EP1255906B1 - Vorrichtung und verfahren zum sicheren transport eines gegenstandes - Google Patents

Vorrichtung und verfahren zum sicheren transport eines gegenstandes Download PDF

Info

Publication number
EP1255906B1
EP1255906B1 EP01907805A EP01907805A EP1255906B1 EP 1255906 B1 EP1255906 B1 EP 1255906B1 EP 01907805 A EP01907805 A EP 01907805A EP 01907805 A EP01907805 A EP 01907805A EP 1255906 B1 EP1255906 B1 EP 1255906B1
Authority
EP
European Patent Office
Prior art keywords
container
signal
communication network
state
further including
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP01907805A
Other languages
English (en)
French (fr)
Other versions
EP1255906A1 (de
Inventor
Alain Richard
Francis Samuel
Philippe Legorjus
Philippe Laurent
Benito-Jean Caradonna
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INTACTUS
Original Assignee
Intactus
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intactus filed Critical Intactus
Publication of EP1255906A1 publication Critical patent/EP1255906A1/de
Application granted granted Critical
Publication of EP1255906B1 publication Critical patent/EP1255906B1/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/14Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft
    • AHUMAN NECESSITIES
    • A45HAND OR TRAVELLING ARTICLES
    • A45CPURSES; LUGGAGE; HAND CARRIED BAGS
    • A45C13/00Details; Accessories
    • A45C13/18Devices to prevent theft or loss of purses, luggage or hand carried bags
    • A45C13/24Devices for sound-producing, piercing, gas-discharging, or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/005Portable strong boxes, e.g. which may be fixed to a wall or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/10Mechanical details
    • G07D11/12Containers for valuable papers
    • G07D11/125Secure containers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/06Coin boxes

