybe left in the open and unlocked condition while being used frequently and closed and locked when access is not required. It may be desirable to placecontainer 110 in a state where it remains unlocked, preventing unwanted use or to ensure items are not accidentally left inside when the container is not in use. Thepersonal computer container 110 is open or whethercontainer 110 is closed and operational its location as well as its contents are secure. - In order for access to be made into a closed and locked container, the user will be required to input contain personalized information into the
personal computer personal computer controller 120 mounted withincontainer 110 to determine that a valid request to unlock had been received from an authorizedindividual controller 120 would then allow for the access requested by operatinglocking mechanism 163. One access per request from the personal computer may, in one embodiment, be allowed. -
Circuit board 122 inside theportable container 110 will store audit trail information into itsinternal memory 121 for each access request and if desired each significant event related to the status of the container. This audit information is available to be extracted frommemory 121 of theportable container 110 for future interrogation. Thepersonal computer - As indicated by
FIGS. 3 and 6 , in the event it becomes necessary forcontainer 110 to be transported to a different location, the container can be locked securely and transported. The contents of the portable container will be kept secure during the transportation of the container. Upon arrival at the desired destination, the container could then communicate with a secondary control point such as a localpersonal computer 101 that has, or is given (by the originating personal computer or y the user) the necessary data required to communicate with the container for the purpose of gaining access to the interior ofcontainer 110. - The data key used to determine the validity of an access request may take the from form of a digital password that is written to the container control logic of
circuit board 122, or may be information that is unique to, or o by the user transporting the container. The portable container authorization data may be transferred from the originating control point to the destination control point utilizing a network communications approach such as the Internet or by way of wireless communications. - It is also a feature of the portable container system to utilize biometric data in the authorization process. Biometric data can associate the individual users requesting access to data that was communicated to the locking mechanism control circuitry at the point of origination when the container was secured for transport. The
memory 121 ofcontroller 120 may store and transport the biometric data of the authorized user at the destination from the origin to the destination or it could store and transport the biometric data of users at the origin and destination. - Each
portable container 110 may also be used in a roaming mode where authorization data is presented to the container control logic circuitry ofcontroller 120 directly from the user. This information may be input trough an optionalmultikey keypad 180 that is a component of the container or through a communications device such as a portable Touch memory™ credential as manufactured by Dallas Semiconductor or such as themulti-function keypad 191 ofcell phone 190. This feature will allow the authorized user to have free access in locations remote from the origination control point. - Access to the portable containers in the system may be geographic (as represented by global positioning satellite signals), time and date dependent in addition to the user or control point verifications. Features such as dual control (requiring more than one user to be verified) and time delay (a wait period after verification before locking
mechanism 163 incontainer 110 allows access) are available. Additional features, such asmechanical locks 162 may be combined with the electronic access control incontainer 110 to further enhance the overall security of the container system. - This advantageously enables one of the user's
host computers 100 to communicate viadata cable 102 directly with thecontroller 120 withinportable container 110, or alternatively, to communicate via a network such as a local area network coupled to the port provided bysocket 128. As a further alternative,host computer 100 may communicate via a radio frequency transmitter andreceiver 106 that, in turn, can communicate viaantenna 108 and anantenna 134 mounted in one of thesidewalls 112 ofcontainer 110, with a transmitter andreceiver 136 connected to provide signals tocontroller 120. As an additional alternative,host computer 100 may communicate viadata cable 150 with an infrared transmitter andreceiver 152 that, in turn, can communicate via an infrared receiver andtransmitter 154 mounted in one of thesidewalls 112, tocontroller 120. - The foregoing paragraphs describe details of a container management system that advantageously provides a portable lock with an authentication component that may be time, date, geographic and person dependent, and that is in most configurations, stationary. Biometric data of authorized users may be stored and carried by the lock. Access to the container may be attained trough use of personal keyboard in which the authentication may be based upon input from the computer keyboard, or any of several profile devices such as a retina (that is a part of eyeball) scan, face recognition, handwriting reader, voiceprint reader or a thumb print read by a scanner connected as a profile devices to the computer. This system provides a technique for sending authentication or authorization data to the remote destination of the portable container via either Internet or some other network communication, or for acquiring the authentication or authorization locally in dependence upon one or more of various possible combinations of geographic data such as signals received directly by
controller 120 from global positioning satellite signals personal data such as retina, thumb print or other biometric template of the individual seeking access, and authorization data transmitted directly to or previously stored in aremote computer terminal 101. - Turning now to
FIG. 9 , aportable box 110 is able to store valuables for removal or access by either the same by a different user. Access to the contents ofbox 110 is effected by change of state ofmovable element 400 as a result of an action by thedecision control point 200.Control point 200 is extended by variabledata interface adapter 300 so thatcontrol point 200 may receive data from, or send data to a variety ofentry units 500. A changeable variabledata interface adapter 300 may be removed and replaced without affecting the code stored inmemory 202 ofcontroller 200. Both the hardware and software configurations of changeable variabledata interface adapter 300 may allow different forms ofentry units 500 to be used. Accordingly, entry of subsequent data may be transmitted through different forms ofentry units 500 becauseadapter 300 is both removable and interchangeable withother adapters 300.Controller 200 includes an input/output stage 201, anoperational memory 202,output stage 203, drivingmovable element 400,microprocessor 204 andclock 205. -
Storage container 110 allows storage of valuable contents and may allow, or deny access to the contents.Container 110 is portable, contains and safely transportscontroller 200, houses and also transports movingelement 400, and contains, or partially contains, variable data interface,adapter 300.Controller 200 stores code data inmemory 202 for comparison to data received bycontainer 110 viaadapter 300, while storing information for transmission viaadapter 300, to describe the event history and provide and audit trail about the use and movement ofcontainer 110. In essence,controller 200 regulates access to the contents ofbox 110 by controlling movingelement 400, and allows access on the basis of data delivered viaadapter 300. Optionally,controller 200 may make an access decision on the basis of the status of peripheral components ofadapter 300, and may optionally make access decisions based upon the status ofclock 205. - Variable
data interface adapter 300 may be replaced with a different type of adapter, without affecting the data code stored inmemory 202. Additionally, adapter may be changed to allow added features that allow communication with preferred customers viainterface 500.Interface 300 may be part of either a modem, a cellular transceiver, an alarm monitoring interface, a communication interface (such as an RS232, universal serial bus, infrared bi-directional receiver and transmitter, or radio frequency transceiver), or global positioning satellite receiver. Gap AG manufactures a line of transceivers that are marketed under the HiConnex and HiConnex Easy product line that may be incorporated intointerface 300; additionally, the Siemens M20 and M20 terminals may also be used as the cellular engines ofinterface 300. - An additional possibility for
circuit 200 is that it may be a single chip PC such as those manufactured by Beck, wherein the various other components such as memory, clock functions and I/O are integrated into a single package which functions as a PC and may use an operating system normally associated with Personal Computers. - Entry Unit and
user interface 500 is always removable. In some embodiments, connection betweenadapter 300 andinterface 500 may not require a physical connection. For example, infra-red bi-directional transmission, cellular transmission and radio frequency transmission and reception avoid the necessity of a cable extending betweenadapter 300 andinterface 500. In particular embodiments,interface 500 may be implemented with one or more of a card reader, keypad, biometric scanning reader, modem, personal computer host, cellular telephone, handheld computer, personal computer network (either a local area or wide area network), an internet interface, a data entry device or a memory device. Multiple types of dataentry interface units 500 may be used with thesame container 110, depending upon configuration ofadapter 300.Data entry unit 500 is not a permanent fixture ofcontainer 110 orcontroller 200.Entry unit 500 may deliver the status ofcontainer 110, as well as the location of the container to the user.Entry unit 500 may, in a particular embodiment, set the code data and criteria by whichcontroller 200 acts on movingelement 400. In the embodiment shown inFIG. 1 , solenoid L1 maybe used asmovable element 400, to either engage, or release, hasp 169. A motor, coil or other electrically responsive moving element could be substituted for solenoid L1. - Turning now to the operation of the various embodiments and modifications of those embodiments disclosed in the foregoing paragraphs,
FIG. 10 is a flowchart describing the beginning of a communication session between the display input device and data coupled container to the point of a major function selection;FIG. 11 is a flowchart describing the major function fromFIG. 10 of closing the container to secure contents or prevent items being placed in the container;FIG. 12 is a flowchart that is the first of two charts describing the major function fromFIG. 10 of opening a container to gain access to container contents or interior;FIG. 13 is a flowchart that is the second of two charts describing the major function fromFIG. 10 of opening a container to gain access to container contents or interior; andFIG. 14 is a flowchart describing the major functions fromFIG. 10 of retrieving event history and changing operational settings. - In the following description, the reader will find use of the terms, coupled and de-coupled as a description of data connection and disconnection, respectively, between a container or group of containers and one or more graphical user interface/input units of the same or varying types. This coupling may occur across the room, a length of wire, an air gap or across the globe in accordance with the network methods used to accomplish the data coupling. It may include live high speed data connection or may take the form of Internet mail or message packets, through which the container and the graphical user interface/input units exchange, data, settings, and exchange information.
