WO2001061134A1 - Dispositif et procede de transport securise d'un objet - Google Patents
Dispositif et procede de transport securise d'un objet Download PDFInfo
- Publication number
- WO2001061134A1 WO2001061134A1 PCT/FR2001/000445 FR0100445W WO0161134A1 WO 2001061134 A1 WO2001061134 A1 WO 2001061134A1 FR 0100445 W FR0100445 W FR 0100445W WO 0161134 A1 WO0161134 A1 WO 0161134A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- container
- signal
- communication
- network
- state
- Prior art date
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/14—Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft
-
- A—HUMAN NECESSITIES
- A45—HAND OR TRAVELLING ARTICLES
- A45C—PURSES; LUGGAGE; HAND CARRIED BAGS
- A45C13/00—Details; Accessories
- A45C13/18—Devices to prevent theft or loss of purses, luggage or hand carried bags
- A45C13/24—Devices for sound-producing, piercing, gas-discharging, or the like
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/005—Portable strong boxes, e.g. which may be fixed to a wall or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D11/00—Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
- G07D11/10—Mechanical details
- G07D11/12—Containers for valuable papers
- G07D11/125—Secure containers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F9/00—Details other than those peculiar to special kinds or types of apparatus
- G07F9/06—Coin boxes
Definitions
- the invention relates to the field of secure transport of objects, such as for example cash (in particular banknotes) and / or checks and / or precious or confidential documents.
- this type of secure transport is currently carried out using armored vehicles. This is particularly the case for the transfer of tickets, from a store to a bank, or from a local bank to another local bank. It is clear that this type of transport presents a certain number of constraints, such as the need to order one, or to have an armored vehicle, and to resort to physical protections for the people who are responsible for carrying out the conveying. .
- armored vehicles are generally bulky. The problem therefore arises of finding a method and a transport device, having a certain degree of security, but allowing conveying using less expensive or less bulky means than armored vehicles.
- the subject of the invention is precisely a device for the secure transport of an object comprising: - means for containing an object to be transported, also called a container, and means for closing or locking these means or this container, communication means, or connection means, for connecting the means for containing an object, or the container, to a communication network.
- the container can then receive, in response, a signal to open the container or means for containing said object.
- the subject of the invention is also a device for the secure transport of an object comprising:
- means for containing an object to be transported also called a container, and means for closing or locking these means or this container,
- communication means for connecting the means for containing an object, or the container, to a communication network, and for sending, on this network, a signal relating to a state of the means for containing said object or the container,
- an opening of the container, or of the means which contain the object can be conditioned to the state of these means or of this container. If the signal relating to the state of the container indicates an attempt to break into the container, no opening signal will be transmitted, and it will take an intervention, for example that of the sender himself, to carry out the container opening
- the opening of the container may take place, after reception of the signal authorizing the opening. It is therefore a remote opening.
- the secure transport device therefore allows a remote control of the state of the container, this control being able to be carried out by the sender himself or by a third party, who is responsible for the sender to monitor the transport of the container and the object to the intended destination or recipient
- the container used is preferably compatible with manual transport (it is then a manual and secure transport device) or with a postal shipment
- the format of the container can be of the type used by the postal services
- the transport device according to the invention is preferably designed for manual transport or for a postal or courier shipment.
- the transport device advantageously replaces the secure means of transport known in the prior art, which use armored briefcases and which must be transported by guard personnel, most often armed
- the means of communication are means for, or specially programmed for, sending an encoded or encrypted signal relating to the state of the container
- the coding or encryption adds an additional degree of security a third party, who would obtain the information by monitoring the communication network used, could only collect information relating to the state of the containers in coded or encrypted form
- the device comprises means for identifying a normal or abnormal operating state, and / or for identifying an attempted break-in or violation or opening without authorization or a type of attempted break-in or violation or unauthorized opening of the transport device or its closing means
- the secunse transport device or the container, can be provided with means for detecting or measuring the temperature of the surrounding atmosphere of the container and / or with means for detecting or measuring the degree of hygrometry of this surrounding atmosphere.
- a conducting circuit can be arranged inside the container, as well as means for detecting a break in this circuit.
- a variation outside one, or of, specified range (s), or below or beyond a predetermined threshold value of the temperature and / or the hygrometry and / or the detection of a interruption of the conductive circuit can trigger means, placed inside the container, making it possible to destroy or damage or smear or mark an object contained in this container
- the means of communication of the secunse transport device according to the invention are means of connection to a telephone network
- the means of communication of the transport device according to the invention compose a telephone number, for example that of the sender or the transport supervisor.
- the latter once the communication is established, compares the telephone number of the er or of the telephone outlet to which the transport device is connected to one or more predetermined numbers which is / are that / those of the recipient initially chosen.
- the container can be opened remotely.
- the telephone network with which the communication is received is an analog network, which is more secure than a digital network.
- the communication network can be an Internet or LAN type network, or ETHERNET or ISDN or X25 or any other type.
- the secure transport device according to the invention is then provided with means for sending, on such a network, signals relating to its state, or else a signal or signals of identification of a recipient, such as for example an address.
- TRANSPAC or predetermined Internet.
- this device dials an identification number of a terminal or a monitoring device or system to which is connected, for example, the shipper or a transportation supervisor
- the secure transport device After establishment of the connection, a signal or signals relating to the state of the container is / are sent, via the network, to a person (for example the shipper or the transport supervisor) or to the terminal or to the surveillance device or system which may be able to send an opening signal to open the means which close or lock the container during all transport.
- a person for example the shipper or the transport supervisor
- the terminal or to the surveillance device or system which may be able to send an opening signal to open the means which close or lock the container during all transport.
- the electronic address or the identification of the place or of a terminal to which the transport device is connected can be compared with a predetermined address or identification which is that of the recipient initially chosen.
- the container can be opened remotely.
- the secure transport device further comprises means for supplying electrical energy, for supplying energy to the connection or communication means and / or to the reception means.
- the device according to the invention is autonomous. It suffices to ensure, before transport, that the means of supplying electrical energy have sufficient capacity to be able to send, on reception, the signal actually corresponding to the state in which container is located
- the invention also relates to a device for monitoring the secure transport of an object contained in a closed container, for example of the type according to the invention and as described above, this monitoring device being characterized in that it comprises :
- - means connected to a communication network, for receiving a signal relating to a state of the container
- the invention also relates to a device for monitoring the secure transport of an object contained in a closed container, for example of the type according to invention and as described above, this device being characterized in that it comprises
- - means connected to a communications network, for receiving a signal relating to a state of the container
- a monitoring device allows remote monitoring of the state of a container of a secure transport device according to the invention, when this device or this container is delivered to a recipient.
- This monitoring device can be provided with means for, or specially programmed for, sending a destruction or smearing or inclusion or marking signal of an object contained in the container, when the received status signal indicates that the containing was or is force, or was or is is attacked, by an external agent, or that the container is still closed after a predetermined closing time
- the monitoring device further comprises means for arming, beforehand, means for destruction or smearing or inclusion or marking of an object contained in the container, then for disarming these means, before sending the opening signal
- the operation or the arming step of the means of destruction or staining or inclusion or marking can be done just after loading the object into the container, for example at the operator of the surveillance system.