Definitions

  • the invention relates to the field of secure transport of objects, such as for example cash values (including banknotes) and / or checks and / or valuable or confidential documents.
  • this type of secure transport is currently achieved by using armored vehicles. This is particularly the case for transfer of tickets, from a store to a bank, or from a bank to another local bank.
  • EP 0,692,599 discloses a secure transport device comprising a transmission station, a reception station, a transport system of the transmitting station at the receiving station and control means of the whole system.
  • the container can then receive, in response, an opening signal container or means for containing said object.
  • an opening of the container or means that contain the object, can be conditioned to the state of these means or of this container. If the signal relating to the condition of the container indicates an attempted tampering with the container, no opening signal will be transmitted, and intervention will be required. example that of the sender himself, to achieve the opening of the container.
  • the opening thereof may take place after receipt of the signal authorizing the opening. It is therefore a remote opening.
  • the secure transport device therefore allows a remote control of the state of the container, which control can be carried out by the sender himself or by a third party, who is instructed by the sender to supervise the transport of the container and the object to the intended destination or consignee.
  • the container used is preferably compatible with manual transport (it is then a device for manual and secure transport) or with a postal item.
  • the format of the container may be of the type used by postal services (envelopes or parcels for example).
  • the transport device according to the invention is of preferably designed for manual transport or for mailing or steed.
  • consignee may also be made on the containing, in particular if the transport is carried out by post or courier.
  • the transport device according to the invention replaces advantageously the secure transport means known in the prior art, which armored cases that must be transported by guard staff, most often armed.
  • the communication means are means for, or specially programmed to send a coded or encrypted signal relating to the condition of the container.
  • Coding or encryption adds an extra degree of security: a third party, who would obtain the information by monitoring the network of communication used, would not be able to capture information on the status of containers only in encrypted or encrypted form.
  • the device comprises means for identifying a normal or abnormal operating status, and / or to identify an attempt tampering or violation or opening without authorization or a type of attempt break-in or violation or unauthorized opening of the transport or its means of closure.
  • the secure transport device or the container, can be equipped with means for detecting or measuring the temperature of the atmosphere container and / or means for detecting or measuring the degree of hygrometry of this surrounding atmosphere.
  • a conductive circuit can be arranged to the inside of the container as well as means to detect a break in this circuit.
  • a variation outside of a specified range (s), or below or above a predetermined threshold value of the temperature and / or the hygrometry and / or the detection of a break in the driver circuit can trigger means, arranged inside the container, to destroy or to damage or stain or mark an object contained in this container.
  • the communication means of the device of secure transport according to the invention are means of connection to a network telephone.
  • the means of communication of the transport device After connecting to the telephone network, the means of communication of the transport device according to the invention dial a number telephone number, for example that of the shipper or the transport supervisor.
  • the latter once the communication is established, compares the number telephone number of the place or telephone socket to which the transport is connected to one or more predetermined numbers that is / are the one of the recipient chosen initially.
  • the telephone network with which the communication takes place is an analog network, which is safer than a network digital.
  • the communication network can be a network of Internet or LAN type, or ETHERNET or ISDN or X25 or of any other type.
  • the secure transport device according to the invention is then equipped with means for sending, on such a network, signals relating to its state, or a signal or identification signals of a recipient, such as example a predetermined TRANSPAC address or Internet.
  • this device When connected to the network, this device dials a number identification of a terminal or apparatus or monitoring system to which is connected, for example, the sender or a transport supervisor.
  • a signal or signals, relative to the state of the container is / are sent via the network. to a person (by example, shipper or transport supervisor) or terminal or device or the monitoring system that is likely to be able to send a signal to open the means that close or lock the container during all the transport.
  • the email address or the identification of the place or terminal to which the transport device is connected can be compared with a predetermined address or identification which is that of the recipient chosen initially. When the address or the identification is that of the recipient chosen initially, and after check the condition of the container, it can be proceeded to the remote opening of the container.
  • the secure transport device furthermore comprises means for supplying electrical energy, for provide energy to the means of connection or communication and / or reception means.
  • the device according to the invention is autonomous. Just make sure, before transport, that the means of supplying electrical energy have a sufficient capacity to be able to send, upon receipt, the corresponding signal actually in the state in which the container is.
  • a monitoring device allows remote monitoring of the status of a container of a device of secure transport according to the invention, when this device or container is delivered to a recipient.
  • This monitoring device may be provided with means for, or specially programmed to, send a signal of destruction or staining or inclusion or marking of an object contained in the container, when the received status signal indicates that the container has been or is being forced, or has been or is attacked by an outside agent, or that the container is still closed after a predetermined closing time.
  • the monitoring device furthermore comprises means for arming, beforehand, means destruction or staining or inclusion or marking of a contained object in the container, then to disarm these means, before sending the signal opening.
  • the operation or the step of arming the means of destruction or staining or inclusion or marking can be done right after loading of the object in the container, for example at the operator of the monitoring.
  • the communication network to which the monitoring device the invention is connected maybe of one or other of the types already described above (telephone network, or Internet or Ethernet or LAN or ISDN or X25 or any other type of network).
  • the system according to the invention preferably also comprises, or is preferably further connected to, a local communication line, a network local network, for example of a local telephone network, making it possible to arming means of destruction or staining or inclusion or marking an object contained in the container.
  • a network local network for example of a local telephone network
  • the arming step can take place, and this without the need for coding information exchanged between the device surveillance and the container.
  • the monitoring device is further provided with means for storing an identification code of a recipient or a place of destination of the transported object, and to compare an identification code received with this identification code of the recipient or purpose of the object.
  • the monitoring system then emits a signal, for example which takes into account the consignee identification code or the place of destination of the transported object.
  • an opening signal is received by the means which contain the object.
  • such a method comprises, before the transport stage, a preliminary step of arming means for the destruction or the staining or inclusion of the object contained in the container.
  • the container may then proceed to the neutralization or destruction or staining or inclusion of the object contained in the container, when the signal transmitted by the container indicates that the container is in a different state from the predetermined state, and in particular is different from the normal state, or that it has been or has been forced, or has been or is being assaulted, by an outside is always closed after a predetermined closing time.
  • FIG. 1 schematically represents a transport device secure according to the invention.
  • this device 2 has the form of a case whose two parts 4, 6 can be closed by closing or locking means 8, 10, 12, 14.
  • This case can be used to carry numeric values 3, or well any other goods whose transport must be carried out in such a way confidential or requires certain precautions.
  • a handle 7 allows manual transport of the device.
  • the closing or locking means may be for example electromagnetic type, for example essentially comprising a miniature electromagnet.
  • the means of closing or locking essentially comprise a mechanical system enslaved.
  • the device may further contain feed means voltage (for example: lithium battery, small footprint) which confer a certain autonomy.
  • feed means voltage for example: lithium battery, small footprint
  • Means 16 make it possible to connect to a network of communication and means 18 make it possible to transmit, via the means 16, to a monitoring system to be described later, signals, including signals relating to a transport device state or identification signals the place where the device is connected 2. These means also make it possible receive signals from the surveillance system.
  • the reference 16 designates a socket for a connection on a network such as the telephone network
  • the means 18, arranged inside the transport device are electronic means which transmit or receive signals via the established connection using means 16 or the socket 16.
  • these means 18 also control the opening and the closing means 8, 10, 12, 14 closing or locking.
  • these means of closure receive an order of closure or opening to from means disposed within the transport device itself.
  • the walls which delimit the transport device according to the invention may be made of flexible plastic material, in particular for package type devices, or material such as rubber for devices "envelope" format. These types of material are compatible with insertion, in the container, means or a management device 18, made for example in the form of an electronic card, and with the making of a connection socket 16 in one of the walls or external surfaces.
  • walls of non-deformable material may be provided.
  • the socket 16 allows connection to a communication network.
  • Figure 2 shows the case of a connection of the Briefcase 2, in the closed state. to a telephone network 20, which is shown schematically in broken lines.
  • the socket 16 makes it possible to connect the case to a telephone jack 19 via a cable 17.
  • a monitoring device 22 is also connected to the network of communication 20, for example, in the case described here, by connection to a socket
  • the surveillance system includes essentially a microcomputer 22 having an interface for communicating via a telephone network, for example a modem.
  • An operator 24 conducts surveillance, in a manner to be described later.
  • the monitoring system 22 comprises a display device 23, a keyboard 26, peripheral means such as a mouse 27 allowing move a cursor on the screen 23.
