A cash safe, such as a cash drawer associated with a cash register, may store valuable items. In order to better protect assets stored within a cash safe, the cash safe may be configured so that it may not be easily tampered with or compromised. For example, electrical mechanisms for securing a cash safe may be used to prevent unauthorized people from gaining access to cash and other valuables stored inside.
In the accompanying drawings, like numerals refer to like components or blocks. The following detailed description references the drawings, wherein:
A cash safe, such as a cash drawer or cash box, associated with a cash register or other electronic device may include a locking mechanism for securing the cash safe, for example, to prevent theft of cash, checks, or other valuables stored inside. A physical lock and key may be used to lock a cash safe to prevent it from opening. However, this may involve a person being available to physically lock the cash safe, and someone in possession of the key could potentially gain access to the cash safe. In some cases, a cash safe may be secured by using an electrical mechanism, such as a circuit. A cash safe may include a circuit that sends a signal to release a locking mechanism to allow the cash safe to open. However, such a mechanism may be tampered with at the circuit level. For example, an intruder may open the cash safe by interfering with a phone port to trigger the circuit to send a signal to release the locking mechanism. A password may be used to make a cash safe more secure. For example, a user may enter a password that causes an electronic device to send a signal to a circuit instructing it to release a locking mechanism securing the cash safe. Again, an intruder may be able to open the cash safe by interfering with the circuit because the circuit logic itself may operate independent of the password.
In one embodiment, a cash safe includes a circuit evaluating a digital key for securing the cash safe. For example, a circuit connected to a locking mechanism for securing a cash safe may receive a key, such as from an electronic device connected to the circuit, when an attempt is made to open the cash safe. The circuit may determine whether the received key corresponds to a key stored in a storage associated with the circuit, such as by determining whether the keys match. If the keys correspond to each other, the circuit may send a signal to release the locking mechanism, resulting in the cash safe being unlocked or automatically opening. If the received key does not correspond to the stored key, the circuit may refrain from transmitting a signal to release the locking mechanism, thereby, securing the cash safe in a closed position.
In one embodiment, a cash safe operates in both a secure and non-secure mode. For example, a circuit connected to a cash safe may operate in a non-secure mode such that the circuit sends a signal to a locking mechanism to release the cash safe without evaluating a key. The circuit may receive a key indicating that the cash safe should be secured. The circuit may store the received key and secure the cash safe such that it may be secured closed in the future unless it receives a key corresponding to the stored key. In one embodiment, a cash safe may be secured from a remote electronic device. For example, a user may instruct a remote electronic device to secure a cash safe, and the remote electronic device may transmit an instruction or key via a network to a circuit connected to the cash safe.
In one embodiment, a circuit connected to a cash safe stores an identifier, such as a serial number, associated with the cash safe. The circuit may send information about the identifier to an electronic device so that the electronic device may track information about the cash safe, such as the assets stored in a particular cash safe within a group of cash safes. The identifier may also be used, for example, to identify which cash safes within a group of cash safes are operating in a secure or non-secure mode.
A cash safe secured by a circuit evaluating a key provides advantages. For example, allowing a circuit to control both the security and releasing mechanism of a cash safe may be more difficult to interfere with than a system where security measures are external from the circuitry for releasing the cash safe. An intruder without access to the proper key or access to an application with the proper key may be prevented from accessing the contents of the cash safe. A cash safe capable of operating within multiple modes may allow a cash safe to be secured according to the circumstances. For example, a remote electronic device may control the security of multiple cash safes, such as cash safes within a bank. An alarm may indicate that a bank is being robbed, and an administrator in a remote location may be able to send an instruction to each of the circuits associated with the cash safes in the bank from the remote electronic device. In addition, the use of a digital key to secure a cash safe provides a simple method for security that may be easily implemented. Allowing a circuit connected to a cash safe to store and transmit information identifying a cash safe may be useful for tracking assets and the security state of a cash safe.
The circuit 210 may be any suitable circuit for controlling the locking mechanism 106. The circuit 210 may be, for example, part of the cash safe 104 or connected to the cash safe 104. The circuit 210 may send a signal to the locking mechanism 106 causing the locking mechanism 106 to release the cash safe 104 such that the cash safe 104 may be opened by removing it from an enclosure or opening a lid or other portion of the cash safe 104. For example, the circuit may send a signal to alter the voltage across two pins connected to the locking mechanism 106 in order to provide power to the locking mechanism 106, which then releases the cash safe 104. In some implementations, the cash safe 104 may be closed, such as by sliding it into a housing or closing a lid, to reset the locking mechanism 106 and the logic of the circuit 210.