- the communication network to which the monitoring device according to the invention is connected can be of one or other of the types already described above (telephone network, or Internet or Ethernet or LAN or ISDN or X25 or any other type network).
- the system according to the invention preferably further comprises, or is preferably further connected to, a local communication line, of a local network, for example of a local telephone network, making it possible to arm the means destruction or smearing or inclusion or marking of an object contained in the container.
- the arming step can take place, and this without recourse to coding of the information exchanged between the communication device.
- monitoring and container is further provided with means for storing an identification code of a recipient or a destination heu of the transported object, and for comparing an identification code received with this identification code of the recipient or the object of the object.
- the surveillance system then emits an opening signal, for example, which takes account of the recipient's identification code or the destination time of the object transported.
- the invention also relates to a method of secure transport of an object, comprising:
- such a method comprises, before the transport step, a prior step of arming means for the destruction or the staining or the inclusion of the object contained in the container.
- Neutralization or destruction or smearing or inclusion of the object contained in the container can then be carried out, when the status signal transmitted by the container indicates that it is in a different state. of the predetermined state, and in particular is different from the normal state, or that this was or is forced, or was or is attacked, by an external agent, or that the container is still closed after a period of predetermined closure.
- the invention also relates to a method for monitoring the secure transport of an object contained in a closed container, this container preferably being of the type described above in the context of the present invention, this method being characterized in that it includes:
- the invention also relates to a method for monitoring the secure transport of an object contained in a closed container, this method being characterized in that it comprises the reception, by means connected to a communication network, of a signal relating to a state of the container, after connection of this container to said network,
- the container can be opened remotely when the state of the container is identified as satisfactory, or as conforming to a predetermined state, or the container can be neutralized when the state of the container does not correspond to a predetermined state, chosen as satisfactory.
- FIG. 1 represents a transport device according to the invention
- FIG. 2 represents a transport device according to the invention and a monitoring system, connected to a network
- FIG. 3 schematically represents the structure of an IT device of a surveillance system according to the invention
- FIG. 4 represents a surveillance system according to the invention and a plurality of transport devices connected by network or by local link, to this surveillance system,
- FIGS. 5A and 5B represent an embodiment of another transport device according to the invention.
- FIG. 6 represents the functional architecture of communication and security control means of a secunse transport device according to the invention
- FIG. 7 represents an embodiment of means of communication and of security control of a secure transport device according to the invention
- - Figure 8 is an example of a network architecture of an embodiment of the invention.
- FIG. 1 schematically represents a secure transport device according to the invention.
- this device 2 has the form of a case, the two parts 4, 6 of which can be closed by closing or locking means 8, 10, 12, 14.
- This case can be used to transport cash 3, or any other goods whose transport must be carried out confidentially or require certain precautions
- a handle 7 allows manual transport of the device.
- the closing or locking means may for example be of the electromagnetic type, for example comprising essentially a miniature electromagnet. According to another embodiment, the closing or locking means essentially comprise a controlled mechanical system.
- the device may also contain voltage supply means (for example: small lithium battery) which give it a certain autonomy.
- voltage supply means for example: small lithium battery
- Means 16 make it possible to make a connection to a communication network and means 18 make it possible to send, via the means 16, to a monitoring system which will be described later, signals, and in particular signals relating to a state of transport device or identification signals of the place where the device 2 is connected. These means also make it possible to receive signals transmitted by the surveillance system.
- the reference 16 designates a socket for a connection on a network such as the telephone network
- the means 18, arranged inside the transport device are electronic means which make it possible to transmit or to receive signals via the connection established using the means 16 or the socket 16
- these means 18 also control the opening and closing of the closing or locking means 8, 10, 12, 14.
- these closing means receive a closing or opening order from means arranged inside the transport device itself.
- the walls which delimit the transport device according to the invention can be made of flexible plastic material, in particular for package type devices, or of material such as rubber for "envelope" format devices. These types of material are compatible with the insertion, in the container, of means or of a management device 18, produced for example in the form of an electronic card, and with the production of a connection socket 16 in one of the walls. or exterior surfaces.
- FIG. 2 represents the case of a connection of the case 2, in the closed state, to a telephone network 20, which is shown diagrammatically in broken lines.
- the socket 16 makes it possible to connect the case to a telephone socket 19 via a cable 17.
- a monitoring device 22 is also connected to the communication network 20, for example, in the case described here, by connection to a telephone socket 21.
- the surveillance system essentially comprises a microcomputer 22 provided with an interface for communicating via a telephone network, for example a modem.
- An operator 24 carries out the surveillance , in a manner which will be described later
- the surveillance system 22 includes a display device 23, a keyboard 26, peripheral means such as a mouse 27 making it possible to move a cursor on the screen 23
- FIG. 3 schematically represents, as a block, various components of the monitoring system 22.
- a microprocessor 34 is connected, by a bus 38, to RAM memories 30 for storing data, to a ROM memory 32 in which program program instructions monitoring can be stored.
- the system further comprises the display device, or screen, 23, and peripheral means 26 (keyboard) and 27 (mouse).
- Reference 36 designates a modem for establishing communication with a telephone network 20
- a personal computer can be used as a system 22 computer within the framework of the present invention.
- the system 22 can for example be produced using a Pentium PC computer, operating under Windows NT.
- several users that is to say several containers each carrying one or more different objects, can be connected to the monitoring system 22.
- This embodiment is illustrated in FIG. 4, where containers, or devices for transport, 48, 50 (represented here in the form of parcels, for example postal parcels) are connected, via a communication network 46, such as the public telephone network, to reception means 42, such as 'a central reception, the latter means being itself connected to the monitoring system 22 by a connection 44 (for example of RS 232 type).
- a local connection at the operator of the monitoring system 22, can be made between containers 52, 54, via one or more local connection connections.
- the advantage of this type of connection will be explains below
- the assembly is connected to power supply means 58
- the system described above mentions a telephone line as a communication network. It is also possible to use any other type of communication network operating with an addressing system for the equipment or stations connected to it. For example, it is possible to implement the Internet, the connection being made for example.
- the object 3 to be transported is placed in the transport device 2, and the latter is closed.
- the means 8, 10, 12, 14 are locked so that an opening, other than an opening controlled by the monitoring system 22, cannot be carried out without forcing the device 2.
- the locking of the means 8, 10, 12 , 14 can be achieved by any means, but preferably by means 16, 18 which will control the opening upon receipt of the container.
- a first connection of the means of transport to the system 22 is made, and the latter sends a signal to close or lock the container (s) 2, 52, 54
- This first connection is advantageously made locally, for example using a local network such as local lines 56 (FIG. 4), so as to overcome, during this step, the security problems which may arise when using a public network such as the public telephone network: the communication between surveillance system 22 and container (s) then need not be coded or encrypted.
- the information which will be used during the opening procedure is transmitted from the monitoring system 22 to the container 2, 52, 56.