  • FIG. 3 schematically shows, in block, various components of the monitoring system 22.
  • a microprocessor 34 is connected by a bus 38, to RAMs 30 for storing data, to a memory ROM 32 in which monitoring program instructions can be stored.
  • the system further comprises the display device, or screen, 23. and peripheral means 26 (keyboard) and 27 (mouse).
  • Reference 36 designates a modem making it possible to establish a communication with a telephone network 20.
  • a personal computer can be used as the computer of the system 22 in the context of the present invention.
  • the system 22 can be by example made using a PC Pentium PC, running on Windows NT.
  • FIG. containers, or transport devices, 48, 50 are connected, via a network of 46, such as the public telephone network, to 42, such as a reception center, the latter means being itself connected to the monitoring system 22 by a connection 44 (for example of the type RS 232).
  • a local connection at the operator of the surveillance system 22, can be carried out between containers 52, 54, via one or more line (s) of local connection (s) 56.
  • the interest of this type of connection will be explained below.
  • the assembly is connected to electrical supply means 58.
  • the object 3 to be transported is placed in the transport device 2, and the latter is closed.
  • the means 8, 10, 12, 14 are locked so that an opening, other than an opening controlled by the monitoring system 22, can not be achieved without forcing the device 2.
  • Locking means 8, 10, 12, 14 can be achieved by any medium, but preferably by the means 16, 18 which will control the opening when receiving the container. It is realized in this case, before shipment of container and its contents, a first connection of the means of transport to the system 22, and the latter sends a closing or locking signal to the container (s) 2, 52, 54.
  • This first connection is advantageously made of locally, for example using a local area network such as local lines ( Figure 4), so as to overcome, during this stage, the problems of which may arise when using a public network such as the public telephone network: the communication between surveillance system 22 and container (s) does not need to be coded or encrypted.
  • the information that will be used during the opening procedure are transmitted from the system of monitoring 22 to the container 2, 52, 56.
  • the transport device After shipping and transport, the transport device is received by its recipient. It establishes, using the means 16, 17, 19 a connection with the system 22 via the network 20.
  • the means 18 When the container 2 is in a normal state, for example when attempts to open it without permission, or to force it, or to force closure means 8, 10, 12, 14, or to force or destroy or disrupt the means 18 of opening control, have not occurred, the means 18 emit a signal reflecting this normal state, signal that is received by the surveillance system 22.
  • Operator 24, or system 22, specially programmed for this purpose may then determine a state of the container (here: a normal state) according to the signal received, and determine a signal to be sent, in response (here: an opening signal of the container).
  • the system 22 can then send an opening signal to the device of This signal is received and processed by the means 18, which then emits a control or an order of opening to the locking means 8, 10, 12, 14.
  • means 18 When the device 2 has undergone an attempt to open without authorization or has been or is being forced, or where the locking means 8 - 14 or the control means 18 are forced or undergo a disturbance which can translate an attempt to force them, means 18 emit another signal, which translated this state.
  • the operator 24, or the system 22, specially programmed for this effect, can then determine a state of the container (here: an abnormal state) depending of the received signal, and determine the answer to be formulated (here: no opening signal container).
  • the system 22 does not send an opening signal to the device 2. He may send a signal indicating the existence of an anomaly and the impossibility of sending an opening signal. This signal is received and processed by the means 18, which may transmit this information to a display device incorporated into the walls of the container or to a device to emit an alarm signal.
  • the device 2 and its means 18 can transmit or are programmed to transmit, a predetermined signal, depending on the state of the container or the 2. They may also possibly transmit an identification signal from the containing itself.
  • the system 22 transmits an opening signal if the status signal received corresponds to a predetermined type of signal, which an operator 24 can qualify, or not, normal.
  • system 2 is programmed, or specially programmed, to transmit an opening signal, or another type of signal (for example a signal signaling the impossibility of transmitting an opening signal, or still a signal of neutralization of the content as will be explained below) according to the received signal.
  • an opening signal or another type of signal (for example a signal signaling the impossibility of transmitting an opening signal, or still a signal of neutralization of the content as will be explained below) according to the received signal.
  • the system 2 can be programmed so that certain signals do not corresponding to a completely intact condition of the container, be accepted or interpreted by System 2 as translating an almost normal state; to this guy of signals, it can then be answered by an opening signal.
  • Means for detecting an attempted break-in device 2 can be the means 18 themselves, or additional means such as sensors that transmit a signal to the device or the means 18, this signal reflecting a variation, normal or abnormal, of a certain Physical size.
  • the inner walls of the transport device 2 can be provided with electrical means forming a circuit when the container is in a closed state, this circuit being interrupted when an attempted break-in that an attempt to separate the two parts 4. 6 of the device 2, takes place.
  • the internal walls of the device 2 may for example be coated with a mesh electrical or electrical conductors that are connected to electronic means 18. In a normal closed state of the device 2, the current flows normally in this mesh or these conductors, and a prescribed current value is detected by current detection means, for example arranged in the 18. When the circuit is open, the current no longer circulates, and a variation of the current is recorded by the means 18. After connection to the network 20, these means 18 send a signal reflecting this variation.
  • the device 2 may also be provided with one or more sensors, such as a thermal probe which makes it possible to detect any abnormal movement of the temperature in the environment of the device 2, or a humidity sensor that allows to detect any abnormal variation of the hygrometry in the environment 2.
  • sensors detect an attempt to open without authorization or violation, carried out using one or more variation (s) abrupt temperature (s) and / or by introducing a liquid around the container or means 18 for transmitting signals or controlling the opening of the device for transport.
  • Other attacks can be made on the device 2, for example by applying high voltage on the visible elements of the device, or by application of electromagnetic disturbances.
  • Sensors can be provided to detect a voltage variation applied to the device 2 or a variation of an electromagnetic quantity, such as for example a field magnetic, applied in the environment or inside the device 2.
  • two temperature sensors equip the device, a first to detect temperatures below a threshold value T 1 (for example: -25 ° C or 0 ° C), a second to detect temperatures above a threshold T 2 (for example: 60 ° C or 40 ° C).
  • a threshold value T 1 for example: -25 ° C or 0 ° C
  • T 2 for example: 60 ° C or 40 ° C
  • two protection meshes can be glued on the device 2: the first mesh for the upper part 4 and the second mesh for the lower part 6.
  • a potentiometer can be provided to adjust an impedance that varies depending on the surface of the device 2.
  • Each potentiometer is connected to the means 18 by two soldered wires.
  • a contact can be mounted directly on the device 2 to signal its opening. This contact delivers information "everything or nothing. "It is connected to the means 18 by two welded wires.
  • sensors such as electrical sensors or electromagnetic fields (eg voltages or magnetic fields) or thermal or hygrometric sensors, or electrical meshes, or means staining or destruction or inclusion is consistent with the realization of a device according to the invention in any of the formats already indicated above. Just select the sensors or adjust the size of the device staining or destruction or inclusion with that of the transport device selected.
  • a recipient identification code or a destination of the transported object can be previously stored by the monitoring device 22.
  • the network 20 is a network telephone number, it may be the telephone number of the place where device 2 to be delivered.
  • the phone number of the place of arrival, or which corresponds to the socket 19 to which the device has been connected can be sent automatically to the monitoring system 22 which identifies the place where the device 2 is located, or where it was delivered, and which check whether this place corresponds to the place where the transport device was actually be issued initially. It is therefore possible to add, as when the system 22 delivers the opening signal of the device 2, the following condition: the identification code is that of the recipient or destination originally planned.
  • the connection of the system 22 to the network telephone 20 may also include an automatic identification service device 2 calling, once it is connected to the telephone network.
  • the system 22 may further verify whether the intended container has been delivered to the addressee or the place intended. This verification is carried out by checking the recipient data and container identification data previously stored in the storage means of the system 22.
  • Another condition for the delivery, by the system 22, of the signal opening of device 2 may therefore be the following condition: the container is the one intended for the intended consignee or destination initially.
  • the transport device according to the invention can in additionally incorporate means of destruction and / or staining and / or inclusion and / or marking an object it contains.
  • numeric values 3 may be smeared, or documents confidential information may be destroyed, or valuable objects may be included in a solid mass during such an attempt to open the device 2.
  • a specific compartment provided for in the interior of the device comprises a product or a liquid adapted to such neutralization, such as an indelible stain for staining, or an acid mineral or an organic solvent for destruction, or a synthetic resin to achieve inclusion.
  • the transport device is then made of a material which ensures maximum efficiency of the process of neutralization of the object by the product or the neutralization liquid.
  • the specific compartment which contains the liquid or the neutralization product is isolated from the part receiving the transported by a wall, for example polyurethane foam, thus protecting it possible shocks during handling and transport operations.
  • Means are also provided, which allow the expulsion of the product or neutralization liquid on the object transported in the device 2.
  • These means comprise for example a second compartment containing a gas tablet that allows the expulsion of the product.
  • the product then spreads uniformly over the values or documents or objects transported, for example using ejection ramps disposed in the vicinity of the area in which the object 3 is transported.
  • a process of staining or destruction or inclusion may be triggered by internal means to the container, such as the means 18 and / or by the remote monitoring system 22.
