Claims
- 1. An apparatus for securely monitoring the sales transactions in bulk vending machines, said apparatus comprising at least one bulk vending machine having a coin mechanism; said coin mechanism comprising a coin plate, a selectively rotatable shaft extending radially therefrom, a coin shuttle, a cam-bearing lobe and a coin mechanism adapter plate co-axially and collectively located around said selectively rotatable shaft; a first switch and a second switch, said first and second switches being fixedly mounted and oriented on said coin mechanism adapter plate so that the maximum amount of backlash in said coin mechanism is less than the angular spread of said switches; a microprocessor having a sales counter; and means for communicatingly connecting said first and second switches to said microprocessor, whereby said microprocessor will advance said sales counter one numeric count and record a single vend only after said cam-borne lobe contacts and completely closes both first and second switches, when said lobe-bearing cam is rotated as a result of a coin deposited in said coin mechanism.
- 2. The apparatus of claim 1, wherein said first and second switches further comprise switch levers and the maximum amount of backlash in said coin mechanism is less than the angular spread of said switch levers.
- 3. The apparatus of claim 2, further comprising a portable reader, said portable reader comprising means for becoming communicatingly connected to said microprocessor, downloading, and storing all vend data contained in said microprocessor after the appropriate initialization data and the appropriate transmission commands are inputted into said microprocessor via said portable reader.
- 4. The apparatus of claim 3, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 5. The apparatus of claim 3, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 6. The apparatus of claim 5, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 7. The apparatus of claim 3, wherein said means for becoming communicatingly connected to said microprocessor and downloading and storing said vend data comprises a power source, a CPU, a memory, a first communication port, a keypad and a display, whereby said power source provides the power to energize said portable reader; said keypad, said CPU and said display operate together for the purpose of entering the appropriate initialization data and transmission commands; and said CPU, said memory and said first communications port operate to download said vend data stored in said microprocessor
- 8. The apparatus of claim 7, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 9. The apparatus of claim 7, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 10. The apparatus of claim 9, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 11. The apparatus of claim 3, further comprising printing means communicatingly connected to said portable reader whereby the vend data downloaded from said microprocessor can be printed for review, study and evaluation.
- 12. The apparatus of claim 11, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 13. The apparatus of claim 11, wherein said means for becoming communicatingly connected to said microprocessor and downloading and storing said vend data comprises a power source, a CPU, a memory, a first communication port, a keypad and a display, whereby said power source provides the power to energize said portable reader; said keypad, said CPU and said display operate together for the purpose of entering the appropriate initialization data and transmission commands; and said CPU, said memory and said first communications port operate to download said vend data stored in said microprocessor.
- 14. The apparatus of claim 12, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 15. The apparatus of claim 11, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 16. The apparatus of claim 15, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 17. The apparatus of claim 13, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 18. The apparatus of claim 17, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 19. The apparatus of claim 1, further comprising a portable reader, said portable reader comprising means for becoming communicatingly connected to said microprocessor and downloading and storing all vend data contained in said microprocessor after the appropriate initialization data and the appropriate transmission commands are inputted into said portable reader.
- 20. The apparatus of claim 19, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 21. The apparatus of claim 19, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 22. The apparatus of claim 21, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 23. The apparatus of claim 19, wherein said means for becoming communicatingly connected to said microprocessor and downloading and storing said vend data comprises a power source, a CPU, a memory, a first communication port, a keypad and a display, whereby said power source provides the power to energize said portable reader; said keypad, said CPU and said display operate together for the purpose of entering the appropriate initialization data and transmission commands; and said CPU, said memory and said first communications port operate to download said vend data stored in said microprocessor.
- 24. The apparatus of claim 23, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 25. The apparatus of claim 23, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 26. The apparatus of claim 25, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 27. The apparatus of claim 19, further comprising printing means communicatingly connected to said portable reader whereby the vend data downloaded from said microprocessor can be printed for review, study and evaluation.
- 28. The apparatus of claim 27, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 29. The apparatus of claim 27, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 30. The apparatus of claim 29, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 31. The apparatus of claim 27, wherein said means for becoming communicatingly connected to said microprocessor and downloading and storing said vend data comprises a power source, a CPU, a memory, a first communication port, a keypad and a display, whereby said power source provides the power to energize said portable reader; said keypad, said CPU and said display operate together for the purpose of entering the appropriate initialization data and transmission commands; and said CPU, said memory and said first communications port operate to download said vend data stored in said microprocessor.
- 32. The apparatus of claim 31, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data and said transmission commands.
- 33. The apparatus of claim 31, wherein said microprocessor further comprises a tamper circuit, said tamper circuit being capable of detecting any unauthorized operations on said microprocessor, locking said microprocessor, and allowing said microprocessor to transmit its vend data only after an unlock code is properly entered into said microprocessor via said portable reader.
