ENTITY MANAGEMENT METHOD AND SYSTEM USING WIRELESS DEVICES
A method of providing information about a plurality of entities within a cash processing centre, the method comprising coupling a first entity with a first wireless device, coupling a second entity with a second wireless device, reading data associated with both the first and second wireless devices, pairing data associated with both the first and second wireless devices and retrieving information concerning the relationship between the first entity and the second entity based on the pairing. The entities are typically objects within the centre and the wireless devices are transmitters and/or receivers.
Latest De La Rue International Limited Patents:
The present invention relates to a vault management system for a cash processing centre. In particular, the present invention relates to systems and methods of efficiently managing entities within a cash processing centre using wireless devices.
The management of cash and other articles of value is vital for the functioning of a healthy modern economy. Often the processing and management of cash and other articles of value is unseen by the consumer yet plays an important role in a variety of sectors including retail, banking, gaming, and government. Most forms of management involve controlling and securing the circulation of cash, such as banknotes and coins, and other articles of value such as cheques, tokens or bonds.
The circulation of cash is typically centred on the secure deposit and storage of quantities of currency. This process is typically performed at one or more secure storage areas or vaults. These vaults may be a safe or physically secure building. Cash and other articles of value are deposited into a vault and then subsequently retrieved from the vault when required. Each vault may be owned and managed by a bank or cash management company. The vault is typically integrated into a larger cash processing centre which is further responsible for handling and verifying cash deposits and preparing cash withdrawals for delivery to customers. A cash processing centre will operate in association with cash in transit (CIT) organisations which are responsible for the security of the cash to and from the centre.
For example, a large retail establishment, at the end of a period of trading, will typically accrue a quantity of cash and other articles of value through retail transactions. As it is impractical and unsafe to keep this cash on the retail premises the cash will typically be sent to a cash processing centre, such as a bank or central deposit, using a CIT operator. The cash processing centre is then responsible for receiving the cash from the CIT operator and storing it in a safe location. Once the quantities of cash have been verified and stored, the verified total of the deposited cash may be credited to the bank account of the retail establishment. In a similar manner, at the beginning of a period of trading, a retail establishment may order a certain quantity of cash to stock the tills or points of sale. This cash will typically be provided by a suitable cash processing centre nearby. At a time stipulated by the cash order the required quantity of cash will be retrieved from the vault and sent to the retail establishment using a CIT operator. Once the cash has been retrieved from the vault and verified it may then be debited from the bank account of the retail establishment. The same processes are also used by high street banks and post offices.
When operating a cash processing centre there are several inherent problems. The first of these is the difficulty in keeping track and control of all the deposits and orders that flow through the vault. For example, a medium to large cash deposit centre may hold thousands if not millions of pounds in a vault at any one time. With such large quantities of cash it is very easy for orders and deposits to be lost or for cash to be stolen by unscrupulous employees or malicious parties. As the cash processing centre would be liable to pay out for any shortfalls in cash amount there is thus a requirement to keep track of all deposits and to prevent theft and loss.
A second problem that arises when dealing with cash processing, and which especially arises with large quantities of cash, is how to process deposits and orders in the quickest possible time. Quick processing is essential in order to prevent cash shortages in the customers requiring cash and also to prevent backlogs within the cash processing centre itself. Many cash processing centres are often constrained by the hours of opening of modern retailers and banks. For example, it is preferable for customers to send cash amounts for deposit after closing in the evening and receive cash orders before opening in the morning. Additionally, much cash processing occurs when customers are closed on the weekend. Hence there is a requirement to quickly perform a deposit and process cash orders within the cash processing centre, not only to reduce costs, but to keep the supply of cash fluid.
A third problem when dealing with cash processing in a cash processing centre is how to efficiently manage a large number of transactions whilst minimising the cash held on site. Modern large cash processing centres can receive hundreds of orders and hundreds of deposits every day requiring large amounts of available stock. If a large stock is required this will increase the attractiveness of the centre to thieves as well as require large amounts of space to be physically secured.
Unfortunately, most cash processing centres involving a vault operated using antiquated technology and procedures which are not able to address the above problems and are not able to keep up with the demands of a modern economy.
According to a first aspect of the present invention, there is provided a method of providing information about a plurality of entities within a cash processing centre, the method comprising:
-
- coupling a first entity with a first wireless device;
- coupling a second entity with a second wireless device;
- reading data associated with both the first and second wireless devices;
- pairing data associated with both the first and second wireless devices;
and
-
- retrieving information concerning the relationship between the first entity and the second entity based on the pairing.
Such a method uses wireless technology to obtain information relating to two entities within a cash processing centre. The entities may be, amongst others, people, machines, computers, articles of value or containers, e.g. any objects or items that have a role within the centre. Coupling an entity with a wireless device may involve physically associating the entity with the device, for example, by attaching or electrically connecting the wireless device to the entity. The wireless devices may comprise wireless transmitters, receivers or transceivers and may use any known wireless technology, such as radio frequency communication.
Such a method enables greater control over entities within a cash processing centre and facilitates their management. The method also enables information detailing a relationship between two entities to be retrieved automatically without human intervention, for example data may be read automatically using radio frequency transceivers and may be automatically processed in conjunction with an external database to retrieve pertinent information. Such a method is important when both the first and second entities belong to respective groups with a large number of respective entities, for example, thousands of containers and hundreds of trolleys or hundreds of employees and hundreds of client workstations. In this situation, there may be many multiple pairings and so both entities need to be identified.
The step of reading data may comprise reading data from the first wireless device and reading data from the second wireless device, wherein said data may comprise identifiers identifying the device. In certain embodiments, it may not be necessary to read an identifier from the second device, for example if its identity is known implicitly by its location within or upon the second entity. In this case the pairing may also be implicit. If the first wireless device is a transmitter and the second wireless device is a receiver, the data associated with the first device, such as a first identifier, may be read from the second device, together with data from the second device. The step of pairing data may comprise pairing the data read from the first wireless device with data read from the second wireless device, for example to produce a tuple. This tuple may be used in a database query to retrieve information concerning the relationship between the two entities, such as the distance between the two entities, whether the first entity is stored on or with the second entity or whether the first entity is authorised to use the second entity. Pairing may cover combining data from both devices in a single data item or may comprise recording data indicating that there is a link between the two entities.
In one embodiment, the first entity comprises a container for storing articles of value and the second entity comprises storage means for one or more containers. In this case, the method may further comprise: storing data comprising the properties of one or more articles of value, for example count, denomination, authentication or fitness information obtained using a banknote counter; associating said data with the first entity, for example, indexing the data using a unique identifier assigned to the first entity; storing the first entity on or within the second entity; and retrieving information comprising the cumulative properties of the articles stored on or within the second entity based on the pairing, for example, the total value of all articles of value on the storage means, or the number of counterfeit notes within the storage means. This last step may be achieved by looking up data relating to the storage means using a second identifier read from the wireless device of the storage means, such as name and location data, processing property data retrieved using a first identifier read from the wireless device of the container and displaying the aforementioned data to an operator.
In one embodiment, the first entity comprises one or more articles of value and the second entity comprises a unit adapted to store articles of value. In this case, the step of retrieving information may comprise retrieving information indicating that the first entity is stored upon the second entity.
In another embodiment, the first wireless device comprises a wireless transmitter configured to transmit a first identifier; the second wireless device comprises a wireless receiver having a second identifier; and the step of reading data comprises: transmitting the first identifier from the wireless transmitter; receiving the first identifier using the wireless receiver; and reading the first identifier received by the wireless receiver from the wireless receiver together with the second identifier, which may be stored within memory within the receiver.
In certain embodiments, the method further comprises determining signal characteristics associated with the received identifier and using the first identifier, the second identifier and the signal characteristics to determine the location of the first entity. In this case, the tuple of paired data is used by a processing system to retrieve information comprising the distance of the first entity from the second entity.
The above method may further comprise receiving the first identifier using one or more additional wireless receivers associated with respective additional entities, said wireless receivers having respective identifiers; pairing the first identifier, second identifier and the one or more additional identifiers, possibly to produce a larger tuple; and using the pairing to determine the location of the first entity, for example using triangulation techniques. Such a method may also comprise determining signal characteristics associated with each received identifier; and using the signal characteristics together with the pairing to determine the location of the first entity. This method may be regularly repeated to dynamically locate the first entity. The second entity and further entities may comprise directional receivers.
The first entity may be one of: a cage, a scanning device, an employee, one or more articles of value, a container, a trolley, or a banknote sorter.
When wireless transmitters and receivers are used the step of retrieving information may comprise determining whether the first entity is authorised to be paired with the second entity and if not generating an alert. In this case data identifying both the first and second entities may be read from wireless devices attached to said entities. This data may be paired and sent to a database to look up a relationship between the entities, for example, whether the first entity was allowed to be used with or placed upon the second entity.
In certain embodiments, the first entity may comprise an operator or a user within the cash processing centre and the step of retrieving information may comprise authenticating the operator using the first identifier, i.e. retrieving information using a tuple containing the first identifier to identify the first entity in a database.
In the method above, the second entity may comprise a device for use in the cash processing centre and the step of retrieving information further may comprise if the operator is authenticated, retrieving user data associated with the operator and based on the user data, determining whether the operator is authorised to use the device, i.e. using the second identifier to identify the second entity in the database and then, once identified, looking for predetermined configurable relationship information concerning the particular two entities. This method may further comprise, if the operator is authorised, allowing access to the device, or if not, denying access to the device and optionally generating an alert. The step of determining whether the operator is authorised to use the device may comprise determining whether the operator is authorised to use any further devices connected to the device; and if so, allowing access to the authorised further devices.
The device may comprise one of: a banknote counter or sorter, a client computing device, or a handheld electronic device.
The wireless devices may comprise radio frequency identification devices.
The first entity may belong to a first group of entities and the second entity may belong to a second group of entities.
According to a second aspect of the present invention there is provided a system for providing information about plurality of entities within a cash processing centre comprising:
-
- a first wireless device coupled to a first entity;
- a second wireless device coupled to a second entity; and
- a processor adapted to:
- read data associated with both the first and second wireless devices;
- pair data associated with both the first and second wireless devices; and
- retrieve information concerning the relationship between the first entity and the second entity based on the pairing.
The first entity may comprise a container for storing articles of value; and the second entity may comprise storage means for one or more containers. In this case, the processor may be further adapted to retrieve information comprising the cumulative properties of the articles stored on or within the second entity based on the pairing, optionally from a database coupled to the processor.
Alternatively, the first entity may comprise one or more articles of value and the second entity may comprise a unit adapted to store articles of value. In this case, the processor may be further adapted to retrieve information indicating that the first entity is stored upon the second entity.
In one embodiment, the first wireless device comprises a wireless transmitter configured to transmit a first identifier and the second wireless device comprises a wireless receiver having a second identifier. In this case the processor may be further adapted to read a first identifier received from the second wireless device, together with the second identifier of said device, and pair said identifiers.
In a first variation, the processor is further adapted to receive signal characteristics associated with the received first identifier; and process the first identifier, the second identifier and the signal characteristics to determine the location of the first entity. In this case, the system may further comprise one or more additional wireless receivers associated with respective additional entities, said wireless receivers having respective additional identifiers. The processor may then be further adapted to receive one or more copies of the first identifier as received by one or more of the additional wireless receivers, together with the additional identifiers of said receivers, pair the first identifier, second identifier and the one or more additional identifiers; and determine the location of the first entity using the pairing. In certain implementations, the processor is adapted to also receive signal characteristics from each wireless receiver; and process the signal characteristics together with the pairing to determine the location of the first entity, possibly repeating the processing steps at regular intervals to dynamically update the location of the first entity. The wireless receivers may comprise directional receivers and the processor may be adapted to determine the location of the first entity using triangulation. In this case, as well as reading identifiers from the devices, extra information such as the signal strength of the received first identifier, as received by a wireless receiver identified by a second identifier is read. In this case, the processor may retrieve further information from a location processing module or from another process being implemented by the processor.
The first entity may be one of: a cage, a scanning device, an employee, one or more articles of value, a container, a trolley, or a banknote sorter.
The system may further comprise a database, for example a database comprising authorisation data. The processor may then be adapted to access the database to determine whether the first entity is authorised to be paired with the second entity; and if not generate an alert. In this case, the information concerning the relationship comprises the authorisation data.