The storage 212 may be any suitable storage medium for storing information accessible by the circuit 210. The storage 212 may be a volatile or non-volatile storage. In some implementations, the storage 212 stores a key 214. The key 214 may be written to the storage 212 by the circuit 210. In some cases, the key 214 is a write only field such that the circuit 210 does not transmit information about it to the electronic device 102. In one embodiment, the electronic cash safe system 200 includes both a volatile and non-volatile storage. For example, a portion of the key 214 may be stored in a volatile storage and a portion of the key 214 may be stored in a non-volatile storage. In one embodiment, the circuit 210 retrieves the key 214 to compare it to a received key. In some implementations, the electronic cash safe system 200 may include one circuit for storing the key 214 and another circuit for comparing the key 214 to a received key.
In one embodiment, the electronic device 102 communicates with the circuit 210 via a communication interface 208. For example, the electronic device 102 may send a key to the circuit 210 via the communication interface 208. The communication interface 208 may be any suitable type of communication interface, such as an Inter-Integrated Circuit (I2C), Universal Serial Bus (USB), or IEEE 1394 interface. In one embodiment, the electronic device 102 houses the circuit 210, the cash safe 104, and the communication interface 208.
Beginning at block 302 and moving to block 304, the circuit 210 receives a key, such as the key 214. The key 214 may be received from any suitable source, such as from the electronic device 102 via the communication interface 208. The electronic device 102 may create the key 214, for example by encrypting data or randomly selecting data. The electronic device 102 may create the key in response to a user request to secure the cash safe 104. In one implementation, an end user enters a key, such as through an input device connected to the electronic device 102. The key 214 may be created by a combination of user input and processing by the electronic device 102. In one embodiment, the electronic device 102 encrypts the key 214 prior to sending it to the circuit 210.
In one embodiment, the circuit 210 receives the key 214 by creating or retrieving it. For example, the electronic device 102 may instruct the circuit 210 to secure the cash safe 104, and the circuit 210 may retrieve a key stored in a storage medium, such as the storage 212. The retrieved key 214 may be a key previously received from the electronic device 102 or a key created by the circuit 210. For example, the circuit may create the key 214 by encrypting an identifier or other data associated with the cash safe 104. The circuit 210 may create the key 214 based on information received from the electronic device 102.
Moving to block 306, the circuit 210 stores the received information, such as in the storage 212. The circuit 210 may store the key 214, for example, so that the circuit 210 may access it later to evaluate whether to send a signal to the locking mechanism 106 to release the cash safe 104. The storage 212 may be a volatile storage or non-volatile storage. If the key 214 is stored in a volatile storage, the circuit 210 may write the key 214 to the storage 212 each time the storage 212 is reset. A non-volatile storage may be more secure because it may continue to be stored in the storage 212 in the event the storage 212 is powered down. In one embodiment, the circuit 210 stores a portion of the key 214 in a volatile storage medium and a portion of the key in a non-volatile storage medium. For example, one bit of the key 214 may be stored in a non-volatile storage. The portion of the key stored in the volatile storage medium may, for example, be updated each time the circuit 210 is reset.
In one embodiment, the circuit 210 receives multiple keys and permissions information associated with each key and stores the keys and associated permissions information in the storage 212. The permissions information may be useful, for example, to identify a user associated with the key or an activity allowed by the key. For example, a separate key may be used for an administrator, local user, and remote user.
Continuing to block 308, the circuit 210 secures the cash safe 104 closed by refraining from sending a signal to the locking mechanism 106 to release the cash safe 104. Any future user without the ability to transmit the proper key, such as by accessing an application capable of sending the proper key, may be unable to access the valuables stored within the cash safe 104. For example, in response to a request to release the cash safe 104, such as from the electronic device 102, the circuit 210 may compare the received key to the stored key 214 to determine whether the received key corresponds to the stored key 214. If not, the circuit 210 may refrain from sending a signal to the locking mechanism 106 to release the cash safe 104. In one embodiment, the electronic device 102 may instruct the circuit 210 to return to a non-secure mode such that it releases the cash safe 104 without evaluating a key. The method 200 may then continue to block 210 to end.
In one embodiment, the key 214 may be reset. For example, a user may want to update the key 214 in the event that information about the key 214 is compromised. In one embodiment, the circuit 210 receives a signal indicating that the key 214 may be reset, such as from the electronic device 102. A signal allowing the key 214 to be reset may prevent an unauthorized user from resetting the key 214 in order to gain access to the cash safe 104.
