The cash supply chain is manual, complex, has inherent risk issues, and is dispersed throughout a network of customers, armored carriers, the Fed (Federal Reserve), and/or a network of client facing devices including but not limited to automatic teller machines (ATMs), vaults, banking centers, safes, cash recyclers, and other cash handling devices. The costs of depositing, distributing, and managing cash across a major bank, as well as the amount of daily excess cash carried by such a bank, can be on the order of billions of dollars.
Today's client deposit process does not adequately allow clients to view the status of their deposit bag as it makes its way from the client's site where the deposit was prepared to the bank or bank's representative who will continue the processing of the deposit. Deposit bags are handled multiple times in the current process (and possibly by many different parties), which increases potential errors and complicates finding missing deposits or understanding where errors occurred and assigning fiduciary responsibility for those errors. Pertinent pieces of deposit data are typically manually entered and reentered into various systems throughout the end-to-end processing of the deposit. The collaboration and sharing of information across multiple organizations and with multiple vendors may make this process very complex and increases risk to the bank and bank clients.
Aspects as described herein are directed to tracking monetary packages, which may contain monetary items such as foreign and domestic government-issued legal-tender paper currency, coins, checks, coupons, food stamps, credit cards, negotiable money orders, and/or other negotiable instruments as well as non-negotiable collateral information, throughout the cash supply chain. In carrying out daily financial transactions, it is typical for monetary packages to be physically transferred between various parties, such as but not limited to a bank client (or a client of another financial institution who is leveraging the services of the bank), a transporter (e.g., an armored carrier), a bank vault, and even various stations within a bank vault. This transfer amongst various parties is referred to as the cash supply chain. Because many types of cash are reusable/recyclable, the same physical cash is usually cycled through the cash supply chain multiple times.
For transport through the cash supply chain, a financial transaction such as a deposit including one or more monetary items is normally bundled or otherwise packaged together as a monetary package. Depending upon the location within the cash supply chain, the monetary package may maintain together a quantity of monetary items as a single entity by way of, e.g., a bag (in which the monetary items are placed within the bag, which may be sealed), by way of a cassette for holding the monetary items, and/or by way of one or more straps (which may also be within the bag).
While a number of techniques to automate transaction handling have been attempted, there remains a need to increase the efficiency and accuracy of the financial transaction process. Consequently, it is desirable to increase the speed and accuracy of the financial transactions and to reduce the labor required to perform the transactions. It is also desirable to make information relating to the financial transaction rapidly available to the client, third party vendors, and the bank, and to identify more quickly problematic locations in the financial transaction, identify potential theft, fraud or embezzlement, and identify industry trends. Information about a deposit or withdrawal, for instance, should be provided in an expeditious fashion as it is processed along a cash supply chain, where notification/reporting is customizable and automatic for enhancing the client's experience and for improving internal processes of a bank. According to further aspects, monetary packages are tracked via a centralized tracking system that communicates with the various parties handling the monetary packages throughout the entire supply chain and/or when a carrier is set to arrive. Each time a monetary package changes status in the cash supply chain (e.g., transfers from one party to another or changes physical location), an involved party (e.g., the party receiving the monetary package and/or the party providing the monetary package) updates the centralized tracking system with the status. The centralized tracking system may be updated using a network of automated sensors that do not necessarily require the intervention of a party to create the update. These updates may be communicated to the centralized tracking system (system of record) in real time or near real time. Such a centralized tracking system may allow the bank or other service provider to offer a variety of services to the client.
For instance, centralized monetary package tracking may allow for more accurate reporting of monetary package status. And, by pre-scheduling (initiation) of deposits and change orders into the centralized tracking system, anomalies in the transport of a monetary package (e.g., a lost or delayed monetary package) may be recognized much earlier, even prior to actual deposit or arrival of the package at the processing site.
Still further aspects are directed to providing a more secure transport mechanism through the cash supply chain. In particular, an armored carrier or other transport entity may scan a remotely-readable identification tag, such as a radio-frequency identification (RFID) tag, of each monetary package being picked up and/or delivered. The scanner used by the armored carrier may notify the armored carrier if one of the monetary packages goes out of range without being checked out, such as within a period of time. Also, if that monetary package is not returned within range within a particular period of time, the scanner may automatically notify a centralized system. The scanner may further be aware of scheduled monetary packages to be picked up. If not all of the monetary packages as expected are picked up, then the scanner may also notify the armored carrier.