  • the triggering of means of destruction or staining or of inclusion can therefore be achieved using the electronic device 18, by example from information received from one or more sensors such as already described above (break of a circuit, and / or a conductor mesh, and / or detecting an abnormal change in humidity, and / or detecting a variation abnormal temperature, and / or detection of abnormal variation of a voltage and / or an electromagnetic magnitude such as a magnetic field, and / or detection of an abnormal variation of any other physical parameter translate an attempted break-in on the device 2).
  • sensors such as already described above (break of a circuit, and / or a conductor mesh, and / or detecting an abnormal change in humidity, and / or detecting a variation abnormal temperature, and / or detection of abnormal variation of a voltage and / or an electromagnetic magnitude such as a magnetic field, and / or detection of an abnormal variation of any other physical parameter translate an attempted break-in on the device 2).
  • the device for staining or destruction or of inclusion can be triggered from the system 22, when the latter detects a anomaly, for example after receiving, via the network 20, a signal that reflects a abnormal state of the device 2. It can also be triggered if the system 22 identifies a recipient that does not conform to the intended recipient or a container which does not correspond to the intended recipient, even though the recipient is well that originally planned.
  • the system 22 does not send a signal opening, but it also sends a signal or an order to trigger the destruction, staining or inclusion of the object. More precisely, this signal is received by the means 18 which trigger the means of destruction or staining or inclusion.
  • device 2 must be open, and its contents must be removed, within a certain period of time after reception of the signal authorizing its opening. Beyond this time interval, the device is locked again, and / or the means of destruction or staining or inclusion are re-armed or reactivated.
  • the means 18 comprise a clock and, after a certain time, a signal is emitted by these means 18, to re-trigger the lock and / or the arming system.
  • the device When loading the transport device 2 with the object 3, the device is closed, locked, and then possibly the staining system or of destruction or inclusion is armed. These operations are done for example on order of the operator 24 of the system 22, by connection on a local line, such than one of lines 56 of FIG.
  • Figs. 5A and 5B show an embodiment of a transport device 60 according to the invention, which comprises means for neutralization of a transported content.
  • the reference 16 designates the socket for the connection to the network and reference 18 the electronic means of communication and signal processing.
  • Reference 62 designates the staining system, connected to maculation ramps 70, 72 arranged at the bottom of a compartment 78 in which can be locked up bank notes or documents.
  • a cover 80 located in the upper part 4 of the device allows to close the compartment 78.
  • Closing contacts 74, 76 make it possible to detect a possible opening of transport device, in the way and with the consequences already described above.
  • the closure system 82, 84 operates on the principle of a electromagnetic locking: the opening or closing of the device 60 is electrically, with an electromagnet.
  • the set is connected to the device 18.
  • the coil power of the electromagnet is 3 W and the coil voltage is fixed at 6 V.
  • Means 119 for supplying voltage and means 124 accumulators are also shown in the wall of the suitcase 60.
  • FIG. 6 represents the electronic means 18 for controlling and control of a secure transport device according to the invention, provided with different peripheral elements.
  • the means 18 comprise a first subset 18-1 which allows to manage the communication with the system of monitoring, via the socket 16, which also controls signaling means 17 to indicate to an outside operator or a carrier a system anomaly.
  • the means 18 comprise a second portion 18-2 which ensures the locking and security management of the device.
  • This second part is connected, in the example given in FIG. 6, to a mesh 92 of the container, to a thermal sensor 94 and an opening detector 96.
  • the means 18-2 also control the opening and closing of locking means 90 of the device.
  • These means 18-2 also control the implementation of the system of staining or destruction or inclusion 62. with its two compartments 62-1 and 62-2 and two ejection ramps 70, 72.
  • FIG. 6 relates to a particular embodiment.
  • a transport device according to the invention can also be implemented, without any of the elements 92, 94, 96, and without the means 62 for staining. The safety is then obviously lower, but the remote opening of the container, depending on a status signal of the device, however, can be ensured.
  • Figure 7 shows, in more detail, the realization of means 18 for communication and control of a transport device according to the invention.
  • microprocessor or microcontroller 100 All the components of this device is organized around a microprocessor or microcontroller 100. and storage means 102 (of non-volatile memory type) and a clock 103.
  • Each of the sensors or detectors is connected to means or a shaping circuit 95, 105, 107, 97 of the signal emitted by the sensor or the detector. Once formatted, the signal is transmitted to the microprocessor 100.
  • the latter is programmed in such a way as to trigger the actions necessary to following reception of signals from sensors or detectors above (send to the monitoring system 22 a signal reflecting a state defect, triggering a control signal of the neutralization, displaying a message for a user, for example the carrier or the recipient of the object).
  • the microprocessor 100 also triggers the opening of the means 8 - 14 (FIG. 1) or 82, 84 (FIG. 5A, 5B) or 90 (FIG. a signal formatted using a shaping circuit 112.
  • Communication with the monitoring system is carried out by via line interface means 114, a modem 116 and a circuit 118 DTMF broadcast.
  • the modem 116 is a V23 modem, 1,200 bauds for transmission in the container-to-supervisor direction, and 75 bauds for transmission in the supervisor to container direction.
  • the choice of these values make it possible to optimize the power consumption of the system.
  • Signals received from the monitoring system 22 pass through the socket 16, the interface 114, the modem 116 and are transmitted to the processor 100 which is programmed to trigger the necessary actions after receiving this signal (for example: opening of the transport device, or triggering of the neutralization (staining, inclusion, destruction), or displaying a message on a display screen 130 of the transport device).
  • Signals emitted by the means 18 to the system of monitoring 22 pass through the circuit 118, the interface 114 and the socket 16.
  • Power supply means 119 such as a battery, contained in the transport device according to the invention are also connected to the means 18, and in particular to means 120 for regulating the voltage.
  • the latter are themselves connected to means 122 for switching the supply which supply a voltage V DC to the microprocessor 100 and a supply voltage to the interface circuit 114.
  • the regulation means 120 can also be connected to a charger 127, which can itself be connected to a DC charger 125 and a diode 123 for indicating the state of charge of the battery.
  • backup accumulator means 124 can be provided, which feed the interface 114.
  • the means 124 backup accumulators also allow establish communication with the supervisor 22, when the battery or voltage supply means are completely destroyed, for example to the outcome of an inclusion operation, or staining, or destruction. So, the opening command of the device can be operated without resorting to mechanical means of the crowbar type.
  • the means 119 and 124 are also shown in FIG. 5A, in position in the wall of the suitcase 60.
  • All the means 18 can be realized using circuits printed matter, the temperature and hygrometry sensors can be themselves soldered on the printed circuit board.
  • the meshes 106, 108, the opening contact 96 are themselves connected to the electronic card by soldered wires. Two soldered wires also enable the card to be connected to the locking means of the transport.
  • the transport device according to the invention can, according to a variant, be equipped with means to locate it continuously during transport.
  • a GPS location can be performed.
  • transmitter / receiver (GPS) means are arranged in the transport device according to the invention.
  • the latter can therefore receive at any time information on his position.
  • means for example transmitter / receiver means to re-transmit or receive RF signals to and from, Surveillance system.
  • the latter is also equipped with transmitter / receiver RF signals. It then processes the signals received from the transport and containing information on the position of the latter, and thus controls the journey of the latter.
  • the system monitoring can send a trigger signal means of neutralization transported content.
  • the transport operation preferably begins, for reasons of in the premises where the means of control are installed.
  • Values or documents or items to be transported will have previously loaded into the device 2, 60 or the carrying case, or are loaded into this device or this briefcase in the premises of the means of control 22.
  • the supervisor 22 receives information about the recipient of the content, for example in the form of a telephone number. This operation can be done automatically after a dialogue with the computer system 22 from the operator, or by manual entry.
  • the local telephone line 56 is connected to the container.
  • a telephone call is established between the supervisor 22 and containing 2 or 60.
  • Confidential information can then be exchanged. They will be used during the procedure of opening the container.
  • the control system 22 can on this occasion check the status of the 119 battery and sensors.
  • the corresponding information can be displayed on the control screen and / or on an LCD display and / or be memorized.
  • An account rendered may then be sent to the operator's computer system and a armament confirmation slip can be printed.
  • the local telephone line 56 is then disconnected, and the container is delivered to the carrier.
  • the disarming operation of the device can be done at the customer who comes into possession of the container, or at the operator who recovers a non-empty container. In both cases, the goal is to open without provoking neutralization of the content.
  • This operation is done under the supervision of the supervisor 22, after connection of the container on a specific telephone line, provided initially.
  • a container connection to the local or direct phone line is realized. This connection leads to an automatic line take and the dialing a phone number which is in this case the phone number supervisor 22.
  • a communication between the supervisor 22 and the container is then established.
  • the authorization to open the container is done after checking the confidential information loaded during the arming operation, and in particular of the identity of the recipient. Detecting a defect can end the procedure for opening the container.
  • This authorization is then issued. This authorization may be valid for a certain period only, for example for 10 s.
  • the container is open, which can be immediately reported to supervisor 22, with, for example, display in a table of Supervisor Events 22 and / or Reporting to the System IT of the operator.
  • the telephone line is then disconnected.
  • This automatic redial feature of the phone number can be blocked after a certain delay (for example: 1 min) so that during the operation of disarming, the customer or the recipient remains in front of the container.