- the transport device After shipment and transport, the transport device is received by its recipient. This establishes, using the means 16, 17, 19 a connection with the system 22 via the network 20
- the means 18 When the container 2 is in a normal state, for example when attempts to open it without authorization, or to force it, or to force the closing means 8, 10, 12, 14, or to force or destroy or disturb the means 18 for opening control, have not been er, the means 18 emit a signal translating this normal state, signal which is received by the monitoring system 22.
- the operator 24, or the system 22, specially programmed to this effect can then determine a state of the container (here: a normal state) as a function of the signal received, and determine a signal to send, in response (here: a signal to open the container).
- the system 22 can then send an opening signal to the transport device 2. This signal is received and processed by the means 18, which then issue an opening command or order to the locking means 8, 10, 12, 14
- the means 18 emit another signal, which translates this state.
- the operator 24, or the system 22, specially programmed for this purpose can then determine a state of the container (here: an abnormal state) as a function of the signal received, and determine the response to be formulated (here: no signal of opening the container). The system 22 then does not send an opening signal to the transport device 2.
- the device 2 and its means 18, can send, or are programmed to send, a predetermined signal, depending on the state of the container or the device 2. They can also entirely emit an identification signal from the container itself.
- the system 22 emits an opening signal if the received status signal corresponds to a predetermined type of signal, which an operator 24 may or may not qualify as normal.
- the system 2 is programmed, or specially programmed, to emit an opening signal, or another type of signal (for example a signal signaling the impossibility of emitting an opening signal, or a signal of content neutralization as will be explained below) depending on the received signal.
- an opening signal or another type of signal (for example a signal signaling the impossibility of emitting an opening signal, or a signal of content neutralization as will be explained below) depending on the received signal.
- System 2 can be programmed so that certain signals, not corresponding to a completely intact state of the container, are accepted or interpreted by system 2 as indicating an almost normal state; this type of signal can then be answered with an opening signal.
- the means which make it possible to detect an attempted break-in on the device 2 may be the means 18 themselves, or additional means such as sensors which transmit a signal to the device or to the means 18, this signal translating a variation, normal or abnormal, of a certain physical size.
- the internal walls of the transport device 2 can be provided with electrical means forming a circuit when the container is in a closed state, this circuit being interrupted when an attempted break-in such as an attempt to separate the two parts 4, 6 of the device 2, takes place.
- the internal walls of the device 2 can for example be coated with an electrical mesh or with electrical conductors which are connected to the electronic means 18.
- the current normally flows in this mesh or these conductors, and a prescribed value of current is detected by current detection means, for example arranged in the means 18.
- current detection means for example arranged in the means 18.
- the circuit is open, the current no longer flows, and a variation of the current is recorded by the means 18. After connection to the network 20, these means 18 send a signal reflecting this variation.
- the device 2 can also be equipped with one or more sensors, such as a thermal probe which makes it possible to detect any abnormal movement of the temperature in the environment of the device 2, or a hygrometry sensor which makes it possible to detect any abnormal variation in humidity in the environment of the device 2.
- sensors make it possible to detect an opening attempt without authorization or violation, carried out using one or more sudden temperature variations and / or by introducing a liquid around the container or means 18 for emitting signals or controlling the opening of the device
- Other attacks can be carried out on the device 2, for example by applying high voltage to the visible elements of the device or by applying electromagnetic disturbances. Sensors can therefore be provided to detect a variation in voltage applied to the device 2 or a variation in an electromagnetic quantity, such as for example a magnetic field, applied in the environment or inside the device 2
- two temperature sensors are fitted to the device, the first one for detecting temperatures below a threshold value T
- two protective meshes can be bonded to the device 2. the first mesh for the upper part 4 and the second mesh for the lower part 6 For each of these meshes, a potentiometer can be provided to adjust an impedance which varies according to the surface of the device 2. Each potentiometer is connected to the means 18 by two welded wires.
- a contact can be mounted directly on the device 2 to signal its opening. This contact delivers "all or nothing" information. 11 is connected to the means 18 by two welded wires
- sensors such as electrical or electromagnetic sensors (for example of voltages or magnetic fields) or thermal or hygrometry sensors, or electrical meshes, or means of smearing or destruction or inclusion is compatible with the production of a device according to the invention in any of the formats already indicated above. Just select the sensors or adapt the size of the smearing or destruction or inclusion device to that of the selected transport device
- an identification code of a recipient or a place of destination of the transported object can be stored beforehand by the monitoring device 22.
- the network 20 is a telephone network
- it can be the telephone number of the er where the device 2 must be delivered.
- the telephone number of the arrival time, or which corresponds to the socket 19 to which the device has been connected can be automatically sent to the surveillance system 22 which then identifies the time where is located, or else where has been delivered, the device 2, and who can therefore verify if this er corresponds to the er where the transport device was actually to be delivered initially.
- the identification code is indeed that of the recipient or of the er of destination initially planned.
- the connection of the system 22 to the telephone network 20 can also include an automatic service for identifying the calling device 2, once the latter is connected to the telephone network.
- the system 22 can also check whether the intended container has been delivered to the recipient or to the hour. planned. This verification is carried out by checking the recipient data and the container identification data previously stored in the storage means of the system 22.
- Another condition for the delivery, by the system 22, of the opening signal of the device 2 can therefore be the following condition.
- the container is indeed the one intended for the recipient or for the time of destination originally planned.
- the transport device according to the invention can also incorporate means of destruction and / or staining and / or of inclusion and / or marking of an object it contains.
- the contents of device 2 can be rendered unusable for someone who could force, or open without authorization, device 2.
- numerical values 3 can be smeared, or confidential documents can be destroyed, or precious objects can be included in a solid mass during such an attempt to open the device 2.
- a specific compartment provided inside the device comprises a product or a liquid suitable for such neutralization, such as an indelible dye for smearing, or a mineral acid or an organic solvent for destruction, or a synthetic resin to achieve inclusion.
- the transport device is then made of a waterproof material, which guarantees maximum efficiency of the process of neutralization of the object by the product or the neutralization liquid.
- the specific compartment which contains the liquid or the neutralization product is isolated from the part receiving the content to be transported by a wall, for example made of polyurethane foam, thus protecting it from possible shocks during handling and transport operations.
- Means are also provided, which allow the expulsion of the product or the neutralization liquid on the object transported in the device 2
- These means comprise for example a second compartment containing a compressed gas which allows the expulsion of the product.
- the product then spreads uniformly over the valuables or documents or objects transported, for example using ejection ramps arranged in the vicinity of the area in which the transported object is located 3
- a process of staining or destruction or inclusion can be triggered by means internal to the container, such as the means 18 and / or by the remote monitoring system 22.
- the triggering of the means of destruction or staining or inclusion can therefore be carried out using the electronic device 18, for example from information received from one or more sensors (s) such as already dec ⁇ t (s) above (rupture of a circuit, and / or of a conductor mesh, and / or detection of an abnormal variation of humidity, and / or detection of an abnormal variation of temperature, and / or detection of an abnormal variation of a voltage and / or an electromagnetic quantity such as a magnetic field, and / or detection of an abnormal variation of any other physical parameter which may reflect an attempted break-in on the device 2).