- Turning to
FIG. 10 , it may be seen thatS 100 determines if an input/graphical user interface device is currently data coupled to the containers variable data interface stage.S 102 instructs connection for serial or USB connections whileS 104 instructs for infrared or cellular interfaces. If the interface type is correct as inS 106, it must be determined inS 108 whether more than one container is connected to the display/input device at one time. If only one device is connected as inS 110 then the display will only indicate one coupled container along with its unique ID and its current security status. The indication of the unique ID displayed by the graphical user interface/input unit and the security status displayed are the result of communication between the micro-controller in the subject container and the micro-controller of the graphical user interface/input unit communication via the variable data interface section of the container circuitry and the communication interface of the graphical user interface/input unit. In the event that there are more than one container coupled as in Yes toS 108 then the graphical user interface (i.e.,: cell phone, PC, PDA or other) will show each container and it s current status. AtS 112, if the bolt position switch or series door position switch of a particular container indicates that the door is open then the status for that container is displayed as inS 116 as Not Secure. If atS 112, the status switch(es) indicate the container is secure as inS 114, then that indication will appear on the currently coupled graphical user interface/input unit. A 118 describes the users decision to change a container status if the user decision is no, en status on display will remain unchanged unless an event changes the status. In the event the user decides to change the status of a particular container he must select the container to change as inS 122 and then as in S 124 select a major function or action of eitheropen container S 126,close container S 128, set parameters for thecontainer S 130 or retrieve history of the container as inS 132. Once selection is made and confirmedS 134 then the appropriate figure and flowchart may be followed. - Turning now to
FIG. 11 , we see the flowchart which represents theselection S 128 close container. This action is for the purpose of securing contents stored in a container or preventing storage of items in a container by denying access to the contents. In the application where a container may be transportable and used in a courier application, it may be desirable to have the container locked open when not used and in the courier companies inventory. This may help prevent inadvertent placement contents in a box not currently slated for a particular customers use.S 200 determines if the container is in a code-to-lock mode. If it is as inS 206, then a code must be used to lock the container This action results in activation of the latching mechanism in such a way to allow the container to be made secure. One could allow any code, such as the current code, to be entered to secure the container or require a fresh unused code to be entered. In any case, the enteredcode S 206 becomes the next code required for opening of the container.S 208 determines if the container is in the GPS (global positioning system) mode. If the container is so equipped and in the GPS mode as in S 210, then the global coordinates for one or more destinations where the container may be opened must be entered through the coupled graphical user interface. If the container is ready to secure as in S 212, then it maybe closed by the user S 214 in the event the status shows that the container is not prepared to be secured S 212 then the next code must be entered correctly starting the sequence again atS 206 ifS 200 indicated that the container is in a mode other than code-to lock, then it must be innormal mode S 204 and the sequence begins at the entry ofS 208 to determine if GPS mode is active for the selected container. Once the container is secured as in S 214, then the status indication of the coupled graphical user such as may be provided by a cellular telephone, interface/input unit will indicate secure. If user desired activity is complete for this container then the coupled graphical user interface/input unit maybe de-coupled and if physical connection is part of the data coupling process, the physical connected maybe removed as described at S 216. - Observing now
FIG. 12 , starting at S126 the reader see that the major function of choice for the user is to open the container. S300 indicates by the way of information that one or more users at the same or different locations and one or more types of coupled graphical user interface/input units may be involved in this process. Determination of data coupling is described in S 304, while S 306 describes use of serial or USB connections, whileS 308 describes infrared and RF or cellular connection.S 310 determines that the variable data interface of the container is of a type compatible with the coupled graphical user interface/input unit. By way of information S 312 indicates that the security status of the container shown on the coupled graphical user interface/input unit is secure. The indication of the unique ID displayed by the graphical user interface/input unit and the security status displayed are the result of communication between the micro-controller in the subject container and the micro-controller of the graphical user interface/input unit communicating via the variable data interface section of the container circuitry and the communication interface of the graphical user interface/input unit. S 314 determines if the container is in the normal mode. If the determination is yes then the user enters code as inS 400. In the event that the container is in GPS mode S 316 then it must be at the correct global coordinates to be openedS 322. In the event it is not at the correct co-ordinates S 324, the container must be re-located to the correct co-ordinates (location). If the container is in highsecurity mode S 318, then one part of the required opening code must be received by the container from the origin site S 412 before the user enters the second code data sequence atS 400 at the destination site. In the event that the first part from the origin site S 412 has not been received then the origin first code data may be requested across the network from the appropriate coupled origin source. In the event that the subject container is in the dual security mode as in S 320, then two parts of a code must be entered into a coupled graphical user interface/input unit at S 420. This two part code may consist of live entry of a password as well as a data carrying card credential or presentation of biometric data via a biometric reader to authenticate the user and thus complete code entry described by S 422. If container is not in dual security mode at S 320, then normal code entry atS 400 permits the determination atS 402 atS 402 the micro controller reads its memory contents where the opening data is stored and compares that to the just entered codes described in the frames between S 314 andS 402. If code matches and authentication is deemed correct by the micro-controller, then the decision control point formed by the micro-controller, memory, clock and I/O will activate switch at S 404 which in turn switches power to cause a moving element to change state at S 408 thus allowing access to container interior and any contents therein. This moving element may for example be a latch, bolt or cover which is released by a motor, solenoid, bi-metal element, alloy element or other element capable of permitting access to the, interior of the container. If user desired activity is complete for this container then the coupled graphical user interface/input unit may be de-coupled and if physical connection is part of the data coupling process, the physical connected may be removed as described at S 406. - Observing now
