WO1993016261A1 - A method for transporting valuables - Google Patents
A method for transporting valuables Download PDFInfo
- Publication number
- WO1993016261A1 WO1993016261A1 PCT/SE1993/000127 SE9300127W WO9316261A1 WO 1993016261 A1 WO1993016261 A1 WO 1993016261A1 SE 9300127 W SE9300127 W SE 9300127W WO 9316261 A1 WO9316261 A1 WO 9316261A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- case
- sigil
- computer
- location
- depot
- Prior art date
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/14—Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/005—Portable strong boxes, e.g. which may be fixed to a wall or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/32—Time-recording locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00761—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C2009/0092—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
- G07C9/00674—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
- G07C9/0069—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in a predetermined sequence
Definitions
- the present invention relates to a method for transporting valuable documents from a first location to a second location in a break-in protected case provided with means which, on triggering, acts upon the valuable documents in the case, for instance by dye-disfiguration, triggering being controlled by a timing mechanism in the case, which method comprises that the despatcher at the first location, after putting the valuables in the case, locks it_and activates the timing mechanism to induce triggering after a given transport time in the absence of any deactivation, the case is transported from the first location to the second location, and the recipient at the second location deactivates the timing mechanism in the case and afterwards opens it.
- the object of the invention is to improve the known technique so as to provide enhanced flexibility and improved securit .
- the underlying concept is the utilization of a break-in protected, computer equipped case with variable locking codes.
- the code is linked to a "sigil", a number combination created by a sufficiently long sigil key, an algorithm and a number of known ( "open” ) but constantly changing data.
- the sigil key which is a prerequisite for the correct calculation of the opening code, is held by the despatcher and the recipient of the money or valuable documents and is secret.
- the sigil key is advantageously held in a "smart card", a card with a memory function and a certain calculating capacity of its own - i.e. a computer.
- the information in the card together with the "open" information regarding a case is processed via a computer card reader ( “sigilator” ) and then sent to a computer in the case, the case being opened if the right opening code has been received.
- the break-in protected case is provided with various forms of alarm and means which upon activation uses dye to disfigure the money or valuable documents in a consistent fashion so that they become unacceptable as a means of payment, but can still be identified by the authenticated legitimate owner and in the circumstances replaced in the most appropriate manner.
- the case is further provided with technical means so that it can determine for itself if the conditions for activation, i.e. dye-disfiguration, are fulfilled.
- Conditions for dye-disfiguration are, for example, an attempt to break into the case, an electricity supply problem, a technical problem in the case computer, exceeding the despatcher-to-recipient transport time, exceeding the transport time between customer and vehicle, or vice versa.
- the case is further provided with additional sigil and sigil key technology in order to identify "safe environments".
- a safe environment can be created, for example, in a vehicle by a vehicle computer which regularly exchanges transport sigils with the case and in so doing demonstrates to the case that it is located in a safe environment.
- a safe environment can also be created in the depot with a computer which regularly exchanges sigils with the case in the same fashion.
- the sigil keys which can be the same throughout a district or be individual for each case or vehicle, are held in this case in the vehicle and case computers.
- Each case additionally has a "depot sigil" for updating data and changing sigil keys, control information etc. This requires a further secret sigil key with the task of legitimating alterations of the essential information with regard to the case wher it is located in the depot.
- All of the secret sigil keys can be quickly_changed throughout a case population, for example if any of the cases are stolen.
- the case computer has a mechanism to protect it against unauthorized reading of sigil keys. Immediately prior to dye-disfigurement, all of the sigil keys in the case computer are erased. The same thing applies with a vehicle computer which is subjected to external tampering.
- Fig. 1 schematically depicts a valuables transport case with a sigilator connected up;
- Fig. 2 schematically depicts the layout of a depot computer system, in block diagrar format
- Fig. 3 schematically depicts the layout of a case computer, in block diagram format
- FIG. 4 schematically depicts the layout of a vehicle computer with associated case connection, in block diagram format
- Fig. 5 schematically depicts the layout of a sigilator with associated card, in block diagram format.