These and other aspects of the disclosure will be apparent upon consideration of the following detailed description.
A more complete understanding of the present disclosure and the potential advantages of various aspects described herein may be acquired by referring to the following description in consideration of the accompanying drawings, in which like reference numbers indicate like features, and wherein:
Centralized tracking system 101 may include at least one computing device and at least one computer-readable medium that, together, are configured to receive monetary package status reports from parties such as parties 102-106, maintain data representing the monetary package status, and generate reports and alert messages from that monetary package status data. A “computing device” as referred to herein includes any electronic, electro-optical, and/or mechanical device, or system of physically separate such devices, that is able to process and manipulate information, such as in the form of data. Non-limiting examples of a computing device includes one or more personal computers (e.g., desktop or laptop), servers, personal digital assistants (PDAs), ultra mobile personal computers, smart phones, cellular telephones, pagers, and/or a system of these in any combination. In addition, a given computing device may be physically located completely in one location or may be distributed amongst a plurality of locations (i.e., may implement distributive computing). A computing device may even be a mobile device. Centralized tracking system 101 may further support co-operation with other non-bank tracking systems.
A computing device typically includes both hardware and software. The software may be stored on a computer-readable medium in the form of computer-readable instructions. A computing device may read those computer-readable instructions, and in response perform various steps as defined by those computer-readable instructions. Thus, any functions attributed to a computing device as described herein may be defined by such computer-readable instructions read and executed by that computing device, and/or by any hardware (e.g., a processor) from which the computing device is composed.
The term “computer-readable medium” as used herein includes not only a single medium or single type of medium, but also a combination of one or more media and/or types of media. Such a computer-readable medium may store computer-readable instructions (e.g., software) and/or computer-readable data (i.e., information that may or may not be executable).
Referring again to
Deposit location 103 is the location at which client 102 releases custody of the deposit (such as in the form of a monetary package). This custody may be released by, for instance, depositing the cash into a cash handling device (e.g., a cash recycler, depository, exchange, dispensing machine, or ATM), or at a bank teller, or even at the client's own location where an armored carrier would pick up the deposit from the client. Pickup location 106 is the location at which client 102 receives custody of the monetary items (which may or may not be prepared by client 102 and which may be in the form of a monetary package), such as from an armored carrier, bank teller, or cash handling device.
Vault 105 is typically a secured location or device in a bank or customer's office where the deposit is processed. In the case of a vault in an armored carrier's or bank's facility, once the deposits are processed, currency or other monetary items are strapped for storage and distribution. A vault may not only process incoming monetary items but may also provide monetary items such as currency to clients. These requests for currency, commonly called “change orders,” are generally standing orders for specific amounts that are sent on a specific schedule, but can be on-demand or non-standing orders that are requested for a specific time. With some embodiments, currency may be verified by the one transporting the currency. This may be because the carrier is trusted and in an appropriate liability agreement with the bank, or the bank owns a carrier. In that case, some or all of the funds may be verified (or trusted due to the device the funds came from) and re-used in the cash supply chain without going to the vault. For example, the carrier may use a hand-held device to check the next location to visit or receive notices that a site needs cash. The carrier may use the verified cash to fulfill the order.
Armored carrier 104a/104b (which may be referred to as a “vendor”) transports cash packages between different stages along the cash supply chain typically in an armored vehicle. The physical transportation could be any type of transportation, however, including a courier or package delivery service with a secured package.
Parties 102-106 may communicate with centralized tracking system 101 over corresponding communications channels. Different types of communications channels may be supported. For example, centralized tracking system 101 may communicate with client 102 through a computer terminal (via the Internet) and/or a wireless telephone, with an armored carrier through a handheld scanner with a wireless communications interface, and with a bank employee through a work station (e.g., via an intranet). A communications channel may utilize different communications media, including a wired telephone channel, wireless telephone channel, and/or wide area channel (WAN).
As can be seen in
Tracking database 302 may be implemented as or otherwise include a computer-readable medium for storing data. This data may be organized, for instance, as a relational database that is responsive to queries such as structured query language (SQL) queries. Tracking database 302 may be distributed and may collaborate with internal and/or external sources to fulfill the completeness of the data utilized for notifications.
