The present invention relates generally to improved methods and apparatus for mobile cash transportation, and more particularly to aspects of a cash transportation case with improved tamper detection and a bill validator managed by an internal control system.
There are a number of electronic smart safe products on the market that can both electronically recognize currency deposited and securely store the deposited currency. An example of this technology is described in U.S. Pat. No. 7,516,832 which is assigned to the assignee of the current invention and is incorporated herein by reference in its entirety. This technology has the limitation of being a stationary container normally bolted in place. Additionally, this technology is designed to be heavy using thick gauge steel and reinforced for security. Frequently, to increase security when removing the collected currency from the electronic support safe, an armored car service is used.
When the added cost of using an armored car service is prohibitive, alternatives are available. Devices used to securely transport paper currency are offered in many forms and styles from sturdy metal cases to locked nylon zipper bags and simple bank deposit bags. In recent years, a number of more sophisticated cash carrying devices have been introduced that add indelible ink deployment mechanisms to devalue currency in the event of theft.
These transport systems typically require that the user first store currency in an intermediate location that is often less protected from theft such as the cash drawer of a point-of-sale (POS) system. While in the intermediate storage location, the cash is vulnerable to theft by an external threat, such as a robber or an internal threat, such as an employee.
Many existing systems use mechanical keys or a range of electronic key options, including radio frequency identification (RFID) tags, Dallas keys, or an optical communication link, to disarm the cash carrying devices to allow retrieval of the cash. These types of systems are vulnerable to key-theft. It is well known that biometric authentication methods can be much more effective in preventing unauthorized access, but such approaches tend to add significant cost as in the case of fingerprint scanners, palm print scanners, retinal scanners, or voice print analyzers. In U.S. Pat. No. 4,805,222, Young discloses an alternate method of biometric authentication through the analysis of an individual's typing patterns including the timing between characters and the pressure of each keystroke. By applying probability techniques, the natural typing cadence of particular users are compared against a database of pre-captured typing cadences to scan for a match. This technique involves the use of a large database containing typing pattern information for a variety of users and employs rigorous computer processing and analysis to validate the keystroke dynamics. The use of keyboard pressure sensing requires the use of specially design keypad interfaces with built-in pressure sensors.
Kellas-Dicks in U.S. Pat. No. 8,332,932 offers an alternative algorithm for analyzing keystroke dynamics based on not only dwell time between characters, but also through the analysis of derivatives and other mathematical products determined based on collected key press timing information. In both the approaches taken by Young and Kellas-Dicks, the objective is to provide authentication of a user based on their natural typing patterns. As a result, the data processing burden is substantial.
In the Eye in the Sky security system project described in, Eye in the Sky Security System Project—May 2004, Aaron Dobbins and Fran Ianacci, http://people.ece.cornell.edu/land/courses/ece4760/FinalProjects/s2004/fci2/highleveldesign.html (“the Dobbins method”), a simpler keystroke dynamics authentication scheme is disclosed in which a user is prompted to come up with a unique keystroke pattern for their pass code. The user is given a blinking light emitting diode (LED) prompt to aid in both creating and recalling their unique timing sequence. In this manner, a deliberate keypad sequence can be much more easily authenticated with keystroke timing and character information alone.
One aspect of this invention seeks to protect cash from the moment a cash transaction occurs, until the moment that cash is deposited at its destination, while also providing verification of the validity of the cash or bank note placed into the transport case.
The present invention improves on the Dobbins method by monitoring both the durations of time between keystrokes, and the duration of the keystroke themselves, and provides an advantageous new training mode technique to aid or prompt users in generating their unique keystroke patterns.
Another aspect of the invention addresses a cash transportation case that combines ready portability with sophisticated tamper detection sensors and a bill validation system which is managed by an internal control circuit that is capable of fully protecting the cash in transit without the need for a link to external processors. Control circuitry, such as an on-board microcontroller, programmed microprocessor, field programmable gate array (FPGA), application specific integrated circuit (ASIC), or the like, or some combination thereof (collectively “controller”), can track money stored within the case, monitor tamper protection sensors, and communicate the information over one or more communication links including a wired or wireless connection to a computer, smart phone device, or web server for the purpose of providing a manager with a remote interface into the transport case.