In a particular embodiment, the first entity comprises an operator within the cash processing centre and/or the second entity comprises a device for use in the cash processing centre. The system may then further comprise authorisation/authentication stored in a database. The processor may then be further adapted to access the database to authenticate the operator using the first identifier and/or retrieve authorisation data associated with the operator from the database if the operator is authenticated. Based on the authorisation data, it can be determined whether the operator is authorised to use the device. The processor may be further adapted to: allow access to the device if the operator is authorised, or deny access to the device if the operator is not authorised; and optionally generate an alert if the operator is not authenticated and/or authorised.
The device may comprise one of: a banknote counter or sorter, a client computing device, or a handheld electronic device.
The system may also further comprise one or more further devices connectable to the second entity and the processor may be further adapted to, based on the authorisation data, determine whether the operator is authorised to use any of said further devices and allow access to any connected further devices if the operator is authorised.
According to certain embodiments a method of tracking one or more articles within a cash processing centre, the cash processing centre comprising a plurality of receivers for radio frequency communication may be provided. This method comprises:
-
- a. coupling a radio frequency identification device to an article, the radio frequency identification device having an unique identifier;
- b. receiving a radio frequency signal from the radio frequency identification device at at least two receivers, the radio frequency signal comprising the unique identifier;
- c. using the received radio frequency signal, together with the received unique identifier, to determine the location of the radio frequency identification device; and
- d. updating the location of the article based on the location of the radio frequency identification device.
In some embodiments the method above uses trilateration, wherein the cash processing centre comprises at least three receivers for radio frequency communication and the method further comprises: receiving a radio frequency signal from the radio frequency identification device at at least three access points; and using the signal strength of the received radio frequency signal received at each receiver, together with the received unique identifier, to determine the location of the radio frequency identification device. In other embodiments the receivers comprise directional receivers and step c) comprises determining the location of the radio frequency device using triangulation. The located article may be one of: a cage, a scanning device, an employee, one or more articles of value, a container, a trolley, or a banknote sorter.
According to certain embodiments there is provided a storage unit for containers for use in a cash processing centre, the containers containing one or more articles of value, the storage unit comprising:
-
- a storage area for one or more containers,
the storage unit characterized by:
-
- one or more radio frequency reading devices configured to wirelessly read data from a radio frequency identification device;
- wherein, in use, each container has an associated radio frequency identification device, the radio frequency identification device storing data associated with properties of the articles of value within the container; and
- in use, the properties of any articles of value stored upon the storage unit may be retrieved by processing data read by the one or more radio frequency reading devices.
According to certain embodiments there is provided a method of tracking articles of value within a cash processing centre comprising:
-
- a. coupling one or more articles of value with a first radio frequency identification device;
- b. coupling a unit adapted to store articles of value with a second radio frequency identification device;
- c. reading data associated with both the first and second radio frequency devices; and
- d. recording that the one or more articles of value are stored upon the unit based on the read data.
Several examples of a number of methods and systems according to the present invention will now be described with reference to the accompanying drawings, in which:
The cash processing cycle 100 has three processes that are typically performed in the three respective areas of
The cash processing cycle 100 next comprises vault processing 120. At this stage cash received by the vault 121, for example via entry point 116, may be further counted, verified and validated and placed in bundles of denominations suitable for storage. The vault 121 may comprise one or more cash deposit apparatus such as a TCR (Teller Cash Recycler) Twinsafe or “Vertera” (TM) apparatus supplied by De La Rue International. Alternatively, the vault 121 may comprise a regular safe or vault, wherein documents of value are routed in and out of the safe or vault by hand. In this case vault processing 120 may involve depositing received cash into a suitable deposit apparatus. Cash remains in the vault 121 until it is required to fulfil a cash order. At this point the vault processing 120 involves preparing the required amount of cash to send for order processing 130. The flow of cash from the stage of vault processing 120 to the stage of order processing 130 is represented by arrow 125 and again involves the crossing of figurative boundary 140. This transfer 125 may reflect the physical removal 127 of cash from a safe or secure area 121 via exit point 126 and the transfer of this cash across physical boundary 141 to the order processing area 131.
The third stage of the cash processing cycle 100 is order processing 130. At this stage, quantities of cash are prepared to supply customers, such as, amongst others, retailers and banks. A cash order may be scheduled regularly in the manner of a standing order or may be prepared individually based on a received order. The quantity of cash received from the vault area 121 will typically be counted, bundled and placed in suitable containers or bags for delivery.
An example of suitable hardware that may be used to implement the present invention is illustrated in
Vault management server 210 typically further comprises a network adapter to connect to a wired or wireless network 231, using standards such as Ethernet or 802.11g. Network 231 is typically a local area network (LAN) covering the cash processing centre 105. In
Networked devices 220 and 230 comprise networked client workstations 220A and 220B. Such workstations are typically located in the areas of the cash processing centre 105 shown in
A number of banknote counters 230 may also be connected to the network 231, either through client workstations 220A and 220B or through using a banknote counter 230B with network capability, such as counter 230B, connected to the network 231 via network hub 235. These banknote counters may be a 2600, EV86, Evolution™, nVision or Kalebra model counter manufactured by De La Rue International Limited or may be any suitable one, two or three or more pocket counter that is adapted to count, validate and/or process batches of banknotes. Networked banknote counter 230B may be located in the any of the cash processing centre areas shown in
The example shown in
Vault management system 200 may also comprise a remote client workstation 220C as shown in
Client devices 220 may be any suitable client device known in the art. For example each device could comprise: a personal computer, a thin client workstation, a personal digital assistant (PDA), a smart phone, a cellular phone, a laptop, a multimedia device etc. Typically, such a device comprises data processing and data transfer means. In this description any functionality and/or interfaces provided by client devices 220 are assumed to be appropriately formatted for the hardware of the device. For example, a graphical user interface (GUI) may be implemented in Java with data supplied in eXtended Markup Language (XML) format; in which case there are known techniques to provide said interface and data on a variety of devices from a personal computer to a cellular or mobile telephone.
The vault management system of the present invention is implemented using a number of integrated software modules that correspond to each of the processing stages illustrated in
As well as a suite of modules corresponding to each of the cash management processes of
The GUIs used by the present invention may be pre-designed or may be generated at run-time (i.e. when the vault management system is implemented) from standard controls and components. During development, maintenance or enhancement of the system, one or more user interface “wizards” or guided processes may be provided. These enable non-technical personnel to design interfaces and reduce production times for qualified developers. Each GUI may be further configurable during implementation by selecting controls and components from menus and lists. Certain configuration options may be disabled for certain users.
In certain embodiments of the present invention, the vault management server 210 may be a virtual server, i.e. may be implemented above an underlying host system. This enables the processes of the vault management server 210 to be distributed over one or more physical computers and the processes of the server to be accessed from one or more remote terminals. The physical computers implementing the virtual server may also host one or more additional systems, for example CCTV server 810 as described with reference to
The operations performed in the deposit processing 110 will now be described in relation to
Each received quantity of cash has an associated deposit slip. This deposit slip lists one or more properties related to the received cash, for example, the originating customer or depositor, the declared deposit amount and the date of deposit. Each container containing a quantity of cash also contains a deposit slip. Containers containing other containers may also contain deposit slips relating to the cumulative deposit amount of all contained containers. The deposit slip may also further comprise a one or two dimensional barcode. This barcode may encode a serial number or actual deposit information. At the deposit stage the quantity of cash within each container is linked to the depositor and verified against the deposit amount declared on the deposit slip.
The operator then selects a deposit container for deposit processing 510, opens the container and retrieves the deposit slip. A new deposit record is then created if no pre-existing record exists. The information present on the deposit slip is then obtained 515 using one or more of automatic means, for example scanning a barcode 515A present on a deposit slip or applying optical character recognition (OCR) to a captured image of the deposit software, or using manual means, for example entering the information 515B, 515C into the deposit module GUI. As a deposit operator will regularly spend a large proportion of their time entering deposit information all functions within the deposit module are accessible with keystrokes or by assigning hot keys. If a barcode is present then the operator can use a barcode scanner 225 to either retrieve a serial number or the deposit data itself. A serial number may be linked to a deposit record generated by the depositing customer or may identify the depositor. Other data that maybe recorded include a till, cashier, store or branch identifier. Once the depositor information has been entered then the deposit record is updated 520. If it is not assigned already the cash deposit is assigned to the current operator by associating an operator identifier, such as a user name, with the deposit record. This may be achieved by associating the user name of the current active operator with the deposit record. A cash deposit may also be assigned to an area, for example deposit area 111, as well as, or instead of an operator. This makes the current operator and/or area responsible for the cash deposit until a transfer is performed.
The data present on the deposit slip may also be obtained using pre-advisement. Pre-advisement involves the customer pre-advising the cash processing centre on the nature of a deposit. Typically, this may be performed using a web interface wherein the customer enters the deposit amount and container identifiers while preparing the deposit. In other embodiments, this may be performed using Interactive Voice Response (IVR) technology. This deposit data is then linked to the cash processing centre receiving the deposit. When a container is subsequent sent and received by the cash processing centre the pre-entered deposit information can be retrieved upon container identification, e.g. when the containers making up the deposit are scanned by an operator.
After initial deposit processing a count and verification process begins. The count and verification process is illustrated in
In a manual count the operator counts and inspects the cash from the container and enters the results of the count into the deposit module GUI. Typically, the cash is sorted into a number of denominations and the total number of notes and cash value of each denomination is recorded. The fitness of each note can also be inspected and the serial numbers recorded. If a banknote counter 230A is currently connected to the client workstation 220 at which the current operator is operating, i.e. is on-line, this will be shown within the deposit module GUI and the banknote counter can be used to generate data documenting characteristics of counted notes. These can be, amongst others, denomination, fitness, and authentication characteristics. To use an on-line banknote counter the operator places the retrieved banknotes on banknote counter 230A. The banknote counter 230A is then able to count and/or verify the banknotes and the data generated by the banknote counter 230A is sent back to the client workstation 220A to populate the count data at stage 540. Alternatively banknote counter 230A can be disconnected from the client workstation 220A, i.e. used off-line. In this case the banknotes will still be counted by the banknote counter but the operator will manually enter the data on the banknote counter display. If the banknote counter 230A is adapted to authenticate the banknotes and identify counterfeit notes then data related to counterfeit notes may either be passed automatically to the deposit module from the banknote counter if the counter is on-line or may otherwise be manually entered into the adapted deposit GUI based on data presented to the user on the banknote counter display. Data on counterfeit notes can then be printed by a user or supervisor to comply with legal reporting requirements. If an error occurs when using a banknote counter an operator is also able to edit any captured data manually by interfacing with the deposit module GUI.
Certain customers of the cash processing centre require that deposits are of a certain form. For example, store Y or bank X may stipulate that deposits of 1000 banknotes should comprise a set proportion of different denominations. At steps 535 and 540, further properties of the banknotes making up the deposit can be captured, possibly using a banknote counter, and compared with the requirements set by the customer. Such requirements may be predetermined or may be stored in data that is accompanies the deposit. If the requirements are not met this can then be logged and flagged to an operator and/or manager. For example, if the denominations of the banknotes of the deposit do not meet the predetermined proportions set by a customer, this may signify that the deposit has been tampered with or is incorrect.
After the banknotes have been processed at step 535 and the count data has been populated at step 540 the populated count data is compared with the deposit amount entered into the deposit module from the deposit slip. This is performed at step 545. At this stage, to provide extra security, the result of the comparison may be reviewed by a supervisor at step 550. If this is the case a supervisor is summoned and logs into the vault management system. Once the supervisor is logged in they are presented with a screen summarising all information relevant to the current deposit. They are then able to review any difference found between the counted amount and the amount on the deposit slip.
If a difference is found at step 555 then this is displayed to the supervisor and the supervisor is asked to enter a reason for the difference at step 560. If no difference is found then the supervisor may be asked simply to confirm the count data. Whatever the result, the supervisor then captures an image of the deposit slip at step 565. This may also be performed by the operator. This typically involves placing the deposit slip underneath a digital camera connected to client workstation 220A. The digital camera is adapted to take a picture of the deposit slip and store it with the deposit record in deposit database 215. After the count has been performed the operator in the deposit processing area 111 the cash is transferred to the vault area 121. Typically, after processing, the cash is retained in a secure container whose ownership is attributed to the operator, machine or area responsible for deposit processing.
