Method and apparatus for mobile cash transportation
11183036 · 2021-11-23
Assignee
Inventors
- Aaron H. Dobbins (Cherry Hill, NJ, US)
- Bob M. Dobbins (Villanova, PA)
- Thomas Carullo (Marlton, NJ, US)
Cpc classification
E05G1/005
FIXED CONSTRUCTIONS
International classification
Abstract
A device designed to validate and transport paper currency in a protected fashion. While being transported, the device monitors for tampering or break-in attempts and subsequently generates warning notifications, or sounds an alarm depending on configuration and the type of tampering detected. The transport case provides end-to-end cash accountability from a location where a bill is inserted into the case, to the bank or cash destination, where the transport case is delivered. Additionally, a docking station accessory is described in which the transport case can be securely fixed while at a point of sale.
Claims
1. A hand carried portable valuables transport system comprising: an outer closeable portable container having a handle utilized to hand carry said portable valuables transport system; an inner valuables container inside the outer closeable portable container; a tamper mechanism for detecting tampering with the outer closeable portable container and the inner valuables container; the outer closeable portable container enclosing the tamper mechanism; and a battery powered controller mounted inside the outer closeable portable container controlling the tamper mechanism and monitoring tampering of both the outer closable portable container and the inner valuables container, the tamper mechanism operating using battery power when the portable valuables transport system is not connected to another source of power; wherein the inner valuables container, the tamper mechanism and the battery powered controller are fixedly mounted to a mechanical mounting surface of the outer closable portable container; and wherein the tamper mechanism and the battery powered controller are each coupled to a control board also mounted to the mechanical mounting surface of the outer closable portable container.
2. The portable valuables transport system of claim 1, further comprising: an arm and disarm mechanism located inside the outer closeable portable container.
3. The portable valuables transport system of claim 2, in which one way to access the inner valuables container comprises opening the outer closeable portable container and then disarming the arm and disarm mechanism within a predetermined period of time after opening the outer closeable portable container.
4. A hand carried portable valuables transport system comprising: an outer closeable portable container; an inner valuables container inside the outer closeable portable container; a tamper mechanism for detecting tampering with the outer closeable portable container and the inner valuables container; the outer closeable portable container enclosing the tamper mechanism; a battery powered controller mounted inside the outer closeable portable container controlling the tamper mechanism, the tamper mechanism operating using battery power when the portable valuables transport system is not connected to another source of power; a currency validator; and a battery adequate to supply power for mobile operation of the currency validator if the outer closeable portable container is disconnected from a mounting dock and not connected to another source of power.
5. The portable valuables transport system of claim 4, further comprising: a communication interface controlled by the controller to communicate a total amount of cash in the portable valuables transport system to a remote location.
6. A hand carried portable valuables transport system comprising: an outer closeable portable container; an inner valuables container inside the outer closeable portable container; a tamper mechanism for detecting tampering with the outer closeable portable container and the inner valuables container; the outer closeable portable container enclosing the tamper mechanism; and a battery powered controller mounted inside the outer closeable portable container controlling the tamper mechanism, the tamper mechanism operating using battery power when the portable valuables transport system is not connected to another source of power; an arm and disarm mechanism located inside the outer closeable portable container; and an alarm and wherein if the inner valuables container is opened without disarming the arm and disarm mechanism, the alarm is actuated.
7. The portable valuables transport system of claim 6, further comprising: a mounting dock; and a mounting mechanism to mount the outer closeable container in the mounting dock.
8. The portable valuables transport system of claim 6, further comprising: an internal polling mechanism to poll a user to provide a response, wherein if the response is not received in a predetermined time, the alarm is sounded.
9. The portable valuables transport system of claim 6, wherein the tamper mechanism further comprises: light sensors and infrared proximity sensors to detect tampering with the inner valuables container.
10. The portable valuables transport system of claim 6, wherein the arm and disarm mechanism comprises: a keypad internal to the outer closeable portable container configured to arm and disarm the alarm, the keypad requiring a correct key press sequence and proper delays between key presses.
11. The portable valuables transport system of claim 6, wherein when the outer closeable portable container is closed, an internal cavity is defined having an illumination below a predetermined low level, and wherein: the tamper mechanism comprises a sensor to detect possible tampering by detecting an increase in illumination above the predetermined level; and the battery operated controller operates to determine the increase in illumination has occurred during a period when the arm and disarm mechanism to arm and disarm the alarm has not been disarmed.
12. The portable valuables transport system of claim 6, further comprising: reflective infrared (IR) proximity sensors to sense motion of a wall of the outer closeable portable container or a tool inserted through a wall of the outer closeable portable container.
13. The portable valuables transport system of claim 6, further comprising: a communication link to communicate a notification that the alarm has occurred.
