In the currency handling industry, it is important to be able to monitor and track currency, such as banknotes and similar documents of value. Notes often are stored in a cash box, which sometimes may be referred to as a currency cassette. Depending on the context in which the cash box is being used, the cash box may be securely located in, or attached to, for example, a safe, a gaming machine, a vending machine or a change machine. The locked cash box typically is removable from the safe or the machine by authorized service personnel so that the cash box can be transported to a secure, central location where the cash is removed and counted. Part of monitoring and tracking the currency, for example, in a gaming facility (e.g., a casino) may include tracking the location and movement of the cash boxes, as well as tracking note acceptors that determine whether currency inserted into the machine is genuine.
This disclosure relates to tracking information in a note handling facility.
Tracking information in a note handling facility involves, in some implementations, communications between components of the system to facilitate tracking the location and movement of note acceptors and cassettes for storing notes. Such components can include host machines (e.g., gaming or vending machines), note acceptors, cassettes for storing notes, databases, and/or note counting machines.
In some implementations, radio frequency (“RF”) tag chips are embedded in or mounted to various of the components to facilitate the communications. RF tag readers can be provided at appropriate locations within the facility to facilitate reading information from and writing information to the RF tag chips.
As used herein, the term “note” (or “notes”) includes, but is not limited to, paper currency such as banknotes, bills, security documents, paper currency checks, coupons, tickets and other documents of value that may be used as legal tender in exchange for goods or services.
Various aspects of the invention are defined by the claims.
In one aspect, a disclosed method includes scanning identification information from a label on a host machine, transferring the scanned identification information to a note acceptor coupled to the host machine, and storing the transferred identification information in memory associated with the note acceptor.
In some implementations, the identification information on the label includes bar-coded identification information. A hand-held bar-code reading device can be used to scan the identification information from the label and transfer it to the note acceptor.
In a second aspect, a method for a host machine (e.g., a gaming machine or vending machine), with a note acceptor coupled the host machine, includes interrogating the note acceptor for identification information stored in memory associated with the note acceptor and receiving identification information from the note acceptor. The host machine is operated in a manner dependent on whether or not the identification information from the note acceptor matches identification information stored by the host machine.
In some implementations, if the identification information from the note acceptor does not match the identification information stored by the host machine, the host machine reports occurrence of an error. Also, in some implementations, if the identification information from the note acceptor does not match the identification information stored by the host machine, the host machine updates the identification information in the note acceptor.
In a related aspect, a method includes installing a note acceptor in a host machine, transferring identification information from the host machine to memory associated with the note acceptor, and storing the identification information in the note acceptor memory. In some implementations, the identification information transferred from the host machine is permanently programmed into host machine memory. The identification information can be transferred to the note acceptor memory, for example, upon power up of the note acceptor.
A third aspect relates to a method for a note acceptor installed in a currency handling system that includes a host machine and a cassette for storing notes received by the note acceptor. The method includes communicating with the cassette to request that the cassette provide identification information if predetermined identification information is stored in memory associated with the note acceptor. Identification information is received from the cassette, and the identification information received from the cassette is stored in the memory associated with the note acceptor. In some implementations, the predetermined identification information stored in the memory associated with the note acceptor indicates that the note acceptor is a replacement or spare note acceptor.
In a related aspect, a note acceptor includes a micro-processor and memory, and is operable, upon being powered up, to communicate with a cassette coupled to the note acceptor to request that the cassette provide identification information, if the note acceptor previously determines that predetermined identification information is stored in the memory. The note acceptor further is operable to receive identification information from the cassette and to store the identification information received from the cassette in the memory.
According to a fourth aspect, a method of processing a cassette for storing notes includes removing the cassette from a first location where it is coupled to a note acceptor that is coupled to a host machine, placing the cassette on a RF tag reader station, and using a RF tag reader to read contents of a RF tag chip mounted to the cassette while the cassette is on the RF tag reader station. In some implementations, the method includes opening the cassette and removing notes from the cassette while the cassette is on the RF tag reader station, and using the RF tag reader to mark the RF tag chip electronically with an indication that the cassette has been emptied. A copy of the contents read from the RF tag chip can be printed.
A fifth aspect relates to a method for a note acceptor to operate with a newly installed cassette for receiving notes. The method includes checking the contents of memory associated with the newly installed cassette, and operating the note acceptor in a manner dependent on whether the contents of the cassette memory indicate that the cassette is empty. In some implementations, the method includes operating the note acceptor in a manner dependent on at least one of whether the contents of the cassette memory indicate that the cassette is empty and whether identification information in the cassette memory matches identification information stored in memory associated with the note acceptor. The note acceptor can be inhibited from accepting notes if the contents of the cassette memory indicate that the cassette is not empty and if the identification information in the cassette memory does not match the identification information stored in the memory associated with the note acceptor.