In certain embodiments, a selective dual control system may be used to implement step 550. Such a system may also be used at other points within the cash processing cycle where dual control is required, for example, when performing count or reclassification during vault processing 120 or when activating and/or allocating an order to an operator during order processing 130. The system typically comprises two parallel modules or GUIs that are presented to two different users, wherein processing performed by a first user using a first module or GUI may be approved and/or authorised by a second user using a second module or GUI. If two GUIs are provided these may either be displayed on the same display or on two different displays, wherein the two displays may be provided in the same area or in two different locations.
In an example wherein a supervisor and an operator use a dual control system implemented using a single display, the dual control system may be initiated by a log-in procedure performed by a supervisor on a client workstation that is presently displaying a first GUI to the operator. Once the supervisor has been successfully authenticated, a second GUI may be displayed together with the first GUI; for example a vertical or horizontal split-screen arrangement could be used. The supervisor may then be presented with data and/or control components unique to his or her level of superiority, e.g. “accept” or “decline” click buttons to authorise count differences as described above. Using a dual screen configuration, the supervisor is able to simultaneously view such data and/or control components together with the options and data of the operator. After completing authorisation a supervisor may log-out of the second GUI, which may act to lock or close the interface.
The dual control system above may be seen as “selective” as such a system is only implemented when a supervisor logs-in to an appropriate module. Each user within the cash processing system may have associated data that is stored by vault management server 210. This data may comprise configuration information detailing which executable components or GUIs are available to a user. Thus when a supervisor logs-in, data is exchanged with the vault management server 210 and, depending on the configuration information of the supervisor, the present workstation may be instructed to display the appropriate dual control GUIs. The configuration information may also be used to restrict access to particular modules; for example, an operator assigned to deposit processing 110 may only be able to load modules related to that area of processing and may only be able to see GUIs related to deposit processing operations. The configuration information may be configured by appropriate management personnel.
The transfer of cash from the deposit area 111 to the vault area 121 involves a transfer process as illustrated in
At step 315 the operator selects a destination, which may also be an individual, an area or a safe, a safe being a subdivision of the vault. For example, the destination may be a user V in the vault area 121. This selection may again be made through the use of a dropdown menu. Once a user and/or area have been selected as a suitable destination the containers and/or cash deposits belonging to the selected destination may be displayed in an information panel.
Once the source of the transfer and the destination of the transfer have been selected in steps 310 and 315, the number of items to transfer is then entered in to the transfer module GUI at step 320. These items can be containers or discrete bundled quantities of banknotes representing a cash deposit. As discussed previously each container has an identifier and this identifier can be in the form of a barcode. Each bundled quantity of cash may also have an identifier in the form of a barcode. Once the number of items to transfer has been entered at step 320, the identifiers corresponding to the items that are to be transferred are entered into the transfer module GUI. For example, if barcodes are used these can be scanned at step 325 to obtain serial numbers identifying each item. As each item is identified it may be passed across the physical boundary 141 separating the deposit area 111 from the vault area 121. Each identified item is counted and the total number of identified items is compared with the quantity entered in step 320. Once all the items for transfer have been identified then the transfer is confirmed at step 330.
In order to complete the transfer process a transfer must be acknowledged by or at the destination. In the present example, this could be operator V in the vault area 121. An acknowledgement can be performed in one of three ways:
-
- The system can be set up to automatically acknowledge any transfers as soon as they have been confirmed by the operator at step 330.
- The receiving party can follow the steps shown in
FIG. 3B . At step 350 the destination operator logs into the vault management system via a client workstation 220 and initiates an acknowledgement module 350. In certain configurations the acknowledgement module automatically identifies the current user and/or destination area based on the operating parameters of the current client workstation and in other configurations the acknowledgement displays a series of users, areas or safes for the operator to select. Once one of a user, area or safe has been selected the current number of transfers awaiting acknowledgement are displayed. The operator then selects one of these transfers at step 355 and interacts with the GUI of the acknowledgement module to acknowledge the transfer. - In addition to the steps of
FIG. 3B described above the receiving party may also re-identify the items at step 365 in order to acknowledge the receipt. For example, the barcodes of two bulk bags received from the deposit area 111 may only be acknowledged when their barcodes are scanned using a barcode scanner 225 connected to a client operating system 220 present in vault area 121. This option is the most secure and means that items can only be acknowledged once they are physically received.
This transfer process described above manages the physical responsibility or “ownership” of containers and/or cash deposits. This allows, all physical movements of containers and/or cash deposits between operators and/or areas of the cash processing centre to be recorded by the vault management system as database records. The vault management system running on vault management server 210 stores records of each transfer and each acknowledgement in database 215. Thus these records can be queried at any time in order to investigate a transfer process. For example, if a transfer has been initiated by one party but the transfer has not been received by a second party then the transfer records for the initiated transfer can be examined and details such as the container identifiers, cash amount, date, time, user and/or area can be retrieved to aid investigation.
Once the cash is in the vault area 121 it will often be processed and stored. This may involve removing the cash and re-bundling sets of banknotes in set bundles of a particular denomination and a particular fitness. For example, banknotes may be sorted into those that are fit for automatic teller machines (ATMs) or those that comply with the Banknote Recycling Framework (BRF).
The vault management system further comprises a vault module that allows the physical inventory of the vault or secure area of the cash processing centre to be accurately represented in real time. As all cash deposits are transferred to the vault the vault module is able to calculate the exact quantity of cash within the vault by using the count and denomination records, linked to the transferred item, that were generated during deposit processing 110. To facilitate management of the vault inventory the vault module further has the ability to generate virtual areas or safes within the vault area 121. Items such as containers or bundled quantities of cash can then be assigned to specific virtual areas through the transfer process of
Vault processing 120 may also involve reclassification of cash media. For example, 100×$1 coins may be reclassified as a 1×$100 rolled coin package. This can help to simplify and refine later order processing. Alternatively, if fitness and authentication sorts are not performed as part of the deposit processing 110 then the resultant quantities of cash will be set as “unclassified”. Within vault processing 120 these quantities of cash can be further sorted for fitness and authentication and the results of the sort process can be used to perform the media reclassification. This can enable the true state of the cash or media within the vault to be ascertained. Additionally, by altering the stage at which media classification is performed the processing workload can be actively split between deposit and vault processing.
Cash remains in the vault area 121 until it is required to fulfil a cash order.
Once a cash order is received, an order processing module verifies the customer making the request and checks that the customer is on, or can be assigned to, a valid delivery route. The delivery date of the order is also checked to confirm that it is possible make the delivery and, if the delivery date is not possible, an error is returned. The order amount is checked against the inventory of the vault 121 to confirm that there is enough stock to complete the order. Orders are then queued and grouped by delivery date.
Before an order can be prepared it needs to be activated and allocated to an operator within the cash processing centre. This is typically performed by a supervisor using a client workstation such as client workstation 220B within the order processing area 131. The supervisor logs into an order preparation module, which forms part of the order processing module, and is presented with a list of orders available for preparation. At this stage the supervisor may also make use of any selective dual control system that has been implemented. Commonly, the list is filtered to show a subset of orders, for example those needing to be prepared for the current day, and the supervisor can view the details of each order by selecting one of the list. To activate an order at step 610 the supervisor selects the order from the list and confirms that it is to be activated. At this stage orders can be assigned one of a plurality of types which will dictate any special preparation requirements. Once an order is activated its status is changed to awaiting preparation. This status change is a one way process and activated orders cannot be modified or deleted.
Once an order has been activated operators within the vault area 121 prepare the cash required to make up the order. At this stage the system may also perform an inventory check. This may involve counting out the amount of cash stipulated in the order. After the cash has been prepared it awaits collection by an operator from the order processing area 131.
Meanwhile, after activation of the order, the supervisor proceeds to allocate the cash order to a user and/or an area. Typically, this is an operator within order processing area 131. To allocate an order at step 620 the supervisor selects an activated order and then selects the required user and/or area in a similar manner to the selection of a destination in the transfer process. It is also possible to allocate more than one cash order. Once an order has been allocated then a pick list or manifest can be printed at step 625. The pick list contains details of the cash order and may have a barcode encoding a unique serial number associated with the order. Typically, the pick list is printed by the printing device 240 connected to the client workstation 220B within the order processing area 131. The pick list may comprise a number of individual manifests corresponding to each required container.
Once the responsible operator receives the pick list they are able to retrieve the cash required to make up the order from the vault. This requires a transfer process 630 as shown in
At step 635 a number of containers required to hold the cash order are prepared. The number and type of containers required may be calculated automatically when the order is activated and may be present on the pick list. For example, orders can be supplied in cassettes, bulk bags or satchels. The containers are retrieved from a stock of fresh or un-used containers and these may be present in the order processing area 131 or maybe retrieved from the vault area 121. As with received deposits, each container is typically assigned a unique identifier. This may be encoded as a barcode. The barcode may already be present on the container or the client workstation 220B within the order processing area 131 may generate and print new barcodes using a connected label printer. Hence, before picking an order the allocated operator is provided with a pick list, a number of identified containers and a quantity of cash from the vault.
An activated order can only be prepared by an allocated operator. Hence the picking process begins when the allocated operator logs into a client workstation, such as workstation 220B, in order processing area 131. The allocated operator is then presented with an order preparation screen. This displays all pending orders that have been allocated to the current operator in an information panel. To perform the picking process at step 640 the allocated operator first selects a pick list and enters the pick list identifier. This may involve scanning the barcode present on the pick list. The entering of the identifier brings up the details of the order on the operator's screen. These details include the number of containers required and the amount of cash or number of banknotes to be placed in each container. The operator begins with a first order container and enters the container identifier associated with the first order container. This may involve scanning a barcode related to that container. The operator is then informed of the quantity of cash to be placed within the container. If the cash is in the form of bundled banknotes a number of bundles can be taken and placed into the container to pick the order. If the cash is provided in the form of a heterogeneous group of banknotes or other documents then the cash may be counted by an attached banknote counter, such as counter 230C. If said counter is connected to the client workstation then the order processing module may automatically pass the required count amount to the counter. The operator then need only place a quantity of banknotes upon the counter and the required amount will be counted into an appropriate output hopper. The operator can then simply remove the banknotes from the output hopper and place them in the associated container. If each container has its own manifest or the order is complete, the appropriate pick list is placed within the container and the container is then sealed. The pick process is then repeated for any additional containers that make up the order.
After the picking process a balance is calculated for the user based on a comparison of the quantity of cash received from the vault with the quantity of cash placed within the one or more containers. These quantities should be equal and if they are not then a supervisor can be called over to log in and confirm the reason for this difference. If an error occurs during the picking process then picked quantities of cash can be retrieved from assigned containers but the associated container identity is destroyed and a new container identity is generated. The end result of the order processing process 130 is one or more containers filled with a quantity of cash that fulfils a given customer order.
Cash reception 150 involves the receipt of containers that contain cash for deposit. Commonly, these containers are received from CIT operators which transport cash deposits from parties who are located at a distance from the cash processing centre. For example, at the end of a trading period, a bank may commission a CIT operator to pick-up cash from the bank's branch and transport it to the cash processing centre. During cash reception 150 the cash processing centre is responsible for unloading containers containing cash deposits from a CIT vehicle and documenting the newly acquired ownership of these containers.
Responsibility for these containers can then be transferred to deposit processing 110. In a similar manner to the boundary line 140 in
An example of the cash reception process 150 is shown in
The operator then proceeds to capture data associated with the cash deposit. This begins with the step of entering the carrier or the route details 405 into the vault management system. Typically, this involves entering a carrier or route identifier from CIT or deposit documentation. This identifier can either be entered manually by the operator or automatically by scanning a barcode encoding the identifier.
At the next stage 410 deposit information related to the received cash is entered into the vault management system. This may comprise the number of containers being deposited or may comprise additional details such as the name of the depositing customer and/or the deposit amount. In a similar manner to the entry of the carrier or route details 405 the deposit information may be entered manually by the operator or may be retrieved from data encoded into the CIT or deposit documentation. At the next stage of the method the identifiers of the received containers containing the cash deposit are entered into the system. Typically, each container has an external barcode encoding the container identifier and this is scanned using a handheld barcode scanner in step 415. The cash reception module then stores the identifiers of each container and verifies that the number of containers present in the CIT or deposit documentation matches the number of identified containers.