FIG. 12 , starting atS 126 the reader will see that the major function of choice for the user is to retrieve history or set parameters. Determination if of data coupling is described inS 500, whileS 504 describes use of serial or USB connections, while S506 describes infrared and RF or cellular connection. S S08 determines that the variable data interface of the container is of a type compatible with the coupled graphical user interface/input unit. By way ofinformation S 512 indicates that the security status of the container shown on the coupled graphical user interface/input unit is secure. The determination of this condition is the present state of input switches reflecting position of the latching mechanism and the container cover as read by the micro-controller as shown inS 510. The indication of the unique ID displayed by the graphical user interface/input unit and the security status displayed are the result of communication between the micro-controller in the subject container and the micro-controller of the graphical user interface/input unit communicating via the variable data interface section of the container circuitry and the communication interface of the graphical user interface/input unit. A not secure condition may be indicated as shown in S 516. If the user chooses to upload the history events as in S 528 then this history will be communicated to the graphical user interface/input t for play. If no history existsS 532, none will be displayed and the session may be ended or another selection made as inS 532. Any of the choices S 126,S 128,S 130,S 132 or de-coupling as in S 216 may be chosen. If the user chooses to change the code as in S 520 and the new code is entered as in S 522 then the access codes required to open the container are new ones as in S 526. If incorrect parameters are met or incorrect code entry is made then the old code data remains active as S 524. - As
FIG. 15 shows, an alternative embodiment of aportable container 100′, which is designed as a piece of furniture on transport rolls 106. The piece of furniture can be carried on the transport rolls 106, for example in a hospital, office etc. In the present embodiment the piece of furniture is designed as a chest of drawers, having a multitude ofdrawers 101 to 105. The chest of drawers is provided with a port, details of which are described above, to be coupled with a host computer. The chest of drawers is also provided with anantenna 200 to receive and emit data from and to, respectively a remote control. Thedrawers 101 to 105 each constitute inner casements, as described above, which are secured in theportable container 101 as described above. -
FIG. 16 a illustrates a situation, in which alocal computer 107 is connected by acable 108 with thesocket 201 ofcontainer 100′ to perform a data transfer as described above. To unlock onesingle drawer 101 to provide access to the interior ofdrawer 101. -
FIG. 16 b illustrates a situation, where aremote control 109 is operationally coupled via theantenna 200 with theportable container 100′ to allow access to one of thedrawers 103 according to procedures as described above. -
FIG. 17 illustrates theportable container 100′ with all drawers open and accessible. In this open state theportable container 101 can be connected to a local computer. -
FIG. 18 illustrates, howcontainer 100′ is connected to thelocal computer 110 in a first place A. Then it is transported (B) to another place C, where it is controlled byremote control 109 to provide access to onedrawer 103. In another place D thecontainer 101 is empty, unlocked, ready to be loaded with contents and to be plugged to a local computer so it may secured once again. -
FIG. 19 illustrates the use of theportable container 100′ in a hospital. In a pharmacy area there is provided alocal computers 107 to communicate with theportable container 100′. In the pharmacy, it is stocked with medications for patients located elsewhere. At another location of the hospital, forexample floor 1, theportable container 100′ is in communication withremote control 109. Theremote control 109 is coupled through acable 111 with alocal socket 110. Here medications may be dispensed based on proper authorization for access. This may also be coupled with a GPS or location device to ensure that the container may only be opened at the correct location of the proper patient or require biometric data from the correct patient viabiometric reader 110. At a third location, forexample floor 2, thelocal container 100′ is in a wireless communication withremote control 109. -
FIG. 21 a illustrates the open state of the ATM ofFIG. 20 b during the a removal of aportable cassette container 502 from its use position. In present practice, the door may be opened with no data cooperation from any network; -
FIG. 21 b illustrates theportable container 502 in present practice may be removed freely from 500 and opened bymechanical lock 503 and shows thecash dispensing slot 504; -
FIG. 22 a illustrates a mechanical key for the containers ofFIG. 20 to 21; -
FIG. 22 b illustrates an alternative lead seal used to secure for the containers ofFIG. 20 to 21; -
FIG. 20 a shows a front view of adoor 502 of anATM machine 500 in its closed state. TheATM machine 500 constitutes a secured stationary room to receive a multitude ofportable cassette containers 502, as can be seen fromFIG. 20 b with thedoor 501 open. The door of 501 is secured to thestrong room 500 as described above in connection with the outer container 70 ofFIG. 2 . TheATM machine 500 is provided with asocket 501 to be coupled with a local computer or remote network computer as described above. Data signals sent from an origin to the destination, namely ATM 500s location, combined with data applied at the destination (location of ATM 500) can result in the dislodging or opening ofdoor 501. - Also, as shown in
FIGS. 21 a and 21 b, each of the multitude ofcontainers 502 is designed as the portable containers as described above. The release of theportable containers 502 from thestrong room 500 is accomplished in accordance with the procedures as described above. To this aim eachcontainer 502 is provided with asocket 501. -
FIG. 22 a illustrates a mechanical key for the containers ofFIG. 20 to 21 in todays practice; -
FIG. 22 b illustrates an alternative lead seal used to secure the containers ofFIG. 20 to 21 in todays practice; -
FIGS. 23 and 24 further illustrate the transport of aportable container 502 from theATM machine 500 from a first control point A where it may be opened or locked or released from its mooring bycomputer 600 orcomputer 601 to a second control point B where it may be moored, data coupled and opened. At the outset, alocal computer 600 orportable computer 601 is coupled tosocket 501 or directly data: coupled to the control system ofcassette container 502 ofstrong room 500 to release thecontainer 502 from thestrong room 500. - Conversely the
cassette 502 may be locked and prepared at control point B for return to control point A and reinstalled inATM Machine 500. It may be moored or attached toATM machine 500 by electro-mechanical means as a result of signals fromcomputer 600 orportable computer 601. - Each of
FIGS. 20 a, 20 b, and 23 represent the invention whereinATM machine 500 is a controlled container and within it resides other controlled containers in the form ofcassette containers 502; - The diagram of
FIG. 26 illustrates the various features and operations of the invention. - The following is a summary of further features and advantages of the invention.
- Conventional locks controlling containers consist of three units, entry unit, processing unit and movable element. This applies either for mechanical and electronic locks.
- The invention of the container controlling system is to put the whole specific lock intelligence inside the moving element unit or inside an adapter unit which can be used for different entry units. That means the entry unit of the invention includes no container specific intelligence at all so that any electronic device which allows to enter a code in any way, also like a biometric code, and which allows to communicate secure with a different electronic device can be used as an entry unit of the invention like a cell phone, a palm or any kinds of PCs.
- The secure communication can be either over wire or wireless eg. over radio technologies. Regarding the encryption of the communication, it can be a standard encryption or a proprietary one.
- Using the adapter version you can also use different kinds of moving elements, which can be connected to the adapter which in turn is responsible for the communication with any kinds of entry devices mentioned above.
- In addition, the container may utilize as a control stage a single “PC on a chip” integrated circuit which may use a PC operating system including a web server. This capability allows nearly any standard, PDA, PC or web enabled cell phone to act as a data entry device, in some cases only using a web browser to access the web page and graphical interface provided from within the container control stage.