- sensors such as already dec ⁇ t (s) above (rupture of a circuit, and / or of a conductor mesh, and / or detection of an abnormal variation of humidity, and / or detection of an abnormal variation of temperature, and / or detection of an abnormal variation of a voltage and / or an electromagnetic quantity such as a magnetic field, and / or detection of an abnormal variation of any other physical parameter which may reflect an attempted break-in on the device
- the smearing or destruction or inclusion device can be triggered from the system 22, when the latter detects an anomaly, for example after reception, via the network 20, of a signal which indicates an abnormal state of the device 2 It can also be triggered if the system 22 identifies a recipient that does not conform to the intended recipient or a container that does not correspond to the intended recipient, even though the recipient is indeed the one initially intended.
- the system 22 not only does the system 22 not send an opening signal, but it also sends a signal or an order to trigger the destruction, smearing or inclusion of the object More precisely, this signal is received by means I which trigger the means of destruction or staining or inclusion.
- the means 16, 18 send a signal to the monitoring system 22 reflecting a normal state of the transport device, the system 22 sends, in response:
- the device 2 must be opened, and its content must be removed, within a certain time interval after reception of the signal authorizing its opening. Beyond this time interval, the device is again locked, and / or the means of destruction or staining or inclusion are again reset or reactivated.
- the means 18 comprise a clock and, after a certain time, a signal is emitted by these means 18, to re-trigger the locking and / or the arming system.
- the device When loading the transport device 2 with the object 3, the device is closed, locked, then, optionally, the staining or destruction or inclusion system is armed. These operations are carried out, for example, on the order of the operator 24 of the system 22, by connection to a local line, such as one of the lines 56 in FIG. 4.
- FIGS. 5A and 5B represent an embodiment of a transport device 60 according to the invention, which comprises means for neutralizing a transported content.
- the reference 16 denotes the socket for connection to the network and the reference 18 the electronic means of communication and signal processing.
- the reference 62 designates the staining system, connected to staining ramps 70, 72 arranged at the bottom of a compartment 78 in which banknotes or documents can be enclosed.
- a cover 80 located in the upper part 4 of the device, makes it possible to close the compartment 78.
- Closing contacts 74, 76 make it possible to detect a possible opening of the transport device, in the manner and with the consequences already described above.
- the closing system 82, 84 operates on the principle of an electromagnetic locking: the opening or closing of the device 60 is done electrically, with an electromagnet.
- the assembly is connected to the electronic control device 18.
- the coil power of the electromagnet is 3 W and the coil voltage is fixed at 6 V.
- Means 1 19 for supplying voltage and means 124 for emergency accumulators are also shown in the wall of the suitcase 60.
- FIG. 6 represents the electronic means 18 for command and control of a secure transport device according to the invention, provided with various peripheral elements.
- the means 18 comprise a first sub-assembly 18-1 which makes it possible to manage the communication with the surveillance system, via the socket 16, and which also controls signaling means 17 making it possible to indicate to an outside operator or has a carrier a system abnormality.
- the means 18 comprise a second part 18-2 which ensures the locking and the security of the device.
- This second part is connected, in the example given in FIG. 6, to a mesh 92 of the container, to a thermal sensor 94 and to an opening detector 96.
- the means 18-2 also control the opening and closing of the locking means 90 of the device.
- These means 18-2 also control the implementation of the staining or destruction or inclusion system 62. with its two compartments 62-1 and 62-2 and two ejection ramps 70, 72
- FIG. 6 relates to a particular embodiment.
- a transport device according to the invention can also be implemented, without any of the elements 92, 94, 96, and without the means 62 of staining. Security is then obviously more weak, but the remote opening of the container, as a function of a device status signal, can however be ensured.
- FIG. 7 shows, in more detail, the production of means 18 for communication and control of a transport device according to the invention
- Each of the sensors or detectors is connected to means or to a shaping circuit 95, 105, " 107, 97 of the signal emitted by the sensor or the detector
- the signal is transmitted to the microprocessor 100
- the latter is programmed to trigger the necessary actions following the reception of the signals coming from the above sensors or detectors (sending to the monitoring system 22 of a signal indicating a state fault, triggering of a signal of neutralization command, display of a message for a user, for example the carrier or the recipient of the object)
- the microprocessor 100 also triggers the opening of the locking means 8 - 14 (fig. 1) or 82, 84 (figure 5 A, 5B) or 90 (figure 6) by sending a signal shaped using a shaping circuit 1 12.
- the modem 116 is a V23 modem, at 1200 baud for transmission in the container direction to supervisor, and at 75 baud for transmission in the supervisor to container direction. The choice of these values optimizes the power consumption of the system
- the signals received from the monitoring system 22 pass through the socket 16, the interface 1 14, the modem 1 16 and are transmitted to the processor 100 which is programmed to trigger the necessary actions after reception of this signal (for example opening of the device for transport, or triggering of neutralization (smearing, inclusion, destruction), or display of a message on a display screen 130 of the transport device)
- Means 1 19 for supplying voltage, such as a battery, contained in the transport device according to the invention, are also connected to means 18, and in particular to means 120 for regulating the voltage Ces the latter are themselves connected to power supply means 122 which supply a voltage Vcc to the microprocessor 100 and a supply voltage to the interface circuit 114.
- the regulation means 120 can also be connected to a charger 127, which can itself be connected to a DC charger 125 and to a diode 123 for indicating the state of charge of the battery.
- backup accumulator means 124 can be provided, which supply the interface 1 14.
- the backup accumulator means 124 also make it possible to establish communication with the supervisor 22, when the battery or the voltage supply means are completely destroyed, for example at the end of an inclusion or smudging operation. , or destruction.
- the device opening control can be actuated, without having to resort to mechanical means of the crowbar type.
- the means 1 19 and 124 are also shown in FIG. 5 A, in position in the wall of the suitcase 60.
- All of the means 18 can be reacted using printed circuits, the temperature and humidity sensors being able to be soldered to the printed circuit themselves.
- the meshes 106, 108, the opening contact 96 are themselves connected to the electronic card by welded wires. Two welded wires also make it possible to connect the card to the locking means of the transport device.
- the transport device according to the invention can, according to a variant, be provided with means making it possible to locate it continuously during its transport.
- a GPS location can be performed.
- transmitter / receiver means are arranged in the transport device according to the invention.
- the latter can therefore receive information on its position at any time.
- transmitter / receiver means for re-transmitting or receiving RF signals to and from the surveillance system.
- transmitter / receiver means for RF signals II then processes the signals received from the communication device. transport and containing information. on the position of it, and thus controls the path of the latter
- the monitoring system can send a trigger signal from the means for neutralizing the transported content.
- the transport operation " preferably begins, for security reasons, in the premises where the control means are installed 22.
- the valuables or documents or objects to be transported will have previously been loaded into the device 2, 60 or the transport case, or are loaded into this device or this case in the premises of the control means 22.
- Supervisor 22 receives information regarding the recipient of the content, for example in the form of a telephone number. This operation can be done automatically after a dialogue with the operator's computer system 22, or by manual entry.
- the local programming telephone line 56 is connected to the container.
