This disclosure relates generally to theft prevention systems and methods and, more specifically, to systems and methods for securing the contents of protected compartments, such as armored vehicles, safes, vaults, and the like. More specifically, this disclosure relates to theft prevention systems that, upon detection of a probable threat, are capable of filling an interior of a protected compartment with an expandable encapsulating material that prevents access to the interior of the protected compartment and/or encapsulates contents of the protected compartment.
A theft prevention system according to this disclosure is capable of supplementing the security that is already provided by a protected compartment. The theft prevention system may further limit access to valuable items within an interior of the protected compartment. Access to the valuable items within the interior of the protected compartment may be further limited by way of an encapsulant dispersal element. The encapsulant dispersal element may be capable of quickly introducing an expandable encapsulating material into the interior of the protected compartment. The expandable encapsulating material may comprise a material that is capable of quickly expanding (e.g., foaming, etc.) and hardening (e.g., polymerizing, etc.). The encapsulant dispersal element may direct the expandable encapsulating material to selected locations within the interior of the protected compartment (e.g., onto one or more access points to the interior of the protected compartment, onto contents within the interior of the protected compartment, etc.). Alternatively, the encapsulant dispersal element may direct the expandable encapsulating material substantially throughout an entirety of the interior of the protected compartment. In some embodiments, the encapsulant dispersal element may be capable of dispersing the expandable encapsulating material and the expandable encapsulating material may be capable of expanding and hardening in about five seconds or less to quickly limit access to the interior of the sealed container and/or to prevent removal of the contents of the sealed container within the interior of the sealed container.
Operation of the encapsulant dispersal element may be actuated by an individual observing a threat or automatically, in response to a probable threat. Automatic actuation of the encapsulant dispersal element may be enabled by a threat detection element of the theft prevention system. A threat detection element may comprise artificial intelligence (AI) capable of monitoring an area, or environment, within which the protected compartment is located and of identifying potentially threatening activities. The threat detection element may also be capable of assessing a threat level based on the potentially threatening activities it detects and, if the threat level meets or exceeds a predetermined threshold threat level, of actuating the encapsulant dispersal element. In various embodiments, the threat detection element may include one or more monitoring elements and a processing element. The one or more monitoring elements may include monitoring elements that detect movement of the protected compartment (e.g., motion sensors, etc.), sensors that detect impacts on the protected compartment (e.g., impact sensors, etc.), proximity sensors, microphones, cameras, and the like. The one or more monitoring elements may monitor traffic patterns (e.g., traffic in the immediate vicinity of the protected compartment, broader traffic patterns, compare current traffic patterns with normal traffic patterns, etc.), wireless communications, communications made over the internet, and the like. The one or more monitoring elements may convey signals, which carry data, to the processing element (e.g., a computer processor, a microcontroller, etc.). The monitoring element(s) may convey signals intermittently (e.g., when the threat detection element operates on stored power, etc.) or continuously. The processing element, operating under control of suitable programming, may process the data received from the monitoring element(s) to determine a current threat level and to determine whether the current level meets or exceeds the predetermined threshold threat level. In the event that the threat level meets or exceeds the predetermined threshold threat level, the processing element may designate that threat level as a probable threat to the contents of the protected compartment and may actuate the encapsulant dispersal element of the threat prevention system.
The theft prevention system may be equipped to prevent actuation of the encapsulant dispersal element while a protected compartment (e.g., a vault, etc.) is occupied by an individual. More specifically, while one or more monitoring elements (e.g., a camera, a thermal sensor, etc.) and the processing element (e.g., an image analytics algorithm, etc.) of a threat detection element of the theft prevention system indicate that an individual is present in the protected compartment or that introduction of the encapsulant into the protected compartment may otherwise be undesirable, programming of the processing element of the threat detection element may prevent the threat detection element from actuating the encapsulant dispersal element. Thus, the theft prevention system may be programmed to prevent injury or death. In some such embodiments, the theft prevention system may provide a warning and a manual override option, which may enable an individual to assess the situation and actuate the encapsulant dispersal element.