- a system incorporating the invention comprises, in accordance with Figs. 1 to 5, a number of components to enable conveyance of money by case from one location to another in an entirely safe-from-stealing manner.
- the case should not be openable by anyone other than the person it is intended for, i.e not even by the person who packed the money in the case.
- the system has the following parts.
- a case 1 (Fig. 1) is specially equipped to carry money 3.
- This case contains a computer 5 (Fig. 3)_which can establish whether it is an authorized recipient opening the case. If the case is opened without authority, the money is sprayed with dye which makes it unusable.
- ID sigil is used to calculate an opening code with the aim of establishing if a recipient is authorized to open the case.
- the keys to the sigil algorithm are stored, inter alia, in active cards 9 of the "Smart Card” type (a BULL CP8 card).
- a system to forward information to the case is located at the place where the money is packed into it so that the case will be able to establish whether an individual opening the case is authorized.
- the case is packed, inter alia, at a depot.
- Located at the depot is a PC-based system which has information on all the customers likely to need money from that depot.
- the depot computer 2 (Fig. 2) is connected up to the case 1 and forwards opening codes to the case which is subsequently activated.
- the case is then transported in a special valuables transport vehicle which has a "vehicle computer" (Fig. 4) to which the case is connected up.
- the task of this computer is to inform the case computer that the case is in a safe environment. If the case is not in such an environment and is activated, a clock (timer) within the case operates. When this clock has counted down to zero, the dye cartridges are detonated in the case and the money therein becomes unusable.
- This clock normally only counts down during "pavement time", i.e. when the case is carried from the vehicle into a bank for example, or vice versa.
- a sigilator is a computer unit with a reader 11 for cards of the Smart Card type (Fig. 5) .
- the recipient of the money has such a card containing the key for calculating the electronic sigil.
- a four digit PIN code must be input by the recipient to the card via the sigilator.
- the case computer 5 and the sigilator 7 are connected via a lead through which communication is effected (Fig. 1)
- the case computer forwards information to the sigilator which calculates a sigil based on this information and the key and forwards this sigil back to the computer.
- a sigil was input to the case computer.
- the case computer compares these two sigils with each other. If the two sigils correspond, the case computer checks, prior to opening the case, that it is not the same card being used which closed (packed) the case. This ensures that the case can not be opened at the same location at which it was packed.
- Safety-on open
- primed loaded
- safety-off closed
- the case In safety-on mode, the case can not detonate the dye cartridges. A safety-on case can not be switched to safety-off. It must first receive data regarding the next opening. These data comprise an ID-sigil, input data for the sigil algorithm which has calculated the ID-sigil and a customer number which indicates who stored this information. Following this, the case is in the primed mode.
- a primed case can be switched to safety-off and can also be loaded with new opening information.
- switching to safety-off of a case is effected by momentarily pressing a switch on the exterior of the case or by the depot computer forwarding a message to this effect.
- a primed case is indicated by a green light emitting diode on the exterior.
- the lid of a safety-off case can not be opened without detonating a dye cartridge.
- a timer in the case operates the whole time. When this timer has counted down to zero, the dye cartridge is detonated.
- the vehicle computer polls it and all of the other cases.
- the polling signals contain, inter alia, a transport sigil. If this sigil corresponds to the relevant sigil calculated by the case computer, the timer is reset. If the sigil does not correspond, dye will be sprayed out over the money when the timer has counted down to zero.
- a safety-off case can be opened with the right ID-sigil.
- This sigil can come from the depot computer or a sigilator. If the sigil received by the case computer is correct, a check is made that the customer number is not the same as that which closed the case. If this check also gives the correct result, the case is "opened".
- a closed case indicates this fact with a blinking red light emitting diode located on the exterior. This light emitting diode blinks more intensively as the time remaining before the timer counts down to zero diminishes.
- the task of the depot system is the management of cases as well as vehicles and customer information.
- the depot system is PC based and one is situated at each depot. Its general set-up is depicted in Fig. 2. Logging on is effected via a single use password using a PC-connected sigilator 7 and a personal active card 9.
- the depot system loads each case computer with the parameters necessary for the case computer to function.