  • the control device 18 can also be programmed to make impossible any opening after several (for example: three) attempts successive openings. The device then returns for example to the operator, only authorized to intervene.
  • the display means signal to the user that opening of the container can not take place.
  • This override command can also be triggered at by the supervisor 22. This allows the operator to intervene on containers that have been reported to be stolen.
  • the container may be redirected to the surveillance system, which may assign it to the transport of another object at another recipient.
  • the email address or identification of the new recipient may be registered in the system of surveillance 22, to verify the identity of the new recipient, after delivery and before opening.
  • the container can be loaded with another object to a first recipient, then sent directly to a second recipient without first being sent back to the surveillance system.
  • the new email address or the new number identification of the new recipient may also be transmitted during this connection.
  • this new electronic address or this new identification number may have been previously established and stored at the time of preparation of the container at the operator of the surveillance system, before shipping to the first recipient.
  • the means or the electronic card 18 do not yet have identification.
  • An operation allows to assign a number to the container, to copy this number in the nonvolatile memory 102 of the card 18, and to add this new number in a database maintained by the supervisor 24. This operation can be done during the container connection on a local line 56 ( Figure 4). This operation also allows to associate a given container with a given operator name 24, and thus to prohibit exploitation with the supervisory device 22 of another operator.
  • This identification data may be part of the data sent by the container to the supervisory system 22, after it has been received by a recipient and its connection to the network, at this recipient. This data is first verified (Is the transmitter container allowed to work with the supervisor contacted?), then the system 22 performs the verification operations already explained above (verification of the condition of the container and possibly verification of the identity of the recipient).
  • a system according to the invention makes it possible to initialize each of the containers it uses, and manage these different containers through the networks existing.
  • each user or recipient can specify to a manager of a fleet of containers the type of object to be transported, and the type of access to a network that he has.
  • the manager can then identify the content to use, and initialize it according to the procedure already described above.
  • the monitoring system described above can be implemented in connection with a management system of a set of transport devices according to the invention.
  • FIG. 8 represents this embodiment, in which the system Supervisor (or supervisor) is equipped with supervision software on a local computer network 29 and is connected to the local network 150 of the management system (or manager).
  • Reference 22 designates a microcomputer of the monitoring, as for example already described above in connection with the FIGS. 2 and 3, and the reference 42 of the reception centers, such as the one already mentioned below in connection with Figure 4.
  • firewall isolates the two networks.
  • the interconnection between the two networks 29 and 150 is in such a way that the seizure of the transport ticket can also be from the network 29, if necessary.
  • the supervisor ensures, or is specially programmed to ensure, the programming of containers and receiving remote calls.
  • the first procedure described is the departure of luggage from central or the surveillance system.
  • the manager begins by opening his own screen entry screen. mission (using a PC or PC 171), and accesses the disk supervisor computer 29.
  • Each parameter is then transmitted to the database of the supervisor disk 29, by any computer means of the manager 150.
  • the application of the manager 150 requests to validate the input screen, and installs these data in a table of delivery notes, included in a "Edit" table, before programming the bag.
  • the operator of the manager fills the bag with its contents, and his delivery note. He locks the suitcase. He sticks the label of the recipient and transmits the bag to the shipping service 160 (which has a microcomputer or PC 161).
  • the operator of the system 29 or dispatch service 160 connects the suitcase to a programming line. The transaction is then done for him in blind (without a screen) and this time it is processed directly by the system 29.
  • ephemeral codes are not chosen in drop-down list, but are preferably generated randomly at each internal or external transaction request.
  • the code is delivered encrypted.
  • Some customers will then be able to get an empty suitcase, for example as an additional service or as a replacement for a defective bag during a tour request.
  • the procedure for returning the bag can be as follows.
  • the suitcase returns to maintenance 154 for diagnosis.
  • Maintenance recovers content orphaned and forwarded it to manager 150 for a new expedition.
  • the manager can enter a second time this delivery slip, since it is seen by the supervisor in the file of "delivery notes entered but not Treaties ".
  • At least one PC 156 is dedicated to maintenance operations. of the Receiving cards or programming cards are connected to this PC.
  • reception centers 42 belonging to to the monitoring system can open or program suitcases depending internal cards they have. But the opening will be refused to a receiving center if the bag arrives directly from the programming without have made its remote opening at the customer.
  • the maintenance 154 has access to all the parameters described in the programming procedure, except for clear reading of ephemeral codes. During the return a suitcase directly from the programming, so it can open the suitcase by a banal procedure if it is not armed, or by exchanging the ephemeral maintenance code associated with the mission, if the suitcase is full.
  • the tooling of the service 152 for receiving the suitcases is composed only reception center. No PC is required. The operator is called recipient.
  • the supervisor After connecting the bag in return for the customer, the supervisor analyze its state and status.
  • the diode of the case lights up (the opening is possible), and the receiver disconnects the bag and sends it to the battery pack for recirculation.
  • the receiver retrieves the contents and delivers the bag to the maintenance for perform technical tests and maintenance.
  • the LED in the bag flashes quickly at the receiving service.
  • the transition to maintenance can detect the client's procedural error by noting that the suitcase is full.
  • the reception service sends it directly to maintenance. More generally, all the different cases of cases A) and C) lead the bag into maintenance.
  • the computer system will treat all the cases in anomaly.
  • the receiver transmits the bag to the maintenance.
  • the maintenance 154 connects the bag and reads on its screen the last transaction (customer code, delivery person, requested tour to etc ). She finds the destination error and open the case from the ephemeral code of the client recipient.
  • the supervisor manages the fleet of suitcases on mission. He knows how to distinguish list of the bags present in the central office (available in stock + in charge of battery + in maintenance + under repair) from the list of cases in mission (in departure from the central + on tour + in stock at the customers + lost + stolen).
  • the last point is random by the very nature of the procedure (without flow management constraint for the client).
  • the second point is uncertain because the destination of the bags is known until an outside event decides otherwise (loss, theft, tour demand, etc.).
  • the customer is re-launched, before being inked or neutralized, to avoid that the customer forgets to open his suitcase.
  • the procedure of starting a full suitcase, from a customer to a another customer without going through the central office or the supervisor (this is then a traffic or a tour of the bag), may be the following.
  • the client informs a server to be defined by the manager (minitel, voice guide ).
  • Supervisor 29 changes the status of the bag from "expected full “to” on tour ".
  • the client has filled and closed (locked) his suitcase. He connects her to her telephone jack permitted.
  • the bag then calls the supervisor 29.
  • the latter recognizes the suitcase number and accepts / refuses the transaction. depending on the status of the bag (lost, stolen %) or a possible incident of connection (wrong jack connected).
  • a diode may blink slowly to signal acceptance of the transaction.
  • the supervisor associates this connection with the request made above by the client on the server, and proceed to test the technical elements of the bag (battery, full case, sensor circuit ). It sends the encrypted ephemeral code of the tour, and the ephemeral encrypted code of the maintenance associated with this tour.
  • the suitcase is then armed.
  • the diode stabilizes on to signal a correct transaction. In this case, there is no limit on the ignition time of the diode, such as when requesting a remote opening of a suitcase full.
  • the customer can remove the plug. It sets the packing slip on the bag and proceeds to the expedition itself.
  • the customer To retrieve the contents of his suitcase before resending it empty, the customer must then reiterate the connection of the bag. It is the supervisor who delivers in this case an opening order on the unarmed suitcase. If the suitcase does not open and that the LED flashes quickly, the customer then applies a return instruction secure the suitcase.
  • the bag must have been used by the sending customer for the last opening. The transaction will therefore be refused in the terms if the suitcase comes from a third party who has stored it, but who is not a customer or recipient.
  • the physical limit of a suitcase tour is related to the expense of its drums. Some customers may be allowed to hold a fast battery charger allowing a charge with the lid of the suitcase open.
  • the status of a suitcase that is at the customer, but not yet scheduled for a tour is that of a suitcase expected at the central or by the supervisor.
  • Program instructions for implementing a method according to the invention are stored in a memory zone of the surveillance system 22 and / or 29 and. management system 150. These instructions are example installed from a device that can be read by the system 22 and / or 29 and on which they are recorded.
  • a device that can be read by the system 22 and / or 29 and on which they are recorded.
  • Such support can for example a hard disk, a ROM, an optical disk compact, DRAM dynamic random access memory or any other type of memory RAM, a magnetic or optical storage element, registers or other volatile and / or nonvolatile memories.
  • a monitoring device further comprises means for or specially programmed to receive a communication request signal transmitted by the container, when it is connected to the communication network.
  • a communication fault signal is sent to the means which contain the object when, after connecting it to the network of communication, communication is not established.
  • a signal can be emitted by the closed container and to the means 22 for monitoring, when the container fails to open after reception by the latter of the signal opening issued by the monitoring means 22.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
  • Forklifts And Lifting Vehicles (AREA)
  • Warehouses Or Storage Devices (AREA)
  • Pallets (AREA)
  • Control Of Conveyors (AREA)
  • Refuse Collection And Transfer (AREA)
  • Details Of Rigid Or Semi-Rigid Containers (AREA)
  • Attitude Control For Articles On Conveyors (AREA)
  • Chain Conveyers (AREA)
  • Auxiliary Devices For And Details Of Packaging Control (AREA)