- Confidential information can then be exchanged. They will be used during the container opening procedure.
- the control system 22 can on this occasion check the state of the battery 1 19 and the sensors.
- the corresponding information can be displayed on the control screen and / or on an LCD display and / or be stored.
- a report can then be sent to the operator's computer system and a cocking confirmation slip can be printed.
- the local telephone line 56 is then disconnected, and the container is returned to the transporter.
- the device disarming operation can be done at the customer who comes into possession of the container, or at the operator who recovers a non-empty container. In both cases, the objective is to open without causing the neutralization of the content This operation is done under the control of the supervisor 22, after connection of the container to a very precise telephone line, initially planned.
- the container is connected to the local or direct telephone line. This connection causes an automatic line pnse and the dialing of a telephone number which is in this case the telephone number of the supervisor 22. A communication between the supervisor 22 and the container is then established.
- the authorization to open the container is made after verification of the confidential information loaded during the arming operation, and in particular of the identity of the recipient.
- the detection of a fault can end the procedure for opening the container.
- This authorization is then issued. This authorization can be valid for a certain period only, for example for 10 s.
- the container is opened, which can be immediately reported to the supervisor 22, with, for example, display in an event table of the supervisor 22 and / or sending a report to the operator's computer system.
- the telephone line is then disconnected
- This automatic redialing function can be blocked after a certain delay (for example 1 min) so that, during the disarming operation, the client or the recipient remains in front of the container
- the control device 18 can also be programmed so as to make any opening impossible after several (for example • three) successive opening attempts.
- the device then returns, for example, to the operator, the only person authorized to intervene.
- Specific indications, corresponding to one or other of the above steps, can be displayed on display means of the container.
- the display means signal the user that an opening of the container cannot be er.
- This neutralization command can also be triggered remotely by the supervisor 22. This leaves the operator the possibility of working on containers which have been reported to him as being stolen.
- the container can be re-dispatched to the surveillance system, which can assign it to the transport of another object to another recipient.
- the e-mail address or the identification of the new addressee may in turn be recorded in the surveillance system 22, in order to verify the identity of the new addressee, after delivery and before opening.
- the container can be loaded with another object at a first recipient, then sent directly to a second recipient without being previously returned to the monitoring system
- the procedure is then the same as that previously described, with however this difference that the closing step as well as the possible steps of arming the neutralization means, and / or of checking the state of the battery and of the sensors, take place remotely
- These steps can take place after unloading the container , while the latter is still connected to the line or socket 19 ( Figure 1) of the first recipient
- the new e-mail address or the new identification number of the new recipient can also be transmitted during this connection.
- this new electronic address or this new identification number may have been previously established and stored, during the preparation of the container at the operator of the surveillance system, before dispatch to the first recipient.
- several e-mail addresses or identification numbers of successive recipients can be provided beforehand. This makes it possible to avoid having to pass one or more confidential identification codes over a public communication network such as the telephone network.
- the means or the electronic card 18 do not yet have an identification.
- An operation makes it possible to assign a number to the " container " , to copy this number into the non-volatile memory 102 of the card 18, and to add this new number to a database kept by the supervisor 24 This operation can be done during of the container connection on a local line 56 ( Figure 4) This operation also makes it possible to associate a given container with a given name of operator 24, and thus to prohibit an operation with the supervisor device 22 of another operator
- This identification data can be part of the data sent by the container to the supervision system 22, after its reception by a recipient and its connection to the network, at this recipient This data is first checked (is the sending container authorized to work with the supervisor contacted?), then the system 22 proceeds to the verification operations already explained above (verification of the state of the container and possibly checked the identity of the recipient).
- a system according to the invention makes it possible to initiate each of the containers that it uses, and to manage these different containers through the existing networks.
- a method of managing a set of containers according to the invention picence therefore comprises in particular the following steps
- each user or recipient can specify to a manager of a fleet of containers the type of object to be transported, and the type of access. to a network he had.
- the manager can then identify the content to be used, and initialize it according to the procedure already described above.
- the transport method as already described above can then be implemented.
- the surveillance system described above can be implemented in conjunction with a management system for a set of transport devices according to the invention.
- FIG. 8 represents this embodiment, in which the supervision system (or supervisor) is equipped with supervision software on a local computer network 29 and is connected to the local network 150 of the management system (or manager).
- Reference 22 designates a microcomputer of the monitoring system, such as for example already described above in connection with FIGS. 2 and 3, and reference 42 of reception centers, such as that already mentioned below in connection with figure 4
- this embodiment it is the management system 150 which will proceed to the edition of a transport ticket which is transmitted to the supervisor 29.
- a firewall 153 isolates the two networks.
- the transport ticket provided by the manager 150 consists for example of:
- the interconnection between the two networks 29 and 150 is provided in such a way that the entry of the transport ticket can also be done from the network 29, if necessary.
- the supervisor ensures, or is specially programmed to ensure, the programming of containers and the reception of remote calls.
- the supervisor software makes it possible for example to store, in the storage means available to the supervisor, the following information - customer data (on disk 25 of the surveillance network 29),
- the possible statuses of a container or a suitcase can be defined as follows: - available (battery in charge of maintenance on rack),
- the supervisor can also deal with the following connection incidents:
- the first procedure described is that of the departure of the bags from the central or the surveillance system.
- the manager begins by opening a mission entry screen (using a microcomputer or a PC 171), and accesses the supervisor's computer disc 29
- Each parameter is then transmitted in the database of the supervisor's disk 29, by any IT means of the manager 150.
- These parameters are for example - an operator code,
- the manager's application 150 requests to validate the entry screen, and installs this data in a table of delivery notes, taken up in an "Edition" table, before programming the bag. There is only one delivery slip number awaiting programming per case and only one suitcase per delivery slip. All other arrangements are managed by the manager's IT system
- the operator of the manager fills the suitcase with its content, and its delivery slip. He locks the suitcase. He sticks the recipient's label and transmits the suitcase to the shipping service 160 (which has a microcomputer or PC 161).
- the operator of the system 29 or of the shipping service 160 connects the case to a programming line. The transaction is then done for him blind (without screen) and it is processed directly this time by the system 29.
- the ephemeral codes are not chosen from a drop-down list, but are preferably generated randomly following an internal or external transaction request.
- the code is encrypted book .
- Some customers will then be able to obtain an empty suitcase, for example as an additional service or to replace a defective suitcase when requesting a tour
- a delivery slip number is chosen from the manager's normal list, - the suitcase is closed,
- the procedure for returning the bag can be as follows.
- the case returns to maintenance 154 for diagnosis.
- the maintenance retrieves the orphaned content and transmits it to the manager 150 for a new shipment.
- the manager can enter this delivery slip a second time, since it is seen by the supervisor in the file of "delivery notes entered but not processed".