Once all the received containers have been identified to the system then reception of the deposit is confirmed at step 420. This can be achieved by pressing an icon within a GUI used to implement the cash reception module. On receipt of a new cash deposit a number of new deposit records are created in the vault management database 215. Each container will have its own associated record which will contain information about its source, its contents and other processing information. When the reception of the cash deposit is confirmed at the confirmation stage 420 these records are permanently stored in the vault management software database 215 and the containers are assigned or allocated to the current operator and/or area. At this stage, “parent” containers containing one or more other containers may be unloaded or loaded to facilitate deposit processing. The opening and loading of a container in this or in related operations may be provided as a single option within the module. Before transfer to the deposit processing area 111 a reception operator is also able to re-load the reception module and edit any incorrect data.
Once a number of containers containing cash deposits have been received and documented in reception area 151 the containers are transferred to deposit processing area 111. Physically this is normally achieved using entry point 156. As well as physically transferring containers of cash between area 151 and 111 the reception operator must also complete a transfer process. As before, this transfer process is required to record the movement of the cash deposit containers. Hence the reception operator performs the steps of
The deposit information captured at step 410 may be stored as initial data in the appropriate deposit record in vault management database 215. This data may then be used again in a later stage of processing to save time. For example, the deposit information may comprise a customer name or identifier and a deposit amount. During deposit processing 110 this initial data may be retrieved and used to initially populate fields within the deposit processing module. The operator performing the deposit processing 110 may then have the opportunity to confirm this initial data, for example verify the customer identifier and details and the cash amount on the deposit slip. If there is a high level of trust within the system the initial data may be confirmed automatically.
The extended cash management process 101 of
The result of the order processing stage 130 is a number of containers containing a quantity of cash to fulfil a cash order. Once an order has been prepared and processed it is transferred to the despatch area 161 to await despatch. Physically, this is often performed using a secure exit point 136. As part of the management process the one or more containers that contain the cash required for the cash order are also transferred to the despatch area 161 using a transfer process 135 as described previously with relation to
Once in the despatch area 161 the operator may combine a number of cash orders into a shipment, as is shown in step 705 of
When the appropriate transport vehicle arrives at the cash processing centre the despatch operator begins the despatch process. The operator begins by loading the despatch module on a client workstation and selecting the route used by the waiting transport vehicle. The despatch operator then enters or selects the relevant shipments for that route and enters the number of containers to load onto the vehicle for each shipment at step 720. This may be achieved by scanning the barcode of a shipment manifest to retrieve a shipment identifier. The identifiers of all the containers to be despatched are entered into the despatch module which assigns these containers to the operator of the transport vehicle. This may be achieved by scanning container barcodes that encode a unique container serial number, as is set out in step 725. The identification of the containers making up the shipment transfers ownership of the containers from the despatch area 161 to transport vehicle operator. The order containers are then physically loaded onto the transport vehicle in step 730. A manifest related to the shipment and documenting the transferred containers may be generated in step 735. This manifest may be printed onto paper or may be stored electronically. The transport vehicle is then ready to depart the cash processing centre with the loaded containers.
As the steps in reception and despatch processing typically involve working with CIT or other delivery or despatch vehicles it is advantageous if operators within these areas are provided with portable electronic devices to perform the steps of
A third embodiment of the present invention is shown in
Using the assignment of containers and assets, together with the transfer process, the vault management system of the first and second embodiments is able to capture data related to all cash processing actions in its database. Each recorded action, for example a transfer, count or reception operation, will have an associated date, time and location. In a similar manner the CCTV system will monitor set locations and will index each video recording using a date and a time. Hence, as both the vault management system and the CCTV system are commonly linked by location, date and time parameters it is possible to retrieve video footage from database 815 based on a location, date and time specified by the vault management server 210.
For example, a supervisor may wish to view the transfer of a set of containers between the order processing area 131 and the despatch area 161. Such a transfer will have an associated transfer record in the vault management database 215. This transfer record will then comprise data specifying an associated set of locations (areas 131, 136 and 161) and an associated date and time. The vault management server 210 is then adapted to supply these parameters to the CCTV multiplex and recorder 810 which is able to retrieve the appropriate video from video database 815. The supervisor is then able to view the video footage for that location, date and time. If the CCTV camera is positioned to monitor the display of a particular client workstation, that workstation may be configured to use large fonts that can be accurately read in CCTV footage.
In certain embodiments, data pertaining to transfer or transaction records generated by the vault management server 210 may be transmitted in real-time or at predetermined intervals to the CCTV system (i.e. devices 810 and 815). The CCTV system may then use such data to annotate video records stored in video database 815. For example, data such as the data or time of a transfer, count or other processing operation being performed in a particular area of the cash processing centre may be stored with the video records of said area. In certain embodiments this data may be in the form of text that is added in real-time as an overlay to video footage, for example as a “ticker-tape” that repeats in a rectilinear section at the bottom of each frame of the video footage. In these embodiments the video footage, together with added visual information relating to the vault management records, is stored in a chosen format, such as one of the Moving Picture Experts Group (MPEG) formats, in database 815. The video footage can then be retrieved at a later date for viewing together with the added visual information. In other embodiments, data relating to the vault management system may be embedded into the video footage without being visible in said footage. For example, data could be incorporated into header sections or unused bits. An appropriate decoder is then able to extract and display the data when the video footage is retrieved. An example of relevant information that is stored with video footage is a list of discrepancies in cash processing operations in a particular area at a particular time.
As well as integrating the vault management data with a CCTV system other supervisor functions may also be optionally integrated to facilitate management of the cash processing centre. The supervisor functions described herein may be used with any embodiment of the present invention. The interfaces for these supervisor functions can be viewed using a remote client workstation such as workstation 220C. The first of these modules is an investigation and research module. This provides a front-end to the vault management database enabling the supervisor to query and view all deposit transactions, all transfer processes and all inventories across any networked cash processing centres, including user and/or area inventories. Each query or inventory may also be printed as an electronic or paper report. Reports include, amongst others, operator productivity, discrepancy pattern analysis, deposit quality per depositor, counterfeit frequency per depositor or ATM fit note yield per depositor. These reports may be generated automatically when certain criteria are met, for example at a particular time every day, week or month. Such scheduling may also be combined with technologies to automatically distribute or publish the reports; for example, a scheduled report may be faxed or emailed to a particular group of users. Discrepancies reported by customers can be investigated by recalling all data associated with the deposit and/or cash order in question, including the image of the deposit slip. Discrepancy reports can then be generated and printed or sent electronically.
As a variation of the reporting described above, the vault management server 210 may be adapted to provide ad-hoc text output files. These files are configurable; operators and management may select which fields from vault management database 215 they wish to export into a text file and these selections may be altered in real-time. For example, a manager may wish to regularly export performance metrics relating to the cash processing centre into an XML file for publication on an internal or external server. The vault management server 210 may also be adapted to process and import data, such as data relating to received orders.
The vault management server 210 may also be configured to manage alerts, alarms and notifications to employees and/or management personnel (often referred to as “Nag-ware” in the art). For example, an operator may require a supervisor to authorise a discrepancy or shortfall in a required cash amount. In the past, the operator typically raised their hand and waited to be noticed by a supervisor. This process was inefficient and required a supervisor to monitor the whole of a department at any one time. The vault management system 200 of the present invention may be configured to automatically detect events that require authorisation. Such events may be detected when an operator reaches a certain point in a process or workflow or when a particular set of data exists. Once an event is detected it may initiate a routine to alert a supervisor. This alert may be provided by, amongst others, one or more of: short message service (SMS) alerts to a cellular mobile phone, paging alerts over amplitude or frequency modulation (AM or FM) frequencies to a pager, or “pop-up” windows that are activated upon a supervisor workstation, such as 220C. The alert may contain, amongst others, one or more of: the operator needing assistance, their location, the time of the alert, its urgency, the level of management required, and the alert category. The system may also be provided with a time-out mechanism; if the required supervisor does not attend to the alert within a configurable period the alert may be logged or another member of staff may be alerted, possibly in the next level of management hierarchy. Such alerts may also be used for service management.
In some configurations it is also possible to provide keystroke and/or device logging that can provide an extra level of information for audits or investigations. For example, all key-strokes and control selections performed by a user during a transfer or transaction may be monitored. Hence, if an operator takes 100 euros from a cash deposit and subsequently cancels an alert showing a 100 euro discrepancy, both the alert and the cancelling of the alert will have been recorded by the logging system and may be used as evidence of theft. The logging may further be synchronised with the CCTV system of
A security console may also be provided to inform a manager or supervisor of any potential security risk within the cash processing centre. The security console may comprise one or more GUI indicators. These GUI indicators may be graphical and/or text-based. For example, in one particular embodiment each indicator may comprise a dial resembling those found within a motor-vehicle dashboard. Each dial may display the value of a key performance indicator (KPI) and different areas of the dial may be given different colours. For example, if the KPI ranges from 0 to 10 and a sub-range of 7 to 10 represent a high security risk, a circular sector of the dial representing this sub-range may be red; likewise a circular sector of the dial representing the sub-range of 4 to 6 may be amber. Each KPI may be calculated using a custom formula or algorithm applied to the vault management data. For example, the KPIs may comprise, amongst others, any one of: the number of counts for a particular user performing cash processing operations in any one of areas 110, 120, 130, 150 or 160 of for a particular delivery route in which the cash amount falls short of a previously recorded amount, the number of transaction adjustments, the number of counterfeit notes detected per machine operator, etc. Security personnel monitoring the security console can thus be provided with clear feedback of the present security situation. The security console may also be integrated with the CCTV system so video footage of events related to each KPI may be retrieved and viewed using the appropriate time-stamps of said events.
The security console methods described above may also be extended to display KPIs associated with the functionality of database 215 or of a particular banknote counter or processing device. For example, database health or performance metrics such as hit ratios and reads per time period may be displayed using “dashboard” displays or machine processing metrics may be displayed on screens in proximity to the banknote counter or processing device. Alternatively, one or more KPIs may be defined by customers or management of the cash processing centre. Typically, such KPIs are implemented by performing a query on database 215, wherein the results are updated in real-time. time. For example, bank X may require that all cash deposits are processed by 3 pm. Personnel within the cash centre may then be shown an indicator illustrated how many cash deposits for bank X have yet to be processed, together with the estimated completion time based on the average processing time per deposit. Personnel of all levels are then aware of whether the target is going to be met and can adjust their behaviour accordingly.
A supervisor may also be provided with a stock balancing function that can be used to balance stock at the end of a working day or shift. The exact time or event that triggers a balance procedure is configurable. An operator first uses the system and logs into the balance module. They then select their name from a list onscreen and are presented with a list of the stock that is currently assigned to them. The operator then performs a count of the cash within their work area and enters the count result into the module. This process may also be performed without displaying the expected stock to perform the balancing “blind”. If a difference is found between the expected and actual stock count the module will prompt the operator to perform a recount. If after the recount an imbalance still remains a supervisor is summoned. The supervisor is then able to adjust the balance if need be or investigate any discrepancy.
The balancing procedure described above may be performed using a technique referred to as High Speed Teller Balancing (HSTB). This technique uses the methods described below with reference to
As well as the examples discussed above, any of the ownership, count, sort, inventory, reclassification and order processing data can be used together with other relevant collected data to provide a real time summary of key performance indicators (KPIs). These may be displayed visually to a supervisor or an operator. Any known data processing used in the art may be applied to the data to provide appropriate management information to a wide variety of personnel, from senior management to low-level operators.
The vault management server 210 may also be adapted to manage user or operator accounts. Typically, each employee associated with the cash processing centre has a user account which they use to log-in to the vault management system 200. Log-in or authentication may be performed through modules of the vault management system 200 implemented by one of the client workstations 220 or directly with the vault management server 210, for example through a web-based interface. Each log-in procedure may involve exchanging data such as a user name and password with the vault management server 210. The vault management server 210 may then authenticate this data against data stored in the user account and, if the log-in request is approved, appropriately configure future processes. The user data may be stored in a database operably connected to the vault management server 210, which may be database 215.