- The big advantage of the invention is that you need not provide a proprietary data entry unit installed on each container. You may use industry standard devices and do not have to allocate space on the container nor cost in its design to a dedicated mounted data entry unit.
- Further must be mentioned the huge flexibility of the new product. In compare to the mechanical locks you have the advantages to use all the advantages of an electronic lock like code splitting, audit trail, easy configuration of functions, like time delay, four eye principle and so on. You do not need a physical key which can be lost, or forgotten. In large populations of containers key administration and related costs are a very tangible problem. For example in case an ATM cassette, the cash carrier personnel needs a bundle of keys for opening a variety of different cassettes. The normal mechanical lock system offers no information about the last opening of the cassettes. In view of the expansion of the ATM locations eg. in hotels, retail stores the negative effect of the many physical keys of cassettes will increase.
- The invention allows to retrofit the ATM cassettes with this, container control system because compared to retrofitting with conventional electronic locks you don't need a space for the code or data entry unit on the exterior surfaces of the cassettes.
- So compared to the conventional electronic locks the invention has the advantage that there is no visable part outside the container. In the case of a wired communication solution, the only thing visible is the socket. In case of using a wireless solution you just have to make sure that the data connection exists. So it can be possible to find a suitable place for the antenna inside the box. This feature helps conceal a logical point of forced attack as would be obvious in conventional mechanical and electronic lock solutions.
- The use of different entry units and communication channels provide for more flexibility. For example using a movable container (box, cassette, . . . ) at the destination nobody can open the box without release from the origin This can be accomplished via wire or wireless communication with a entry unit mentioned above.
- It could also be possible that the sender has no code. He has just to close the box at the origin. If the box must be unlocked it can be done by the recipient over wire or wireless connection using a standard data entry unit he already owns.
- One scenario could be that the sender and receiving person has the code or part of the code, or an authorized party in a remote location may prepare the code for use by the container receiving party at the destination.
- Another method of location is that the box is data connected to a network and if proper destination can be determined by a proper email address, or proper IP address of the coupled computer, then the party who receives the box will have all or part of the code to open it.
- Also location system like GPS can be integrated by using one of the input channels. This has the advantages that the lock can be configured to unlock only in certain defined (programmed) locations. You can have GPS supervision or monitoring of the proper locations, and a list of determined locations programmed in the container control stage.
- Additionally, you can use it as a tracking unit for giving an alarm if the box leaves the determined path back and forth from origin to destination.
- The possibility to use entry units like PC cell phone, teleguidance and so on requires on the lock side a processing unit which includes memory, CPU, clock and software. So you can implement different scenarios. In one case the software or part of the lock application software has to be implemented inside the entry unit.
- In another and more convenient case the software is running inside the lock or adapter system and inside the entry unit, only a standard viewing tool such as browser, like Internet Explorer™ is necessary. In this case a WEB Server running in the controller (100) or variable data interface (300).
- An other important issue of the invention is the expansion capability in case of implementing the container control system inside a box system like a safe deposit box system with a couple of boxes. Here you can connect the locks over different channel depending on the price and monitoring functions required. So in one case all locks can have there own monitoring processing unit eg. over TCP/IP.
- In a second case the locks consist a lower communication channel like I2C which are connected to an adapter including the high communication channel like TCP/IP.
- All these features are examples of the resulting benefit that the control stage or the adapter includes the container specific information and the entry unit is just a standard communication unit without specific lock commands or proprietary design.
Claims (56)
1. A container manager, comprising:
a housing comprised of a plurality of sidewalls bearing a removable lid, forming a container having a closed interior while said lid is in complete engagement with said housing, and providing an open interior able to removably receive items within said open interior while said lid is dislodged from said complete engagement;
a port borne by said housing to accommodate conduction of transmission of data signals between said closed interior and an environment external to said housing;
a control stage comprised of a memory storing information specific to said container, said control stage being mounted entirely within and being completely encased by said container during said complete engagement, and being operationally coupled to provide communication with said interior via said port, and generating a control signal in dependence upon disposition of said port relative to a source of said data signals, in dependence upon disposition of said container within a scheme for generation of said data signals, and in response to occurrence of a coincidence between a data key received among said data signals via said port and a data sequence obtained by said control stage in dependence upon said information stored within said memory; and
a moveable latch disposed to engage said lid and hinder removal of said lid from said complete engagement, and to respond to said control signal by releasing said lid from said complete engagement.
2. The container manager of claim 1 , further comprising a socket mounted within said housing providing said port.
3. The container manager of claim 1 , further comprising an infrared receiver mounted within said housing providing said port.
4. The container manager of claim 1 , further comprising an antenna mounted within said housing providing said port.
5. The container manager of claim 1 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data key; and a data cable coupling said host computer to said port.
6. The container manager of claim 1 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data key; and
a local area network coupling said host computer to said port.
7. The container manager of claim 1 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data key;
said port comprising a first antenna mounted on one of said sidewalls;
a data transceiver connecting said first antenna and said controller; and
a second antenna driven by said host computer, operationally connecting said host computer to said first antenna.
8. The container manager of claim 1 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data key;
an infrared transmitter driven by said host computer to broadcast an infrared signal corresponding to said data key; and
an infrared receiver mounted in one of said sidewalls, disposed to receive said data key from said infrared transmitter.
9. The container manager of claim 1 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data key;
a first infrared transmitter and receiver driven by said host computer to broadcast an infrared signal corresponding to said data key; and
a second infrared transmitter and receiver mounted n one of said sidewalls, disposed to receive said data key from said infrared transmitter, and to transmit operational communications from said controller to said host computer via said first infrared transmitter and receiver.
10. The container manager of claim 1 , further comprising:
said controller generating an alarm signal in response to an unauthorized interruption of said communication via said port; and
an alarm driven by said controller to broadcast an indication of said unauthorized interruption in response to said alarm signal.
11. The container manager of claim 1 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, periodically making a determination of whether said an unauthorized interruption of said communication has occurred; and
an alarm driven by said host computer to broadcast and indication of said unauthorized interruption dependence upon said determination
12. The container manager of claim 1 , further comprising:
said controller generating an alarm signal in response to an unauthorized interruption of said communication via said port;
a first alarm driven by said host computer to broadcast an indication of said unauthorized interruption in response to said alarm signal;
a microprocessor based host computer operationally coupled to said controller via said port, periodically making a determination of whether said an unauthorized interruption of said communication has occurred; and
a second alarm driven by said host computer to broadcast an indication of said unauthorized interruption in dependence upon said determination.
13. A container manager, comprising:
a housing comprised of a plurality of sidewalls bearing a removable lid, forming a container having a closed interior wile said lid is in complete engagement with said housing, and providing an open interior able to removably receive items within said open interior while said lid is dislodged from said complete engagement;
a port mounted within said housing to receive data signals; a control stage comprised of a memory storing information specific to said container, said control stage being mounted entirely within said container, being completely encased by said container during said complete engagement, and being operationally coupled to provide communication by data signals with said interior via said port, and generating an al signal in response to an unauthorized interruption of said communication via said port; and an alarm driven by said controller to broadcast an indication of said unauthorized <<interruption in response to said alarm signal.
14. The container manager of claim 13 , further comprising a socket mounted within said housing providing said port.
15. The container manager of claim 13 , further comprising an infrared receiver mounted within said housing providing said port.