The theft prevention system may be self-sustained and remotely actionable with bidirectional communications and embedded intelligence.
In another aspect, methods for supplementing the security provided by a protected compartment are disclosed. Such a method includes evaluating potential threats to the contents of the protected compartment. Evaluation of the potential threats to the contents of the protected compartment may be conducted intermittently or continuously. The potential threats to the contents of the protected compartment may be evaluated by an individual (i.e., manually) or automatically (e.g., by AI, etc.). In the event that evaluation of potential threats leads to identification of a probable threat to the contents of the protected compartment, an expandable encapsulating material may be introduced into an interior of the protected compartment. The expandable encapsulating material may be directed toward access points to the interior of the protected compartment. Alternatively, the expandable encapsulating material may be directed toward contents of the interior of the protected compartment. As another alternative, the expandable encapsulating material may be introduced throughout the interior of the protected compartment (e.g., throughout substantially an entirety of the interior of the protected compartment, throughout an entirety of the interior of the protected compartment, etc.). As the expandable material is introduced into the interior of the protected compartment, it may expand (e.g., foam, etc.) and harden (e.g., polymerize, etc.). Introduction of the expandable encapsulating material into the interior of the protected compartment and hardening of the expanded encapsulating material may occur in as quickly as five seconds. In some embodiments, the expandable encapsulating material may be introduced into the interior of the protected compartment, expand, and harden in five seconds or less. Once there is no longer a threat to the contents of the protected compartment, the expanded encapsulating material may be removed from those contents—a process which may take a significant amount of time.
Other aspects of the disclosed subject matter, as well as features and advantages of various aspects of the disclosed subject matter, will become apparent to those of ordinary skill in the art through consideration of the ensuing description, the accompanying drawings, and the appended claims.
In the drawings:
Referring to
In addition to the encapsulant dispersal element 20, a theft prevention system 10 according to this disclosure may include a threat detection element 60. The threat detection element 60 may be capable of monitoring the protected compartment 100 and/or an area, or an environment, within which the protected compartment 100 is located. The threat detection element 60 may have a configuration that enables it to monitor, sense, or detect one or more types of activities that may be indicative of a threat to the protected compartment 100 and its contents 104 (e.g., valuables, etc.), which activities are also referred to herein as “threat indicators.” In addition, the threat detection element 60 (e.g., an AI of the threat detection element 60, etc.) may evaluate one or more threat indicators using a set of threat detection rules to determine a likelihood that an individual or a group of individuals will try to break into, or breach, the protected compartment 100. That likelihood may also be referred to as a “threat level.” If the threat level reaches or exceeds a predetermined threshold, as determined by the set of threat detection rules, the threat detection element 60 may designate a threat indicator or a collection of threat designators as a “probable threat.”
In some circumstances, regardless of the threat level, the threat detection element 60 may be programmed to prevent actuation of the encapsulant dispersal element 20 and, thus, the introduction of an encapsulant into the protected compartment 100. As an example, if the threat detection element 60 determines that the protected compartment 100 (e.g., a large protected compartment, such as a vault, etc.) is occupied by an individual, a processing element of the threat detection element 60 may prevent the threat detection element 60 from actuating the encapsulant dispersal element 20. Thus, the theft prevention system 10 may be programmed to automatically override protection of the protected compartment 100 in events where the consequences of protection outweigh the benefits of protection (e.g., to prevent injury or death, etc.). In some such embodiments, when the threat detection element 60 determines that the threat level otherwise warrants actuation of the encapsulant dispersal element 20, the theft prevention element 60 may provide a warning and a manual override option, which may enable an individual to assess the situation and, if the individual deems it appropriate, actuate the encapsulant dispersal element 20.
When a probable threat exists, the threat detection element 60 may actuate the encapsulant dispersal element 20, causing it to introduce the expandable encapsulating material 12 into the interior 102 of the protected compartment 100.