According to a sixth aspect, a method includes communicating information indicative of a software version with which a note acceptor is configured, the information being communicated from the note acceptor to a cassette for storing notes. The information is stored in memory associated with the cassette. Subsequently, the information is read from the memory associated with the cassette. In some implementations, the method includes storing the information read from the memory associated with the cassette in a database. The method can include interrogating the database to check what version of software is being used by the note acceptor and confirming that the version of software being used by the note acceptor matches an expected version.
In a seventh aspect, a method for processing information in a first RF tag chip mounted to a cassette for storing notes includes placing the cassette in the vicinity of a RF tag reader and placing a card in the vicinity of the RF tag reader, wherein the card has a second RF tag chip embedded therein or mounted thereto. The information in the first RF tag chip is transferred to the second RF tag chip via the RF tag reader. A stack of notes is removed from the cassette, and the card is transported together with the stack of notes after transferring the information to the second RF tag chip. The notes are fed into a note counting machine, and the information is transferred from the second RF tag chip to the note counting machine. In some implementations, prior to placing the cassette in the vicinity of the RF tag reader, the cassette is detached from a host machine where the cassette stores notes received from a note acceptor and where the first RF tag chip mounted to the cassette stores information received from the note acceptor.
Other aspects, features and various advantages that are present in some implementations will be apparent from the following detailed description, the accompanying drawings, and the claims.
As illustrated in the example of
As shown in
In the illustrated example, the acceptor 20 has a RF antenna associated with it to transmit and receive data. As shown in
As indicated by
For example, once the cash box 22 is installed in a chassis 24 with an associated note acceptor 20 having an interface board 26 with a fixed antenna, data can be written to the cash box memory 31. With the RF tag 30 in close proximity to the note acceptor 20, modulation of the acceptor's antenna energizes an antenna in the RF tag that allows data to be communicated to the RF tag chip 30 and transferred to the RF tag's memory 31.
Although the illustrated implementation uses a RF tag chip 30 to facilitate radio frequency communications between the cash box 22 and the note acceptor 20, in other implementations, the cash box and acceptor can communicate through other means, such as electrical or optical communications.
Various types of data that can be transferred from the note acceptor 20 for storage in the cash box memory include product performance and audit data. Such data may contain information such as, but not limited to, operating hours, number of notes processed, tamper attempts detected, number of notes and how they were inserted, number of jams and jam recoveries, acceptance rates, number of resets, and the number of times the cash box became full. Other information also can be stored in the RF tag memory.
For example, it can be advantageous to store information indicative not only of the total number of notes and the number of notes for each denomination, but also the number of notes within a particular series for each denomination. For example, U.S. $5 bills have multiple series. The bills of each series are generally accepted as currency in the U.S., and various note acceptors can differentiate among the different series of bills by detecting differences in their optical or other characteristics. Thus, the note acceptor can communicate to the cash box memory the number of bills in each particular series.
Another example of the type of data that can be transferred from the note acceptor 20 for storage in the cash box memory 31 is identification information (e.g., a location number or asset number). Preferably, the identification information includes a unique identifier associated with the host machine. This facilitates tracking and monitoring of the movement of each cash box in the gaming or other facility so that currency stored in each cash box can be tracked and monitored more easily. The movement of the note acceptors also can be tracked and monitored in this way.
The identification number (e.g., the location number or asset number) can be provided to the note acceptor 20 in any one of various ways. In some implementations, the location or asset number is entered into the note acceptor using a computer (e.g., laptop) or a handheld device coupled to the note acceptor. The location or asset number can be entered via the computer or handheld device using, for example, a keyboard, swipe device, memory stick or other data entry device. For example, the asset number can be provided to the bill acceptor by connecting a personal computer or handheld device to a USB port on the front of the bill acceptor. In other implementations, a Universal Serial Bus-based (“USB-based”) scanner is coupled directly to the note acceptor to read identification from the host machine and report it directly to the note acceptor.
Alternatively, a hand-held bar-code wand attached, for example, near the front of the host machine and coupled to the note acceptor can be used to scan unique identification information (e.g., a location or asset number) encoded as a bar code on a label mounted to the gaming or other machine. The location or asset number then is written from the bar code wand to the note acceptor memory. When the cash box 22 is installed in the chassis 24, the unique location or asset number is transmitted from the note acceptor 20 to the cash box memory 31.
Data also can be read from the cash box memory 31. For example, if the cash box memory 31 is part of a RF tag chip 30, the data can be read by a RF tag reader having an antenna. In the context of a gaming facility, the RF tag reader can be located, for example, in a soft count room where the contents of the cash box 22 are verified. In a particular scenario (see
The information read by the RF tag reader from the cash box memory 31 can be stored, for example, in a database. The stored information can be used to generate reports to assist management in monitoring and tracking various activities taking place at the gaming or other facility. For example, the gaming facility may determine that there appears to be potentially fraudulent activity with respect to the use of a particular series of bills. In such a situation, management personnel may choose to reconfigure (e.g., change the software in) the note acceptors used at the gaming facility so as not to accept notes of the specified series.
