METHOD AND PRODUCT FOR TRACKING CURRENCY TRANSFER
20220343419 · 2022-10-27
Inventors
Cpc classification
G06Q10/087
PHYSICS
International classification
Abstract
Described herein is a method, product and system for tracking currency transfer, said method comprising use of a currency security bag containing currency and a series of steps to securely monitor information corresponding to the security bag. The security bag allows for a user to track the currency from a point of deposit until reaching a destination.
Claims
1. A method for tracking currency transfer, comprising the steps of: providing a security bag for holding currency; depositing currency into the security bag; entering information corresponding to the security bag into a database; and updating the database with at least one location of the security bag; wherein the security bag may be tracked by a user from a point of deposit until reaching a destination by remote accessing of the database.
2. The method according to claim 1, wherein the security bag comprises: a machine readable code; and a wireless identifier; which enable said currency security bag to be identified so that the security bag can be tracked from a point of deposit until reaching a destination.
3. The method according to claim 2, wherein the machine readable code comprises a primary barcode in the form of a 1D barcode, wherein the primary barcode provides access to the database and allows for allocation to a unique ID tag to the security bag in the database.
4. The method according to claim 2, wherein the machine readable code comprises a secondary barcode comprising information that provides access to the database.
5. (canceled)
6. The method according to claim 4, wherein the secondary barcode provides access to a deposit URL, for recording deposit data regarding the contents of the security bag, wherein said deposit data includes auto-populated data corresponding to the unique ID tag.
7. (canceled)
8. The method according to claim 4, wherein the secondary barcode is a QR code.
9. (canceled)
10. The method according to claim 6, wherein the user confirms the data recorded regarding the contents of the security bag, and upon confirmation of the deposit data recorded into the deposit URL: the secondary code corresponding to the security bag is deactivated; the user is sent a confirmation notification; and/or the deposit data is encrypted and entered into the deposit database, wherein the encrypted deposit data is able to be accessed by the depositor or by the recipient when the security bag arrives at the destination.
11. (canceled)
12. (canceled)
13. (canceled)
14. (canceled)
15. The method according to claim 2, wherein the wireless identifier comprises an RFID tag and provides access to the database to allow for viewing: data corresponding to the unique ID tag, and/or data corresponding to the deposit data; and wherein the RFID tag further provides additional information to the database, providing a means for entry of status data.
16. (canceled)
17. (canceled)
18. The method according to claim 1, wherein the step of depositing currency into the security bag comprises: placing currency to be transferred inside the bag, and/or scanning a secondary code to receive a unique deposit code corresponding to the bag.
19. The method according to claim 1, wherein the information corresponding to the security bag comprises: personal details of the user, and/or details of currency to be deposited.
20. The method according to claim 1, wherein the step of providing the security bag comprises: a user accessing a stock management interface, and entering data including number of bags into the stock management interface; recording the identity of each bag sent to the user.
21. The method according to claim 1, wherein upon depositing the bag a user receives a confirmation notification including the details of the deposit.
22. The method according to claim 1, wherein said database provides notification when a security bag has already been used; and/or wherein said database provides means for generating a report, wherein said report is in the form of a CSV file or similar format.
23. (canceled)
24. (canceled)
25. A currency security bag comprising: a primary barcode, a secondary barcode, and an RFID tag; which enable said currency security bag to be tracked from a point of deposit until reaching a destination.
26. A tracking system for tracking currency transfer in a security bag having a machine readable code and a wireless identifier, said system comprising: a first reader, a server and a second reader; wherein the first reader is operatively arranged to read the machine readable code at a commencement location, the reader operatively arranged to read the machine readable code and extract information and an identifier of the security bag from the code, the information operative to trigger a connection to a remote server; wherein the remote server is arranged to receive the identifier and information about the currency to be transported and recording the identifier and the currency information; wherein the second reader is operatively arranged to receive an identifier of the security bag from the wireless identifier at a destination location; wherein the remote server is configured upon receipt of the identifier by the second reader to receive from a destination device said identifier, wherein the server is configured to retrieve the information about the currency based on the identifier provided to the server and one or both of: provide the information about the currency to the destination device; and record the time of the second reader receiving the identifier of the security bag.
27. A computer program embodied in a physical form comprising instructions for controlling a computer to: receive from a first reader at a first remote location an identifier of a security bag read from a code on the security bag by the first reader; provide to a user of the first reader a link that enables a connection to the server; receive from the user information about currency to be transported in the security bag; record the identifier and the currency information; receive from a second reader at a second location an identifier of the security bag read from a wireless identifier on the security bag by the second reader; retrieving the currency information based on the identifier of the security bag read from a wireless identifier; sending to a destination device at the second location the retrieved currency information.
28. The computer program according to claim 27, wherein the instructions are also configured to control the computer to: record the time of the second reader receiving the identifier of the security bag; and provide the recorded time to the user.
29. A system comprising means for implementing the computer program according to claim 27.
30. A method performed by a system when executing the computer program according to claim 27.
Description
BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES
[0076] In the Figures:
[0077]
[0078]
[0079]
[0080]
[0081]
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0082] Referring to
[0083] Referring to
[0084] The server 430 is configured with a processor (such as a virtual CPU), memory (such as an allocation of virtual memory, a data storage device (such as a virtual disk drive) and a computer network connection (such as a connection to the Internet). The server 430 also comprises application software comprising instructions stored in the data storage which are created to control the processor and other elements of the server 430 to operate as described herein. The description herein will serve as a blueprint for a computer programmer (or team) to implement in an operative form the application software as defined in this specification by use of standard computer programming techniques.
[0085] The system 400 enables implementation of a method for tracking currency transfer, comprising the steps of: [0086] providing the security bag 300 for holding currency to enable a user wishing to transfer currency from one location to another; [0087] depositing currency 310 into the security bag 300 via the opening 302; [0088] scanning one or more of the identifiers 304, 306 or 308 at a first location (Loc 1) to enable entering information identifying the security bag 300 into the database 434; and [0089] when the bag 300 has been transported to the desired location (Loc 2) scanning one or more of the identifiers 304, 306 or 308 to update the database the location (loc 2) of the security bag 300; [0090] whereby the security bag 300 is able to be tracked by a user from a point of deposit (Loc. 1) until reaching a destination (Loc. 2) by remote accessing of the database 464 using the user device 410.
[0091]
[0092]
[0093]
[0094] The amount is stored in the database 434 against the identity of the bag 300. The bag 300 is then taken for transport, such as being taken from the start location (Loc. 1) to a bank branch or by a security transport firm at 218 to a deposit facility.
[0095] The bag 300 is received 230 at the destination (Loc 2). If the bag is received and has not entered into the database 434 it is manually processed at 236. If it was entered, receipt of the bag 300 is recoded by scanning gone of the identifiers (e.g. 1D barcode, QR Code or RFID), such as by using scanner 404. The receipt of the bag may be stored in the database 434. The bag 300 may be moved from a receipt location (Loc 2) to a counting location (Loc 3). The movement from Loc 2 to Loc 3 may be recorded by use of scanner 406.
[0096] The content of the bag is checked 234 (such as by counting the currency). The counted amount can be verified against the amount of currency recorded in the database 434 via the bank device 420 and API access to the server 430 at 222. The user can check the transfer by accessing the website via their device 410. A report of the receipt of the currency is generated at 224. This notification may be sent to the user, such as by email or SMS.
[0097] Finally, it is to be understood that various alterations, modifications and/or additions may be made without departing from the spirit of the present invention as outlined herein.