Turning now to
The delivery device 30 may have a configuration (e.g., a wireless communication element, a wired communication port, etc.) that enables a switch, a controller, or a processor of the delivery device 30 to receive and optionally process data from a manual trigger or from the threat detection element 60 (
At one end 31, the delivery device 30 includes a trigger circuit 32, which may be actuated manually or under control of the threat detection element 60 (
The trigger circuit 32 may communicate with one or more igniters 34. Each igniter 34 may release a high current discharge. The high current discharge of each igniter 34 may be communicated to an ignition chamber 36 that carries an accelerant. The ignition chamber 36 may communicate with a pressure chamber 38, which may be pressurized upon ignition of the accelerant within the ignition chamber 36. In a specific embodiment, ignition of the accelerant may generate about 5 psi of a non-toxic gas in the pressure chamber 38. In turn, the pressure chamber 38 may communicate with canisters 40 and 42. The canisters 40 and 42 may contain separate parts of the expandable encapsulating material 12 (
Once ejected from the nozzle 48 of the delivery device 30, the expandable encapsulating material 12 may expand and harden. In some embodiments, the volume of the expandable encapsulating material 12 may increase (e.g., by about ten (10) times, by about twenty (20) times, by about thirty (30) times, by about forty (40) times, etc.). The expandable encapsulating material 12 may harden (e.g., polymerize, etc.) in about five seconds or less. Once encapsulated and hardened, the expanded encapsulating material (not shown) may form a solid mass. The encapsulating material 12 may be directed to one or more selected locations within the interior 102 of the protected compartment 100 (e.g., toward access points to the interior 102 of the protected compartment 100, onto the contents 104 of the protected compartment 100, etc.), resulting in the formation of a solid mass at each such location. Alternatively, the encapsulating material 12 may be directed throughout the interior 102 of the protected compartment 100, into voids or cavities in the interior 102 of the protected compartment 100, and surrounding any contents 104 (e.g., valuables, etc.) within the interior 102 of the protected compartment 100, thereby preventing removal of the contents 104 from the interior 102 of the protected compartment 100.
With reference to
The command module 70, which may also be referred to as a “processing element” of the threat detection element 60, may comprise a self-sustained operational computing unit. Among other things, the command module 70 may include a central processing unit (CPU), a video processing unit (VPU), memory, and one or more communications buses. The CPU and/or VPU of the command module 70 may execute one or more programs that enable threat detection, evaluation of delivery devices 30 (
The failover module 75 comprises a standby for the command module 70 to protect the threat detection element 60 from failure. Thus, the failover module 75 may also serve as a processing element, and may also comprise a self-sustained operation computing unit. The failover module 75 may include a CPU, memory, and at least one communication bus, as well as a battery 79. The CPU of the failover module 75 may execute one or more programs that enable threat detection, evaluation of delivery devices 30 of the encapsulant dispersal element 20 (
A variety of different monitoring elements 80-85 may communicate with the command module 70 and the failover module 75. As an example, the threat detection element 60 may include an external microphone 80, an internal microphone 81, an impact sensor 82, a vibration sensor 83, a GPS (Global Positioning System) module 84, and an accelerometer 85. Other examples of monitoring elements that may be used with a threat detection element 60 include door state sensors, cameras, temperature sensors, pressure sensors, tampering sensors, radio receivers (e.g., a sub-1 GHz radio module, etc.), and the like.
The threat detection element 60 or, rather, its command module 70 and/or failover module 75, may execute one or more applications, or programs, that enable it to identify a possible threat, determine a likelihood that the possible threat will result in an actual threat, designate such a possible threat as a “probable threat,” and actuate the encapsulant dispersal element 20 (
In some embodiments, the applications executed by the threat detection element 60 or, more specifically, by its command module 70 and failover module 75 may comprise artificial intelligence software and supporting hardware that may comprise a neural network module. The neural network module may enable the threat detection element 60 to continuously learn one or more sets of threat detection rules and improve the decision making ability of the threat detection element 60 over time to progressively optimize when to best trigger the encapsulant dispersal element 20 (
The threat detection element 60 may also include a triggering module 90a, 90b, etc., for each segment 22a, 22b, etc. (
In addition to detecting threats to the protected compartment 100 and its contents 104, the command module 70 of the threat detection element 60 may monitor the encapsulant dispersal element 20 (
The command module 70 and/or the failover module 75, which may operate in isolation from one another, may also monitor a state of the other module (i.e., the command module 70 may monitor the failover module 75 and the failover module 75 may monitor the command module 70) to determine whether or not the other module is functioning normally or abnormally. If any abnormal situation is detected (e.g., tampering, malfunction, etc., of hardware or software) a malfunction alert may be generated so that the problem may be properly addressed.