- 34. The apparatus of claim 33, wherein the input into said microprocessor via said portable reader is strictly limited to said initialization data, said transmission commands and said unlock code.
- 35. A method for securely monitoring sales transactions in bulk vending machines, comprising the steps of:
providing at least one bulk vending machine with product to be dispensed at the end of a sales transaction; outfitting said bulk vending machine with a coin mechanism having a coin plate, a selectively rotatable shaft extending radially therefrom, a coin shuttle, a cam-bearing lobe and a coin mechanism adapter plate co-axially and collectively located around said selectively rotatable shaft; and a first switch and a second switch, said first and second switches being fixedly mounted and oriented on said coin mechanism adapter plate so that the maximum amount of backlash in said coin mechanism is less than the angular spread of said switches; communicatingly connecting said first and second switches to a microprocessor comprising a sales counter; inserting a coin into said coin mechanism of said bulk vending machine; rotating said lobe-bearing cam counterclockwise, whereby said cam-borne lobe contacts and closes said first switch and places said microprocessor on alert; continuing the counterclockwise rotation of the lobe-bearing cam while simultaneously using said microprocessor to check the closed status of said first switch for a first, fixed period of time; while confirming said closed status of said first switch at the end of said first, fixed period of time, continuing the counterclockwise rotation of said lobe-bearing cam off said first switch, causing the release and opening of said first switch, alerting said microprocessor that said cam-borne lobe is in between said first switch and said second switch and notifying said microprocessor to await for the possible closure of said second switch; thereafter continuing the counterclockwise rotation of said lobe-bearing cam whereby said cam-borne lobe contacts and closes said second switch for a second, fixed period of time; continuing the counterclockwise rotation of said lobe-bearing cam while simultaneously using said microprocessor to monitor the closed status of said second switch for said second, fixed period of time; while confirming said closed status of said second switch at the end of said second, fixed period of time, continuing the counterclockwise rotation of said lobe-bearing cam off said second switch, causing the release and opening of said second switch, and notifying said microprocessor to acknowledge a valid vend event and increment said microprocessor sales counter by one upon acknowledgment of said valid vend event and the incrementing of said sales counter by one, continuing the counterclockwise rotation of said lobe-bearing cam back to the coin mechanism's starting position; dispensing a product; and readying said bulk vending machine for another vend sequence.
- 36. The method of claim 35, further comprising the steps of
1. communicatingly connecting a portable reader to said microprocessor; 2. entering appropriate initialization data into said portable reader; 3. thereafter entering appropriate transmission commands; and 4. downloading and storing all vend data contained in said microprocessor, in connection with said sales transactions of said bulkvending machine.
- 36. The method of claim 36, further comprising the steps of:
communicatingly connecting printing means to said portable reader; and printing said downloaded and stored vend data from said microprocessor.
- 37. The method of claim 35, further comprising the steps of providing said microprocessor with a tamper circuit, using said tamper circuit to detect any unauthorized operations on either said microprocessor or said bulk vending machine, and upon the detection of said unauthorized operations to shut down said microprocessor and prevent the further sales of product.
- 38. The method of claim 36, further comprising the steps of providing said microprocessor with a tamper circuit, using said tamper circuit to detect any unauthorized operations on either said microprocessor or said bulk vending machine, and upon the detection of said unauthorized operations to shut down said microprocessor, prevent the further sales of product, and allow said microprocessor to transmit its vend data and said bulk vending machine to resume normal operation, only after an unlock code is properly entered into said microprocessor via said portable reader.
- 39. The method of claim 37, further comprising the steps of providing said microprocessor with a tamper circuit, using said tamper circuit to detect any unauthorized operations on either said microprocessor or said bulk vending machine, and upon the detection of said unauthorized operations to shut down said microprocessor, prevent the further sales of product, and allow said microprocessor to transmit its vend data and said bulk vending machine to resume normal operation, only after an unlock code is properly entered into said microprocessor via said portable reader.
- 40. The method of claim 36, wherein said portable reader can be used to enter initialization data and transmission commands only.
- 41. The method of claim 37, wherein said portable reader can be used to enter initialization data and transmission commands only.
- 42. The method of claim 39, wherein said portable reader can be used to enter initialization data, transmission commands, and the unlock code only.
- 43. The method of claim 40, wherein said portable reader can be used to enter initialization data, transmission commands, and the unlock code only.
CROSS REFERENCE TO RELATED PROVISIONAL APPLICATION
[0001] This application claims the benefit of U.S. Provisional patent application No. 60/388,076 filed on Jun. 11, 2002.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60388076 |
Jun 2002 |
US |