The cash transportation case may suitably comprise a cash stronghold module, control circuitry, tamper detection sensors, a power source, and an outer case enclosure. The cash stronghold module further comprises a bill validator mechanism, a cash cassette, and a cash compartment door that provides access into the cash cassette. The control circuitry comprises a microcontroller, memory storage, one or more wireless transceivers, electrical interfaces to one or more sirens, tamper sensors, a keypad, LED indicators, and a battery charging port. With a battery supply and its ready portability, the cash transportation case of the invention finds ready applicability to environments, such as fairgrounds, ice cream and food trucks, and the like, where enhanced cash protection would be highly advantageous.
An objective of this invention is to implement novel tamper detection sensor methods advantageously suited for cash transport applications through the use of ambient light sensors to detect breaches in an internal cavity having an illumination below a predetermined level, such as a pitch black case interior space. The ambient light sensors are further complemented by the use of reflective infrared (IR) proximity sensors that are effective in recognizing the presence of nearby foreign objects such as probes, tools, or fingers located within a range up to 20 cm of the sensor elements. The reflective IR sensors are affixed to the cash stronghold module subassembly such that motion of the cash stronghold with respect to the outer case walls can also be detected.
Ambient light sensing elements are optimally suited to detect the presence of small amounts of visible light over a wide incidence angle but are not well suited in the event a case wall breach occurs in a dark room. Reflected IR proximity sensors can detect motion or objects over a comparably narrower incidence angle, but remain effective in any room lighting.
Another objective of the current invention is to use an orientation sensor such as a three-axis accelerometer to monitor the transport case orientation for signs of mishandling. The case can be preconfigured to only accept certain valid orientations. In the event the case is stolen, the thief may not be aware of the valid orientations, and if placed in an invalid orientation, the case may enter an alarm state in which audible sirens are activated, wireless alerts are issued, or both.
Another objective of the current invention is to monitor the state of a cash compartment door such that a sensor is utilized to detect the very start of a door opening operation. The door opening procedure requires a minimum duration of time to open the mechanical latch mechanism, which provides the necessary delay to ensure alarm sirens and wireless alerts can be sent out before the door is opened. The delay time is preferably on the order of several seconds and the latch mechanism may be in the form of a captured screw latch, preferably of the type offered by Southco.
Another objective of the current invention is to couple the above mentioned tamper detection sensors to a control circuit capable of interpreting sensor data, communicating the data to an external terminal device over a wireless link, and receiving inputs from that terminal device or a local keypad to change the operating state of the transport case. The external terminal can be in the form of a smart phone or tablet equipped with a compatible wireless radio, and is the preferred method of sending state change information to the case such as arm or disarm commands which are sent over an encrypted data link. Alternatively, arm and disarm commands can be entered into the local keypad in a novel manner that requires both a correct key press sequence along with the proper delays between key presses. A blinking LED is provided near the keypad to provide a metronome function that enables a user to consistently enter their code with proper delays. Alternatively, the appropriate key can be lit to prompt the user to press that key and then turned off to prompt the user to release the key for the proper duration before the next key is lit, and so on. Both the key press sequence and the delays between key presses are programmable such that they can be customized for each user. In this manner, if the case were stolen, a thief would need to know both the pin code and the proper timing between button presses to access the cash area. This approach alleviates the problem presented by users writing down their personal identification number (PIN) codes near or on a device, such as a computer, or the like, as well as the problem of scammers mounting a camera on an automated teller machine (ATM) or observing a user key in his or her code.