With continued reference to
Prior to transporting the protected compartment 100 and any valuable items therein, the command module 70 of the threat detection element 60 may be activated. Activation of the command module 70 may include connection of the command module 70 to a central event server 200, which may transmit an up-to-date version of the applicable threat detection rules to the command module 70 and, optionally, to the failover module 75. The threat detection element 60, including its command module 70 and failover module 75, may then be activated. In addition, the threat detection element 60 may provide an indicator of when the threat detection element 60 has been activated, which may include enabling operation of the armored vehicle 110.
Prior to and/or while transporting the protected compartment 100, the command module 70 may monitor the encapsulant dispersal element 20 and/or components of the encapsulant dispersal element 20 (e.g., segments 22 thereof, etc.) to ensure that the encapsulant dispersal element 20 and/or its components are functioning as intended. Monitoring of the encapsulant dispersal element 20 and/or its components may continue periodically or intermittently during transportation of the armored vehicle 110 and its protected compartment 100.
As the armored vehicle 110 transports the protected compartment 100 and its contents 104, the threat detection element 60 may monitor various sounds (e.g., sounds detected by the external microphone 90 and/or the internal microphone 91). The threat detection element 60 may monitor data regarding the route traveled by the armored vehicle 110, the location of the armored vehicle 110 (e.g., by way of the GPS module 94), and/or data obtained from various other monitoring elements of the threat detection element 60 (e.g., door state sensors, vibration sensors 93, impact sensors 92, etc.). The threat detection element 60 may also be capable of detecting any manual directives received from a local manual trigger 88 and/or a remote manual trigger 89. Such information may provide the command module 70 and/or the failover module 75 with data that will enable a determination by the artificial intelligence, as it applies the threat detection rules, of whether or not there is a probable threat to the contents 104 of the protected compartment 100. If the command module 70 and/or the failover module 75 of the threat detection element 60 determines that there is a probable threat to the protected compartment 100 and its contents 104, the command module 70 and/or the failover module 75 may send a signal (e.g., an encrypted signal, etc.) to the encapsulant dispersal element 20 to actuate the encapsulant dispersal element 20.
Once the armored vehicle 110 and its protected compartment 100 are back at the base station, the command module 70 may upload the data obtained from its monitoring, along with any corresponding information pertinent to actual threats to the protected compartment 100 and its contents 104, to the central knowledge database 210 (e.g., through the central event server 200, etc.). That data and information may be used to update the central knowledge database 210 for use in connection with future uses of the armored vehicle 110 or other armored vehicles (e.g., in the same fleet, in the same area, etc.).
Although the foregoing description sets forth many specifics, these should not be construed as limiting the scope of any of the claims, but merely as providing illustrations of some embodiments and variations of elements or features of the disclosed subject matter. Other embodiments of the disclosed subject matter may be devised which do not depart from the spirit or scope of any of the claims. Features from different embodiments may be employed in combination. Accordingly, the scope of each claim is limited only by its plain language and the legal equivalents thereto.
A claim for the benefit of priority to the Aug. 7, 2018 filing date of U.S. Provisional Patent Application No. 62/715,418, titled SYSTEMS AND METHODS FOR PREVENTING THEFT OF VALUABLES FROM PROTECTED COMPARTMENTS (“the '418 Provisional application”) is hereby made pursuant to 35 U.S.C. § 119(e). The entire disclosure of the '418 Provisional application is hereby incorporated herein.
Number | Date | Country | |
---|---|---|---|
62715418 | Aug 2018 | US |