- the maintenance service 160 can then manually inform the supervisor of the new status of the suitcase "under maintenance”
- the maintenance service 160 can then manually inform the supervisor of the new status of the suitcase "under maintenance”
- At least one PC 156 is dedicated to maintenance operations Reception cards or programming cards are connected to this PC
- reception centers 42 belonging to the surveillance system can open or program suitcases according to the internal cards they have. But the opening will be refused at a reception center if the case arrives directly from programming without have opened it remotely at the customer's
- the maintenance department 154 has access to all the parameters described in the programming procedure, except the clear reading of the ephemeral codes. When returning a case directly from programming, it can therefore open the case by a common procedure if it is not armed, or by exchanging the temporary maintenance code associated with the mission, if the suitcase is full
- Maintenance 154 also diagnoses on the supervisor's screen the differences that appeared, during the treatment of the bag, in the reception service, with the two standard cases which are - bag normally empty,
- the tool for the service 152 for receiving suitcases is only composed of a reception center No PC is required
- the operator is called a receiver
- the supervisor analyzes its state and status.
- the receiver collects the content and hands the bag over to maintenance to carry out technical tests and maintenance.
- the reception department transmits it directly to maintenance. More generally, all the cases different from cases A) and C) lead the suitcase to maintenance.
- Maintenance 154 connects the suitcase and t the last transaction on its screen (customer code, delivery person, requested route to etc). She notices the destination error and opens the suitcase using the ephemeral code of the recipient client. Maintenance has 2 options: 1 ° It has the natural time to send the suitcase back to the recipient.
- the maintenance finds that the bag has not been opened by the remote procedure (state of the bag not opened). Maintenance manually ends the mission by erasing the programming elements. She returns the bag and its contents to the manager for a new edition with a new delivery slip.
- the supervisor manages the fleet of suitcases on mission. He knows how to distinguish the list of suitcases present at the central (available in stock + in charge of battery + in maintenance + in repair) from the list of suitcases on mission (from the central + on tour. + in stock with customers + lost + stolen)
- the last point is random by the very nature of the procedure (without flow management constraints for the client).
- the second point is uncertain because the destination of the suitcases is known until an external event decides otherwise (loss, theft, tour request, etc.)
- the first point it can be the subject of a reminder from the customer, before inking or neutralization, to avoid that the customer forgets to proceed to the opening of his suitcase.
- the procedure for leaving a full suitcase, from one client to another client without going through the central office or the supervisor (this is then a circulation or tour of the suitcase), can be as follows.
- the client informs a server to be defined by the manager (minitel, voice guide, etc.)
- the supervisor 29 recovers, by this server, the following information, the manager of which guarantees the authenticity
- Supervisor 29 changes the status of the bag, which changes from "expected full” to "on tour”
- the customer has filled and closed (locked) his suitcase. He connects it to his authorized telephone socket.
- LED may blink slowly to indicate acceptance of the transaction
- the supervisor associates this connection with the request made above by the client on the server, and proceeds to the tests of the technical elements of the suitcase
- the customer can remove the plug. He fixes the packing slip on the suitcase and performs the shipping himself. If an anomaly occurs in the above process, especially during technical tests (empty battene, etc.), or because of a procedural error (incorrect codes), the diode will start to flash continuously. Action is then taken, from the maintenance department, to warn the customer of a technical impossibility. For this, an audible signal is provided to the maintenance service as soon as the anomaly arrives on the network 29.
- the customer To recover the contents of his suitcase before sending it empty, the customer must then reiterate the connection of the suitcase. In this case, the supervisor issues an order to open the unarmed suitcase. If the suitcase does not open and the LED flashes quickly, the customer then applies a secure return suitcase instruction.
- the physical limit of a suitcase tour is linked to the charge of its battery. Some customers can be authorized to hold a rapid battery charger allowing charging with the cover of the suitcase open.
- the program instructions for implementing a method according to the invention are stored in a memory area of the monitoring system 22 and / or 29 and. possibly, from the manager system 150 These instructions are for example installed from a medium which can be read by the computer system 22 and / or 29 and on which they are recorded.
- a support can be for example a hard disk, a ROM read-only memory, a compact optical disk, a dynamic random access memory DRAM or any other type of memory
- RAM random access memory
- magnetic or optical storage element registers or other volatile and / or non-volatile memories.
- the computer program instructions are stored to implement a monitoring method according to the invention and / or a method. transport according to the invention
- a monitoring device further comprises means for, or especially programs for, receiving a communication request signal sent by the container, when the latter is connected to the communication network
- a communication failure signal is sent to the means which contain the object when, after connection of the latter to the communication network, the communication is not established.
- a signal can be transmitted by the firm container and intended for the monitoring means 22, when the container is not opened after the latter has received the signal d opening issued by the monitoring means 22
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
- Forklifts And Lifting Vehicles (AREA)
- Warehouses Or Storage Devices (AREA)
- Pallets (AREA)
- Control Of Conveyors (AREA)
- Details Of Rigid Or Semi-Rigid Containers (AREA)
- Refuse Collection And Transfer (AREA)
- Chain Conveyers (AREA)
- Auxiliary Devices For And Details Of Packaging Control (AREA)
- Attitude Control For Articles On Conveyors (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001235683A AU2001235683A1 (en) | 2000-02-16 | 2001-02-15 | Device and method for safe transport on an object |