Claims (48)

  1. Vorrichtung (2, 48, 50, 52, 54, 60) zum sicheren Transport eines Gegenstandes (3), umfassend:
    Mittel (4, 6, 78, 80) zum Enthalten eines zu transportierenden Gegenstandes (3), oder Behälter, und Schließmittel (6, 8, 10, 14, 82, 84, 90) zum Verschließen der Mittel (4, 6, 78, 80) zum Enthalten eines Gegenstandes oder des Behälters, dadurch gekennzeichnet, daß sie außerdem umfaßt:
    Kommunikationsmittel (16, 18) zum Verbinden der Mittel zum Enthalten eines Gegenstandes oder des Behälters mit einem Kommunikationsnetzwerk (20) und zum Senden über das Kommunikationsnetzwerk (20) von einem Signal, das einen Zustand des Mittels zum Enthalten des Gegenstandes oder Behälter betrifft, und
    Empfangsmittel (16, 18) zum Empfang eines Öffnungssignals der Mittel zum Schließen der Mittel zum Enthalten des Gegenstandes.
  2. Vorrichtung nach Anspruch 1, worin die Kommunikationsmittel (16, 18) vorgesehen sind, um ein codiertes oder verschlüsseltes Signal zu senden, das einen Zustand des Mittels zum Enthalten des Gegenstandes betrifft.
  3. Vorrichtung nach Anspruch 1 oder 2, umfassend Mittel (18, 62, 74, 76, 92, 94, 96, 100) zum Identifizieren oder Detektieren eines normalen oder abnormalen Betätigungszustandes und/oder zum Identifizieren oder Detektieren eines Einbruchs-, Gewaltanwendungs- oder nicht zugelassenen Öffnungsversuchs oder Einbruchs-, Gewaltanwendungs- oder nicht zugelassenen Öffnungsversuchstyps der Transportvorrichtung oder ihrer Schließmittel.
  4. Vorrichtung nach einem der Ansprüche 1 bis 3, weiterhin umfassend Mittel (94) zum Detektieren oder Messen der Temperatur der umgebenden Atmosphäre des Behälters oder in dem Behälter und/oder Mittel zum Detektieren oder Messen des Feuchtigkeitsgrades der umgebenden Atmosphäre oder in der umgebenden Atmosphäre.
  5. Vorrichtung nach einem der Ansprüche 1 bis 4, weiterhin umfassend einen Leiterkreis oder Leiternetzwerk (92), angeordnet in der sicheren Transportvorrichtung, und Mittel (18, 100) zum Detektieren einer Unterbrechung des Kreises oder des Netzwerks.
  6. Vorrichtung nach einem der Ansprüche 1 bis 5, weiterhin umfassend Mittel (62, 70, 72) zum Zerstören, Beschädigen oder Verschmieren eines Gegenstandes, der in den Mitteln (4, 6, 78, 80) zum Enthalten des Gegenstandes enthalten ist.
  7. Vorrichtung nach einem der vorhergehenden Ansprüche, weiterhin umfassend Mittel zur Bestimmung des Ortes der Vorrichtung bei ihrem Transport.
  8. Vorrichtung nach Anspruch 7, weiterhin umfassend Mittel zum Senden und Empfangen von Radiofrequenzsignalen.
  9. Vorrichtung nach einem der Ansprüche 1 bis 8, worin die Kommunikationsmittel Verbindungsmittel (16, 114, 116) zu einem Telefonnetzwerk umfassen.
  10. Vorrichtung nach einem der Ansprüche 1 bis 9, worin die Kommunikationsmittel vorgesehen sind, um automatisch eine Identifikationsnummer eines fernen Postens, Apparats oder Terminals zu wählen, der auch mit dem Kommunikationsnetzwerk nach Verbindung der Transportvorrichtung mit dem Netzwerk verbunden ist.
  11. Vorrichtung nach Anspruch 10, worin die Kommunikationsmittel vorgesehen oder programmiert sind, um die Identifikationsnummer automatisch mehrere Male zu wählen, wenn kein Öffnungssignal empfangen wird oder wenn keine Kommunikation nach dem Verbinden der Kommunikationsmittel mit dem Netzwerk aufgebaut wird.
  12. Vorrichtung nach einem der Ansprüche 1 bis 11, weiterhin umfassend erste elektrische Energieversorgungsmittel (119) zum Liefern elektrischer Energie an die Kommunikationsmittel und/oder Empfangsmittel.
  13. Vorrichtung nach Anspruch 12, weiterhin umfassend zweite elektrische Energieversorgungsmittel (124) zur Versorgung der Kommunikationsmittel im Falle einer Fehlfunktion oder eines schlechten Funktionierens der ersten Versorgungsmittel (119).
  14. Vorrichtung nach einem der Ansprüche 1 bis 13, worin der Behälter das Format eines Briefumschlags oder Pakets hat.
  15. Vorrichtung nach einem der Ansprüche 1 bis 14, worin der Behälter Wände hat, die aus einem flexiblen Material oder Gummi gemacht sind.
  16. Vorrichtung nach einem der Ansprüche 1 bis 15, weiterhin umfassend Speichermittel (102).
  17. Vorrichtung nach einem der Ansprüche 1 bis 16, weiterhin umfassend Anzeigemittel (130).
  18. Vorrichtung (22) zur Überwachung des sicheren Transports eines Gegenstandes (3), der in einem geschlossenen Behälter (4, 6, 78, 80) enthalten ist, wobei die Vorrichtung dadurch gekennzeichnet ist, daß sie umfaßt:
    Mittel (22), die mit einem Kommunikationsnetzwerk (20) verbunden sind, um ein Signal bezüglich eines Zustands des Behälters zu empfangen,
    Mittel (22, 30, 32) zum oder speziell programmiert zum Senden eines Öffnungssignals an den Behälter nach Empfangen und in Abhängigkeit des Signals, das den Zustand des Behälters betrifft.
  19. Vorrichtung nach Anspruch 18, die weiterhin Mittel zum oder speziell programmiert zum Senden eines Signals der Zerstörung, Zerschießens oder Verschmierung des in dem Behälter enthaltenen Gegenstandes umfaßt, wenn das empfangene Signal anzeigt, daß der Behälter überbeansprucht, Gewalt unterzogen oder angegriffen wird oder worden ist durch ein äußeres Mittel oder daß der Behälter noch nach einer vorbestimmten Verschließzeit verschlossen ist.
  20. Vorrichtung nach Anspruch 19, weiterhin umfassend Mittel zur oder speziell programmiert zur vorherigen Entsicherung der Mittel (18, 62, 70, 72) zum Zerstören, Verschmieren oder Zerschießen des in dem Behälter enthaltenen Gegenstands.
  21. Vorrichtung nach Anspruch 20, die mit einer lokalen Kommunikationsleitung verbunden ist, um die Mittel zum Zerstören, Verschmieren oder Zerschießen des Gegenstandes zu entsichern.
  22. Vorrichtung nach einem der Ansprüche 18 bis 21, weiterhin umfassend Mittel, um oder speziell programmiert, um eine Kommunikation mit dem Behälter zu initialisieren, wenn der Behälter mit dem Kommunikationsnetzwerk verbunden wird.
  23. Vorrichtung nach einem der Ansprüche 18 bis 22, weiterhin umfassend Mittel, um oder speziell programmiert, um ein Kommunikationsanfragesignal zu empfangen, daß durch den Behälter ausgesandt wird, wenn der Behälter mit dem Kommunikationsnetzwerk verbunden wird.
  24. Vorrichtung nach einem der Ansprüche 18 bis 23, weiterhin umfassend Mittel (30, 32) zum Speichern eines Identifikationscodes eines Empfängers des transportierten Gegenstands und zum Vergleichen des empfangenen Identifikationscodes mit dem Identifikationscode des Empfängers des Gegenstands.
  25. Vorrichtung nach einem der Ansprüche 18 bis 23, weiterhin umfassend Mittel (30, 32) zum Speichern der Identifikation oder eines Identifikationscodes des Behälters und zum Vergleich des Codes oder der Identifikation mit dem Code oder der Identifikation eines Behälters, der für einen vorgegebenen Empfänger des transportierten Gegenstands vorgesehen ist.
  26. Überwachungsvorrichtung nach einem der Ansprüche 18 bis 23, weiterhin umfassend Sende- und Empfangsmittel von Radiofrequenzsignalen.
  27. Verfahren zum sicheren Transport eines Gegenstandes (3), umfassend:
    Laden des Gegenstandes (3) in Mittel (4, 6, 78, 80) zum Enthalten des Gegenstandes und Verschließen der Mittel,
    Transport des Gegenstandes (3) und der Mittel (4, 6, 78, 80), die ihn enthalten, zu einem ersten vorbestimmten Empfänger, dadurch gekennzeichnet, daß es weiterhin umfaßt:
    Verbinden der Mittel (4, 6, 78, 80), die den Gegenstand enthalten, mit einem Kommunikationsnetzwerk (20), und
    Senden über das Kommunikationsnetzwerk eines Signals, das den Zustand des Mittels betrifft, das den Gegenstand enthält.
  28. Verfahren nach Anspruch 27, weiterhin umfassend empfangen eines Signals zum Öffnen der Mittel, die den Gegenstand enthalten, wenn das durch den Behälter übermittelte Zustandssignal anzeigt, daß dieser in einem vorbestimmten Normalzustand ist.
  29. Verfahren nach Anspruch 27 oder 28, einschließend, vor dem Transportschritt einen vorläufigen Schritt der Entsicherung von Mitteln (18, 62) zur Zerstörung oder Verschmierung oder Zerschießen des in dem Behälter enthaltenen Gegenstandes.
  30. Verfahren nach Anspruch 29, weiterhin umfassend die Zerstörung oder Verschmierung des in dem Behälter enthaltenen Gegenstandes, wenn das durch den Behälter übermittelte Zustandssignal, anzeigt, daß er in einem anderen Zustand als dem vorbestimmten Normalzustand vorliegt oder, daß es überbeansprucht worden ist oder angegriffen worden ist durch ein äußeres Reagenz oder daß der Behälter noch nach einer vorbestimmten Verschließzeit verschlossen ist.
  31. Verfahren nach einem der Ansprüche 27 bis 30, worin das Kommunikationsnetzwerk ein Telefonnetzwerk ist.
  32. Verfahren nach Anspruch 31, worin das Kommunikationsnetzwerk ein analoges Telefonnetzwerk ist.
  33. Verfahren nach einem der Ansprüche 27 bis 30, worin das Kommunikationsnetzwerk ein elektronisches Kommunikationsnetzwerk ist.
  34. Verfahren nach einem der Ansprüche 27 bis 33, worin ein Kommunikationsfehlersignal an den Gegenstand enthaltende Mittel gesandt wird, wenn keine Kommunikation nach dem Verbinden von jenem mit dem Kommunikationsnetzwerk die Kommunikation nicht aufgebaut wird.
  35. Verfahren nach einem der Ansprüche 27 bis 34 umfassend, nach Verbindung der, den Gegenstand enthaltenden Mittel mit dem Kommunikationsnetzwerk (20), das Senden eines Identifikationssignals des wirklichen Empfängers des Gegenstands (3) und des Behälters.
  36. Verfahren nach Anspruch 35, weiterhin umfassend das Senden eines Signals zur Identifikation der Mittel zum Enthalten des Gegenstands.
  37. Verfahren nach einem der Ansprüche 27 bis 36, einschließend einen vorherigen Schritt zum Speichern eines Identifikationscodes wenigstens eines Empfängers des zu transportierenden Behälters in einem Datenverarbeitungssystem.
  38. Verfahren nach einem der Ansprüche 27 bis 37, worin eine Vielzahl von Empfängern des zu transportierenden Behälters vorbestimmt wird oder auch eine Vielzahl von Identifikationscodes mehrerer Empfänger des Behälters im Speicher vorbestimmt wird.
  39. Verfahren nach einem der Ansprüche 27 bis 38, umfassend, nach Öffnung des Behälters, das Schließen der Mittel (4, 6, 78, 80) zum Enthalten desselben Gegenstands oder eines anderen Gegenstands und:
    Transportieren des Gegenstandes (3) und der Mittel (4, 6, 78, 80), die ihn enthalten zu einem zweiten Empfänger,
    Verbinden der Mittel (4, 6, 78, 80), die den Gegenstand enthalten mit einem Kommunikationsnetzwerk (20),
    Senden eines Signals über das Kommunikationsnetzwerk, das den Zustand der Mittel betrifft, die den Gegenstand enthalten.
  40. Verfahren zum Überwachen des sicheren Transports eines Gegenstands (3), der in einem verschlossenen Behälter (4, 6, 78, 80) enthalten ist, welches Verfahren dadurch gekennzeichnet ist, daß es umfaßt:
    den Empfang durch mit einem Kommunikationsnetzwerk (20) verbundene Mittel (22), eines Signals bezüglich des Zustands des Behälters nach Verbindung des Behälters mit dem Netzwerk,
    Senden eines Öffnungssignals an den Behälter nach Empfangen des Signals, bezüglich des Zustands des Behälters oder Neutralisieren oder Zerstören oder Verschmieren oder Zerschießen des Gegenstands (3), der in dem Behälter enthalten ist, wenn das durch den Behälter übermittelte Signal anzeigt, daß dieser überbeansprucht oder mit Gewalt behandelt oder angegriffen worden ist durch ein äußeres Mittel oder daß der Behälter noch nach einer vorbestimmten Verschließzeit verschlossen ist.
  41. Überwachungsverfahren nach Anspruch 40, umfassend einen vorherigen Schritt der Entsicherung der Sicherungsmittel zum Neutralisieren oder Zerstören oder Beschädigen oder Verschmieren oder Durchführen eines Zerschießens des Gegenstands (3), der in dem Behälter enthalten ist.
  42. Verfahren nach Anspruch 41, worin die vorherige Entsicherung der Sicherungsmittel durch Mittel (22) ausgeführt wird, die mit dem Kommunikationsnetzwerk (20) verbunden sind.
  43. Verfahren nach Anspruch 42, worin die Mittel (22), die mit einem Kommunikationsnetzwerk verbunden sind, auch mit einem lokalen Kommunikationsnetzwerk (56) verbunden sind und die vorherige Entsicherung des Sicherheitssystems durch das lokale Kommunikationsnetzwerk nach Verbindung des Behälters mit dem Kommunikationsnetzwerk durchgeführt wird.
  44. Überwachungsverfahren nach einem der Ansprüche 41 bis 43, umfassend die Sicherung der Sicherheitsmittel, wenn das den Zustand des Behälters betreffende Signal anzeigt, daß der Zustand des Behälters zufriedenstellend ist.
  45. Überwachungsverfahren nach Anspruch 44, worin das Sicherheitssystem nach Entsicherung wieder gesichert wird, wenn der Behälter nach Sicherung nicht geöffnet ist.
  46. Verfahren nach Anspruch 44 oder 45, wobei die Sicherung des Sicherheitssystems durch Senden über das Kommunikationsnetzwerk (20) durch die Überwachungsmittel (22) von einem Sicherungssteuersignal nach Verbinden des geschlossenen Behälters mit dem Netzwerk stattfindet.
  47. Überwachungsverfahren nach einem der Ansprüche 40 bis 46, weiterhin umfassend das Senden eines Signals des geschlossenen Behälters an die Überwachungsmittel (22) im Falle eines Behälteröffnungsfehlers nach Empfang durch diesen letzteren des Öffnungssignals, das durch die Überwachungsmittel (22) ausgesandt wird.
  48. Verfahren nach einem der Ansprüche 40 bis 47, worin die Mittel (22), die mit einem Kommunikationsnetzwerk verbunden sind, ein Signal oder einen Identifikationscode eines wirklichen Empfängers des Behälters oder eines Ortes vergleichen, an dem sich der Behälter befindet, mit einem Identifikationssignal eines gewünschten Empfängers des Behälters oder eines Ortes, an den der Behälter vorgesehen oder zu transportieren ist.
EP01907805A 2000-02-16 2001-02-15 Vorrichtung und verfahren zum sicheren transport eines gegenstandes Expired - Lifetime EP1255906B1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0001887A FR2804994B1 (fr) 2000-02-16 2000-02-16 Dispositif et procede de transport securise d'un objet
FR0001887 2000-02-16
PCT/FR2001/000445 WO2001061134A1 (fr) 2000-02-16 2001-02-15 Dispositif et procede de transport securise d'un objet

