The present disclosure relates generally to a system for handling valuable documents, and more particularly, to an automated system for handling valuable documents contained within a secure lockable container from which valuable documents can be extracted for processing.
In financial institutions or casinos, large volumes of valuable documents (e.g., paper currency, bills, banknotes) are often transported to a central location for counting, sorting and organizing. It is often standard for the transported banknotes to be housed within a secure container to minimize theft or loss. Such secure containers can house various volumes of banknotes depending on the application. Typically secure containers are equipped with a locking mechanism by which only authorized personnel can access and thus retrieve the valuable documents contained therein.
Once the secure container has been transported to a central location within the respective institution, an authorized operator unlocks the secure container to allow access to the valuable documents contained therein. After unlocking the secure container, the operator removes the valuable documents from the secure container and transfers them to a machine for sorting, counting or further organizing. Once the secure container is emptied, the operator may be required (by regulation or law) to demonstrate that the secure container is in fact empty and no valuable documents remain. When such a requirement is present, for instance in a casino cash room, the operator may show a camera on a closed circuit television system that is monitored and recorded in a security room. After the contents of the secure container have been removed and transferred to a sorting machine, the secure container must be re-locked and transported to a secondary station for reuse.
The handling system described above requires at least one operator to physically manipulate the secure containers and the valuable documents contained therein. By having the operator handle the secure container and transfer the contents to a counting machine, the processing speed is limited to the speed at which the operator can perform the described tasks. Also, the security of the valuable documents must be continuously monitored by a secondary security system in order to prevent theft or loss during exposure of the valuable documents. There exists a need to increase the speed at which valuable documents can be extracted and transferred to a counting machine. Additionally, there exists a need to increase the level of security when handling the valuable documents while minimizing the additional expense of having a security system/personnel continuously monitoring the handling process.
The present disclosure relates to an automated document handling system. The system can be arranged for transferring valuable documents from a secure container to a sorting machine and for returning the empty secure container for reuse. The secure container is of the type, for example, whereby valuable documents are generally stacked inside a rigid body and the secure container has a lockable access panel. Secure containers are loaded onto a transportation mechanism and sequentially moved to an extraction location. At the extraction location the handling apparatus unlocks the secure container and opens the access panel to expose the valuable documents contained therein. Once the valuable documents contained in the secure container are exposed, the handling apparatus reads an RFID identifier (or any other electronically readable identifier) from the container and sends this information to an external processing unit. The external processing unit associates the contents of the container with a reference card, typically identified by a readable bar-code or other electronically readable label, for tracking (for example). Once an associated reference card has been identified for the specific container, the handling apparatus inserts the reference card at one end of the stacked valuable documents. After the reference card has been inserted onto the stack of valuable documents, the handling apparatus extracts the stack of documents from the container. After the stack of documents has been extracted from the container, the handling apparatus transfers the stack to a sorting machine for processing. The sorting machine can be of various known types and may perform many functions including, but not limited to counting, sorting and authenticating. The stack of valuable papers housed within the secure container may be, but are not limited to paper currency, banknotes or bills.
After the stack of banknotes is transferred from the secure container to the sorting machine by the handling apparatus, the empty container may be required to be shown to a security system to verify the container is empty and no valuable documents remain inside the container. To accomplish this, the handling apparatus can be equipped with a optical recording device to obtain a visual record of the inside of the container, and this information is transferred to an external processing system for recording and storage.
Once the container has been emptied, the handling device closes the access panel of the container and performs a locking operation to ensure the container is locked. After the emptied container has been re-locked, the handling apparatus transfers the empty and secured container to a further transportation mechanism. Empty and secured containers located on the further transportation mechanism can be processed for reuse as required by a given application. The processing for reuse may include, but is not limited to, reading an RFID identifier for each empty secure container and recording any data that may be required to allow the container to be reused.