To reset the key 214, the circuit 210 may first receive a signal indicating that the stored key may be updated, such as from the electronic device 102 or the input device 416. The circuit 210 may receive an updated key, such as via the communication interface 208. The circuit 210 may replace the stored key 214 with the received updated key. In one embodiment, the circuit 210 stores the new key and continues to store the previous key 214. In one embodiment, the circuit 210 resets a portion of the key 214, such as a portion of the key 214 stored in a volatile storage or a portion of the key 214 stored in a non-volatile storage.
Beginning at block 502 and moving to block 504, the circuit 210 receives a key. The key may be any suitable information and may be received in any suitable manner. For example, in one embodiment, the circuit 210 receives the key from the communication interface 208. The key may be sent across the communication interface 208, for example, from an application on the electronic device 102. In one embodiment, the electronic device 102 encrypts a key or retrieves an encrypted key to transmit to the circuit 210. In one embodiment, the electronic device 102 performs a hashing method on an identifier or serial number associated with the cash safe 104 and sends the encrypted information to the circuit 210. In one embodiment, the key is originally entered by an end user, for example, by using an input device connected to the electronic device 102. An end user may instruct the electronic device 102 to send a key, and the electronic device 102 may create or retrieve a key to transmit to the circuit 210. In one implementation, a higher level password system is also used. For example, the electronic device 102 may determine whether a user entered a correct password and send a key to the circuit 210 if the user entered the correct password.
In one embodiment, the circuit 210 receives the key by retrieving it from a storage medium accessible by the circuit 210. For example, the circuit 210 may receive an instruction from the electronic device 102 to retrieve a key. In one embodiment, the electronic device 102 transmits a portion of the key, and the circuit 210 also retrieves a portion of the key.
Moving to block 506, the circuit 210 retrieves a stored key. For example, the circuit 210 may retrieve the key 214 from the storage 212. Proceeding to block 508, the circuit 210 compares the received key to the stored key 214. In one embodiment, the circuit 210 processes, such as by decoding, the received key or the stored key 214 prior to comparing the keys. In one embodiment, the circuit 112 compares the keys to determine whether the keys correspond, such as by matching. In one embodiment, the circuit 112 checks to see whether a portion of the keys correspond to one another.
Continuing to block 510, the circuit 210 determines whether to release the cash safe 104 based on the comparison. The circuit 210 may determine to release the cash safe 104, for example, if the received key and the stored key 214 correspond, such as by matching or having a portion that matches. In one embodiment, the circuit 210 considers other factors in addition to the comparison of the keys.
In one embodiment, the circuit 210 stores multiple keys in the storage 212. The storage 212 may store permission information associated with each of the keys. The circuit 210 may determine whether the received key corresponds to any of the stored keys. If the received key corresponds to one of the stored keys, the circuit 210 may check the permissions associated with the stored key to determine whether to release the cash safe 104. The permissions information may, for example, indicate a time that the key may be used or a device from which the key may originate.
Proceeding to block 512, the circuit 210 sends a signal to release the locking mechanism 106 securing the cash safe 104 closed if determined to release the cash safe 104. In some implementations, the cash safe 104 automatically opens when receiving the signal from the circuit 210. In some cases, the cash safe 104 may be opened by a user once the cash safe 104 receives the signal from the circuit 210. The method 500 then continues to block 514 and ends.
In one embodiment, the remote electronic device 620 communicates with multiple circuits and cash safes via the network 618. For example, if an alarm alerts a remote user that a bank robbery is taking place, the user may input information into the remote electronic device 620 so that the remote electronic device 620 sends instructions to each of the local electronic devices, such as the electronic device 102, to secure their associated cash safes.
In one embodiment, the circuit 210 retrieves the identifier 722 from the storage 212. The circuit 210 may send the identifier 722 via the communication interface 208 to the electronic device 102, such as prior to or after securing the cash safe 104. The electronic device 102 may use the identifier 722 to track multiple cash safes in a system. For example, a remote electronic device may receive information identifying a cash safe in order to determine which cash safes should be secured.
Embodiments disclosed herein provide advantages. For example, a cash safe secured by a circuit evaluating a key may be more difficult to interfere with than other security methods. A cash safe that operates in both a secure and non-secure mode may allow the cash safe to be secured according to the circumstances and may allow for remote securing of a cash safe or a group of cash safes. In addition, a cash safe that stores an identifier associated with it may be useful in a system with multiple cash safes for tracking the security of a cash safe and the assets contained in an individual cash safe.