DE60113234T DE60113234T2 (de) | 2000-02-16 | 2001-02-15 | Vorrichtung und verfahren zum sicheren transport eines gegenstandes |
AT01907805T ATE304111T1 (de) | 2000-02-16 | 2001-02-15 | Vorrichtung und verfahren zum sicheren transport eines gegenstandes |
CA002400392A CA2400392A1 (fr) | 2000-02-16 | 2001-02-15 | Dispositif et procede de transport securise d'un objet |
EP01907805A EP1255906B1 (fr) | 2000-02-16 | 2001-02-15 | Dispositif et procede de transport securise d'un objet |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0001887A FR2804994B1 (fr) | 2000-02-16 | 2000-02-16 | Dispositif et procede de transport securise d'un objet |
FR00/01887 | 2000-02-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001061134A1 true WO2001061134A1 (fr) | 2001-08-23 |
Family
ID=8847037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2001/000445 WO2001061134A1 (fr) | 2000-02-16 | 2001-02-15 | Dispositif et procede de transport securise d'un objet |
Country Status (9)
Country | Link |
---|---|
US (1) | US20030011466A1 (fr) |
EP (1) | EP1255906B1 (fr) |
AT (1) | ATE304111T1 (fr) |
AU (1) | AU2001235683A1 (fr) |
CA (1) | CA2400392A1 (fr) |
DE (1) | DE60113234T2 (fr) |
ES (1) | ES2249412T3 (fr) |
FR (1) | FR2804994B1 (fr) |
WO (1) | WO2001061134A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1807810A1 (fr) * | 2004-09-08 | 2007-07-18 | Gunnebo Cash Automation AB | Systeme de manipulation de billets de banque |
CN1328467C (zh) * | 2002-01-22 | 2007-07-25 | Sqs安全空间系统股份公司 | 打开移动式容器的方法和装置 |
FR2922577A1 (fr) * | 2007-10-19 | 2009-04-24 | Idips Imp Ation Distrib Instal | Systeme de detection miniaturise integre dans un systeme electronique a microprocesseur de verrouillage et deverouillage de meubles de securite |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USD339928S (en) * | 1991-05-23 | 1993-10-05 | John Caldwell | Chair |
US6965310B1 (en) * | 2002-10-04 | 2005-11-15 | Gauging Systems, Inc. | Remote notification method |
FR2846361B1 (fr) * | 2002-10-29 | 2005-06-24 | Brinks France | Dispositif de securite pour le transport et/ou le stockage de valeurs papier |
US6864791B1 (en) * | 2003-01-22 | 2005-03-08 | Rackel Industries Ltd. | Security bag |
GB0306987D0 (en) * | 2003-03-26 | 2003-04-30 | Johnson Security Ltd | Security containers |
JP2005018644A (ja) * | 2003-06-27 | 2005-01-20 | Aruze Corp | 貨幣取扱装置 |
US7088257B2 (en) * | 2004-06-10 | 2006-08-08 | David Weekes | Systems and apparatus for secure shipping |
US7088252B2 (en) * | 2004-06-10 | 2006-08-08 | David Weekes | Systems and apparatus for personal security |
US7088229B2 (en) * | 2004-06-14 | 2006-08-08 | Oracle International Corporation | Methods and systems for verifying the position and status of hierarchically arranged objects |
US7444946B2 (en) * | 2004-09-14 | 2008-11-04 | Halliburton Energy Services, Inc. | Material management apparatus, systems, and methods |
DK1797269T3 (da) * | 2004-10-01 | 2013-08-26 | Peter Villiger | Multifunktionelt og bærbart sikkerhedssystem |
US7385507B2 (en) * | 2004-12-17 | 2008-06-10 | Simpson Anthony T | Security case |
DE102005003150B4 (de) * | 2005-01-21 | 2007-02-08 | OECON Ingenieurgesellschaft für Industrieberatung und Projektmanagement mbh | Sicherungsbehälter |
WO2006094962A1 (fr) * | 2005-03-07 | 2006-09-14 | Peter Villiger | Procede et systeme global de transport sur d'objets de valeur |
US20060238347A1 (en) * | 2005-04-22 | 2006-10-26 | W.R. Parkinson, Co., Inc. | Object tracking system |
SE532088C2 (sv) * | 2005-09-28 | 2009-10-20 | Sqs Ab | Förfarande vid hantering av värdeföremål |
WO2007036915A1 (fr) * | 2005-09-29 | 2007-04-05 | Deposita Systems (Pty) Limited | Bancomate automatique |
US7719419B2 (en) * | 2005-11-02 | 2010-05-18 | Honeywell International Inc. | Intrusion detection using pseudo-random binary sequences |
US7535358B2 (en) * | 2006-03-15 | 2009-05-19 | Elaine A. Crider | Method and apparatus for electronically tracking luggage |
US20100113143A1 (en) * | 2007-04-24 | 2010-05-06 | Wms Gaming ,Inc. | Securing mobile wagering game machines |
US20170059233A1 (en) * | 2015-08-29 | 2017-03-02 | Danby Products Limited | Appliance improvements |
US11274876B2 (en) * | 2007-12-28 | 2022-03-15 | Intirion Corporation | Multiple linked appliance with auxiliary outlet |
DE102008011404A1 (de) * | 2008-02-27 | 2009-09-03 | Wincor Nixdorf International Gmbh | Dokumentenkassette |
US8094021B2 (en) * | 2008-06-16 | 2012-01-10 | Bank Of America Corporation | Monetary package security during transport through cash supply chain |
US9024722B2 (en) * | 2008-06-16 | 2015-05-05 | Bank Of America Corporation | Remote identification equipped self-service monetary item handling device |
US7982604B2 (en) * | 2008-06-16 | 2011-07-19 | Bank Of America | Tamper-indicating monetary package |
US8210429B1 (en) | 2008-10-31 | 2012-07-03 | Bank Of America Corporation | On demand transportation for cash handling device |
DE102010016808A1 (de) * | 2010-05-05 | 2011-11-10 | Wincor Nixdorf International Gmbh | Vorrichtung zum Transport und/oder zur Aufbewahrung von Wertscheinen |
DE102010060379A1 (de) * | 2010-11-05 | 2012-05-10 | Wincor Nixdorf International Gmbh | Geldkassette mit Mitteln zur Detektion von Manipulationsversuchen |
US20120273314A1 (en) * | 2011-04-27 | 2012-11-01 | Raymond Lindsey M | Wheeled luggage assembly |
US9928387B2 (en) * | 2013-03-15 | 2018-03-27 | Charles Hallinan | Security case |
AU2012350416A1 (en) * | 2011-12-12 | 2014-07-03 | David BERGER | Transportable safe |
US9732550B2 (en) | 2012-08-10 | 2017-08-15 | Coolsafe Enterprises Inc. | Storage assembly having user-accessible compartments categorized by different levels of user access |
ES2532653B1 (es) * | 2013-09-30 | 2016-01-05 | Intelligent Data, S.L. | Dispositivo electrónico de pago |
GB201404502D0 (en) * | 2014-03-13 | 2014-04-30 | Patronus Cash Systems Ltd | Cash spoiling system |
US20160058149A1 (en) * | 2014-08-26 | 2016-03-03 | Selvakumari Dhanasekaran | Purse with weight scale and locating device |
EP3173736A1 (fr) * | 2015-11-24 | 2017-05-31 | Leica Geosystems AG | Récipient de sécurité pour appareils de mesure |
JP6421763B2 (ja) * | 2016-01-13 | 2018-11-14 | トヨタ自動車株式会社 | 湿度センサの異常検出装置 |
EP3336781A1 (fr) * | 2016-12-13 | 2018-06-20 | Sigma-Aldrich International GmbH | Ensemble électronique pour la transmission sans fil d'au moins une information d'état |
EP3379015A1 (fr) | 2017-03-21 | 2018-09-26 | STMicroelectronics (Grand Ouest) SAS | Procédé et système de contrôle d'un objet destiné à être partagé par plusieurs utilisateurs potentiels |
IT201700034089A1 (it) * | 2017-03-28 | 2018-09-28 | Prima Ricerca & Sviluppo Srl | Cassetta di sicurezza e relativo sistema per la spedizione sicura di oggetti di valore. |
US10217084B2 (en) | 2017-05-18 | 2019-02-26 | Bank Of America Corporation | System for processing resource deposits |
US10515518B2 (en) | 2017-05-18 | 2019-12-24 | Bank Of America Corporation | System for providing on-demand resource delivery to resource dispensers |