In this example, tracking controller 301 may be configured to add, edit, update, delete, and query data stored in tracking database 302. The data stored in tracking database 302 may include, for instance, data indicating the current status of each of a plurality of monetary packages. For example, the data may indicate that a given monetary package is with a particular armored carrier, and that it was transferred to the armored carrier at a certain time on a certain date. The status data may be associated with the unique identifier of the relevant monetary package.
Web server 303 may be configured to generate an Internet web page that is accessible by client 102 and/or other parties. The web page may be used to query tracking database 302 via tracking controller 301. For example, a party using the web page may be able to enter an identifier associated with a monetary package. In response, web server 303 may request tracking controller 301 to query tracking database 302 (or alternatively web server 303 may generate the query itself) for that identifier. The query response is forwarded by tracking controller 301 to web server 303, and displayed on the web page for review by the party. The query response may include, for instance, the status data associated with the identifier. Many other types of query transactions are possible. In addition, updates, deletions, and additions may be made to the data in tracking database 302 via the web page generated by web server 303. For example, a party may desire to update status information about a particular monetary package via the web site, or may desire to add a new monetary package with a new identifier not previously included in tracking database 302.
Tracking interface 304 may be used as an alternative interface into tracking controller 301 and tracking database 302, without the need for an Internet web page. For example, data and queries may be provided to tracking controller 301 via tracking interface 304 using a short messaging system (SMS) message or other type of messaging from a cellular telephone.
The above discussion in connection with
In general, service person 401 may use RFID scanner 306 to identify the presence of bags 307A-C prior to, during, or after placing bags 307A-C into armored vehicle 402. The identifiers of the RFID tags for the various bags 307A-C may be automatically stored in RFID scanner 306, and wirelessly transmitted to a communication network so as to be ultimately received by centralized tracking system 101 via tracking interface 304 and/or web server 303. A status indicating that the bags associated with those identifiers have been picked up by service person 401 may also be wirelessly transmitted to centralized tracking system 101. In response, centralized tracking system 101 may associate in tracking database 302 each of the transmitted identifiers with a status of being picked up by service person 401 (and/or by the carrier represented by service person 401).
A similar procedure may also be used for dropping-off, rather than picking up, monetary packages 307A-C. In that case, the status of each identified monetary package would be transmitted to centralized tracking system 101, which would update tracking database 302 to indicate that those monetary packages are now in the possession of the subsequent entity in the cash supply chain.
Controller 501 may be any unit configured to control, or assist in the control of, the various functions of RFID scanner 306. For example, controller 501 may be or include a processor.
Storage 502 may be any computer-readable medium, such as memory or a hard drive. Storage 502 may store any data utilized by RFID scanner 306 as well as any computer-executable instructions that may be used by controller 501. Thus, some or all of the functions performed by controller 501 (and indeed by RFID scanner 306 as a whole) may be in accordance with computer-executable instructions stored in storage 502.
Communication interface 503 may include a radio-frequency transmitter and/or a radio-frequency receiver for wirelessly communicating in a uni-directional or bi-directional manner with the RFID tags of bags 307A-C and/or with any other entity external to RFID scanner 306 such as third party system 305 (and ultimately with centralized tracking system 101) and/or via any other wireless communication channel. The terms “transmitter” and “receiver” is considered to include not only single transmitters and receivers, but also sets of multiple sub-transmitters and sub-receivers each configured to operate at different frequencies and/or communication protocols. For example, the “transmitter” may be configured to communicate at a first frequency and using a first protocol with an RFID tag of a bag, and also at a second frequency and using a second protocol with third party system 305.
In the present example of
RFID scanner 306 in this example also includes keyboard 505, which allows for user input via one or more buttons. Where display 504 is capable of interpreting user input, RFID scanner 306 may use such user input directed to display 504 rather than user input to keyboard 505.
Audio output device 506 may be configured to emit any type of sound, such as beeping, buzzing, clicking, musical tones, voice, or any other sound. Audio output device 506 may be configured, for example, as a speaker or piezo-electric acoustic device. As will be described further below, audio output device 506 may be used to alert service person 401 of a particular event or status, such as a missing monetary package.