The user account may store a variety of data. For example, the user account may store data indicate which commands, GUIs or processing modules a user has access to. For example, a deposit processing operator may be limited to accessing a deposit processing GUI or module and may not have the option to load or access an order processing GUI or module. This data may be configurable. For example, management may wish to assign an operator from deposit processing 110 to order processing 130 and thus may wish to appropriately change the access permissions of the operator. Additionally, users who are higher in the management hierarchy may have access to a greater number of GUIs or modules.
The vault management system 200 may also be configured to automatically log-out a user or lock their system if their workstation or module is idle for a predetermined period of time. If this occurs the user may have to log-in to the system a second time to reactivate any idle processes. This may increase security and prevent unauthorised access. The period between the last action and the locking and/or the log-out procedure may be configurable according to user or user group. The system may also be configured to “roll-back” any pending transfer or transaction that is interrupted by the locking or log-out procedure. More details of “roll-back” operations are given below. As a user may have a plurality of executable modules loaded upon a client workstation the locking and/or log-out procedure may be applied to one or more of: the client workstation, one or more active modules, and all modules loaded upon the workstation. For example, the system may log a user out of any background processes that have not been activated in the last five minutes.
In one embodiment of the present invention, user accounts for a selected plurality of users may be assigned to a user group. For example, operators performing vault processing 120 may be assigned to a vault processing group. Data that is common to all users within the user group, for example permission data, shortfall amounts that require authorisation or available GUIs, may be stored as metadata for the user group. The vault management server 210 may then be adapted to use this metadata as user account data for all users within the group. For example, for the vault processing group, the metadata may comprise a field indicating that all shortfalls in count amount above 5 euros require authorisation by a supervisor. In use of a vault processing module, said module may make use of this field to decide when to lock the module and request supervisor authorisation. Due to inflation, management may wish to increase the 5-euro limit to 10 euros. Instead of having to individually edit the user account data of each operator performing vault processing 120, management may simply edit the metadata for the vault processing group, i.e. instead of having to edit the shortfall field for every operator, management only needs to edit a single shortfall field in the metadata.
The vault management server 210 typically offers the option to add, edit or delete a user account for a particular user or a user account group for a particular group of users. For example, a user may be allowed to edit their password and/or user name. Within the vault management system 200 there is the constraint that, when an employee has left the cash processing centre, the associated user account must be maintained to view and manipulate historical data stored in database 215. For example, each deposit transaction, transfer process and inventory recorded by the vault management system 200 is commonly associated with a particular user. Even if the user has now left the cash processing centre, management may wish to retrieve an audit trail of all transactions associated with the user, for example, as part of a criminal investigation. However, maintaining unused user accounts places a burden on management staff, as they need to select and monitor current employees. The present invention offers a solution to this problem by adding a field to each user account or user account group to enable the logical deletion of a user whilst maintaining the physical data associated with the user account or user account group. For example, each user account or user account group may have a binary flag that indicates if the user is active. This flag may be set by selectively activating a “Disabled” tick-box in a user-account configuration GUI. Once the tick-box is checked the vault management server 210 is configured to appropriately filter the user accounts to exclude unused user accounts from lists of current users.
The teachings above in relation to user accounts and user account groups may also be applied mutatis mutandis to customer accounts. Such customers may be those who deposit cash or who receive outgoing cash orders.
The vault management system 200 and/or database 215 may be provided with a “roll back” function to enable changes to the system and/or database performed within a particular time period to be removed. This has the effect of returning the system and/or database to a previous state. This may be applied at the level of software updates or single transfers and transactions using database methods known in the art.
A fourth embodiment of the present invention is illustrated in
Top network 231A is connected to vault management server 210 and mirror or RAID (Redundant Array of Independent Disks) server 211 which together run the server operations of the vault management software and include a vault management database (not shown). Lower network 231B interfaces with vault management server 210 via the WAN 245. Both networks further comprise uninterruptible power supplies (UPS) 255A and 255B, reports printers 240, client workstations 220A and connected handheld barcode scanners 225 and currency sorting machines 260D and 260E. An exemplary currency sorting machine 260 is illustrated in
Multiple cash processing centres may record data such as ownership transfers, count data and inventory information on a single central database server. This central database server may comprise a primary and back-up server and be accessible from each cash processing centre over a WAN. The database server may also be accessible from a central administrative head-quarters or office.
The database server may also provide some or all of the functionality of vault management server 210 and may be connected to a network resembling network 231A but without the cash processing centre workstations 220 and banknote counters 260. Standard firewall technology can be implemented so that networked machines within a cash processing centre can only see data upon the database server that relates to the centre in question. However, administrative machines may be able to access, view and aggregate data from a plurality of cash processing sites.
The method of the fourth embodiment illustrated in
The method of deposit processing according to the fourth embodiment involves three main stages: preparation; note sorting and deposit counting; and reject entry. Reject entry comprises capturing data related to notes that were rejected within the sort process. Such notes may be damaged or counterfeit.
The method 900 of
A series of three deposits and their associated separator documents 1112 that make up an exemplary deposit batch are shown in
Alternatively, the separator documents may be taken from a stock of pre-existing separator documents. In this case, each the barcode and magnetic strip(s) encode an arbitrary serial number. This serial number is then assigned to a deposit at step 905 by scanning the barcode on each header document whilst putting together the deposit batches.
Each deposit batch is commonly arranged on a deposit tray that is adapted to feed a currency sorting machine 260. A deposit batch may contain a plurality of deposits from difference customers. Once a deposit tray is full, or a deposit batch reaches a predefined size, it is taken by an operator to the currency sorting machine 260 for processing and counting at step 920. The deposit batches, complete with separator documents, are placed onto a feed mechanism of the currency sorting machine 260 at feed area 1012 and the machine continuously feeds the note into a note processing area. The processing performed by the currency sorting machine 260 incorporates one or more of counting, authentication, fitness and denominational sorting in a single process run and typically provides all four forms of processing. During the sort process detectors within the machine inspect both the banknotes and separator documents. When the machine encounters a header document it reads the unique identifier on the document encoded in either the magnetic strips or the barcode. This identifier is then associated with the sort or process records of the subsequent banknotes. When the trailer separation document is then subsequently detected the machine then disassociates the unique identifier from the sort or process records of subsequent banknotes.
Sorted banknotes are provided to output hoppers 1014 depending on the sort process. For example, a detector may be provided for determining the denomination of each banknote and another detector for determining authenticity. If a banknote is found to be authentic and its denomination can be determined, it will be directed to a particular output hopper for stacking genuine banknotes with that denomination. All other documents either non-genuine or unreadable banknotes or separators are fed to the reject hopper 1014R.
The processing data associated with a deposit amount originally situated between the separator documents is sent by the currency sorting machine 260 via network 231A to vault management server 210. The server then populates the deposit count and processing data at step 925 using the unique deposit identifier as an index.
Reject banknotes fed to the reject hopper 1014R remain sandwiched between their associated separator documents and form reject deposit batches. These reject deposit batches are then taken to a reject processing station wherein the reject notes are processed a second time at stage 930 to ascertain the reason for rejection and/or possible detect good notes that were not detected on the first pass (for example if they were rejected as overlapping or misfed notes). The reject data is also associated with the unique identifier on the header document and is sent to the vault management server to update the deposit count and processing data. Alternatively, the reject notes can be manually inspected by an operator. In this case the operator will manually scan the barcode on the associated header document and enter the reject data.
Once process data for all the banknotes within the deposit has been ascertained then this data is automatically reconciled with data obtained from the deposit slip at step 935. As with the first embodiment any discrepancies are flagged to a supervisor in a management report produced at step 940.
The benefits of the fourth embodiment are numerous. The deposit processing is performed in one continuous process and a high level of accuracy, integrity and security is maintained. Added security can be provided by performing the processing “blind”, i.e. the operator responsible for operating the counter and/or entering reject information is unaware of the depositor details.
A fifth embodiment of the present invention is illustrated in the flowchart of
In the flowchart of
The customer will then prepare the cash and/or articles of value for deposit. This typically comprises sorting the articles for deposit into bundles of banknotes of a certain cash value or of a number of banknotes of a set denomination. This sorting may be performed in conjunction with a banknote sorter present upon the retailer's premises. For each bundle deposit generated by the retailer, the customer attaches one or more separator documents. These separator documents may comprise the header and trailer cards 1118 and 1119 shown in
In the present case, the header card 1119, forming part of the separator documents attached to a bundle of banknotes, comprises a barcode and an RFID or wireless electronic chip. As each bundle is formed, such as bundles 1116, 1120 or 1124 in
The RFID chip typically comprises an integrated circuit and an antenna and may be similar to the chip shown in
In alternate embodiments that do not use an RFID chip, the customer or retailer may print their own header cards 1119. For example, at step 1255, on creation of a new deposit and the generation of a new deposit identifier, the customer may be given an option to print one or more header cards containing the deposit identifier. A header card 1119 may be printed onto adhesive labels, paper, card or plastic (amongst others) and the deposit identifier may be incorporated into the header card in the form of a one or two dimensional barcode. This provides a cheap method of providing customers with header cards and enables the header cards to be disposed of, preferably recycled, after use.
During the preparation of the cash deposit at step 1205, the customer will generate deposit information relating to each bundle. For example, this may be at least one of: date and time of processing, personnel present, location of processing, count information, the total value of the bundle, the number of notes of a particular denomination, authenticity information related to the notes within the bundle and fitness information such as the level of soil or tears. This deposit data may either be produced by hand, based on a manual count, and individual inspection of each note within the bundle, or may be produced automatically using a banknote sorter. If the information is produced by hand it may be recorded against the bundle RFID and/or barcode reference using a user interface displayed on a customer computer terminal. If the information is produced by the banknote counter it may be passed in electronic form to the customer's computer for storage against the bundle RFID and/or barcode reference (and thus in turn the deposit reference) or maybe displayed to the customer for manual entry against the bundle reference using a user interface. This allows a running total of the current deposit to be calculated after processing each bundle.
The banknote sorter may be further adapted to take a plurality of banknotes and/or articles of value as input and produce a number of banknote bundles with pre-determined properties as output. For example, the banknote sorter may automatically produce bundles of one hundred notes of each denomination, for example one hundred notes of 10 dollar or 10 euro value and then automatically place a header and trailer card around the bundle before the bundle is output to a sorter output tray or stack. The banknote sorter can then be adapted to read either the barcode or the RFID chip serial number as the bundle is put together to automatically associate the separator card or chip identifier with the processing details of the banknote bundle.
At step 1215, the produced cash bundles are placed into one or more containers ready for transportation to the cash processing centre. Each container may optionally also comprise a barcode and/or RFID chip, in which case a serial number or alpha-numeric code contained within the barcode and/or RFID chip may be read and associated with the deposit and bundle references. The container is preferably made form a non-conductive material to facilitate the reading of RFID chips inside the container. This then marks the end of processing at the customer end of the process flow.
At step 1220, the one or more containers containing the cash bundles are transported to the cash processing centre. This step is typically performed by a carrier operator who collects the one or more containers from the customer and delivers them to the cash processing centre. In the present example, the carrier operator is equipped to scan each container with an RFID reader. This allows the bundle identifiers associated with RFID chips attached to each bundle to be read inside the container. These identifiers can then be associated with the carrier and/or route details such as the present driver or security personnel, the time and date of collection, and other relevant information. The bundle identifiers may be associated with the carrier and/or route details in a database record and stored locally in a storage device present within the carrier vehicle. These records may then be downloaded upon arrival at the cash processing centre. Alternatively, each vehicle or carrier operator may be provided with a wireless or mobile data entry device, such as a PDA or mobile phone. This device may also comprise the RFID reader and a barcode reader and thus the header and container identifiers read from the container may be transmitted wirelessly to a central server wherein the deposit records can be updated accordingly. If these carrier details are linked with the header identifiers then they may be retrieved from the central database using the identifiers as an input to a query at step 1225 when the containers are scanned on arrival in the reception area 151.