In some currency counting applications, it is desirable to have the currency sorting and counting equipment located in a different area from where the notes are removed from the cash box. In such situations, the information contained within the cash box memory 31 should be physically transported together with the notes so that the information remains available when the notes are counted. The following paragraphs describe a technique to copy stored data from the cash box memory to a RF tag attached to a card, which then is transported with the notes from the location where the notes are removed from the cash box to the location where the notes are counted.
As shown by
As illustrated by
An issue that occasionally can arise when a note acceptor 20 is replaced or swapped, for example, with an empty note acceptor is that the location or asset number which is associated with the empty note acceptor may be incorrect for the new location (i.e., the gaming or vending machine in which the empty note acceptor is being installed). Thus, the location or asset number should be programmed to ensure the note acceptor contains the correct location or asset number.
One way of addressing the issue of location or asset number errors is to program the identification information (e.g., location or asset number) permanently into memory of the host machine 40 (e.g., gaming or vending machine). In some implementations, in addition to the exchange of any other messages that takes place between the host machine 40 and the note acceptor 20 (for example, upon power-up), a message is added to provide the identification information from the host machine to the note acceptor (see
Alternatively, as shown in
In some implementations, the replacement note acceptor is configured with predetermined special identification information (e.g., asset number) in its memory that indicates the acceptor is a “spare” or “replacement” acceptor that is being used to replace the note acceptor currently coupled to the host machine. As indicated by
To facilitate testing of note acceptors during manufacturing, a “dummy” asset number can be stored in the note acceptor's memory. The “dummy” asset number is recognized by the note acceptor's microprocessor and allows the note acceptor to continue operating during testing even though there is no separate confirmation that the asset number in the note acceptor matches the identification information in a particular host machine or is otherwise correct.
As explained above, in a typical scenario such as may occur in a gaming facility, when a cash box 22 is filled to capacity (e.g., when it is filled with banknotes), the cash box is removed from the chassis 24 by service personnel, and an empty cash box is installed in its place. The removed cash box 22 is taken to a counting room and placed on the RF tag reading station 32. The currency or other notes in the cash box 22 are removed, and a bar coded ticket is printed with the information retrieved from the cash box memory 31 and other relevant data (e.g., time and date). When the data stored in the cash box 31 has been read and saved, the cash box memory 31 is marked electronically to indicate that the cash box 22 has been emptied (or is now empty). The cash box 22 then is ready to be reinstalled in a chassis 24 to receive notes from an acceptor 20 coupled to a host machine 40.
An accounting issue, however, can occur if the cash box being installed in the chassis is not, in fact, empty. As illustrated by
The cash box system also can be used to deliver information to a note acceptor unit 20 in the field or, for example, on the gaming facility floor. To change or update functionality of a note acceptor, service personnel typically must change a setting or update firmware or software. The cash box memory allows such updating to be done automatically by taking advantage of the fact that the cash boxes 22 are removed from and replaced in the host machines on a regular or periodic basis. Once the cash box 22 is emptied of its contents or the cash box memory 31 is electronically marked to indicate the cash box is “empty,” new information can be written to and stored in the cash box memory, as indicated by block 130 of
The cash box memory 31 also can be used to track the software version with which a particular note acceptor 20 is configured. For example, as indicated by
Other implementations are within the scope of the claims.
This application claims priority from U.S. Provisional Patent Application No. 60/813,863, filed on Jun. 14, 2006.
Number | Name | Date | Kind |
---|---|---|---|
4992648 | Hutchinson | Feb 1991 | A |
5630755 | Walsh et al. | May 1997 | A |
5640002 | Ruppert et al. | Jun 1997 | A |
5774876 | Wooley et al. | Jun 1998 | A |
6332099 | Heidel et al. | Dec 2001 | B1 |
6633881 | Drobish et al. | Oct 2003 | B2 |
6845905 | Blad et al. | Jan 2005 | B2 |
6896116 | Deaville et al. | May 2005 | B2 |
6941274 | Ramachandran et al. | Sep 2005 | B1 |
RE39666 | Walsh et al. | May 2007 | E |
7275991 | Burns et al. | Oct 2007 | B2 |
7494414 | Hedrick et al. | Feb 2009 | B2 |
20020091648 | Phillips et al. | Jul 2002 | A1 |
20030189093 | Fujimoto | Oct 2003 | A1 |
20030230464 | Deaville et al. | Dec 2003 | A1 |
20040016797 | Jones et al. | Jan 2004 | A1 |
20040149817 | Kuroiwa et al. | Aug 2004 | A1 |
20040169075 | Washington et al. | Sep 2004 | A1 |
20040180721 | Rowe | Sep 2004 | A1 |
20040238319 | Hand et al. | Dec 2004 | A1 |
20070194106 | Force et al. | Aug 2007 | A1 |
20080200256 | Gagner et al. | Aug 2008 | A1 |
20080223930 | Rolland et al. | Sep 2008 | A1 |
Number | Date | Country |
---|---|---|
S61-229185 | Oct 1986 | JP |
0191065 | Nov 2001 | WO |
2005055159 | Jun 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20080011840 A1 | Jan 2008 | US |
Number | Date | Country | |
---|---|---|---|
60813863 | Jun 2006 | US |