Another objective is to provide a mode in which a user can train the transport case with their own unique disarm pin code and key press pattern in which a blinking LED or buzzer is used to provide a metronome by which to calibrate press intervals. Once an arbitrary key press sequence is entered by a user in training mode, the user is prompted to re-enter the code with the same unique timing, but on second entry, the LED or buzzer will mirror when the button presses should occur as a guide. The process may be repeated until the user is comfortable with the selected sequence at which point, the guide LED or buzzer will be replaced once again with only a metronome indicator. This training mode can alternatively be used to teach a pre-assigned button press sequence to a user rather than allowing the user to select an arbitrary sequence.
Another objective is to poll the transport case carrier at randomized intervals while armed to provide authentication credentials to prove that a valid user is still in control of the transport case. Authentication is preferably performed by entering a unique pin code into the user's terminal device, such as a smart phone, biometric authentication through the use of a voice print, fingerprint or palm print scan. One simple approach is for the user to take a photo with a cell phone and transmit it to a central location for authentication. It is also possible to perform a biometric authentication on the terminal device and communicate the success or failure of the authentication to the transport case. Another authentication method may be a special tap sequence on the exterior of the case which is detected by vibration sensors interpreted by the control circuitry inside the transport case. The method of authentication in a presently preferred embodiment does not require the user to open the transport case. In the event the authentication test fails, the controller in the transport case can activate a siren, send out wireless notifications or a combination of the two. Alerts can also be issued to managers who wish to monitor their transport case remotely. These alerts may be issued over an RF link such as a cellular network by way of a modem located either in the transport case itself or on the terminal device.
Another objective of the current invention is to provide a cash transport case that contains an onboard database of security parameters, user names along with their access codes and permission levels, GPS coordinates of valid destinations or route waypoints, and identification numbers of wireless radio keyfobs or waypoint beacons. This on board database is modifiable through the use of a wireless connection to a terminal device or a data server. By containing all the above mentioned data within the transport case, the security of the case is maintained even in the event that external communication links are disabled. In a presently preferred implementation, only a single electrical port is needed to pass through the transport case outer wall for the purpose of connecting a battery charging power supply. This charging port may alternatively be eliminated if a wireless charging technology is employed, such as the one prescribed by the Qi consortium. In this manner, direct electrical access to the control circuitry is minimized resulting in fewer electrical connections to protect against electrical overstress in attempts to disable control circuitry.
Yet, another object of the current invention is to provide a transport case secure docking station that is capable of receiving one or more transport cases. The docking station can be securely fastened to the floor, walls, or fixtures located at the point of sale. When the case is docked, it is locked into the secured docking station by means of mechanical locks or electronic solenoid locks and cannot be removed until the locks are disengaged by way of mechanical key, combination entry, or electronic key methods. The docking station is a mechanism to prevent a snatch and grab theft of the transport case while at the point of sale. It may also function to provide a mechanism to recharge the batteries within the transport case.
A more complete understanding of the present invention, as well as further features and advantages of the invention, will be apparent from the following Detailed Description and the accompanying drawings.
A center partition 400 serves as a mechanical mounting surface for all electrical and mechanical subassemblies of the disclosed invention. All subassemblies can be readily outfitted for other outer case shells 100 and 101 by customizing the center partition piece 400 for attachment to the new shell by way of screws 402 placed around the perimeter of piece 400 that are fashioned to drive into a mounting flange in the lower case shell 100. Two large openings 12 and 14 are cut in the center partition: one for a cash stronghold module 300 and one for a keypad 410, respectively.
The cash stronghold module 300 is covered by cash compartment door 301 which rotates open and closed on hinge 305. The door can be sealed closed with a latching mechanism, such as a pair of captured screws 302 that are capable of being hand-tightened and released. According to one aspect of the invention, at least one of the captured screws 302 has a fine thread requiring that a user undoing the screw rotate it multiple times to unscrew it. The beginning of rotation is detected. The time taken by the multiple rotations allows an alarm to sound or a notification to be made before the cash door 301 is opened.
The tolerance applied to each measured duration of time can be a pre-determined quantity or can be a function of how consistently the operator keyed in their PIN code during multiple trials in the training mode.