16. The container manager of claim 13 , further comprising an antenna mounted within said housing providing said port.
17. The container manager of claim 13 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data signals; and a data cable coupling said host computer to said port while conveying said data signals to said controller via said port.
18. The container manager of claim 13 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data signals; and a local area network coupling said host computer to said port while conveying said data signals to said controller via said port.
19. The container manager of claim 13 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data signals;
said port comprising a first antenna mounted on one of said sidewalls; data transceiver connecting said first antenna and said controller; and a second antenna driven by said host computer, operationally connecting said host computer to said first antenna wile conveying said data signals to said controller via said first antenna.
20. The container manager of claim 13 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data signals;
an infrared transmitter driven by said host computer to broadcast an infrared signal corresponding to said data signals; and an infrared receiver mounted in one of said sidewalls, disposed to receive and convey to said controller said data signals from said infrared transmitter
21. The container manager of claim 13 , further comprising:
a microprocessor based host computer operationally coupled to said controller via said port, generating said data key;
a first infrared transmitter and receiver driven by said host computer to broadcast an infrared signal corresponding to said data key; and
a second infrared transmitter and receiver mounted in one of said sidewalls, disposed to receive said data key from said infrared transmitter, and to transmit operational communications from said controller to said host computer via said first infrared transmitter and receiver.
22. The container manager of claim 14 , further comprising:
said controller generating a control signal in response to occurrence of a coincidence between a data key received via said port and a data sequence obtained by said control stage in dependence upon information stored within said memory; and an electromechanical latch responding to said control signal by hindering removal of said lid From said complete engagement.
23. A container manager, comprising:
a housing comprised of a plurality of sidewalls bearing a removable lid, forming a container having a closed interior while said lid is in complete engagement with said housing, and providing an open interior able to removably receive items within said open interior while said lid is dislodged from said complete engagement; a port to receive data signals;
a control stage comprised of a memory, said control stage being mounted on said container and being operationally coupled to provide communication with said interior via said port, and generating a control signal in response to occurrence of a coincidence between a data key received among said data signals via said port and a data sequence obtained by said control stage in dependence upon information stored within said memory;
a microprocessor based host computer sited externally to said container, said host computer comprising a keyboard initiating formation of said data signals and a monitor driven by said host computer to visually display video images, said host computer being operationally coupled to said port and participating in said communication by generating said data signals; and
an electromechanical latch disposed to engage said lid and hinder removal of said lid from said complete engagement, and to respond to said control signal by releasing said lid from said complete engagement.
24. The container manager of claim 23 , further comprising a data cable coupling said host computer to said port.
25. The container manager of claim 24 , further comprising a local area network coupling said host computer to said port.
26. The container manager of claim 25 , further comprising:
said port comprising a first antenna mounted within said container;
a data transceiver connecting said first antenna and said controller; and
a second antenna driven by said host computer, operationally connecting said host computer to said first antenna.
27. The container manager of claim 26 , further comprising:
an infrared transmitter driven by said host computer to broadcast an infrared signal corresponding to said data key; and
an infrared receiver mounted in one of said sidewalls, disposed to receive said data key from said infrared transmitter.
28. The container manager of claim 27 , further comprising:
a first infrared transmitter and receiver driven by said host computer to broadcast an infrared signal corresponding to said data key; and
a second infrared transmitter and receiver mounted in one of said sidewalls, disposed to receive said data key From said infrared transmitter, and to transmit operational communications from said controller to said host computer via said first infrared transmitter and receiver.
29. A container manager, comprising:
a housing comprised of a plurality of sidewalls bearing a removable lid, forming a container having a closed interior while said lid is n complete engagement with said housing, said housing providing an open interior able to removably receive items within said open interior while said lid is dislodged from said complete engagement;
a port exposed through said housing to receive data signals;
a control stage comprised of a memory, said control stage being mounted on said container and being operationally coupled to provide communication by data signals with said interior via said port;
a microprocessor based host computer sited externally to said container, said host computer comprising a keyboard initiating formation of said data signals and a monitor driven by said host computer to visually display video images, said host computer being operationally coupled to said port and participating in said communication by generating said data signals; and
an alarm driven in response to an unauthorized interruption of said communication via said port to broadcast an indication of said unauthorized interruption in response to said alarm signal.
30. The container manager of claim 29 , further comprising:
said controller generating an alarm signal in response to an unauthorized interruption of said communication via said port; and
said alarm being driven by said control stage to broadcast an indication of said unauthorized interruption in response to said alarm signal.
31. The container manager of claim 29 , further comprising:
said host computer periodically making a determination while operationally coupled to said controller via said port of whether said an unauthorized interruption of said communication has occurred; and
an alarm driven by said host computer to broadcast an indication of said unauthorized interruption in dependence upon said determination.
32. The container manager of claim 29 , further comprising:
said controller generating an alarm signal in response to an unauthorized interruption of said communication via said port;
a first alarm driven by said host computer to broadcast an indication of said unauthorized interruption in response to said alarm signal;
said host computer periodically making a determination wile operationally coupled to said controller via said port, of whether said an authorized interruption of said communication has occurred; and
a second alarm driven by said host computer to broadcast an indication of said unauthorized interruption in dependence upon said determination.
33. The container manager of claim 29 , further comprising:
said data signals exhibiting a first wavelength, and said data signals exhibiting a second and different wavelength carrier signal; and
said port being plug coupleable to said control stage, and comprising a receiver stage converting said data signals into input signals exhibiting said second wavelength, and a transmitter stage converting said data signals into output signals exhibiting said first wavelength.
34. The container manager of claim 29 , with said port comprising:
a first unit that is plug coupleable to said control stage when said data signals received by said pot exhibit a first wavelength and said data signals provided by said control stage exhibit a second and different wavelength carrier signal, said first unit comprising a receiver stage converting said data signals received by said port into input signals exhibiting said second wavelength, and
a transmitter stage converting said data signals provided by said control stage into output signals exhibiting said first wavelength; and
a second unit that is plug coupleable to said control stage and interchangeable with said first unit to provide a data connection between said control stage and said host computer when said data signals received by said port exhibit the same wavelength as said data signals provided by said control stage.
35. A container manager, comprising:
a housing composed of a plurality of sidewalls bearing a removable lid, forming a container having a closed interior while said lid is in complete engagement with said housing, and
providing an open interior able to removably receive items within said open interior while said lid is dislodged from said complete engagement;
a source of an input signal representing a first class of information, mounted upon and borne by said housing;
a port borne by said housing to accommodate conduction of transmission of data signals through said housing;
a control stage comprised of a memory storing a second class of information specific to said container, said control stage being mounted entirely within and being completely encased by said container during said complete engagement, and being operationally coupled to provide communication with said interior via said port, and generating a control signal in dependence upon disposition of said port relative to an origin of said data signals, in dependence upon said information represented by said input signal, and in response to occurrence of a coincidence between a data key received among said data signals via said port and a data sequence obtained by said control stage in dependence upon said information stored within said memory; and
a latch mounted on said housing and disposed to engage said lid and hinder removal of said lid from said complete engagement, and to respond to said control signal by releasing said lid from said complete engagement.
36. The container manager of claim 36 , further comprising said source detecting movement of said lid, and said first class of information indicating said movement.
37. The container manager of claim 36 , further comprising said source detecting a position of said lid, and said first class of information indicating said position.