Once the one or more containers reach the cash processing centre, steps 1270 are performed within the centre. The present example will be described in relation to a cash processing centre such as that described in the second embodiment. However, it is also possible to use a cash processing centre as described with relation to the first embodiment. Hence, when the one or more containers containing the bundles of banknotes arrive at the cash processing centre, they enter into the reception area 151 wherein reception processing 150 begins. However, in contrast to the reception processing 150 of the second embodiment, the use of RFID chips associated with each cash bundle greatly simplifies the steps that need to be performed by the operator in the reception stage. Instead of entering deposit details into a user interface, the operator in the reception area 151 simply scans each container at step 1225 with a RFID reader to obtain the serial numbers of all the cash bundles present within the scanned container. Alternatively, this scanning may be performed automatically by a scanning gate at the entrance to the reception area 151. These serial numbers are then processed by the reception module of the vault management system. This processing typically involves using the serial numbers in a database query to retrieve the deposit records generated at steps 1205 and 1255 within the retailer's premises. For example, the reception module may access a central server or database wherein the deposit and processing information related to each bundle identifier is stored. Once the deposit reference associated with the one or more cash bundles is retrieved, data related to that deposit, such as the customer name and address, total value of the deposit or any other preadvised data that was entered at the customer's premises, may be displayed onscreen for visual verification by the operator in the reception area 151. The reception processing 150 may also involve verifying that all the RFID serial numbers associated with bundles placed in each container by the customer are also detected on the scan performed by the operator. If one or more RFID serial numbers are not detected, or alternatively one or more RFID serial numbers not associated with the customer's deposit are detected, then this is recorded and a warning may be flagged to the operator or their supervisor. If the RFID serial numbers match, the one or more containers and/or the RFID and/or barcode serial numbers associated with each cash bundle within each container are assigned to the current operator and/or area. If a scanning gate is provided at the entrance to the reception area, the carrier vehicle or containers from the vehicle may be scanned on entry to the reception area 151 to check for the presence of RFID chips. If a scanning gate is used audio and/or visual and/or tactile feedback may be provided to indicate when a container has been successfully scanned. Scanning gates are particularly useful to track RFID items crossing boundary 140, i.e. entering the vault. The serial numbers read back from located RFID chips may then be reconciled with the data recorded by the carrier operator.
In one particular embodiment, the RFID reader may be part of a thin, wall-mounted, dual-purpose scanner and display that would enable scanning on receipt. Such a scanner and display may comprise one or more of: a multi-directional barcode laser scanner, an RFID reader and antenna, a wireless networking module and/or fixed network capability, a large display and/or keypad for input. The scanner and the display are preferably constructed to withstand a collision from a trolley or other heavy apparatus within the cash processing centre.
As in the second embodiment, after the containers have been scanned in the reception area 151, the cash bundles are transferred to the deposit processing area 111 wherein deposit processing 110 is performed. Typically, deposit processing 110 is performed in a similar manner to that described in the fourth embodiment, however, the various steps described herein may also be performed manually in association with the deposit processing described in relation to the first embodiment. The transfer of ownership to the deposit area and/or deposit operator may involve logging the transfer of the bundle identifiers to keep track of all bundles of cash.
At step 1235 the cash bundles are removed from the one or more containers and prepared for processing by a banknote sorter. In contrast to the fourth embodiment, the cash to be counted and processed is already provided in bundles with separator documents and therefore these cash bundles may be simply retrieved from the one or more containers and placed on a deposit tray ready for feeding to a currency sorting machine 260. The currency sorting machine 260 is typically adapted to either read the barcode serial numbers present on one of the separator documents or the RFID serial number on each cash bundle at step 1240 and thus is able to look up the deposit identifiers related to the bundle identifiers and then record processing data generated by the currency sorting machine 260 against the deposit record. For example, as in the fourth embodiment, the currency sorting machine may incorporate one or more of counting authentication, fitness and denomination sorting. Information related to one or more of these areas may be stored under the deposit reference that is linked to the presently processed cash using the bundle identifier. This is shown in step 1245.
This then allows the sort information associated with each bundle that was recorded at the customer's premises to be reconciled with the sort information generated by the currency sorting machine 260. Any errors, irregularities or discrepancies may then be reported to senior personnel and recorded against the deposit. For example, the counted value of each bundle, as calculated by the currency sorting machine 260, may be compared with the value of each bundle as entered or calculated during deposit processing at the customer's premises. In one example, if the serial numbers of each banknote in a given bundle were recorded during deposit processing at steps 1265 then these could be checked against the serial numbers of each banknote as recorded by the currency sorting machine 260. After processing by the currency sorting machine 260, the separator documents are removed from the bundles as the cash is typically resorted and recombined with other deposits for ease of deposit into the vault 121. In this case, the separator documents are sent to a reject pocket such as 1014R in
Several variations of the fifth embodiment may be applied without deviating from the scope of the present invention. Instead of bundling the cash to be deposited, a durable plastic tag containing an RFID chip may be included in the deposit container together with the cash to be deposited. A serial number associated with the tag is associated with the deposit by either scanning the tag with an RFID reader, scanning a barcode printed on the tag or manually entering a serial number printed on the tag. Deposit information produced by the customer is then associated with the serial number of the tag. On arrival at the cash processing this tag may be read and processed in a similar manner to the separator documents described previously. The tag may be also scanned by the carrier operator during delivery.
If the security of the deposit is monitored from the time of customer deposit processing to deposit in the vault 121 then the methods of the fifth embodiment may be used to enable the value of the deposit to be added to the customer's financial account at the date and time of customer deposit processing, i.e. enable customers to pass value at source.
A further variation of the fifth embodiment uses RFID devices with a quantity of writeable memory. The customer is equipped with a RFID writer that enables the previously discussed deposit and/or processing data related to each banknote bundle and/or total cash deposit to be written to a memory within an RFID device associated with the bundle and/or deposit. Hence, instead of retrieving deposit and/or processing data using the serial numbers of the RFID chips, such data may be read directly from the memory of the chip itself.
A sixth embodiment of the present invention is illustrated in the flowchart of
One set of processing which is performed during vault processing 120 is the re-bundling of sets of banknotes in bundles of a predetermined denomination and optionally of a particular fitness. Each bundle is then secured with one or more plastic straps. The strapping process may also be performed by a strapping machine that is adapted to sort and process the banknotes before automatically applying straps to any sorted bundles.
In the present case, RFID devices or tags are embedded or attached to the banknote straps that secure each bundle and this RFID tag is used to identify the bundle and optionally to store data related to the notes within the bundle. Each RFID device may resemble that shown and described in relation to
At step 1325, a decision is made as to whether strapped bundles of banknotes should be strapped into bundles of even larger value. For example, a number of bundles each containing one hundred banknotes of a particular denomination may be strapped to form a larger bundle of a thousand banknotes of that denomination, i.e. by strapping ten previously strapped bundles. Again, this may be carried out by a suitably adapted strapping machine or by an operator. If strapping of strapped bundles is required, then the strapped bundles are themselves strapped at step 1335 and a strap identifier or serial number associated with an RFID tag attached or embedded within the strap applied to the strapped bundles is read at step 1340. The data associated with the previously strapped bundles and the further strapping process is then associated with the strap identifier of the larger bundle at step 1345. For example, if ten previously strapped bundles are to be strapped to create a larger bundle, then the strap identifiers of the ten previously strapped bundles may be registered with the strap identifier of the strap wrapping the previously strapped bundles. After the bundles of banknotes have been strapped one or more times, the strapped bundles are either stored or moved to an area where they may be ready for order processing at step 1330. Typically, the method 1300 is performed within the vault area 121 although it may alternatively be performed as part of the deposit processing 110 or the order processing 130.
The bundles of banknotes are then used to pick an order as shown in
Additionally, the RFID tags on the bundle may be used to transfer ownership of the bundles. For example, once a bundle is strapped, it may be assigned to an operator in the vault processing area 121. During transfer of the bundle from the vault processing area to the order processing area 131, ownership of the bundles may be transferred as well using the methods of the present invention. This method may also allow the automatic picking of orders through automatically reading the RFID serial numbers of bundles to ascertain their value and then to use this information to automatically pick a predetermined quantity of notes for an order.
The final recipient of the cash order may also use the RFID devices attached to the strapped bundles to check that their order is correct. By scanning a container containing one or more tagged bundles that comprise a cash order, the recipient is able to confirm the value of a sealed container as discussed above. This may be performed by receiving and integrating data stored in memory coupled to each RFID device or may be achieved by using the serial numbers associated with, and read from, each RFID device to perform a query on a central database to which the customer has access. In this manner the customer may check that their order is complete before opening the container and officially accepting a delivery of an order.
As well as associating details of the banknotes with the strap identifier at step 1320, other details relating to the processing may also be associated with the serial number or alpha-numeric code of the RFID tag. For example, data such as the date of strapping or processing, time of strapping or processing, operator in charge of strapping or processing, sorting machine, strapping machine, processing performed, and/or area of processing may be associated with the RFID tag. Again, this association may be performed by storing data within memory coupled to the RFID tag or may be performed by associating the serial number or alpha-numeric code of the RFID tag with data in a database record stored within the vault management system. If a problem arises with a particular bundle of banknotes, useful data can be retrieved from the vault management system: for example, the exact machine that produced the strap may be investigated and/or the time of strapping may be linked to the security camera system in order to allow a visual check of the strapping process; alternatively if there is a note quality or authenticity concern, the sorting or strapping machine ID may be used to retrieve the sort parameters active at the time of sorting or strapping.
In the above embodiment an identifier comprising a serial number or alpha-numeric code is associated with a bundle of banknotes by way of an RFID device embedded in the strap of the bundle. In one variation the RFID device need not be used and the identifier is printed on each strap or bundling device by the cash processing system. In another variation strapped bundles may need to be separated before being deposited in a container. If this is required the RFID devices in each strap may be scanned before the strap is removed and the banknotes in the bundle are placed in the container. At this point data comprising properties of the banknotes in each bundle may be retrieved using the scanned identifier. Such data may then be associated with an identifier of the container. This technique may be used, for example, when filling an ATM cassette.
While the method of the sixth embodiment has been described in relation to a strap it is also possible to use alternative means to secure sorted numbers of banknotes. For example, output cassettes, plastic containers or envelopes may alternatively be used, wherein an RFID is inserted or attached to the cassettes or envelopes. In these cases the strapping machine will be adapted to output the collection of banknotes in the required form. The RFID tag may also be incorporated into a print-on-demand label which may then be attached to a bundle of notes.
To facilitate the transfer process described in relation to
An example of a suitable RFID tag is shown in
A tag 1400 as shown in
A container equipped with an RFID tag may also be used to record the events surrounding a transfer as described in
In order to provide a closed system, passive gates may also be provided on all entrances and exits to the cash processing centre. For example, turning to the exemplary cash processing centre shown in
If methods and apparatus according to the fifth or sixth embodiments are used then individual cash bundles may be tracked on entry and/or exit to particular areas using RFID tags located in either the header or trailer documents or the straps of bundled banknotes.
To facilitate end-to-end tracking of deposits throughout the deposit process each deposit may be linked to a particular deposit identifier from pre-advertisement at the customer's premises to deposit processing and reject handling. To do this a particular RFID identifier related to a particular RFID tag may be associated with a container containing the deposit. The container and/or the RFID tag then stays with the deposit throughout the deposit lifecycle. RFID readers at predetermined locations may then detect the RFID tag and retrieve the identifier. This then allows real-time deposit tracking. For example, RFID readers may be provided within CIT vehicles, in the reception area 151, at the preparation and machine entry areas within deposit processing area 110, near or on cages temporarily storing deposit containers or within the vault. A similar system may also be used to track customer orders from the vault to the dispatch area and even possibly the CIT delivery vehicle. This would then allow complete tracking from and to the customer.
The tracking of items within the cash centre using RFID technology may be passive, based on the location of the last recorded transaction involving the RFID tag, or active, using the properties of the RFID tag to track the location of the tag in relation to one or more RFID readers positioned nearby. For example, a container having an RFID tag and being positioned on a cage in a first area awaiting transfer to a second area may be located by an overhead RF antenna positioned in the first area. The tracking system may also be used by CIT operators to retrieve real-time information on the status of cash orders. A plurality of RFID readers at a variety of stages during order preparation and dispatch may replace or complement existing CIT tracking systems. Using a single tracking method incorporating RFID would, however, greatly simplify the process.