14. The portable valuables transport system of claim 7, wherein the mounting dock further comprises a mechanism to recharge the battery.
15. The portable valuables transport system of claim 6, further comprising: a polling mechanism to poll a mobile phone of an authorized user of the portable valuables transport system at periodic or random intervals.
16. The portable valuables transport system of claim 6, further comprising: a vibration detector to detect impacts on an outer surface of the outer closeable portable container.
17. The portable valuables transport system of claim 16, wherein the arm and disarm mechanism is disarmed in response to detection of a predetermined sequence of taps on the outer surface of the outer closeable portable container by the vibration detector.
18. The portable valuables transport system of claim 6, further comprising: a database internal to the outer closeable portable container storing all necessary user data and security parameters.
19. The portable valuables transport system of claim 6, wherein valuables pass through an opening for insertion of valuables into the outer closeable portable container and are stored inside the inner valuables container.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
DETAILED DESCRIPTION
(14)
(15) A center partition 400 serves as a mechanical mounting surface for all electrical and mechanical subassemblies of the disclosed invention. All subassemblies can be readily outfitted for other outer case shells 100 and 101 by customizing the center partition piece 400 for attachment to the new shell by way of screws 402 placed around the perimeter of piece 400 that are fashioned to drive into a mounting flange in the lower case shell 100. Two large openings 12 and 14 are cut in the center partition: one for a cash stronghold module 300 and one for a keypad 410, respectively.
(16) The cash stronghold module 300 is covered by cash compartment door 301 which rotates open and closed on hinge 305. The door can be sealed closed with a latching mechanism, such as a pair of captured screws 302 that are capable of being hand-tightened and released. According to one aspect of the invention, at least one of the captured screws 302 has a fine thread requiring that a user undoing the screw rotate it multiple times to unscrew it. The beginning of rotation is detected. The time taken by the multiple rotations allows an alarm to sound or a notification to be made before the cash door 301 is opened.
(17)
(18)
(19) The tolerance applied to each measured duration of time can be a pre-determined quantity or can be a function of how consistently the operator keyed in their PIN code during multiple trials in the training mode.
(20) Additionally, a disarm code programming mode may suitably be employed in which the operator presses his or her code sequence at timing intervals of his or her choice and with button hold durations of his or her choice and the microcontroller captures and stores the sequence and timing information during a learning interval of the training mode operation as shown in the
(21) As seen in
(22) Another feature of the keypad 410 shown in
(23) Another feature of the keypad 410 is to include security sensors such as a combined ambient light (ALS) and proximity sensor 412, and a temperature sensor 413. The ALS 412 can be used to detect a breach in the area of the transport case in front of the center partition that exposes the sensor surface to light above a predetermined threshold. The proximity sensor 412 detects motion of fingers or probe tools in the proximity of the keypad, but also is capable of detecting small motions in the outer case shell 101 which would occur if the case were to be pried or hinged open. The temperature sensor 413 can be used to detect the presence of extreme heat or cold which could be evidence of a tamper attempt in which a heat source such as a soldering iron or torch or a cold source like liquid nitrogen is applied in the vicinity of the keypad 410.
(24)
(25)
(26) The cash compartment area is additionally monitored by a door sensor 309 which detects when the captured screw latches 302 are fully engaged. An ambient light sensor 307 is installed against the inner wall of the cash compartment door. A wire harness 308 runs from the ambient light sensor and puncture sensors through the cash compartment case wall and over to the control board 401, as seen in
(27) Behind the center partition, proximity, ambient light, temperature, and puncture sensors are configured to detect tampering preferably in an arrangement shown in
(28) All sensors located remotely from the control board are preferably configured with serial communication links such as I2C, and are individually addressed so they can be wired along a common harness back to the control board. Furthermore, the idle state of the electrical signals on the wires that comprise the harness can be monitored by the control board to determine if the harness is cut. For instance, the idle state on each wire of the I2C serial link may be 3.3V as the result of a pull up resistor to a 3.3V supply rail located at the most remote sensor in the daisy chain link of sensors. If the link is cut, the I2C lines in their idle state would register 0V at the controller.
(29) Depending on the state of the transport case in addition to which tamper sensor has triggered, the controller will respond differently as shown in the
(30) Minor offenses result in the transport case entering a warn state 1004 in which an audible alert is given by activating an audio source or annunciator, such as a beeper, a buzzer or the like. Once in the warn state, the operator must successfully disarm the case within a predetermined period of time as detected in disarm parameters met state 1006 or the case 10 will activate a loud siren and/or send out wireless notifications. A major offense results in the immediate activation of the siren in loud siren state 1008. Upon proper disarming of the case, audible feedback, as in sound disarmed chime state 1010, may be given to indicate the operator may proceed to open the case and access the cash stronghold module, and the case 10 proceeds to enter the disarmed state 1012. Security parameters may be configurable to only allow for disarming during certain times of day or when the case is located at predetermined locations verifiable by electronic means such as wireless beacons or global positioning services.