Publications (2)

Publication Number Publication Date
EP1255906A1 EP1255906A1 (de) 2002-11-13
EP1255906B1 true EP1255906B1 (de) 2005-09-07

Family

ID=8847037

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01907805A Expired - Lifetime EP1255906B1 (de) 2000-02-16 2001-02-15 Vorrichtung und verfahren zum sicheren transport eines gegenstandes

Country Status (9)

Country Link
US (1) US20030011466A1 (de)
EP (1) EP1255906B1 (de)
AT (1) ATE304111T1 (de)
AU (1) AU2001235683A1 (de)
CA (1) CA2400392A1 (de)
DE (1) DE60113234T2 (de)
ES (1) ES2249412T3 (de)
FR (1) FR2804994B1 (de)
WO (1) WO2001061134A1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005003150A1 (de) * 2005-01-21 2006-07-27 OECON Ingenieurgesellschaft für Industrieberatung und Projektmanagement mbh Sicherungsbehälter

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USD339928S (en) * 1991-05-23 1993-10-05 John Caldwell Chair
SE520944C2 (sv) * 2002-01-22 2003-09-16 Sqs Ab Förfarande vid öppning av en transporterbar behållare samt anordning för genomförandet av förfarandet
US6965310B1 (en) * 2002-10-04 2005-11-15 Gauging Systems, Inc. Remote notification method
FR2846361B1 (fr) * 2002-10-29 2005-06-24 Brinks France Dispositif de securite pour le transport et/ou le stockage de valeurs papier
US6864791B1 (en) * 2003-01-22 2005-03-08 Rackel Industries Ltd. Security bag
GB0306987D0 (en) * 2003-03-26 2003-04-30 Johnson Security Ltd Security containers
JP2005018644A (ja) * 2003-06-27 2005-01-20 Aruze Corp 貨幣取扱装置
US7088257B2 (en) * 2004-06-10 2006-08-08 David Weekes Systems and apparatus for secure shipping
US7088252B2 (en) * 2004-06-10 2006-08-08 David Weekes Systems and apparatus for personal security
US7088229B2 (en) * 2004-06-14 2006-08-08 Oracle International Corporation Methods and systems for verifying the position and status of hierarchically arranged objects
SE531325C2 (sv) * 2004-09-08 2009-02-24 Gunnebo Cash Automation Ab Sedelhanteringssystem för detaljhandeln innefattande kassett
US7444946B2 (en) * 2004-09-14 2008-11-04 Halliburton Energy Services, Inc. Material management apparatus, systems, and methods
EP1797269B1 (de) * 2004-10-01 2013-05-29 Peter Villiger Multifunktionales, tragbares sicherheitssystem
US7385507B2 (en) * 2004-12-17 2008-06-10 Simpson Anthony T Security case
WO2006094962A1 (de) * 2005-03-07 2006-09-14 Peter Villiger Verfahren und gesamtsystem zum sicheren transportieren von wertgegenständen
US20060238347A1 (en) * 2005-04-22 2006-10-26 W.R. Parkinson, Co., Inc. Object tracking system
SE532088C2 (sv) * 2005-09-28 2009-10-20 Sqs Ab Förfarande vid hantering av värdeföremål
WO2007036915A1 (en) * 2005-09-29 2007-04-05 Deposita Systems (Pty) Limited An automatic banking machine
US7719419B2 (en) * 2005-11-02 2010-05-18 Honeywell International Inc. Intrusion detection using pseudo-random binary sequences
US7535358B2 (en) * 2006-03-15 2009-05-19 Elaine A. Crider Method and apparatus for electronically tracking luggage
US20100113143A1 (en) * 2007-04-24 2010-05-06 Wms Gaming ,Inc. Securing mobile wagering game machines
FR2922577B1 (fr) * 2007-10-19 2014-06-06 Idips Imp Distribution Installation De Produits De Securite Systeme de detection miniaturise integre dans un systeme electronique a microprocesseur de verrouillage et deverouillage de meubles de securite
US20170059233A1 (en) * 2015-08-29 2017-03-02 Danby Products Limited Appliance improvements
US11274876B2 (en) * 2007-12-28 2022-03-15 Intirion Corporation Multiple linked appliance with auxiliary outlet
DE102008011404A1 (de) * 2008-02-27 2009-09-03 Wincor Nixdorf International Gmbh Dokumentenkassette
US9024722B2 (en) * 2008-06-16 2015-05-05 Bank Of America Corporation Remote identification equipped self-service monetary item handling device
US8094021B2 (en) * 2008-06-16 2012-01-10 Bank Of America Corporation Monetary package security during transport through cash supply chain
US8556167B1 (en) 2008-06-16 2013-10-15 Bank Of America Corporation Prediction of future cash supply chain status
US8210429B1 (en) 2008-10-31 2012-07-03 Bank Of America Corporation On demand transportation for cash handling device
DE102010016808A1 (de) * 2010-05-05 2011-11-10 Wincor Nixdorf International Gmbh Vorrichtung zum Transport und/oder zur Aufbewahrung von Wertscheinen
DE102010060379A1 (de) * 2010-11-05 2012-05-10 Wincor Nixdorf International Gmbh Geldkassette mit Mitteln zur Detektion von Manipulationsversuchen
US20120273314A1 (en) * 2011-04-27 2012-11-01 Raymond Lindsey M Wheeled luggage assembly
US9928387B2 (en) * 2013-03-15 2018-03-27 Charles Hallinan Security case
AU2012350416A1 (en) * 2011-12-12 2014-07-03 David BERGER Transportable safe
US9732550B2 (en) 2012-08-10 2017-08-15 Coolsafe Enterprises Inc. Storage assembly having user-accessible compartments categorized by different levels of user access
ES2532653B1 (es) * 2013-09-30 2016-01-05 Intelligent Data, S.L. Dispositivo electrónico de pago
GB201404502D0 (en) * 2014-03-13 2014-04-30 Patronus Cash Systems Ltd Cash spoiling system
US20160058149A1 (en) * 2014-08-26 2016-03-03 Selvakumari Dhanasekaran Purse with weight scale and locating device
EP3173736A1 (de) * 2015-11-24 2017-05-31 Leica Geosystems AG Schutzbehälter für vermessungsgeräte
JP6421763B2 (ja) * 2016-01-13 2018-11-14 トヨタ自動車株式会社 湿度センサの異常検出装置
EP3336781A1 (de) * 2016-12-13 2018-06-20 Sigma-Aldrich International GmbH Elektronikbaugruppe zur drahtlosen übertragung von mindestens einer statusinformation
EP3379015A1 (de) * 2017-03-21 2018-09-26 STMicroelectronics (Grand Ouest) SAS Kontrollverfahren und -system eines objekts, das dazu bestimmt ist, von mehreren potenziellen benutzern geteilt zu werden
IT201700034089A1 (it) * 2017-03-28 2018-09-28 Prima Ricerca & Sviluppo Srl Cassetta di sicurezza e relativo sistema per la spedizione sicura di oggetti di valore.
US10515518B2 (en) 2017-05-18 2019-12-24 Bank Of America Corporation System for providing on-demand resource delivery to resource dispensers
US10217084B2 (en) 2017-05-18 2019-02-26 Bank Of America Corporation System for processing resource deposits
US10275972B2 (en) 2017-05-18 2019-04-30 Bank Of America Corporation System for generating and providing sealed containers of traceable resources
GB201719396D0 (en) * 2017-11-22 2018-01-03 Walsh Timothy Neville Tamper detection system
DE102018007564A1 (de) * 2018-09-24 2020-03-26 Giesecke+Devrient Currency Technology Gmbh Anordnung und Verfahren zur Bearbeitung von Wertdokumenten
US11127280B2 (en) * 2018-09-29 2021-09-21 Fiv (Fast Identification Vests), L.L.C. Emergency identification system
WO2020154790A1 (en) * 2019-01-28 2020-08-06 Eria Smart Technologies, Inc. Storage system with remote monitoring and management capabilities
USD978476S1 (en) * 2019-05-23 2023-02-14 Harex Infotech Inc. Automated teller machine
USD880103S1 (en) * 2019-09-05 2020-03-31 Clevermade, Llc Secured container
USD880102S1 (en) * 2019-09-05 2020-03-31 Clevermade, Llc Secured container
CN115735237A (zh) * 2020-06-30 2023-03-03 锡克拜控股有限公司 用于存储或运输有价文件的安全容器以及用于有价文件的安全存储和运输的***