US10275972B2 (en) | 2017-05-18 | 2019-04-30 | Bank Of America Corporation | System for generating and providing sealed containers of traceable resources |
GB201719396D0 (en) * | 2017-11-22 | 2018-01-03 | Walsh Timothy Neville | Tamper detection system |
DE102018007564A1 (de) | 2018-09-24 | 2020-03-26 | Giesecke+Devrient Currency Technology Gmbh | Anordnung und Verfahren zur Bearbeitung von Wertdokumenten |
US11127280B2 (en) * | 2018-09-29 | 2021-09-21 | Fiv (Fast Identification Vests), L.L.C. | Emergency identification system |
WO2020154790A1 (fr) * | 2019-01-28 | 2020-08-06 | Eria Smart Technologies, Inc. | Système de stockage à capacités de surveillance et de gestion à distance |
USD978476S1 (en) * | 2019-05-23 | 2023-02-14 | Harex Infotech Inc. | Automated teller machine |
USD880102S1 (en) * | 2019-09-05 | 2020-03-31 | Clevermade, Llc | Secured container |
USD880103S1 (en) * | 2019-09-05 | 2020-03-31 | Clevermade, Llc | Secured container |
DK4172962T3 (da) * | 2020-06-30 | 2024-05-06 | Sicpa Holding Sa | Sikker beholder til opbevaring eller transport af værdidokumenter, og system til sikring af opbevaring og transport af værdidokumenter |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0692599A1 (fr) * | 1993-04-05 | 1996-01-17 | First National Bank of Southern Africa Limited | Système pour le transport protégé de biens |
FR2751111A1 (fr) * | 1996-07-10 | 1998-01-16 | Axytrans | Systeme de transport securise d'objets en conteneur inviolable dont au moins une station destinatiare est mobile et transportable |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6046678A (en) * | 1994-09-08 | 2000-04-04 | Wilk; Peter J. | Protective device for storage and transport containers |
US6057779A (en) * | 1997-08-14 | 2000-05-02 | Micron Technology, Inc. | Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system |
-
2000
- 2000-02-16 FR FR0001887A patent/FR2804994B1/fr not_active Expired - Fee Related
-
2001
- 2001-02-15 AU AU2001235683A patent/AU2001235683A1/en not_active Abandoned
- 2001-02-15 WO PCT/FR2001/000445 patent/WO2001061134A1/fr active IP Right Grant
- 2001-02-15 US US10/204,072 patent/US20030011466A1/en not_active Abandoned
- 2001-02-15 AT AT01907805T patent/ATE304111T1/de not_active IP Right Cessation
- 2001-02-15 ES ES01907805T patent/ES2249412T3/es not_active Expired - Lifetime
- 2001-02-15 EP EP01907805A patent/EP1255906B1/fr not_active Expired - Lifetime
- 2001-02-15 CA CA002400392A patent/CA2400392A1/fr not_active Abandoned
- 2001-02-15 DE DE60113234T patent/DE60113234T2/de not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0692599A1 (fr) * | 1993-04-05 | 1996-01-17 | First National Bank of Southern Africa Limited | Système pour le transport protégé de biens |
FR2751111A1 (fr) * | 1996-07-10 | 1998-01-16 | Axytrans | Systeme de transport securise d'objets en conteneur inviolable dont au moins une station destinatiare est mobile et transportable |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1328467C (zh) * | 2002-01-22 | 2007-07-25 | Sqs安全空间系统股份公司 | 打开移动式容器的方法和装置 |
CN100564787C (zh) * | 2002-01-22 | 2009-12-02 | Sqs安全空间系统股份公司 | 运送报警容器的方法和装置 |
EP1807810A1 (fr) * | 2004-09-08 | 2007-07-18 | Gunnebo Cash Automation AB | Systeme de manipulation de billets de banque |
EP1807810A4 (fr) * | 2004-09-08 | 2010-02-24 | Gunnebo Cash Automation Ab | Systeme de manipulation de billets de banque |
FR2922577A1 (fr) * | 2007-10-19 | 2009-04-24 | Idips Imp Ation Distrib Instal | Systeme de detection miniaturise integre dans un systeme electronique a microprocesseur de verrouillage et deverouillage de meubles de securite |
Also Published As
Publication number | Publication date |
---|---|
ES2249412T3 (es) | 2006-04-01 |
EP1255906B1 (fr) | 2005-09-07 |
US20030011466A1 (en) | 2003-01-16 |
EP1255906A1 (fr) | 2002-11-13 |
CA2400392A1 (fr) | 2001-08-23 |
FR2804994A1 (fr) | 2001-08-17 |
DE60113234T2 (de) | 2006-07-13 |
FR2804994B1 (fr) | 2003-06-27 |
AU2001235683A1 (en) | 2001-08-27 |
DE60113234D1 (de) | 2005-10-13 |
ATE304111T1 (de) | 2005-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1255906B1 (fr) | Dispositif et procede de transport securise d'un objet | |
US7936266B2 (en) | Shipping container seal monitoring device, system and method | |
EP1593099A1 (fr) | Dispositif de consigne et procede de depot et de retrait d'un objet dans un dispositif de consigne | |
PT1237445E (pt) | Sistema de entrega ou levantamento seguro | |
EP0992017B1 (fr) | Installation de suivi de bouteilles de gaz | |
EP1766587B1 (fr) | Procede de transport securise de documents ou d'objets de valeur et caissette utilisable lors de la mise en oeuvre dudit procede | |
WO2019158862A1 (fr) | Dispositif de stockage d'objets, et procédé mettant en œuvre un tel dispositif | |
WO2005076236A2 (fr) | Dispositif d'affranchissement de colis et methode de mise en oeuvre d'un tel dispositif | |
EP3257028B1 (fr) | Présentoir semi-automatique de bouteilles de gaz et procédé associé | |
EP1961903A2 (fr) | Panier pour le transport d'objets de valeur | |
EP1530170A1 (fr) | Système de transport et de livraison d'objets de valeur | |
EP2297714B1 (fr) | Dispositif et procédé de vérification d'intégrité d'objets physiques | |
EP2521104A1 (fr) | Procédé de pilotage d'un système modulaire de distribution de bouteilles de gaz comprenant au moins un présentoir avec une pluralité de casiers à bouteille et une borne de pilotage de chaque présentoir, reliés par une liaison radioélectrique | |
WO2008031115A1 (fr) | Terminal de dépôt d'argent liquide et système de sécurité associé pour le transport d'argent liquide | |
FR2821382A1 (fr) | Dispositif de controle-commande en vue de la surveillance de la neutralisation et/ou la destruction de valeurs, de documents et/ou d'objets | |
FR2726659A1 (fr) | Dispositif et procede de telesurveillance d'objets deposes dans un local | |
EP1494180A1 (fr) | Appareillage de gestion de la distribution de bouteilles de gaz | |
EP1061315B1 (fr) | Système pour l'exploitation et la gestion d'un parc de conteneurs réfrigérés | |
FR2899988A1 (fr) | Procede et dispositif qui permettent d'assurer le depot, le retrait et le transport d'une lettre et/ou d'un colis | |
FR2784775A1 (fr) | Systeme pour la protection des marchandises transportees par un vehicule | |
FR2811211A1 (fr) | Dispositif de livraison a domicile, systeme et procede pour gerer des livraisons a domicile mettant en oeuvre ce dispositif | |
FR3112658A1 (fr) | Système de verrouillage pour armoire électrique et procédé associé | |
ITVR940036U1 (it) | Metodo di sicurezza per la distribuzione e la raccolta di oggetti tra uno o piu' centri di smistamento ed una pluralita' di stazioni perife- |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2001907805 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2400392 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10204072 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2001907805 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2001907805 Country of ref document: EP |