- the depot computer has further functions for the transfer of information to each case which provide that the case can either regard itself "safe” or be opened or closed.
- Each depot has an "c customer collection”, e.g. the necessary informatic n its own circle of customers to enable the managemen of their money transportation.
- each case or vehicle computer must be initiated with certain information.
- the computers have a defined number of status inputs. Each status input requires a decision as to what measure or measures the computer is to take in relation to changing of the status in question.
- a case computer must contain certain fundamental data in order to function within the system. Such information includes the case number, transport key and depot key.
- the depot computer can communicate with the case computer and with the assistance of the transport key the preconditions for communication with the vehicle computer during transport are also created (the transport sigil function).
- a completely new case at a depot is allocated a case number drawn from a number series for the cases of that depot. Number allotment is conveniently done sequentially using the "next available" principle.
- the transport key and the depot key are also transferred to the case computer for storing therein after which the depot system notes that the new case is now in the system.
- Ths case is the most vital component in the whole concept. Functioning of the case is the wholly deciding factor for the secure money transport. It is therefore of great importance that the various parts of the case are regularly tested for function and serviced.
- One task of the depot system is to keep up with the condition of the cases. This is done by storing information for each case regarding case identification, latest computer function test and latest exchange of batteries and dye cartridges.
- the vehicle computer must be regularly checked if the system is to function without ccLiplaint. It is, of course, the function of the vehicle computer to ensure that the case regards itself safe and to store information on the movements of the case.
- the vehicle computer also must have certain information to be able to contribute to the secure transport of valuables. To be able to keep watch over "its" cases, the vehicle computer must have the possibility of identifying itself to all the connected cases. This is done by
- Polling signifies that the computer forwards an enquiry if there are any cases connected up. A case must recognize itself in order to respond to such an enquiry. This is effected with an "exchange" of transport sigils. The sigil must be calculated from a common transport key and one task of the depot system is to provide the vehicle computer with this key. To this end, the vehicle computer is connected up to the depot computer and exchange of information is effected in accordance with communication protocols.
- the depot system has a routine to enable changing of the key in the case.
- a session is commenced by the depot computer forwarding a "depot enquiry" to the case.
- the case responds to this enquiry by forwarding information for the calculation of a depot sigil to the depot computer.
- the depot computer calculates a depot sigil based upon the received information and delivers this to the case. If everything is OK, i.e. if the case computer, after having also calculating a depot sigil, finds that the sigils correspond, communication continues with uptake, via the case number, of the current transport key and the depot computer does a sigil calculation with the new key as a basis.
- the resulting sigil is forwarded, together with its underlying data (the new key) to the case computer.
- the case computer verifies the sigil and stores the new key in the case computer.
- the electronic lock consists of an ID sigil for identifying the authorized recipient.
- the physical lock can consist of a plastic seal which is applied to the case when the electronic locking is ready.
- the depot system has the tasks of ensuring that the case is electronically locked and then can not be opened by anyone other than whom it was intended for.
- the routine to switch the case to safety-off in the depot is to first connect the case up to the depot computer.
- the depot computer senses that a case is connected up and sends out a status enquiry to the case which responds with its case number, non-fixed data (time) and other information on its physical state.
- the depot computer can infer what the case computer considers regarding the functioning of its inbuilt equipment. If the function status is not OK, the closing procedure should be immediately broken off.
- the depot computer uses the received case number to find the current sigil key to the case and thereafter to calculate a depot sigil for the case based upon the case number and said non-fixed data.
- the case is cleared of its logging data and optionally loaded with new information as to time and timing.
- the depot computer now questions the user as to information on the customer who is to have the case. This can be the customer number or the name of those who are to have the case. Should the option of the name as identification be selected, a list is shown of the customer entries which correspond with the input key data. With this list as a starting point, the intended customer can then be "pointed out”. The input is verified against the customer register of the depot and thereafter an ID sigil key for the customer is drawn. This sigil key forms the basis for calculation of an ID sigil, a unique identification of a certain recipient. The ID sigil is calculated with TIME as a factor.
- the calculated ID sigil, non-fixed base data for the ID sigil and the customer number for those who are to close the case, are forwarded to the case computer.