Additionally, a disarm code programming mode may suitably be employed in which the operator presses his or her code sequence at timing intervals of his or her choice and with button hold durations of his or her choice and the microcontroller captures and stores the sequence and timing information during a learning interval of the training mode operation as shown in the
As seen in
Another feature of the keypad 410 shown in
Another feature of the keypad 410 is to include security sensors such as a combined ambient light (ALS) and proximity sensor 412, and a temperature sensor 413. The ALS 412 can be used to detect a breach in the area of the transport case in front of the center partition that exposes the sensor surface to light above a predetermined threshold. The proximity sensor 412 detects motion of fingers or probe tools in the proximity of the keypad, but also is capable of detecting small motions in the outer case shell 101 which would occur if the case were to be pried or hinged open. The temperature sensor 413 can be used to detect the presence of extreme heat or cold which could be evidence of a tamper attempt in which a heat source such as a soldering iron or torch or a cold source like liquid nitrogen is applied in the vicinity of the keypad 410.
The cash compartment area is additionally monitored by a door sensor 309 which detects when the captured screw latches 302 are fully engaged. An ambient light sensor 307 is installed against the inner wall of the cash compartment door. A wire harness 308 runs from the ambient light sensor and puncture sensors through the cash compartment case wall and over to the control board 401, as seen in
Behind the center partition, proximity, ambient light, temperature, and puncture sensors are configured to detect tampering preferably in an arrangement shown in
All sensors located remotely from the control board are preferably configured with serial communication links such as I2C, and are individually addressed so they can be wired along a common harness back to the control board. Furthermore, the idle state of the electrical signals on the wires that comprise the harness can be monitored by the control board to determine if the harness is cut. For instance, the idle state on each wire of the I2C serial link may be 3.3V as the result of a pull up resistor to a 3.3V supply rail located at the most remote sensor in the daisy chain link of sensors. If the link is cut, the I2C lines in their idle state would register 0V at the controller.
Depending on the state of the transport case in addition to which tamper sensor has triggered, the controller will respond differently as shown in the
Minor offenses result in the transport case entering a warn state 1004 in which an audible alert is given by activating an audio source or annunciator, such as a beeper, a buzzer or the like. Once in the warn state, the operator must successfully disarm the case within a predetermined period of time as detected in disarm parameters met state 1006 or the case 10 will activate a loud siren and/or send out wireless notifications. A major offense results in the immediate activation of the siren in loud siren state 1008. Upon proper disarming of the case, audible feedback, as in sound disarmed chime state 1010, may be given to indicate the operator may proceed to open the case and access the cash stronghold module, and the case 10 proceeds to enter the disarmed state 1012. Security parameters may be configurable to only allow for disarming during certain times of day or when the case is located at predetermined locations verifiable by electronic means such as wireless beacons or global positioning services.
From the disarmed state 1012, a user may arm the case by entering the arm code on the keypad or it can be sent over Bluetooth® or a cellular phone connection. Sensors are checked in state 1014. If the sensors are all clear, sound armed chime state 1016 is entered and then followed by armed state 1002. If in check sensors dwell state 1018, the sensors were not all clear, for example, by a 20 s timer expiring with remaining detected sensor faults, the process returns to the disarmed state 1012.
While at the point of sale, the transport case 10 can be further secured in place with the use of a permanently installed docking station 700 as shown in
In
Microprocessor 1310 also provides driver signals to user prompt LEDs and a buzzer 1334, drives a loud siren speaker 1337, an audible alarm, such as alarm buzzer 1336, and arm and disarm chimes 1338. The microprocessor 1310 also stores and retrieves data from a database 1340 of user data and security parameters. For example, database 1340 may suitably store user names along with their access codes and permission levels. The database 1340 may also store global positioning satellite (GPS) coordinates of valid destination waypoints, and identification numbers of wireless radio keypads, user smart devices or waypoint beacons.