38. The container manager of claim 36 , further comprising said control stage generating said control signal in response to instructions received by said control stage from a host computer independently of said disposition of said port, independently of said information represented by said input signal, and independently of said occurrence of coincidence.
39. The container manager of claim 36 , further comprising said control stage generating said control signal in dependence of said disposition of said port, in dependence of said information represented by said input signal, in dependence of said occurrence of coincidence, and in response to instructions received by said control stage from a host computer coupled to said port.
40. The container manager of claim 36 , further comprising said container being transportable between an origin and a destination, and said data key being encoded and being available only at destination.
41. The container manager of claim 36 , further comprising said container being transportable between an origin and a destination, and said data key being encoded and being transmitted to said port from said origin.
42. The container manager of claim 36 , further comprising said container being transportable between an origin and a destination, and said data key being encoded and being available only at destination.
43. The container manager of claim 36 , further comprising a microprocessor based host computer operationally coupled to said controller via said port, generating said data signals.
44. The container manager of claim 44 , further comprising said host computer comprising a cellular telephone bearing a graphical user interface.
45. The container manager of claim 36 , further comprising some or all of said data signals being transmitted across or received one of an Internet and a wide area network.
46. The container manager of claim 36 , further comprising said data signals comprising one of an e-mail packet and an attachment to an e-mail message.
47. The container manager of claim 36 , further comprising said information represented by said source comprising a global location of the container, and said control stage generating said control signal in dependence of said disposition of said port, in dependence of said information represented by said input signal, and in dependence of said occurrence of coincidence.
48. The container manager of claim 36 , further comprising said container being transportable between an origin and a destination, and a user at one of said origin and said destination requests via a network a request for some part of said data key.
49. The container manager of claim 36 , further comprising said container being transportable between an origin and a destination, and said second class of information is installed at said origin comprises biometric data matching a person of a human user of said container and said coincidence must be made with biometric data matching said person at said destination.
50. The container manager of claim 36 , where components of said data signals may result in the configuration of container software features.
51. The container manager according to claim 36 , wherein said control stage comprises a portable computer and said portable computer provides data to a host computer when said host computer is equipped with a web browser.
52. The container manager according to claim 1 , wherein a plurality of portable containers is releasably stored in a secured stationary room, the room having a door and a door lock.
53. The container manager according to claim 53 wherein the door lock is operationally coupled to a port to provide communication with a host computer and/or a remote control.
54. A container manager of claim 53 , wherein portable containers may be electro-mechanically released.
55. A container manager of claim 36 wherein a portion of said second class of information comprises data describing the personal characteristics of a person permitted to access the interior of said container.
56. A container manager of claim 36 wherein said housing and said lid may be a housing and drawer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/848,724 US8749382B2 (en) | 2002-08-13 | 2010-08-02 | Portable security container |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02018080.8A EP1391579B1 (en) | 2002-08-13 | 2002-08-13 | Portable security container |
EP02018080.8 | 2002-08-13 | ||
PCT/EP2003/008937 WO2004016896A1 (en) | 2002-08-13 | 2003-08-12 | Portable security container |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2003/008937 A-371-Of-International WO2004016896A1 (en) | 2002-08-13 | 2003-08-12 | Portable security container |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/848,724 Continuation US8749382B2 (en) | 2002-08-13 | 2010-08-02 | Portable security container |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060139147A1 true US20060139147A1 (en) | 2006-06-29 |
Family
ID=30775793
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/524,416 Abandoned US20060139147A1 (en) | 2002-08-13 | 2003-08-12 | Portable security container |
US12/848,724 Expired - Fee Related US8749382B2 (en) | 2002-08-13 | 2010-08-02 | Portable security container |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/848,724 Expired - Fee Related US8749382B2 (en) | 2002-08-13 | 2010-08-02 | Portable security container |
Country Status (4)
Country | Link |
---|---|
US (2) | US20060139147A1 (en) |
EP (1) | EP1391579B1 (en) |
AU (1) | AU2003250228A1 (en) |
WO (1) | WO2004016896A1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138405A1 (en) * | 2003-12-18 | 2005-06-23 | Ncr Corporation | Media transport cassette |
US20070044524A1 (en) * | 2005-08-24 | 2007-03-01 | Innerloc, Llc, A Texas Limited Liability Corporation | Internal locking apparatus and methods for making and using same |
US20100179890A1 (en) * | 2009-01-14 | 2010-07-15 | Cianciotto Jr Michael S | Tool inventory management system |
US20110201432A1 (en) * | 2008-08-15 | 2011-08-18 | Nxp B.V. | Container and electronic game system comprising such container |
US8291247B1 (en) | 2008-09-30 | 2012-10-16 | The Directv Group, Inc. | Method and system for predicting use of an external device and removing the external device from a low power mode |
US20130038550A1 (en) * | 2011-08-08 | 2013-02-14 | Lattice Energy Technology Corporation | Multi-protection touch lock |
US8671429B1 (en) | 2008-09-30 | 2014-03-11 | The Directv Group, Inc. | Method and system for dynamically changing a user interface for added or removed resources |
US9049473B1 (en) | 2008-09-30 | 2015-06-02 | The Directv Group, Inc. | Method and system of processing multiple playback streams via a single playback channel |
US20150225993A1 (en) * | 2012-03-05 | 2015-08-13 | Craig D. Mcalexander | Locking insert mechanism and receiver to secure personal weapons, valuables and other items |
US9148693B1 (en) | 2008-09-30 | 2015-09-29 | The Directv Group, Inc. | Method and system of scaling external resources for a receiving device |
US9426497B1 (en) | 2008-09-30 | 2016-08-23 | The Directv Group, Inc. | Method and system for bandwidth shaping to optimize utilization of bandwidth |
US9494986B1 (en) | 2008-09-30 | 2016-11-15 | The Directv Group, Inc. | Method and system for controlling a low power mode for external devices |
US9710055B1 (en) | 2008-09-30 | 2017-07-18 | The Directv Group, Inc. | Method and system for abstracting external devices via a high level communications protocol |