An example of a deposit sequence using the methods discussed above is shown in
Some advantages of the RFID technology described above are:
-
- efficient confirmation of containers and/or bags received from a CIT vehicle, by using RFID tags to track deposits and provide associated data manual counting and/or quantity reconciliation is avoided;
- efficient loading of deposit and manifest data for further sorting during deposit processing, this increases the speed with which transfers between areas can be achieved;
- the presence of deposits to be processed and their corresponding location can be ascertained;
- manual typing and its associated risk of error is reduced;
- the presence of articles of value in the vault area may be accurately ascertained, together with the entry and exit times of such items; and
- all items that are ready to be placed in the vault can be monitored.
RFID technology may also be used to facilitate the processing of secure cassettes for automated teller machines (ATMs). Such cassettes are typically mounted within ATMs and supply cash for withdrawal. U.S. Pat. No. 6,976,634 B2 provides an example of a secure cassette and its use within an ATM, wherein the cassette may be supplied with an embedded RFID tag. A cassette may also be compartmentalised to store different types of currency; for example, a cassette may have one compartment to supply cash to the ATM for withdrawal by a customer, one compartment to store any notes that have been rejected by the ATM, and a third compartment for cash deposits made into the ATM.
The presence of an RFID within the structure of the cassette or deposited with cash within the cassette may facilitate the reconciliation process performed when the cassette is returned to a cash processing centre. The lifecycle of a cassette begins when it is selected as a container in order processing 130. The cassette may be filled according to the steps shown in
During use and/or before removal of the cassette, the ATM may communicate with the memory to update various fields of data. For example, the ATM may record details of all cash withdrawn from or deposited into the cassette and details of notes deposited into a reject compartment. Depending on the size of the memory and the hardware of the ATM, this data may relate to individual notes indexed by serial number or may relate to final totals for each compartment. The ATM and/or cassette may also be adapted to determine when data values indicate that the cassette requires emptying or refilling and automatically place an order for pick-up and delivery to the cash processing centre.
After removal and delivery to the cash processing centre, data stored with memory may be read by operators in the reception 150 and/or deposit processing 110 stages. For example, in a similar manner to the “pre-advisement” methods described above, the operator may scan the RFID, download data concerning the cash contained within the cassette and use such data to populate fields within the vault management system 200 in preparation for the reconciliation performed during deposit processing 110, e.g. automatically obtain the data required to perform steps 515 as shown in
In certain circumstances, ATM reliability can be increased if secure cassettes are matched with individual ATMs. For example, mating mechanisms on both cassette and ATM may wear and be displaced over time; however, for a given cassette and ATM pairing such wear and displacement will be complementary. To facilitate the correcting pairing of a given cassette and ATM, an RFID may be used.
According to a particular embodiment, the secure cassette is permanently associated with a particular RFID. For example, the cassette may be fitted with a read/write (R/W) RFID coupled to a memory. The memory may comprise a protected area that is read-only; this area contains a data identifier. The data identifier may be permanently associated with an ATM identifier, either via intermediary means, such as an association in a relational database, or directly, i.e. the data identifier may comprise the ATM identifier. When a paired cassette is required, the order, as described in the method of
Another use of RFID tag 1400 is shown in
A cage may also be adapted as described above and will typically resemble the trolley 1510 in
By using cages and/or trolleys with built-in RFID scanning readers the vault management software is able to track which containers move in and out of each trolley and/or cage within the cash processing centre. Hence, an operator or manager may be able to instantly find out the value of any cage and/or trolley within the centre by retrieving the cash or deposit information that has been associated with each container or the RFID tag 1400. In certain cash processing centres each cage and/or trolley may have a certain insurance limit. This means that the cage and/or trolley can only be loaded with a certain amount of cash. The RFID scanning reader thus allows the value of any cage and/or trolley to be calculated by the vault management system and if the insurance limit is exceeded then a warning can be displayed. Events that record when a container 1550 enters a cage and/or trolley may also be used together with CCTV systems to retrieve video footage of the container being placed into the cage and/or trolley or being removed from the cage and/or trolley.
In a variation to the apparatus shown in
In a similar manner, the trays that are loaded with cash deposits before processing by a banknote sorter or currency sorting machine may also comprise an associated RFID tag. If the methods of identifying bundles of cash used in the fifth and sixth embodiments are used then the bundles of cash present upon a tray may be linked with an identifier associated with the RFID tag attached to the tray by scanning the tray any accompanying deposits with an RFID reader. This then returns the tray tag identifier and the deposit identifiers which can then be linked within the vault management system. Hence the vault management system is able to keep a record of the expected value of each tray within the cash processing centre. By keeping track of the value of each bundle of cash placed on the tray a manager may also be provided with information about the total value of cash upon the tray. This total value of the tray may be used to keep within insurance limits and/or used to track whether there is enough deposited cash to keep the banknote sorter or currency sorting machine running at a predetermined capacity. If a tray is scanned before a processing operation upon the currency processing machine 260 is performed, then the data associated with the processing of the deposits upon the tray may be verified against data related to the deposits that were recorded before the operation. The banknote sorter or currency sorting machine may also be adapted to use a list of expected cash bundle or header card identifiers and thus the sorter or machine may be further adapted to stop operation if an RFID tag is detected that has an identifier that is not on the list. This technique may also be used to pair users and devices or storage containers and units.
An extension of the use of RFID tags and RFID readers to ascertain the location of cash within the cash processing sensor, both in the form of customer deposits and orders, involves the use of an advanced active RFID device in association with a wireless positioning system. The example below is described in relation to a wireless trilateration system, however the methods and systems may be adapted to operate using other known positioning systems, such as those that involve wireless triangulation or global positioning systems such as NAVSTAR GPS.
Wireless trilateration systems typically allow location tracking of suitably adapted RFID devices using a wireless local area network (LAN). Typically, an IEEE 802.11 compliant wireless LAN is constructed with a plurality of wireless access points. A RFID device is then adapted to communicate with these access points upon the wireless LAN using standard protocols and each RFID device may be uniquely identified by an address string such as the network MAC address of the RFID device. In use, when an RFID device communicates with three or more wireless access points the RFID device may be located by examining the signal strength of radio frequency communications between the RFID device and each of the three or more access points. Such a system is easy to implement using existing wireless LAN infrastructure that has been designed for data communication. An example of a suitable wireless trilateration system is that provided by Pango Networks Incorporated.
A seventh embodiment of the present invention directed to a wireless trilateration system adapted for use in a cash processing centre is shown in
Location server 1710 is connected to the vault management server 210 via a network comprising router 235A. Hence, the location server 1710 is integrated into the vault management system in a similar way to the CCTV system shown in
Articles to be tracked within the cash processing centre are typically equipped with an RFID device. These articles may comprise one or more of cages, guns, employees, bullion, trays, containers, cash bundles, trolleys, banknote sorters, and any other equipment used within the cash processing centre. Each RFID device is designed to communicate with the access points 1720 forming the wireless LAN. In use, due to the careful positioning of the access points within the cash processing centre, each RFID device should be able to communicate with at least three access points.
In the present example, the RFID device is adapted to emit a radio frequency signal or “chirp” containing a unique device identifier at predetermined intervals. For example, the RFID device may emit a number of bits comprising the device MAC address at 20-second intervals. This signal or chirp is detected by any access points within range of the RFID device. Each of the access points within range then processes the received signal or chirp and forwards a message comprising the detected signal strength of the received signal and the unique device identifier to the location server 1710 over network 1730. The location server 1710 is then adapted to use the received signal strength and device identifier from at least three access points to calculate the position of the RFID device and hence calculate the location of the article of interest. Typically, this is achieved by calculating the distance of the tagged object from the at least three receivers based on the signal strength and known signal attenuations over a set distance. The position of the object can then be found using standard geometry. Using such a system articles can typically be located to within 0.5 meters.
In an alternative embodiment, directional antennas may be used in a triangulation system to detect the position of a tagged object. In this case only two directional receivers need be used. When a “chirp” is received from a tagged device each receiver records the direction in which the “chirp” has a maximum measured power or intensity. Two angles are then calculated from the directions detected by both detectors and these angles are used together with the known distance between the detectors to calculate the position of the object. Such a system could operate on similar hardware to that shown in
In the present example, the calculated location is used to update a location database 1715. Location database 1715 may comprise an object orientated database comprising a collection of object records corresponding to each of the tagged articles within the cash processing centre. Each object record may be indexed and retrieved using the unique device identifier of the RFID device attached to each article. Each object record also has a location property. This location property may be given as a 2-dimensional coordinate corresponding to a location within the cash processing centre. To enable real time or near real time monitoring of articles within the cash processing centre this location property may be updated at predetermined intervals using the calculated location information.
The location module displays a schematic plan 1810 of the cash processing centre on a suitably designed graphical user interface. The location of various articles 1820 and 1830 are then superimposed on this plan 1810. This may be achieved by retrieving the location property of a given article from the location database 1715. In
In certain embodiments of the present invention, delivery and article routes may be displayed on a third party mapping system that provides schematics maps of the area or country of operation, for example “Google Maps” provided by Google Incorporated of California, USA. Such routes may be generated with or without the tracking system described above. Without the tracking system routes may be generated by passing parameters such as the post or ZIP codes of start and end destinations to a third party application programming interface. This parameters and any date and/or time data may be retrieved automatically from records stored in database 215. For example, a route may be generated using records pertaining to two or more of: a customer requiring a deposit, a CIT depot, the cash processing centre, a delivery address in a cash order etc. Each route may have one or more intermediate points. With the tracking system described above data may be passed to the mapping interface in real-time or at predetermined intervals. New routes may thus be created using this data or the data may be used to update and/or amend pre-existing routes. For example, a first route may be displayed from a customer address to the cash processing centre. Real-time location data may then be used to display the progress of a CIT vehicle travelling between the two locations, including timings and any detours taken. Such a map may be displayed to a customer making a deposit or awaiting a cash order, for example a customer operating a client device similar to device 220C. The mapping system may also provide a map of the customer's premises, the cash processing centre, and any stop off points along the route of the CIT operator.
The history of when a particular RFID tag was scanned and detected may also be added to the location map using transfer or detection event information stored in central database 215. By processing location data collected over time, average timings of transport and standard routes both inside and outside the cash processing centre may be established. Security alarms may then be raised if an article is detected as deviating from an established route.
An RFID badge for use in tracking employees or operators using the methods described above is shown in
As well as tracking employees around the cash processing centre the RFID badges may also be used to recognize the presence of an employee in front of a device and/or determine whether the employee is authorised to use the device. This may be performed in one of two ways.
In the first method, the triangulation system of
In the second method, an RFID reader is used to detect the RFID badge 1610. In this case, the RFID badge 1610 may comprise a RFID chip that may be read either passively or actively over a limited range.
In
In the present example it will be assumed that RFID reader 2010 has limited processing capability and passes any received data to the vault management server 210 over network 231. Vault management server 210 then performs the following processing steps. However, in other embodiments the following processing steps may be distributed across one or more devices including the RFID reader and/or a local workstation.
At step 2030 the received identifier is used to lookup user data. Such user data may be stored in a user account as described earlier. The identifier may be a primary key for the user account or may be associated with the user data in a relational database such as 215. Alternatively, the identifier may identify a user group as described earlier. At step 2040 the user is authenticated, i.e. the user wearing the RFID badge 1610 is identified. If the use of RFID badges is strictly controlled then it may be assumed that the identified user is correct. However, in most cases this level of trust will not exist and a further password may be required to fully authenticate the user. For example, when the user comes into close proximity to RFID reader 2010A, the banknote sorter 230A may display an identified user name received from vault management server 210 and prompt the user to enter his or her password to confirm authentication. The password may then be entered using an input device of the banknote sorter 230A. Even when a password is required this process reduces keying by a user by fifty percent. A similar procedure may be performed for client workstation 220A. For devices such as barcode or RFID scanner 225 that do not have a display or input device, a further local device may be used to confirm the authentication. For example, a user may be shown his or her user name on nearby client workstation 220A and be asked to enter his or her password using the keyboard of the workstation.