By way of example, the portable cash transport apparatus 10 may be employed in a food truck which from 10 pm until 6 am is expected to be parked at a first location. From 6 am-6:30 am, it is expected to be in transit from the first parking location to a second parking location where breakfast items are sold from 6:30 am-10:30 am. The food truck then travels to a third resupply location and then goes to a fourth location where lunch items are sold from 11:00 am until 2:30 pm. The truck then again resupplies and goes to a fifth location where dinner items are sold from 4:30 pm until 10 pm. After 10 pm, the portable cash transport apparatus 10 is taken to a location where cash is removed.
As another example, the portable cash transport apparatus 10 may be employed to collect cash from kiosks or retailers at a mall, or from concessions at a ballgame, or the like. Again, the location can be tracked and matched against an expected route as an operator collects cash which is validated and stored. A transaction receipt can be texted or otherwise provided to each kiosk operator, retailer or the like if desired.
Controller 1310 can receive GPS data 1342 and compare data stored in database 1340. If the two do not match up appropriately, an alarm can be sounded using loud siren speaker 1336 and a supervisor or other authorized personnel can be notified by sending an alert to a remote server 1342, a smart phone 1344, or the like.
Microprocessor 1310 also may suitably communicate to a remote computer utilizing a modem or wireless modem 1346. A polling device 1348 in the portable case 10 can poll a user and then communicate with microprocessor 1310. If the user does not respond to a polling attempt within a predetermined acceptable time to reply, the polling device 1348 informs microprocessor 1310 which then drives loud siren speaker 1336 to sound a loud audible alarm and to communicate the failure to authenticate to a supervisor through wireless communication interface 1302, wireless modem 1346, or the like.
When a disarm signal is received from an RF disarm signal unit 1350 or the correct sequence of keystrokes is received from keypad 1320, the microprocessor 1310 disarms the portable case 10 allowing an operator to access cash storage. In a presently preferred embodiment, the portable cash transport apparatus 10 is light and its plastic case is relatively easy to drill into or otherwise attack by a vandal or thief. Security is primarily provided by detecting such attacks, activating an alarm, and reporting the attack. However, it will be recognized a sturdier case may be employed utilizing a controllable lock 1352 to lock and unlock the case. Additionally, the ink deployment device of U.S. Pat. No. 9,406,208, filed Jun. 12, 2014, and incorporated by reference herein can also be employed to deter attempted thefts by rendering any internal access unavailing by deploying ink before someone intent on theft can access any stored cash.
Similarly, the portable case 10 can be armed employing an RF arm signal unit 1351. As cash is deposited, sales are made and the like, storage transaction data, such as the current amount of cash in the portable transport apparatus 10 is stored in storage 1354. Such data can be subsequently retrieved and analyzed to provide useful information about times when sales are most frequent, and the like.
In a presently preferred embodiment, when the portable transport apparatus 10 is inserted in a docking station 1356, the microprocessor 1310 provides control signals causing solenoids in docking station 1356 to lock the portable transport apparatus 10 in place. Power is supplied by the docking station 1356 through a connector (not shown) to a battery charging port 1332, such as connector 501 of
It will be clear that there are numerous configurations and embodiments possible using the technology and techniques described above. While the present invention is disclosed in the context of presently preferred embodiments, it will be recognized that a wide variety of implementations may be employed by persons of ordinary skill in the art consistent with the above discussion and the claims which follow below.