US20170225569A1 (en) * | 2011-10-28 | 2017-08-10 | Husqvarna Ab | Indicator system for outdoor power equipment |
US20180162636A1 (en) * | 2016-12-13 | 2018-06-14 | Sigma-Aldrich International Gmbh | Electronics assembly for wireless transmission of at least one status information |
EP2452320B1 (en) * | 2009-07-10 | 2018-11-28 | Novomatic AG | Apparatus for managing, accepting and/or dispensing valuables |
US10445541B2 (en) * | 2011-10-26 | 2019-10-15 | Warsaw Orthopedic, Inc. | Portable RFID tagged carrier for sterile implants and biological products |
US20200020187A1 (en) * | 2017-07-10 | 2020-01-16 | Panasonic Intellectual Property Corporation Of America | Supply chain system and non-transitory computer-readable recording medium storing program |
US10990922B1 (en) * | 2019-02-02 | 2021-04-27 | Roambee Corporation | Continuous inventory management |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7331793B2 (en) | 2005-12-16 | 2008-02-19 | Motorola, Inc. | Magnetic connector |
DE102008033731A1 (en) | 2008-07-18 | 2010-01-21 | Cargoguard Gmbh | Lock for securing a security container or security room and method for securing the transport of a security container |
US10657488B2 (en) * | 2009-07-14 | 2020-05-19 | Carefusion 303, Inc. | Portable inventory tracking system |
SK1712010A3 (en) * | 2010-12-23 | 2012-07-03 | Milos Kmetko | System for storage subjects |
CN102536042A (en) * | 2011-10-04 | 2012-07-04 | 徐国元 | Intelligent safety box |
BR112014014293A2 (en) * | 2011-12-12 | 2017-06-13 | Berger David | transportable safe |
US8749379B2 (en) * | 2012-01-19 | 2014-06-10 | Carefusion 303, Inc. | Portable medication dispensing containers |
US9732550B2 (en) | 2012-08-10 | 2017-08-15 | Coolsafe Enterprises Inc. | Storage assembly having user-accessible compartments categorized by different levels of user access |
US9721224B2 (en) | 2013-03-14 | 2017-08-01 | Coreorient Oy | System and method for managing transportation and storage of goods |
US9351098B2 (en) * | 2014-05-19 | 2016-05-24 | Lenovo (Singapore) Pte. Ltd. | Providing access to and enabling functionality of first device based on communication with second device |
CN205047045U (en) * | 2015-08-25 | 2016-02-24 | 关国安 | Safe deposit box anti -theft system |
US10186100B2 (en) * | 2016-02-09 | 2019-01-22 | Omnicell, Inc. | Relay box |
US10062048B2 (en) * | 2016-09-29 | 2018-08-28 | Walmart Apollo, Llc | Systems and methods to distribute and authenticate product delivery lockers |
US10806676B2 (en) | 2018-01-30 | 2020-10-20 | Omnicell, Inc. | Relay tray |
US11319745B1 (en) * | 2019-07-09 | 2022-05-03 | Marc Tobias | System for monitoring status of a protected space of a container |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4727369A (en) * | 1984-06-29 | 1988-02-23 | Sielox Systems, Inc. | Electronic lock and key system |
US5131038A (en) * | 1990-11-07 | 1992-07-14 | Motorola, Inc. | Portable authentification system |
US5219386A (en) * | 1988-05-06 | 1993-06-15 | Keba Gesellschaft M.B.H. & Co. | Locker unit comprising a plurality of lockers |
US5225825A (en) * | 1990-04-05 | 1993-07-06 | Meridian Incorporated | Electronic interlock for storage assemblies |
US5278395A (en) * | 1991-09-03 | 1994-01-11 | Hello S.A. | Portable electronic access controlled system for parking meters or the like |
US5299436A (en) * | 1990-03-13 | 1994-04-05 | Mardesich Enterprises, Inc. | Fast access electronic locking system |
US5321242A (en) * | 1991-12-09 | 1994-06-14 | Brinks, Incorporated | Apparatus and method for controlled access to a secured location |
US5615625A (en) * | 1993-04-05 | 1997-04-01 | First National Bank Of Southern Africa Limited | System for the secure transportation of articles |
US5736932A (en) * | 1996-07-03 | 1998-04-07 | At&T Corp | Security for controlled access systems |
US5835861A (en) * | 1994-11-22 | 1998-11-10 | Lucent Technologies Inc. | Enhanced automatic operation of wireless telephones |
US6040771A (en) * | 1995-12-02 | 2000-03-21 | Kim; Jitae | Intelligent safe system |
US20020091537A1 (en) * | 2000-11-06 | 2002-07-11 | Algazi Allan Stuart | System and methods for transportation and delivery using bar codes |
US20020153994A1 (en) * | 2001-04-18 | 2002-10-24 | Fedex Corporation | System and method for controlling access to designated area |
US20030104866A1 (en) * | 2001-12-05 | 2003-06-05 | Arrow International, Inc. | Electronic game unit with removable processor |
US6583713B1 (en) * | 1997-08-14 | 2003-06-24 | Micron Technology, Inc. | Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system |
US6806807B2 (en) * | 2000-06-30 | 2004-10-19 | Jordan Cayne | Intelligent locking system |
US6850149B2 (en) * | 2000-11-27 | 2005-02-01 | Lg Electronics Inc. | Network control method and apparatus for home appliance |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4119815A (en) * | 1977-05-31 | 1978-10-10 | American District Telegraph Company | Central station system including secondary communication path established through commercial telephone network |
JPH0685912A (en) * | 1992-08-31 | 1994-03-25 | Tokyo Cosmos Electric Co Ltd | Communication line interruption alarm device |
US5416472A (en) * | 1992-12-04 | 1995-05-16 | Torii, Jr.; Dennis R. | Firearm security system and access lock therefor |
US5475378A (en) * | 1993-06-22 | 1995-12-12 | Canada Post Corporation | Electronic access control mail box system |
JP3433855B2 (en) * | 1995-02-15 | 2003-08-04 | 富士通株式会社 | Transport container management system |
AU5618000A (en) | 1999-06-16 | 2001-01-02 | Reinhold Holtkamp | Network connected delivery box using access codes and methods for providing same |
GB2353067B (en) | 1999-07-19 | 2001-07-18 | Spinnaker Int Ltd | Security cabinet,combined security unit and ATM pick unit,and ATM including such an arrangement |
GB2365606A (en) | 2000-08-04 | 2002-02-20 | Something4 Ltd | Selective (goods) storage access |
US7212098B1 (en) * | 2000-09-21 | 2007-05-01 | Myspace, Llc | Portable security container |
-
2002
- 2002-08-13 EP EP02018080.8A patent/EP1391579B1/en not_active Expired - Lifetime
-
2003
- 2003-08-12 WO PCT/EP2003/008937 patent/WO2004016896A1/en active Application Filing
- 2003-08-12 US US10/524,416 patent/US20060139147A1/en not_active Abandoned
- 2003-08-12 AU AU2003250228A patent/AU2003250228A1/en not_active Abandoned
-
2010
- 2010-08-02 US US12/848,724 patent/US8749382B2/en not_active Expired - Fee Related
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4727369A (en) * | 1984-06-29 | 1988-02-23 | Sielox Systems, Inc. | Electronic lock and key system |
US5219386A (en) * | 1988-05-06 | 1993-06-15 | Keba Gesellschaft M.B.H. & Co. | Locker unit comprising a plurality of lockers |
US5299436A (en) * | 1990-03-13 | 1994-04-05 | Mardesich Enterprises, Inc. | Fast access electronic locking system |
US5225825A (en) * | 1990-04-05 | 1993-07-06 | Meridian Incorporated | Electronic interlock for storage assemblies |
US5131038A (en) * | 1990-11-07 | 1992-07-14 | Motorola, Inc. | Portable authentification system |
US5278395A (en) * | 1991-09-03 | 1994-01-11 | Hello S.A. | Portable electronic access controlled system for parking meters or the like |
US5321242A (en) * | 1991-12-09 | 1994-06-14 | Brinks, Incorporated | Apparatus and method for controlled access to a secured location |
US5615625A (en) * | 1993-04-05 | 1997-04-01 | First National Bank Of Southern Africa Limited | System for the secure transportation of articles |