- the customer number is actually the identity of those who are to have the case but with the category marking "depot”.
- the case computer verifies with its own depot sigil calculation that the information comes from an authorized party, after which the information is stored in the case computer memory.
- the depot system requests the operator to switch the case to "safety-off". Input of this command means that the operator acknowledges the case as "safety-off” and ready for delivery. If the operator elects to switch the case to "safety-on", a command sequence should be sent in order to disarm the case computer. If no response is forthcoming at all from the operator or a repeatedly wrong response is given, after a certain amount of time a command sequence is sent to disarm the case computer, i.e. "safety-on" is sent to the case.
- the next initiative of the case computer is now to instruct the case computer to switch to "safety-off". This is effected by calculating the depot sigil from the sigil key of the case and TIME, and forwarding it together with sigil data and command codes to the case.
- the case verifies with its own calculation of the depot sigil that the command comes from an authorized party after which a function test is initiated. Depending on the outcome of this function test, the response "closed” or “open” is delivered back to the depot computer.
- the depot computer does not receive any response from the case, this should be alerted on the screen of the depot computer so that as much attention as possible is brought to bear.
- a case has two locks, one physical and one electronic when it is to be opened in the depot.
- the physical lock consists of a simple plastic seal and has the task of preventing opening by mistake.
- To open the plastic seal a hand grip is required which causes the "opener” to consider and to carry out the various manipulations in the opening routine in the right order.
- the electronic lock is based on an ID sigil and keeps the case safety-off.
- the case sigil enables the case to recognize itself and the ID sigil identifies the authorized recipient.
- a safety-off case is ready to be
- the depot system has adequate information to be able to open all of the cases which are freighted to and from the customers of the depot.
- Authorization in accordance with the authorization rules is required to gain access to the opening information of the depot system.
- the routine for the opening of a safety-off case in the depot is to first connect up the case to the depot system.
- the depot computer "senses" that a case is connected and sends a status enquiry to the case.
- the case responds to this status enquiry by reciting information on its case number etc.
- the depot computer draws a depot key for calculation of a depot sigil.
- the depot sigil is calculated on TIME and forwarded to the case together with base data (TIME) in a "give me opening parameters" transaction to the case computer.
- the case computer calculates its own depot sigil guided by the data received from the depot computer.
- the depot sigil is compared with the received depot sigil and if the two correspond, the case computer considers itself safe to communicate further with the depot computer.
- This communication is effected in the form of a "here are my opening data" message back to the depot computer.
- This message contains information for sigil calculation (DATE) and information on the customer (customer number) who packed the case.
- the depot computer draws the ID sigil key intended for the actual customer.
- An ID sigil is calculated and forwarded in an "open up" transaction to the case computer.
- the case computer compares the thus transferred ID sigil with the sigil which identifies the authorized recipient and if these correspond the case computer "disarms” the destruction device and detectors and advises this, ("open"), to the depot computer.
- the depot computer advises the "opener", via its screen, that it is now appropriate to remove the plastic seal and physically open and empty the case.
- the timer of the case computer is operating. In order to keep the timer in check during the opening procedure, it is necessary that the depot computer can retrieve the case number and thereby the transport key in order to calculate the transport sigil.
- Every event in the system is logged where and when it occurs.
- the depot system logs events which the depot system has control over, the case computer logs events which lie near to hand and the vehicle computer does likewise in its quarter.
- the depot computer logs every event with user identity, time point and function used (requested).
- Each case logs itself by storing information on events during loading, transport and opening procedures.
- the vehicle computer logs events in its proximity. Each time a case registers itself as “newly entrained”, the vehicle computer logs this fact. When the case eventually no longer responds to polling, the vehicle computer notes this in its log.
- the case logs are routinely cleared in connection with new packing but his can also be explicitly effected by a special request from the depot computer to the case computer.
- the vehicle computer is connected up to the depot computer for clearing of the vehicle computer logs, whereupon log clearing command sequences are sent from depot computer to vehicle computer.
- the depot system has the capability to compile an event log for a certain case/vehicle/depot or customer. Upon closing of a case, certain information on the case, date, time, customer and transport information are stored. This information can later be retrieved at some convenient occasion and reconciled with the correponding information from the case and vehicle computers for possible follow-up purposes.
- the communication between the depot and case computers is bidirectional at the initiative of the depot computer.
- the case computer In order for the case computer to take up information, it is necessary to be able to determine that it is communicating with a depot. This is effected by the handshake between the depot computer and case is initiated with the depot enquiring after information upon which to calculate the depot sigil. The case supplies this to the depot computer whereupon the depot sigil is calculated and transferred to the case computer where the sigil is compared with the sigil calculated by the case computer. If the comparison is favourable, the case computer regards itself safe to continue communication.
- the depot and vehicle computers hold bidirectional communication at the initiative of the depot computer.
- the communication includes functions for loading of the transport keys and clearing of logs.
- Each "statement exchange” is verified by the vehicle computer via a depot sigil following the pattern of communications between depot - case.
- the case is coupled with a lead to a sealed, vehicle or sigil computer which regularly "polls” e.g. decouples/deactivates the time mechanism.
- vehicle computer contains a transport key which can be the same for a given transporter within a whole district and therefore can deactivate all the cases which belong to the district (depot area).
- the transport sigil does not allow unlocking of the case. It is also possible to time restrict the duration of this coupling.
- the case also contains the transport key which is used for verification.
- the vehicle computer should be kept activated by deliberate actions of the transporters. For example, the following conditions can be posed in order that the vehicle computer should remain alive and legitimate the cases:
- Position information is regularly sent (every 5, 10, 15 minutes)
- the signalling can include a location sigil which is to be verified by the computer in the vehicle for maintaining continued operation. This can, e.g. be de-pressed by the vehicle personnel when responding to a position call.
- this regular radio traffic gives good assistance in tracking the vehicle, when necessary.
- the recipient's ID sigil (Fig. 5) is required for post- transport unlocking. This is calculated by a sigil computer or sigilator in combination with a smart card which contains the personal ID sigil key while also utilizing open information on e.g. date and loading time of loading the case number.
- an administrative aid such as a PC with sigil software, encryptation etc, becomes practical.
- the one or two authorised persons/officers which are needed, for instance at a bank branch, can each be equipped with a personal "Smart Card” with ID sigil key.
- the valuables transporter carries a sigilator with communication capability with the case (adjustment only possible when the case is open) with whose help the secret sigil is created and stored in the case.
- the valuables transporter brings along the open information and someone with the sigil key at the second location can thereby give the right code to the case to open the lock mechanism.
- the, e.g. bank branch can be equipped with its own sigilator.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collation Of Sheets And Webs (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP93904463A EP0635091A1 (en) | 1992-02-17 | 1993-02-17 | A method for transporting valuables |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9200464A SE501386C2 (en) | 1992-02-17 | 1992-02-17 | Procedure for value transport |
SE9200464-7 | 1992-02-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1993016261A1 true WO1993016261A1 (en) | 1993-08-19 |
Family
ID=20385340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE1993/000127 WO1993016261A1 (en) | 1992-02-17 | 1993-02-17 | A method for transporting valuables |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP0635091A1 (en) |
SE (1) | SE501386C2 (en) |
WO (1) | WO1993016261A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL1005598C2 (en) * | 1997-03-21 | 1998-09-22 | Iq Sec N V S A | Device for securing valuables and storage rack as well as base station for use therewith. |
EP1271424A1 (en) * | 2001-06-28 | 2003-01-02 | Jean Pierre Derni | Control system for invalidating valuables contained in a box |