Service person 401 may later arrive at deposit location 103 (either per a predetermined regular pickup schedule or in response to the scheduling performed in step 601). Service person 401 may indicate (e.g., via user input) to RFID scanner 306 the present location (in this example, deposit location 103) and/or RFID scanner 306 may automatically determine the present location such as using global positioning system (GPS) technology. In step 602, when RFID scanner 306 in possession of service person 401 comes within scanning range of bags 307A-C, then RFID scanner 306 will sense their presence and determine each of their associated identifiers as transmitted by their respective RFID tags. In this example, all three of bags 307A-C have been scheduled for pickup.
When service person 401 believes that all monetary packages have been accounted for and are in the presence of RFID scanner 306, then in step 603 service person 401 may provide user input (e.g., in the form of a press of a button of keyboard 505 or input to display 504) to indicate that the pickup of monetary packages has been completed. In step 604, the identified monetary packages actually scanned may be compared with a list of those monetary packages scheduled for pickup for the identified pickup location (which may be have been input by service person 401 and/or determined by GPS). Thus, RFID scanner 306 may simultaneously store multiple lists of identifiers, each list associated with a different pickup location. Alternatively, RFID scanner 306 may receive each list on demand from centralized tracking system 101 each time it is in a new pickup location. It could also be determined if the person handling the bags had permission or access to handle the bags.
In step 604, if there is a complete match between the set of expected identifiers and the actual scanned identifiers, then the process moves to step 605. For example, if all three bags 307A-C are scheduled for pickup, and all three are recognized by RFID scanner 306, then the process moves to step 605. However, if one or more of bags 307A-C are not scanned, then the process moves to step 606.
In step 605, RFID scanner 306 may send an update message centralized tracking system 101 with the new status of bags 307A, 307B, and/or 307C, via communication interface 503 and/or third party system 305. In response, centralized tracking system 101 may update the status of each bag 307A, 307B, and/or 307C identified by the update message in tracking database 302.
Returning to step 604, if not all of the scheduled bags 307A-C have been scanned by RFID scanner 306 (per a comparison of the set of expected identifiers and the actual scanner identifiers), then RFID scanner 306 may notify service person 401 in step 606. Such a notification may be, for instance, an audio and/or visual notification. For example, controller 501 may cause audio output device 506 to emit a sound, and/or may cause display 504 to display a message indicating that one or more of the expected monetary packages have not been scanned. RFID scanner 306 may also at this point send a notification message, via communication interface 503 and/or third party system 305, to centralized tracking system 101.
In step 607, RFID scanner 306 may await user input from service person 401 in response to the displayed and/or heard notification. This user input may take the form of, for example, a confirmation that, despite the missing bag, the pickup should be considered completed. If so, then RFID scanner 306 may perform step 605 by updating centralized tracking system 605 of the monetary packages scanned, and including a status indication that one or more expected specific monetary packages were not scanned. This situation may occur where the customer has changed his or her mind as to how many monetary packages to deposit, or where a monetary package has simply gone missing.
If, at step 607 (or at any time), RFID scanner 306 detects the missing monetary package's identification tag using communication interface 503, then the process may move automatically to step 605, with the correct status of each monetary package updated to centralized tracking system 101.
The process shown in
In step 701, RFID scanner 701 may be idle or may be at any point in the process of
RFID scanner 306 may periodically or continuously perform an inventory check using communication interface 503 to determine which of the monetary packages currently considered in the custody of service person 401 (as indicated in storage 502) are still within RFID scanning range. If any of those monetary packages cannot be detected (i.e., if their respective RFID tags cannot be read), then the process moves to step 702 (detect monetary package out of range) and then to step 703. In step 703, responsive to detecting a monetary package out of range in step 702, RFID scanner 306 notifies service person 401. This notification, like the notification in step 606, may be audible and/or visual.
RFID scanner 306 may also, in response to detecting the monetary package out of range, start a timer. This time may be of any length of time, such as but not limited to less than one minute or more than one minute. In step 704, RFID scanner 306 determines whether that previously “lost” monetary package has been re-acquired via communication interface 503 within the timeframe as determined by the timer. If so, then the process may return to idle (step 701) or wherever RFID scanner 306 left off prior to entering step 702.