US5835861A (en) * | 1994-11-22 | 1998-11-10 | Lucent Technologies Inc. | Enhanced automatic operation of wireless telephones |
US6040771A (en) * | 1995-12-02 | 2000-03-21 | Kim; Jitae | Intelligent safe system |
US5736932A (en) * | 1996-07-03 | 1998-04-07 | At&T Corp | Security for controlled access systems |
US6583713B1 (en) * | 1997-08-14 | 2003-06-24 | Micron Technology, Inc. | Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system |
US6806807B2 (en) * | 2000-06-30 | 2004-10-19 | Jordan Cayne | Intelligent locking system |
US20020091537A1 (en) * | 2000-11-06 | 2002-07-11 | Algazi Allan Stuart | System and methods for transportation and delivery using bar codes |
US6850149B2 (en) * | 2000-11-27 | 2005-02-01 | Lg Electronics Inc. | Network control method and apparatus for home appliance |
US20020153994A1 (en) * | 2001-04-18 | 2002-10-24 | Fedex Corporation | System and method for controlling access to designated area |
US20030104866A1 (en) * | 2001-12-05 | 2003-06-05 | Arrow International, Inc. | Electronic game unit with removable processor |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138405A1 (en) * | 2003-12-18 | 2005-06-23 | Ncr Corporation | Media transport cassette |
US20070044524A1 (en) * | 2005-08-24 | 2007-03-01 | Innerloc, Llc, A Texas Limited Liability Corporation | Internal locking apparatus and methods for making and using same |
US8608575B2 (en) * | 2008-08-15 | 2013-12-17 | Nxp B.V. | Container and electronic game system comprising such container |
US20110201432A1 (en) * | 2008-08-15 | 2011-08-18 | Nxp B.V. | Container and electronic game system comprising such container |
US9710055B1 (en) | 2008-09-30 | 2017-07-18 | The Directv Group, Inc. | Method and system for abstracting external devices via a high level communications protocol |
US10819939B2 (en) | 2008-09-30 | 2020-10-27 | The Directv Group, Inc. | Method and system for controlling a low power mode for external devices |
US8291247B1 (en) | 2008-09-30 | 2012-10-16 | The Directv Group, Inc. | Method and system for predicting use of an external device and removing the external device from a low power mode |
US8671429B1 (en) | 2008-09-30 | 2014-03-11 | The Directv Group, Inc. | Method and system for dynamically changing a user interface for added or removed resources |
US9049473B1 (en) | 2008-09-30 | 2015-06-02 | The Directv Group, Inc. | Method and system of processing multiple playback streams via a single playback channel |
US11330224B2 (en) | 2008-09-30 | 2022-05-10 | Directv, Llc | Method and system for controlling a low power mode for external devices |
US9148693B1 (en) | 2008-09-30 | 2015-09-29 | The Directv Group, Inc. | Method and system of scaling external resources for a receiving device |
US9426497B1 (en) | 2008-09-30 | 2016-08-23 | The Directv Group, Inc. | Method and system for bandwidth shaping to optimize utilization of bandwidth |
US9494986B1 (en) | 2008-09-30 | 2016-11-15 | The Directv Group, Inc. | Method and system for controlling a low power mode for external devices |
US10212384B2 (en) | 2008-09-30 | 2019-02-19 | The Directv Group, Inc. | Method and system for controlling a low power mode for external devices |
US20100179890A1 (en) * | 2009-01-14 | 2010-07-15 | Cianciotto Jr Michael S | Tool inventory management system |
EP2452320B1 (en) * | 2009-07-10 | 2018-11-28 | Novomatic AG | Apparatus for managing, accepting and/or dispensing valuables |
US20130038550A1 (en) * | 2011-08-08 | 2013-02-14 | Lattice Energy Technology Corporation | Multi-protection touch lock |
US10445541B2 (en) * | 2011-10-26 | 2019-10-15 | Warsaw Orthopedic, Inc. | Portable RFID tagged carrier for sterile implants and biological products |
US9950621B2 (en) * | 2011-10-28 | 2018-04-24 | Husqvarna Ab | Indicator system for outdoor power equipment |
US20170225569A1 (en) * | 2011-10-28 | 2017-08-10 | Husqvarna Ab | Indicator system for outdoor power equipment |
US9624711B2 (en) * | 2012-03-05 | 2017-04-18 | Craig D. Mcalexander | Locking insert mechanism and receiver to secure personal weapons, valuables and other items |
US20150225993A1 (en) * | 2012-03-05 | 2015-08-13 | Craig D. Mcalexander | Locking insert mechanism and receiver to secure personal weapons, valuables and other items |
US20180162636A1 (en) * | 2016-12-13 | 2018-06-14 | Sigma-Aldrich International Gmbh | Electronics assembly for wireless transmission of at least one status information |
US10618726B2 (en) * | 2016-12-13 | 2020-04-14 | Sigma-Aldrich International Gmbh | Electronics assembly for wireless transmission of at least one status information |
US20200020187A1 (en) * | 2017-07-10 | 2020-01-16 | Panasonic Intellectual Property Corporation Of America | Supply chain system and non-transitory computer-readable recording medium storing program |
US11195357B2 (en) * | 2017-07-10 | 2021-12-07 | Panasonic Intellectual Property Corporation Of America | Supply chain system and non-transitory computer-readable recording medium storing program |
US10990922B1 (en) * | 2019-02-02 | 2021-04-27 | Roambee Corporation | Continuous inventory management |
US11599852B1 (en) * | 2019-02-02 | 2023-03-07 | Roambee Corporation | Continuous inventory management |
US11978015B1 (en) | 2019-02-02 | 2024-05-07 | Roambee Corporation | Continuous inventory management |
Also Published As
Publication number | Publication date |
---|---|
AU2003250228A1 (en) | 2004-03-03 |
US8749382B2 (en) | 2014-06-10 |
WO2004016896A1 (en) | 2004-02-26 |
US20110187530A1 (en) | 2011-08-04 |
EP1391579A1 (en) | 2004-02-25 |
EP1391579B1 (en) | 2015-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8749382B2 (en) | Portable security container | |
US20070171060A1 (en) | Portable security container | |
US11935353B2 (en) | Apparatus for controlling access to and use of portable electronic devices | |
US10643415B2 (en) | Package management system with accelerated delivery | |
TW300936B (en) | ||
US7012503B2 (en) | Electronic key device a system and a method of managing electronic key information | |
CA2811317C (en) | Systems and methods for accessing or managing secured storage space | |
CN114365230A (en) | Security inventory access and control mechanism | |
US20020105425A1 (en) | Walk-in crib | |
US20150211258A1 (en) | Electronic Cam Lock for Cabinet Doors, Drawers and Other Applications | |
US20170186258A1 (en) | Electronic locker | |
EP3493129A1 (en) | Rfid scanning device | |
US11952827B1 (en) | Portable locker and docking station system | |
JP2011065264A (en) | Asset management system | |
JP2005139644A (en) | Key information distribution system | |
US20080150680A1 (en) | Remote Portable Access System | |
EP2157889B1 (en) | Mail delivery system | |
US11544980B2 (en) | Electronic key storage device | |
KR102100642B1 (en) | Block type locker having function of iot | |
CN212027435U (en) | Locking device for parcel box | |
KR20170015955A (en) | A digital doorlock which performs additional authentication by user's callback | |
KR101682546B1 (en) | Door lock device for providing information | |
EP4053807A1 (en) | Electronic key storage device | |
JP2006185315A (en) | Security system | |
JP2024085773A (en) | Control device and control system for lock device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MYSPACE LLC, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STERZINGER, HERMANN;LEICHER, PETER;HYATT, RICHARD G.;REEL/FRAME:017584/0570 Effective date: 20051123 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |