Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ANTI-THEFT AND PENETRATION ALARM SYSTEM OF SAFE BOXES, VAULT DOORS AND ATMS
Document Type and Number:
WIPO Patent Application WO/2020/016629
Kind Code:
A1
Abstract:
By placing a neural network of non-conductive tablets equipped with lines of conductive materials in inner wall of safe and its door as well and connecting it to the controller for discerning the infringement and announcing the robbery, the safe is equipped with smart theft detection system and the extension of controller tablets across all the layers of internal cabinet of the safe controller system checks all the tablets frequently in terms of physical maintenance. In case the robbery by penetration happens, theft announcement system gets activated in early moments of the incident.

Inventors:
AHMADI KARGAR SEYYED MOHSEN (IR)
Application Number:
PCT/IB2018/055328
Publication Date:
January 23, 2020
Filing Date:
July 18, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
AHMADI KARGAR SEYYED MOHSEN (IR)
International Classes:
G08B13/00
Foreign References:
KR20100042737A2010-04-27
US8138922B22012-03-20
Download PDF:
Claims:
Claims

1. The invention of Anti-theft and penetration alarm system of safe boxes, vault doors and ATMs including at least a neuronical network of paper with printed conductive lines and at least a digital codes sending and receiving system, a power supply system, and at least a warning system in the form of an alarm or activating a siren or sending relevant text messages to police office or system owners and at least an incident announcement system by GSM modem and an electronic anti-theft system.

2. The invention of number one claim in which the detection of penetration happens by electronic circuit fault method in one or more closed circuit through which current flows.

3. The invention of number one claim in which the detection of penetration and damage to the track, lost electronic connection and circuit for discerning the loss of connection announce the theft and controller circuit announces the damage.

4. The invention of number one claim in which the resistance rate in the closed circuit is calculated and in case of fluctuation, the penetration will be announced.

5. The invention of number one claim in which the closed circuit (track) for transmitting the electric current is created by wire, conductive ink or any element, compound or chemical material which has the capability of electricity transmission.

6. The invention of number one claim in which the current flowing through the closed circuit can be alternating current, or direct current and in any frequency.

1

7. The invention of number one claim in which in which the closed circuits (tracks) can be of varying length and diameter.

8. The invention of number one claim in which the amount and magnitude of passing current can't affect the detection of penetration.

9. The invention of number one claim in which the code is sent by the transmitter at the beginning of closed track and is received at the end of the track by the receiver, and in case the code is not acknowledged by the receiver, the penetration into the system is detected.

10. The invention of number one claim in which the use of thermocouple creates a closed track the damage to which or the loss of connection may lead to penetration detection.

11. The invention of number one claim in which the use of voltage supply at the beginning and end of track increases the chance of detection.

12. The invention of number one claim in which the use of closed circuit( track) can be applied in the body, and door of safes, vault doors and ATM boxes as well as anti-theft doors for detecting the penetration by destruction or drilling.

13. The invention of number one claim in which controller unit activates anti- theft lock if theft happens.

14. The invention of number one claim in which theft announcement happens by turning off the system in case of high temperature of the body because of laser oxy-fuel cutting or electric arc.

2

Description:
Anti-theft and penetration alarm system of safe boxes, vault doors and ATMs

TECHNICAL FIELD: The present invention is related to the structure of anti-theft safes as well as that of smart safes which are able to alert against penetration and theft and react against theft in a smart manner. The invention is about protective means and security field and is also a kind of alerting system in safes, which is related to different kinds of safes, vault doors, and portable and fixed boxes of ATMs and anti-theft doors.

BACKGROUND OF THE INVENTION:

Concerning present protective security systems for safes, vault doors and ATM boxes and in particular the portables which are in use in public places and regarding the current condition of protective products, it should be mentioned that the best metal alloy is used for strengthening the exterior and interior layer while injecting the most resistant material for improving the middle layer in the best samples made. We will study their function, pros and cons in a full-fledged manner.

Safes comprise of a cabinet or an external frame and an internal frame which can be viewed after it is open. Both external and internal layers are made of a metal alloy like steel to have the highest strength level. First type: Rendering severe blows against the lock pushes the fence, which is a small rod resting atop the wheels to keep the safe shut, and destructs the logical link between the lock and turning knob. Thereafter, by turning the main lock of the door, the thief is able to easily open it. This is the most common method of burglary from normal safes.

The second type:

This method is specifically designed in anti-theft safes. In order to foil the attempts in striking blows against the locks which leads to pushing the fence (small rod) further back and thus disconnecting the link between the lock and turning knob, a space with a thin glass tablet which is connected to the bolt by a piece of wire has been created behind the locks, which prevents the theft by the method early explained in the first type. Even the thefts can ' t open the door by turning the knob (combination lock).

Third type: In this method which belongs to professional thieves aiming at valuable safes, the thieves open the locks which have a key, the, they pierce a tiny hole on the back of the safe and insert special means to open the bolts of the protective lid of combination lock. Later, they can insert a built-in camera to the space and read the security numbers to open the safe.

Fourth type: This method is used when there is not enough expertise or meticulousness for decoding the security number of the locks or there not enough time. The thief uses different techniques and devices such as laser cutting, oxy-fuel cutting or even by the help of welding device for its high temperature to cut the external metal section of the safe. Then, He hollows the content of internal section out and cuts through the inner layer as well to execute the burglary.

We can now lay an eye on the prior art regarding different inventions about systems and methods to give safes an anti-theft status or to produce anti-theft doors. In patent NO. US5475376A dated as Dec. 12, 1995 which has been registered by ’’Masaru Chikamitue, Kengo Ishibas, hiHiroshi Ito, Kentaro Adachi” in USPTO, a kind of security system of safes is introduced which includes a safety box, safety box controller, a system controller, and multi-functional key inside which an electronic hard is installed. The electronic data saved in electronic hard is deciphered by a device and is transferred to the determiner device in system controller. The device compares the transferred data with data already saved in electronic hard and if they are compatible, the lock gets unlocked.

Another patent, CN105822180A registered in Chinese patent registration office, on July 06, 2016 is a compound safe made of double anti-theft layers. It is comprised of an external door and one or more internal doors to reduce the stealing risk.

Another patent, CN201835672U, registered in on September 19, 2010, burglary is announced to police by the help of smart RF-ID system which is connected to the cellphone.

Patent NO. CN205558639U registered in Feb. 01, 2016 in offers a network system of an alarm for the safety of safes which has a coded fingerprint discernment system, tremor discernment module, smart controller, photo discernment module, LCD touchpad module, GPRS module, data police module and main control. In case the fingerprint is not compatible with the previous fingerprints, the discrepancy is informed to the police office by the help of the safe owner ' s cell phone.

The patent No. US20020157227 A1 registered in USPTO in Oct. 31, 2002 by Michael Hedrick displays a safe which has a frame with a specific key for the safe without which opening the safe is impossible.

EXISTING PROBLEMS AND THE PURPOSE OF THE INVENTION:

Nowadays, people throughout the world employ protective security systems to keep their valuables and riches safe against burglary and theft, and are somehow successful in defeating the criminals. However, the purpose behind developing and producing these alarm systems for transgression in safes, vault doors and ATM boxes is the prevention of burglary by professional thieves. Considering the fact that different individuals and legal entities employ safes, vault doors and ATM boxes for the protection of personal property or important documents, it should be mentioned that protective means serve different functions based on their application, technology and the country in which they are made of, which we will briefly study these systems.