If the lost monetary package is not re-acquired within the timeframe, then RFID scanner 306 may alert service person 401 (using an audio and/or visual alert) and/or centralized tracking system 101 with a status update message indicating that the status of the monetary package is that it is missing or otherwise unaccounted for. Of course, if the lost monetary package is later re-acquired even after the timeframe, the process may return to step 701 and/or send another message to centralized tracking system 101 indicating that the status is now that the monetary package is again within the custody of service person 401. RFID scanner 306 may further notify service person 401 using an audio and/or visual alert that the monetary package has again return within scanning range.
Thus, systems and methods have been described that may provide additional security of monetary packages throughout the cash supply chain. Although certain examples have been described in connection with an armored carrier pickup of a deposit, various aspects as described herein may also be used for other points along the cash supply chain, such as within the bank's vault.
This application claims priority to U.S. provisional patent application Ser. No. 61/061,987, filed Jun. 16, 2008, entitled “Cash Supply Chain Improvements,” hereby incorporated herein by reference as to its entirety.
Number | Name | Date | Kind |
---|---|---|---|
3618059 | Allen | Nov 1971 | A |
4352097 | Hamann | Sep 1982 | A |
4443692 | Nishimura | Apr 1984 | A |
5453601 | Rosen | Sep 1995 | A |
5689240 | Traxler | Nov 1997 | A |
5748906 | Sandig | May 1998 | A |
5748908 | Yu | May 1998 | A |
5952920 | Braddick | Sep 1999 | A |
5953423 | Rosen | Sep 1999 | A |
5963131 | D'Angelo et al. | Oct 1999 | A |
6028517 | Sansone et al. | Feb 2000 | A |
6047807 | Molbak | Apr 2000 | A |
6055438 | Winner, Jr. | Apr 2000 | A |
6122625 | Rosen | Sep 2000 | A |
6167378 | Webber, Jr. | Dec 2000 | A |
6483433 | Moskowitz et al. | Nov 2002 | B2 |
6487542 | Ebata et al. | Nov 2002 | B2 |
6491216 | May | Dec 2002 | B1 |
6498603 | Wallace | Dec 2002 | B1 |
6526273 | Link, II et al. | Feb 2003 | B1 |
6633881 | Drobish et al. | Oct 2003 | B2 |
6736314 | Cooper et al. | May 2004 | B2 |
6788203 | Roxbury et al. | Sep 2004 | B1 |
6845905 | Blad et al. | Jan 2005 | B2 |
7004385 | Douglass | Feb 2006 | B1 |
7042360 | Light et al. | May 2006 | B2 |
7076458 | Lawlor et al. | Jul 2006 | B2 |
7201313 | Ramachandran | Apr 2007 | B1 |
7212992 | Kanevsky et al. | May 2007 | B1 |
7216800 | Ramachandran | May 2007 | B1 |
7243080 | Bhadra | Jul 2007 | B2 |
7248160 | Mangan et al. | Jul 2007 | B2 |
7284692 | Douglass | Oct 2007 | B1 |
7348886 | Himberger et al. | Mar 2008 | B2 |
7350230 | Forrest | Mar 2008 | B2 |
7375638 | Light et al. | May 2008 | B2 |
7461780 | Potts et al. | Dec 2008 | B2 |
7474217 | Himberger et al. | Jan 2009 | B2 |
7577612 | Waller et al. | Aug 2009 | B2 |
7588185 | Berquist et al. | Sep 2009 | B2 |
7623033 | Ainsworth et al. | Nov 2009 | B2 |
7659816 | Wandel | Feb 2010 | B2 |
7714708 | Brackmann et al. | May 2010 | B2 |
7719423 | Himberger et al. | May 2010 | B2 |
7748610 | Bell et al. | Jul 2010 | B2 |
20010051922 | Waller et al. | Dec 2001 | A1 |
20010054643 | Siemens | Dec 2001 | A1 |
20020052193 | Chetty | May 2002 | A1 |