The present application is a continuation of U.S. patent application Ser. No. 15/707,345 filed Sep. 18, 2017 which is a continuation of U.S. patent application Ser. No. 14/302,555 filed Jun. 12, 2014, published as U.S. Patent Application Publication No. 2014/0368345 A1 entitled “Method and Apparatus for Mobile Cash Transportation” and now issued as U.S. Pat. No. 9,799,179, which claims the benefit of U.S. Provisional Application Ser. No. 61/834,120 filed Jun. 12, 2013 entitled “Method and Apparatus for Mobile Cash Transportation”, all of which are incorporated by reference herein in their respective entireties. The present application is related to U.S. application Ser. No. 14/302,598 filed Jun. 12, 2014 and issued as U.S. Pat. No. 9,406,208 entitled “Mobile Cash Transport System with Tampering Triggered Ink Deployment”, which claims the benefit of U.S. Provisional Patent Application Ser. No. 61/834,148 filed Jun. 12, 2013 entitled “Mobile Cash Transport System with Tampering Triggered Ink Deployment”; and is also related to U.S. patent application Ser. No. 14/328,784 filed Jul. 11, 2014 and issued as U.S. Pat. No. 9,113,518 entitled “Battery Powered Light Source for Compartment Illumination”, which claims the benefit of U.S. Provisional Patent Application Ser. Nos. 61/875,205 and 61/845,095 filed Sep. 9, 2013 and Jul. 11, 2013, respectively, entitled “Battery Powered Light Source for Compartment Illumination”, all of which are incorporated by reference herein in their respective entireties.
Number | Name | Date | Kind |
---|---|---|---|
4805222 | Young et al. | Feb 1989 | A |
5404583 | Lalezari | Apr 1995 | A |
5598793 | Lopez, Jr. | Feb 1997 | A |
5615625 | Cassidy | Apr 1997 | A |
5616625 | Hung et al. | Apr 1997 | A |
5952920 | Braddick | Sep 1999 | A |
6564726 | Lindskog | May 2003 | B1 |
7100520 | Abe et al. | Sep 2006 | B2 |
7281477 | Dyson et al. | Oct 2007 | B2 |
7516832 | Dobbins | Apr 2009 | B2 |
7707950 | Villiger | May 2010 | B2 |
7969304 | Berland | Jun 2011 | B2 |
8054183 | Villiger | Nov 2011 | B2 |
8134464 | Lynch | Mar 2012 | B2 |
8332932 | Kellas-Dicks et al. | Dec 2012 | B2 |
9799179 | Dobbins et al. | Oct 2017 | B2 |
20030160701 | Nakamura et al. | Aug 2003 | A1 |
20040119588 | Marks | Jun 2004 | A1 |
20040163913 | Tschudy | Aug 2004 | A1 |
20060220850 | Bowser | Oct 2006 | A1 |
20060249531 | Litchfield | Nov 2006 | A1 |
20070132583 | Sweeney, II | Jun 2007 | A1 |
20070152839 | Dalzell et al. | Jul 2007 | A1 |
20070250920 | Lindsay | Oct 2007 | A1 |
20080136587 | Orr | Jun 2008 | A1 |
20090235847 | Villiger | Sep 2009 | A1 |
20100001859 | Sharma | Jan 2010 | A1 |
20100168903 | Aas | Jul 2010 | A1 |
20100188287 | Madsen | Jul 2010 | A1 |
20110155026 | Villiger | Jun 2011 | A1 |
20120146803 | Gear et al. | Jun 2012 | A1 |
20120235912 | Laubach | Sep 2012 | A1 |
20120279875 | Simpson | Nov 2012 | A1 |
20130024952 | Sivertsen | Jan 2013 | A1 |
20140368345 | Dobbins et al. | Dec 2014 | A1 |
20180089968 | Dobbins et al. | Mar 2018 | A1 |
Number | Date | Country |
---|---|---|
2341636 | Mar 2000 | GB |
2540449 | Jan 2017 | GB |
2540449 | Jan 2017 | GB |
H0498387 | Mar 1992 | JP |
Entry |
---|
Dobbins, A., et al., “Eye in the Sky Security System”, May 2004, Page(s) http://people.ece.cornell.edu/land/courses/ece4760/FinalProjects/s2004/fci2/highleveldesign.html. |
Number | Date | Country | |
---|---|---|---|
20200160675 A1 | May 2020 | US |
Number | Date | Country | |
---|---|---|---|
61834120 | Jun 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15707345 | Sep 2017 | US |
Child | 16704624 | US | |
Parent | 14302555 | Jun 2014 | US |
Child | 15707345 | US |