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ZA944849B (en) * 1993-04-05 1995-03-20 First National Bank Of Souther A system for the secure transportation of articles
US6046678A (en) * 1994-09-08 2000-04-04 Wilk; Peter J. Protective device for storage and transport containers
FR2751111B1 (fr) * 1996-07-10 1998-10-09 Axytrans Systeme de transport securise d'objets en conteneur inviolable dont au moins une station destinatiare est mobile et transportable
US6057779A (en) * 1997-08-14 2000-05-02 Micron Technology, Inc. Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005003150A1 (de) * 2005-01-21 2006-07-27 OECON Ingenieurgesellschaft für Industrieberatung und Projektmanagement mbh Sicherungsbehälter
DE102005003150B4 (de) * 2005-01-21 2007-02-08 OECON Ingenieurgesellschaft für Industrieberatung und Projektmanagement mbh Sicherungsbehälter

Also Published As

Publication number Publication date
DE60113234D1 (de) 2005-10-13
DE60113234T2 (de) 2006-07-13
ES2249412T3 (es) 2006-04-01
FR2804994A1 (fr) 2001-08-17
WO2001061134A1 (fr) 2001-08-23
EP1255906A1 (de) 2002-11-13
AU2001235683A1 (en) 2001-08-27
CA2400392A1 (fr) 2001-08-23
US20030011466A1 (en) 2003-01-16
FR2804994B1 (fr) 2003-06-27
ATE304111T1 (de) 2005-09-15

Similar Documents

Publication Publication Date Title
EP1255906B1 (de) Vorrichtung und verfahren zum sicheren transport eines gegenstandes
EP1593099B1 (de) Aufbewahrungsvorrichtung und verfahren für das einlegen und ausgeben eines gegenstandes in eine aufbewahrungsvorrichtung
US7936266B2 (en) Shipping container seal monitoring device, system and method
RU2523966C2 (ru) Защитное устройство
PT1237445E (pt) Sistema de entrega ou levantamento seguro
US7088257B2 (en) Systems and apparatus for secure shipping
EP1766587B1 (de) Sicheres transportverfahren für wertdokumente und wertgegenstände sowie behälter zur ausführung dieses verfahrens
EP1276946B1 (de) Verfahren zum schliessen und öffnen eines behälters
CA2294084C (fr) Installation de suivi de bouteilles de gaz
EP3752990A1 (de) Vorrichtung zur aufbewahrung von gegenständen und verfahren mit verwendung einer solchen vorrichtung
US7602294B2 (en) Across the pavement wireless security system
EP3257028B1 (de) Halbautomatische anzeigeeinheit für gaszylinder und zugehöriges verfahren
EP1961903A2 (de) Gestell für den Transport von Wertgegenständen
EP2297714B1 (de) Einrichtung und verfahren zum prüfen der integrität physischer objekte
EP1236855B1 (de) Regel- und Steuervorrichtung zur Überwachung, zur Neutralisation und/oder zur Vernichtung von Wertsachen, Dokumenten und/oder Gegenständen
WO2008031115A1 (en) Cash deposit terminal and associated cash transport security system
EP2261865A1 (de) Dynamisches Überwachungsverfahren des Warentransports und Lagervorrichtung für diese Waren
EP2913462A1 (de) Perfektionierter Kasten und sein Funktionsverfahren
FR2726659A1 (fr) Dispositif et procede de telesurveillance d'objets deposes dans un local
FR2811211A1 (fr) Dispositif de livraison a domicile, systeme et procede pour gerer des livraisons a domicile mettant en oeuvre ce dispositif
FR2899988A1 (fr) Procede et dispositif qui permettent d'assurer le depot, le retrait et le transport d'une lettre et/ou d'un colis
FR2784775A1 (fr) Systeme pour la protection des marchandises transportees par un vehicule
FR2805561A1 (fr) Dispositif electronique permettant d'utiliser une combinaison a usage unique pour le deverrouillage d'une serrure electronique autonome
WO1996038824A1 (fr) Dispositif pour le rangement de petits objets et pour la gestion et la surveillance des entrees et sorties de ces petits objets
ITVR940036U1 (it) Metodo di sicurezza per la distribuzione e la raccolta di oggetti tra uno o piu' centri di smistamento ed una pluralita' di stazioni perife-

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020809

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RIN1 Information on inventor provided before grant (corrected)

Inventor name: LEGORJUS, PHILIPPE

Inventor name: CARADONNA, BENITO-JEAN

Inventor name: SAMUEL, FRANCIS

Inventor name: RICHARD, ALAIN

Inventor name: LAURENT, PHILIPPE

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: INTACTUS

17Q First examination report despatched

Effective date: 20040421

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20050907

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REF Corresponds to:

Ref document number: 60113234

Country of ref document: DE

Date of ref document: 20051013

Kind code of ref document: P

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051207

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051207

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051207

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: MICHELI & CIE INGENIEURS-CONSEILS

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 20060109

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20060228

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20060228

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2249412

Country of ref document: ES

Kind code of ref document: T3

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20060608

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20070117

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 20070118

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IE

Payment date: 20070123

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PT

Payment date: 20070129

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20070209

Year of fee payment: 7

Ref country code: GB

Payment date: 20070209

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20070215

Year of fee payment: 7

Ref country code: ES

Payment date: 20070215

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20070228

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20070702

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20071128

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20050907

REG Reference to a national code

Ref country code: PT

Ref legal event code: MM4A

Free format text: LAPSE DUE TO NON-PAYMENT OF FEES

Effective date: 20080818

BERE Be: lapsed

Owner name: *INTACTUS

Effective date: 20080228

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20080215

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080818

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080229

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080229

NLV4 Nl: lapsed or anulled due to non-payment of the annual fee

Effective date: 20080901

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080215

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20050907

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080901

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080902

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080215

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080228

REG Reference to a national code

Ref country code: ES

Ref legal event code: FD2A

Effective date: 20080216

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080215

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080216

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20080215

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20091030

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20090302