The foregoing operations can be applied to processing of a single secure container or to a series of secure containers such that a large volume of containers can be processed by the handling apparatus without the need of a human operator. The operations allow for a series of secure containers to be sequentially processed such that the contents of each container can be identified, extracted, processed and recorded as dictated by a specific application.
In one aspect, a system is disclosed for automatically processing secure containers housing valuable documents. The system includes a container processing unit arranged to remove contents of the secure containers, and an extraction module operatively coupled to the container processing unit to open and close the secure containers and to remove the contents of the secure containers.
In another aspect, a method is disclosed for automatically processing secure containers housing valuable documents, the method includes receiving a secure container in a secure container processing unit, opening the secure container using an extraction module operatively coupled to the secure container processing unit, removing the valuable documents from the secure container using the extraction module, transferring the valuable documents to an external processing apparatus, and closing the secure container using the extraction module.
Other aspects, features and advantages will be readily apparent from the detailed description, the accompanying drawings, and the claims.
The details of secure container processing unit 30 will now be described. Transportation mechanism 20 sequentially delivers secure containers 50 to secure container processing unit 30 such that one secure container 50 is processed at a time by secure container processing unit 30. The following description refers to the processing of a single container. However, the process is repeated for each secure container 50 that is delivered to secure processing unit 30.
As secure container 50 is delivered to secure container processing unit 30, content extraction module 100 is operable to manipulate secure container 50 and the contents housed therein. Specifically, module 100 includes a lock manipulation tool 120 and a content extraction tool 110. Content extraction tool 110 further includes at least first and second content stabilizers 111 and 112 (
In some configurations, it may be necessary to include a separator card between the contents of sequential secure containers 50. A separator card can include an electronically readable label such that it can be associated to each respective secure container 50 handled by secure container processing unit 30. The separator card can be inserted with the stack of documents prior to extraction from the container or it can be placed between stacks in the sorting machine.
In some implementations, an image of the inside of secure container 50 is recorded once the contents of the container have been removed. For example, there may be regulations or laws that require that a secure container 50 housing valuable documents be verified as empty prior to allowing the container to be re-used. Some implementations include an image recorder operatively coupled to secure container processing unit 30. The image recorder may be that of any number of currently known devices, such as a digital camera or any other known means for recording the image of the inside of secure container 50. While secure container 50 is positioned within secure container processing unit 30, extractor module 100 uses an image recorder to capture an image of the inside of secure container 50 to demonstrate there are no valuable documents remaining. The recorded image of the inside of container 50 is communicated to an external processing device for formal storage. Handling apparatus 10 can be configured to combine an identifier (explained in detail below) for each secure container 50 and the recorded image of the inside (after removal of contents) of container 50 such that an external processing device stores both types of information as a single set of data.
The operation of the system will now be described. First, one or more secure containers 50, each of which has at least one valuable document housed therein, are placed on transportation mechanism 20. Secure containers 50 are sequentially transported by transportation mechanism 20 to secure container processing unit 30. Each secure container 50 is received and handled by secure container processing unit 30. Container processing unit 30 executes various operations, which, in some implementations, are performed at separate stations of within unit 30. To facilitate understanding, the processing of a single secure container 50 is described. However, the same technique can be applied to any number of sequentially supplied secure containers 50. As secure container processing unit 30 receives a secure container 50, extraction module 100 reads the RFID of container 50. The information obtained from the RFID of the secure container 50 is communicated to an external processing apparatus. The reading of an identification of container 50 has been described as occurring prior to opening the container, however this can be done at any point in the processing of a container 50 by secure container processing unit 30.
Once the RFID identifier has been read, lock manipulation tool 120 unlocks secure container 50. Lock manipulation tool 120 is arranged to unlock locking mechanism 52 in a manner commonly know in the art (for example, with a physical or electronic key). If, for example, a physical key is used, the key is inserted into lock 52, which is actuated from the locked position to the unlocked position. In some implementations, access panel 51 is pivotally coupled to housing 55 such that clockwise rotation of the access panel 51 about pivot 57 moves the access panel 51 from a closed position to an open position. Placing access panel 51 in an open position exposes the contents of secure container 50 (a stack 70 of banknotes or other valuable documents) housed in storage space 58. In some implementations, lock manipulation tool 120 is arranged so that when the key is in the unlocked position, lock manipulation tool 120 recognizes that the key cannot be extracted and, in response, lock manipulation tool 120 moves access panel 51 from its closed position to an open position. Once the access panel has been moved to the open position, the key is returned to the locked position and is extracted from the lock. In other implementations the key can remain in the lock without varying in scope from the present disclosure. At this point, container 50 is ready for the next operation, which can be performed either at another station within the container processing unit 30 or by another manipulation tool that removes the contents from the container.
With access panel 51 in an open position, extraction module 100 is moved into position to extract stack 70 of banknotes from storage space 58 of secure container 50. In some implementations, extraction tool 110 extracts stack 70 by operatively engaging the stack 70 with first 111 and second 112 stabilizers. Stabilizers 111 and 112 abut stack 70 at surfaces 71 and 72, respectively. Alternatively, extraction tool 110 can be configured to engage stack 70 with stabilizers 111 and 112 by abutment with surfaces 73 and 74, respectively. Extraction tool 110 can have additional stabilizers as required to properly stabilize stack 70. In some implementations, extraction tool 110 includes a pair of vertically spaced stabilizers 111 and 112 and a pair of horizontally spaced stabilizers 211 and 212. In such a configuration each pair of stabilizers work in conjunction with each other to stabilize stack 70 of container 50.
As shown in
As shown in
To assist in stabilizing the stack of documents for extraction, some implementations include a modified design for pressure plate 80, as shown in
After extraction tool 110 extracts stack 70 of documents from secure container 50, stack 70 is transferred from secure container processing unit 30 to an external apparatus for additional processing (e.g., counting, sorting and authenticating). Each stack 70 removed from a secure container 50 can be sequentially transferred to the external processing apparatus. In some configurations, secure container processing unit 30 inserts a separator card between each sequentially transferred stack 70. The separator card can be inserted in storage space 58 with stack 70 or it can be inserted between stacks 70 as they are sequentially transferred to the external processing apparatus. Extraction module 100 can be coupled, for example, to a multi-axis robotic arm or other similar motion device to allow movement between the container area and the location of the sorting machine.
In some implementations, it is necessary or desirable to record that secure container 50 is, in fact, empty. After stack 70 is removed from secure container 50, secure container processing unit 30 captures an image of storage space 58 of secure container 50. The image capturing means can be operatively coupled to extraction module 100. Alternatively, the image capturing means can be operatively coupled to secure container processing unit 30. In some implementations, the recorded image of the empty container and the secure container identifier are combined (e.g, the RFID identifier is overlaid onto the image) and the combined information is transferred to an external processing unit (e.g., computer or information processing device) for proper storage and reporting.
After the contents of secure container 50 have been removed (and, in some cases, the empty storage space verified), access panel 51 is returned to a closed position. Once access panel 51 is in the closed position, locking mechanism 52 is actuated from an unlocked state to a locked state. In some implementations, closing access panel 51 and locking lock 52 occurs at a third station within container processing unit 30. The locked secure container 50 then is transported out of, and away from, secure container processing unit 30 by transportation mechanism 20 for further processing. Empty secure containers 50 may have their RFID read by an additional processing station such that they are ready to be reused for storing valuable papers and subsequent processing.
As mentioned above, some implementations of container processing unit 30 include multiple stations, each of which performs a particular operation of set of operations. In any event, containers 50 can be moved through the processing unit continuously, such that each container is processed in a short amount of time (e.g., about 10 seconds).
While specific examples have been described above, various modifications can be made. Therefore, other implementations are within the scope of the claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US09/50225 | 7/10/2009 | WO | 00 | 6/16/2011 |
Number | Date | Country | |
---|---|---|---|
61080003 | Jul 2008 | US |