EP1541795A3 (en) * | 2003-12-10 | 2005-07-06 | Giesecke & Devrient GmbH | Container for storing valuables |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2397613A (en) * | 2002-12-13 | 2004-07-28 | Envopak Group Ltd | Lock system with electronic key unit |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1989002968A1 (en) * | 1987-09-30 | 1989-04-06 | Global Security Ab | Locking system |
EP0328495A2 (en) * | 1988-02-12 | 1989-08-16 | Inter Innovation AB | System for the safe and secure transportation of valuable articles, such as bank notes, cheques etc. |
EP0385070A1 (en) * | 1989-02-24 | 1990-09-05 | Daimler-Benz Aktiengesellschaft | Remote control system with a code transmitted by code words |
-
1992
- 1992-02-17 SE SE9200464A patent/SE501386C2/en unknown
-
1993
- 1993-02-17 WO PCT/SE1993/000127 patent/WO1993016261A1/en not_active Application Discontinuation
- 1993-02-17 EP EP93904463A patent/EP0635091A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1989002968A1 (en) * | 1987-09-30 | 1989-04-06 | Global Security Ab | Locking system |
EP0328495A2 (en) * | 1988-02-12 | 1989-08-16 | Inter Innovation AB | System for the safe and secure transportation of valuable articles, such as bank notes, cheques etc. |
EP0385070A1 (en) * | 1989-02-24 | 1990-09-05 | Daimler-Benz Aktiengesellschaft | Remote control system with a code transmitted by code words |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL1005598C2 (en) * | 1997-03-21 | 1998-09-22 | Iq Sec N V S A | Device for securing valuables and storage rack as well as base station for use therewith. |
WO1999058799A1 (en) * | 1997-03-21 | 1999-11-18 | Iq.Sec N.V./S.A. | Device for securing valuable goods and storage rack as well as base station for use therewith |
EP1271424A1 (en) * | 2001-06-28 | 2003-01-02 | Jean Pierre Derni | Control system for invalidating valuables contained in a box |
EP1541795A3 (en) * | 2003-12-10 | 2005-07-06 | Giesecke & Devrient GmbH | Container for storing valuables |
Also Published As
Publication number | Publication date |
---|---|
SE9200464L (en) | 1993-08-18 |
SE9200464D0 (en) | 1992-02-17 |
EP0635091A1 (en) | 1995-01-25 |
SE501386C2 (en) | 1995-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10984625B2 (en) | Intelligent key system | |
CN1611060B (en) | Radio identification system | |
EP3433838B1 (en) | Automated locker system and method for delivery and collection of packages | |
JP3433855B2 (en) | Transport container management system | |
JP3571383B2 (en) | IC card, IC card read / write device and electronic wallet system | |
EP0193920B1 (en) | Ic card system | |
US20130027177A1 (en) | Electronic Security System for Monitoring Mechanical Keys and Other Items | |
US20120011366A1 (en) | Method for Controlling and Recording the Security of an Enclosure | |
JPH0689383A (en) | Device and method for performing handling of storing place which is safely managed | |
RU2005138121A (en) | SYSTEM AND METHOD FOR CREATING DEVICES WITH A UNIFIED SET OF ACCOUNTING INFORMATION ADAPTED TO PROCESSING BIOMETRIC DATA, AS WELL AS THE SYSTEM AND METHOD FOR APPLYING SUCH DEVICES | |
CN101868810A (en) | System for management of ubiquitously deployed intelligent locks | |
US5315656A (en) | System for protecting documents or objects enclosed in a tamper-proof container | |
CN113538770A (en) | Intelligent money box control system and method | |
KR101755352B1 (en) | Firearms Management Method and System | |
US11400888B1 (en) | Commercial vehicle access control system | |
US6430689B1 (en) | System for securely transporting objects in a tamper-proof container, wherein at least one recipient station is mobile and portable | |
EP0635091A1 (en) | A method for transporting valuables | |
EP1926058A2 (en) | Cash dispensing system | |
CN114780984B (en) | Intelligent money box handover management method and system | |
JPS6332075A (en) | Passage control system | |
US10200858B2 (en) | Distributed management system for security of remote assets | |
JP2019215653A (en) | Money depositing machine management system | |
JP4843919B2 (en) | IC card stacker and electronic money system | |
JP2009003635A (en) | Handgun management system | |
GB2362188A (en) | Security system for lockable enclosures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): FI NO US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1993904463 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: US Ref document number: 1994 256524 Date of ref document: 19940715 Kind code of ref document: A Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 1993904463 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1993904463 Country of ref document: EP |