If the user is not successfully authenticated, for example if the identifier was not located in database 215, a password was incorrect, or the user is no longer an employee, then access to the vault management system is denied at step 2045. If the user is denied access an alert may be also triggered to inform security and management personnel of an unauthenticated access attempt has been made, together with the location and time of the attempt. At step 2035 video footage of the user, either a still or moving image, may be optionally captured to visually confirm identity or further biometric scans may be required instead of or as well as a password.
If the user is successfully authenticated a check is then made at step 2050 to determine if the user is authorised to use the device. Typically, this involves looking up user or user group data in a database such as database 215 for the authenticated user. For example, a binary flag stored within user or user group data may indicate whether the authenticated user is authorised to operate banknote sorter 230A. If the user is not authorised they are denied access to the device at step 2055. An alert may also be logged. If the user is authorised they are allowed to access the device at step 2060.
In certain embodiments, a single RFID reader may be provided for several devices. For example, in
The system and method of
The system and method may also be used to control the configuration of devices. For example, the authorisation data retrieved for an authenticated user may be used to select and/or lock an appropriate banknote processing program; an operator performing a note count operation would not require denomination and/or authentication detectors on a banknote sorter, hence these detectors may be automatically switched off based on authorisation data for the operator. Alternatively, the authorisation data may be used to implement the dual control and module locking methods described above. For example, when a supervisor enters the proximity field associated with an operator's client workstation, the workstation screen may automatically prompt the supervisor for their password and activate the dual control configuration. Likewise, a deposit processing operator may only be authorised to access a deposit processing module and be denied access to an order processing module. Such configuration could further be based on a number of conditions, for example an afternoon shift may be limited to use a particular sorting process, which may differ from the process used by the morning shift. The user, and by extension the shift, may be identified and authorised using the method of
The authorisation may also apply to physical access. In certain embodiments an RFID reader may be applied to a cage or trolley, as shown in
Even though the above system and method was described in relation to an RFID badge 1610, it need not be limited to such a form. In an alternate or complimentary embodiment, the RFID chip may be embedded in a watch, wrist strap or bracelet worn by the operator or employee. In this case, a narrow field RFID reader may be placed underneath an input panel of the device, such as under a keyboard of client workstation 220A. Hence, when the operator interacts with the input panel, the watch, wrist strap or bracelet will come into close proximity to the RFID reader and the RFID chip may be read without requiring any further action or input from the operator. This makes the technology more acceptable to employees as they do not have to alter their established routines to enable RFID authentication and authorisation. Alternatively, the RFID badge 1610 may be swiped or passed underneath an RFID reader in the usual manner to log in and out of the vault management system on a client workstation. RFID cards may also be used with biometrics and fingerprint identity systems. By combining the RFID badge with one or more additional security systems a manager can be confident that only authorized users may access the vault management system and thus be confident of the integrity of any information being inputted into the system. Data associated with the location of the employees may also be used to track employees working hours.
The above systems and methods have been described with relation to radio frequency identification devices; however, such systems and methods may also be adapted to operate with other related wireless transmission systems using optical, infra-red or microwave wavebands, acoustic technology such as ultrasound, mobile radio systems, cellular technology, and Bluetooth, ZigBee or Ultra-wideband (UWB) standards, amongst others.
Any of the methods described in this specification may be implemented in software using known software development techniques, in dedicated hardware using appropriately configured logic units or in programmable hardware adapted to process digital instruction sets.
Claims
1. A method of providing information about a plurality of entities within a cash processing centre, the method comprising:
- coupling a first entity with a first wireless device;
- coupling a second entity with a second wireless device;
- reading data associated with both the first and second wireless devices; pairing data associated with both the first and second wireless devices; and
- retrieving information concerning the relationship between the first entity and the second entity based on the pairing.
2. The method of claim 1, wherein:
- the first entity comprises a container for storing articles of value; and
- the second entity comprises storage means for one or more containers;
- the method further comprising:
- storing data comprising the properties of one or more articles of value;
- associating said data with the first entity;
- storing the first entity on or within the second entity; and
- retrieving information comprising the cumulative properties of the articles stored on or within the second entity based on the pairing.
3. The method of claim 1, wherein:
- the first entity comprises one or more articles of value; and
- the second entity comprises a unit adapted to store articles of value;
- the step of retrieving information comprising:
- retrieving information indicating that the first entity is stored upon the second entity.
4. The method of claim 1, wherein:
- the first wireless device comprises a wireless transmitter configured to transmit a first identifier;
- the second wireless device comprises a wireless receiver having a second identifier; and the step of reading data comprises:
- transmitting the first identifier from the wireless transmitter;
- receiving the first identifier using the wireless receiver; and
- reading both the received first identifier and the second identifier of the receiving device.
5. The method of claim 4, wherein the method further comprises:
- determining signal characteristics associated with the received identifier;
- using the first identifier, the second identifier and the signal characteristics to determine the location of the first entity.
6. The method of claim 4, wherein the method further comprises:
- receiving the first identifier using one or more additional wireless receivers associated with respective additional entities, said wireless receivers having respective identifiers;
- pairing the first identifier, second identifier and the one or more additional identifiers; and
- using the pairing to determine the location of the first entity.
7. The method of claim 6, further comprising:
- determining signal characteristics associated with each received identifier; and
- using the signal characteristics together with the pairing to determine the location of the first entity.
8. The method of claim 4, further comprising:
- repeating the method steps at regular intervals; and
- updating the location of the first entity.
9. The method of claim 6, wherein the wireless receivers comprise directional receivers and the location of the first entity is determined using triangulation.
10. The method of claim 5, wherein the first entity is one of: a cage, a scanning device, an employee, one or more articles of value, a container, a trolley, or a banknote sorter.
11. The method of claim 4, wherein the step of retrieving information comprises:
- determining whether the first entity is authorised to be paired with the second entity;
- if not generating an alert.
12. The method of claim 4, wherein:
- the first entity comprises an operator within the cash processing centre; and
- the step of retrieving information comprises:
- authenticating the operator using the first identifier.
13. The method of claim 12, wherein:
- the second entity comprises a device for use in the cash processing centre;
- and the step of retrieving information further comprises:
- if the operator is authenticated, retrieving user data associated with the operator;
- based on the user data, determining whether the operator is authorised to use the device.
14. The method of claim 13, wherein the step of retrieving information further comprises:
- if the operator is authorised, allowing access to the device, if not, denying access to the device.
15. The method of claim 12, wherein if the operator is not authenticated and/or authorised an alert is generated.
16. The method of claim 13, wherein the device comprises one of: a banknote counter or sorter, a client computing device, or a handheld electronic device.
17. The method of claim 13, wherein the step of determining whether the operator is authorised to use the device further comprises:
- determining whether the operator is authorised to use any further devices connected to the device; and
- if so, allowing access to the authorised further devices.
18. The method of claim 1, wherein the wireless devices comprise radio frequency identification devices.
19. The method of claim 1, wherein the first entity belongs to a first group of entities and the second entity belongs to a second group of entities.
20. A system for providing information about plurality of entities within a cash processing centre comprising:
- a first wireless device coupled to a first entity;
- a second wireless device coupled to a second entity; and
- a processor adapted to:
- read data associated with both the first and second wireless devices;
- pair data associated with both the first and second wireless devices; and
- retrieve information concerning the relationship between the first entity and the second entity based on the pairing.
21. The system of claim 20, wherein:
- the first entity comprises a container for storing articles of value; and
- the second entity comprises storage means for one or more containers; the processor being further adapted to:
- retrieve information comprising the cumulative properties of the articles stored on or within the second entity based on the pairing.
22. The system of claim 20, wherein the first entity comprises one or more articles of value; and
- the second entity comprises a unit adapted to store articles of value;
- the processor being further adapted to:
- retrieve information indicating that the first entity is stored upon the second entity.
23. The system of claim 20, wherein:
- the first wireless device comprises a wireless transmitter configured to transmit a first identifier;
- the second wireless device comprises a wireless receiver having a second identifier; and
- the processor being further adapted to:
- read a first identifier received from the second wireless device, together with the second identifier of said device, and pair said identifiers.
24. The system of claim 23, wherein the processor is further adapted to:
- receive signal characteristics associated with the received first identifier; and
- process the first identifier, the second identifier and the signal characteristics to determine the location of the first entity.
25. The system of claim 24, wherein the system further comprises:
- one or more additional wireless receivers associated with respective additional entities, said wireless receivers having respective additional identifiers; and
- the processor is further adapted to:
- receive one or more copies of the first identifier as received by one or more of the additional wireless receivers, together with the additional identifiers of said receivers;
- pair the first identifier, second identifier and the one or more additional identifiers; and
- determine the location of the first entity using the pairing.
26. The system of claim 25, wherein the processor is further adapted to:
- receive signal characteristics from each wireless receiver; and
- process the signal characteristics together with the pairing to determine the location of the first entity.
27. The system of claim 24, wherein the processor is adapted to:
- repeat the processing steps at regular intervals to dynamically update the location of the first entity.
28. The system of claim 24, wherein the wireless receivers comprise directional receivers and the processor is adapted to determine the location of the first entity using triangulation.
29. The system of claim 24, wherein the first entity is one of: a cage, a scanning device, an employee, one or more articles of value, a container, a trolley, or a banknote sorter.
30. The system of claim 23, further comprising:
- a database comprising authorisation data;
- wherein the processor is adapted to:
- access the database to determine whether the first entity is authorised to be paired with the second entity; and
- if not generate an alert.
31. The system of claim 23, wherein:
- the first entity comprises an operator within the cash processing centre; the system further comprises a database comprising authentication data; and the processor is further adapted to access the database to authenticate the operator using the first identifier.
32. The system of claim 31, wherein: the second entity comprises a device for use in the cash processing centre;
- the database further comprises authorisation data;
- and the processor is further adapted to:
- retrieve authorisation data associated with the operator from the database if the operator is authenticated;
- based on the authorisation data, determine whether the operator is authorised to use the device.
33. The system of claim 32, wherein the processor is further adapted to:
- allow access to the device if the operator is authorised, or deny access to the device if the operator is not authorised.
34. The system of claim 31, wherein the processor is further adapted to generate an alert if the operator is not authenticated and/or authorised.
35. The system of claim 32, wherein the device comprises one of: a banknote counter or sorter, a client computing device, or a handheld electronic device.
36. The system of claim 32, wherein the system further comprises:
- one or more further devices connectable to the second entity;
- and the processor is further adapted to:
- based on the authorisation data, determine whether the operator is authorised to use any of said further devices; and
- allow access to any connected further devices if the operator is authorised.
37. The system of claim 20, wherein the wireless devices comprise radio frequency identification devices.
38. The system of claim 20, wherein the first entity belongs to a first group of entities and the second entity belongs to a second group of entities.
39. A storage unit for containers for use in a cash processing centre, the containers containing one or more articles of value, the storage unit comprising: a storage area for one or more containers,
- the storage unit by comprising:
- one or more wireless receivers coupled to the storage unit configured to wirelessly read data from a wireless identification device and output data accordingly;
- wherein, in use, each container is coupled to a wireless identification device, the wireless identification device storing data associated with properties of the articles of value within the container; and
- in use, the properties of any articles of value stored upon the storage unit may be retrieved by processing data output by the one or more wireless receivers devices.
40. A method of tracking articles of value within a cash processing centre comprising:
- a. coupling one or more articles of value with a first wireless identification device;
- b. coupling a unit adapted to store articles of value with a second wireless identification device;
- c. reading data associated with both the first and second wireless devices; and
- d. recording that the one or more articles of value are stored upon the unit based on the read data.
41. A system for authenticating a user within a cash processing centre comprising:
- a first wireless device coupled to a device to be operated by the user;
- a second wireless device coupled to the user for identification;
- a processor adapted to: read data from the first wireless device comprising identification data received from the second wireless device;
- using the identification data authenticate the user with regard to the device to be operated by a user.
42. The system of claim 41, wherein the processor is further adapted to determine if the user is authorise to operate the device to be operated: if so allowing the user to operate the device, if not preventing the user from operating the device.
Type: Application
Filed: Dec 19, 2008
Publication Date: May 5, 2011
Applicant: De La Rue International Limited (Hampshire)
Inventors: Alexander Cockerell (Hampshire), Kevin Smith (Wilton, CT), Timothy Edward Plumridge (Hampshire)
Application Number: 12/735,177
International Classification: G06Q 40/00 (20060101); G06Q 10/00 (20060101);