20020052794 | Bhadra | May 2002 | A1 |
20020091937 | Ortiz | Jul 2002 | A1 |
20020095588 | Shigematsu et al. | Jul 2002 | A1 |
20020138424 | Coyle | Sep 2002 | A1 |
20020194122 | Knox et al. | Dec 2002 | A1 |
20020195309 | Pope | Dec 2002 | A1 |
20030011466 | Samuel et al. | Jan 2003 | A1 |
20030050891 | Cohen | Mar 2003 | A1 |
20030061153 | Birdsong et al. | Mar 2003 | A1 |
20030083936 | Mueller et al. | May 2003 | A1 |
20030122671 | Jespersen | Jul 2003 | A1 |
20030163710 | Ortiz et al. | Aug 2003 | A1 |
20030177102 | Robinson | Sep 2003 | A1 |
20030208431 | Raynes et al. | Nov 2003 | A1 |
20030213843 | Jackson | Nov 2003 | A1 |
20030234719 | Denison et al. | Dec 2003 | A1 |
20040016796 | Hanna et al. | Jan 2004 | A1 |
20040056767 | Porter | Mar 2004 | A1 |
20040083149 | Jones | Apr 2004 | A1 |
20040100379 | Boman et al. | May 2004 | A1 |
20040111346 | Macbeath et al. | Jun 2004 | A1 |
20040124966 | Forrest | Jul 2004 | A1 |
20040201454 | Waterhouse et al. | Oct 2004 | A1 |
20050091129 | Tien | Apr 2005 | A1 |
20050108164 | Solafia, III et al. | May 2005 | A1 |
20050183928 | Jones et al. | Aug 2005 | A1 |
20050258234 | Silverbrook et al. | Nov 2005 | A1 |
20050273347 | Dudley et al. | Dec 2005 | A1 |
20060131395 | Potts et al. | Jun 2006 | A1 |
20060247973 | Mueller et al. | Nov 2006 | A1 |
20060271441 | Mueller et al. | Nov 2006 | A1 |
20060282277 | Ng | Dec 2006 | A1 |
20060288233 | Kozlay | Dec 2006 | A1 |
20070005452 | Klingenberg et al. | Jan 2007 | A1 |
20070008118 | Kassiedass | Jan 2007 | A1 |
20070012602 | Baldassari et al. | Jan 2007 | A1 |
20070034693 | Jouvin et al. | Feb 2007 | A1 |
20070063016 | Myatt et al. | Mar 2007 | A1 |
20070174156 | Emde et al. | Jul 2007 | A1 |
20070226142 | Hanna et al. | Sep 2007 | A1 |
20070282724 | Barnes et al. | Dec 2007 | A1 |
20080005019 | Hansen | Jan 2008 | A1 |
20080005578 | Shafir | Jan 2008 | A1 |
20080103959 | Carroll et al. | May 2008 | A1 |
20080120237 | Lin | May 2008 | A1 |
20080149706 | Brown et al. | Jun 2008 | A1 |
20080155269 | Yoshikawa | Jun 2008 | A1 |
20080199155 | Hagens et al. | Aug 2008 | A1 |
20080223930 | Rolland et al. | Sep 2008 | A1 |
20080262949 | Bond et al. | Oct 2008 | A1 |
20080265019 | Artino et al. | Oct 2008 | A1 |
20080303903 | Bentley et al. | Dec 2008 | A1 |
20090006249 | Morgan et al. | Jan 2009 | A1 |
20090006250 | Bixler et al. | Jan 2009 | A1 |
20090032580 | Blachowicz et al. | Feb 2009 | A1 |
20090051566 | Olsen et al. | Feb 2009 | A1 |
20090051769 | Kuo et al. | Feb 2009 | A1 |
20090065573 | Potts et al. | Mar 2009 | A1 |
20090107800 | Nishida et al. | Apr 2009 | A1 |
20090114716 | Ramachandran | May 2009 | A1 |
20090164364 | Galit et al. | Jun 2009 | A1 |
20090187482 | Blount et al. | Jul 2009 | A1 |
20100052844 | Wesby | Mar 2010 | A1 |
20100274723 | Joab | Oct 2010 | A1 |
Number | Date | Country |
---|---|---|
4019265 | Nov 1991 | DE |
4429815 | Feb 1996 | DE |
19512045 | Oct 1996 | DE |
19846452 | Dec 1999 | DE |
102004039365 | Feb 2006 | DE |
102005047711 | Apr 2007 | DE |
1477949 | Nov 2004 | EP |
2304953 | Mar 1997 | GB |
9933040 | Jul 1999 | WO |
03034359 | Apr 2003 | WO |
2005041385 | May 2005 | WO |
2005106722 | Nov 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20090309729 A1 | Dec 2009 | US |
Number | Date | Country | |
---|---|---|---|
61061987 | Jun 2008 | US |