(31) From the disarmed state 1012, a user may arm the case by entering the arm code on the keypad or it can be sent over Bluetooth® or a cellular phone connection. Sensors are checked in state 1014. If the sensors are all clear, sound armed chime state 1016 is entered and then followed by armed state 1002. If in check sensors dwell state 1018, the sensors were not all clear, for example, by a 20 s timer expiring with remaining detected sensor faults, the process returns to the disarmed state 1012.
(32) While at the point of sale, the transport case 10 can be further secured in place with the use of a permanently installed docking station 700 as shown in
(33) In
(34)
(35) Microprocessor 1310 also provides driver signals to user prompt LEDs and a buzzer 1334, drives a loud siren speaker 1337, an audible alarm, such as alarm buzzer 1336, and arm and disarm chimes 1338. The microprocessor 1310 also stores and retrieves data from a database 1340 of user data and security parameters. For example, database 1340 may suitably store user names along with their access codes and permission levels. The database 1340 may also store global positioning satellite (GPS) coordinates of valid destination waypoints, and identification numbers of wireless radio keypads, user smart devices or waypoint beacons.
(36) By way of example, the portable cash transport apparatus 10 may be employed in a food truck which from 10 pm until 6 am is expected to be parked at a first location. From 6 am-6:30 am, it is expected to be in transit from the first parking location to a second parking location where breakfast items are sold from 6:30 am-10:30 am. The food truck then travels to a third resupply location and then goes to a fourth location where lunch items are sold from 11:00 am until 2:30 pm. The truck then again resupplies and goes to a fifth location where dinner items are sold from 4:30 pm until 10 pm. After 10 pm, the portable cash transport apparatus 10 is taken to a location where cash is removed.
(37) As another example, the portable cash transport apparatus 10 may be employed to collect cash from kiosks or retailers at a mall, or from concessions at a ballgame, or the like. Again, the location can be tracked and matched against an expected route as an operator collects cash which is validated and stored. A transaction receipt can be texted or otherwise provided to each kiosk operator, retailer or the like if desired.
(38) Controller 1310 can receive GPS data 1342 and compare data stored in database 1340. If the two do not match up appropriately, an alarm can be sounded using loud siren speaker 1336 and a supervisor or other authorized personnel can be notified by sending an alert to a remote server 1342, a smart phone 1344, or the like.
(39) Microprocessor 1310 also may suitably communicate to a remote computer utilizing a modem or wireless modem 1346. A polling device 1348 in the portable case 10 can poll a user and then communicate with microprocessor 1310. If the user does not respond to a polling attempt within a predetermined acceptable time to reply, the polling device 1348 informs microprocessor 1310 which then drives loud siren speaker 1336 to sound a loud audible alarm and to communicate the failure to authenticate to a supervisor through wireless communication interface 1302, wireless modem 1346, or the like.
(40) When a disarm signal is received from an RF disarm signal unit 1350 or the correct sequence of keystrokes is received from keypad 1320, the microprocessor 1310 disarms the portable case 10 allowing an operator to access cash storage. In a presently preferred embodiment, the portable cash transport apparatus 10 is light and its plastic case is relatively easy to drill into or otherwise attack by a vandal or thief. Security is primarily provided by detecting such attacks, activating an alarm, and reporting the attack. However, it will be recognized a sturdier case may be employed utilizing a controllable lock 1352 to lock and unlock the case. Additionally, the ink deployment device of U.S. Pat. No. 9,406,208, filed Jun. 12, 2014, and incorporated by reference herein can also be employed to deter attempted thefts by rendering any internal access unavailing by deploying ink before someone intent on theft can access any stored cash.
(41) Similarly, the portable case 10 can be armed employing an RF arm signal unit 1351. As cash is deposited, sales are made and the like, storage transaction data, such as the current amount of cash in the portable transport apparatus 10 is stored in storage 1354. Such data can be subsequently retrieved and analyzed to provide useful information about times when sales are most frequent, and the like.
(42) In a presently preferred embodiment, when the portable transport apparatus 10 is inserted in a docking station 1356, the microprocessor 1310 provides control signals causing solenoids in docking station 1356 to lock the portable transport apparatus 10 in place. Power is supplied by the docking station 1356 through a connector (not shown) to a battery charging port 1332, such as connector 501 of
(43) It will be clear that there are numerous configurations and embodiments possible using the technology and techniques described above. While the present invention is disclosed in the context of presently preferred embodiments, it will be recognized that a wide variety of implementations may be employed by persons of ordinary skill in the art consistent with the above discussion and the claims which follow below.