In the most basic type, safes play the role of a heavy iron enclosure with a lock and fight against theft by carrying the property and documents by the thieves and the installed lock in safes make it impossible for thieves to open the door. In these safes which have relatively low safety precaution, thief may strike blows against the lock, push the bolt back away from its main place, and disconnect the link between the lock and turning knob( combination lock) of the main door if he can't decipher the security number, and this is the simplest way of burglary from thefts. In another type of safes which are called anti-theft safes, a space is developed by a thin glass behind the locks and attaching a piece of wire to the bolt prevents the repetition of the first method in burglary as the blow causes the glass to be broken and accordingly the wire gets released which leads the anti- theft lock to get activated. In this method, theft purchases a safe similar to what he intends to rob. Then, he first drills a hole in the anti-theft lock ' s place and later another hole in the anti-theft lock itself. He later places a pin inside the bolt of anti-theft lock and prevents the lock inside the cam to fall. He also changes the bolt ' s place by rendering blows against the locks and because the place of anti-theft lock is fixed, alarm system loses its meaning. There is no counter method to foil thieves ' attempts to rob trying this method considering the fact that methods and means for thieves have developed in the course of time.

Some of the thieves do not resort to older methods for burglary and try to do robbery by the help of special means and equipment. This group of robbers employ special equipment like oxy-fuel cutting, laser cutting and high temperature of welding tool intend to cut through the external metal layer of the safe, and then hollow the content of the internal layer out and effect a second cut through the internal layer to do the robbery. There is no solution against this method of robbers.

The purpose to develop the new product is to display a better and safer function for the safes, vault doors and portable and fixed ATM boxes, in which case it makes the theft from safes more difficult and time-consuming. At the same time, its fast announcement of robbery in early moments of the incident enables its owner to activate the anti-theft lock which is located in the internal layer after the concrete section and operates quite independently. The theft can't prevent anti-theft lock even if he knows where it is located. THE DESCRIPTION OF THE INVENTION:

In the present invention, a kind of smart network like neural network is applied to detect any kind of penetration to the external layer of safes and other safety systems. This network constitutes of very thin conductive lines which are placed over a very flexible surface like paper or other materials. For developing such tablets equipped with neuronal conductive lines, lines could be drawn on the papers according to the decided sketch by the help of a printer, plotter or other manual means or by the help of analog or digital devices. The ink which is used for sketching the lines is a kind of conductive ink and can be produced based on graphite, silver compounds or any formula and compound which is able to have electricity pass through. For developing this network in the present invention, graphite compounds are used; however, the ink we are discussing does not consist in graphite and any kind of ink and conductive material can create the network. Another kind of network development can be done by acidizing copper surfaces and using the remaining copper on the surface which constitutes the network. Yet, in another method conductive polymer tablets which is cut by laser can be employed to develop the network we can use a surface that printed both sides and connected end of line as first side to start line of another side by a pin. In general, the existence of a network of conductive lines developed by each of the aforementioned methods is the subject of our network in the present invention and our examples of a printed network on a paper does not limit our options and is just an example of network development methods.

The surfaces (tablets) have an input and an output such that one the lines are intersected in each section. This non-cohesive connection leads to electricity outage. By using epoxy resin or any kind of resin which can be fixed, is water-proof and wet-proof and can be pasted to inner surfaces of exterior cabinet of safes, ATM boxes, and vault doors for giving them an anti-theft feature. By connecting surfaces to each other, we can create numerous number of series or parallel circuits. This causes the input and output connection to get detached with one another in case there happens a rupture in any of the lines in every surface (tablet) and thus the ability to transfer the electricity throughout the network becomes impossible. If needed, several layers of these surfaces can be pasted one over the other and asymmetrical pattern of networks or disorganized stacking of surfaces over each other in terms of the surface lines' angles in respect to each other causes the insertion of an object like a drill through layers of neural network impossible without damage to the lines. If developed surfaces (tablets) are wrapped with a layer of insulation like polymer film or paper covers or similar non-conductive materials, crooked, deformed and crumpled surfaces might be used in surfaces without problem. By the help of the surfaces, all the interior space of the safe is covered. Hence, from the input path of the first page to the exit track of the last page are connected and make a unified network. Input electrons may require a specific time period to exit from the network because of the length of the network. If certain signals with certain voltage are sent from the input, signal will be received and detected at the end of the circuit with little voltage sag. If signals could be created by signal production generator, we can receive the pattern for those signals in the output. If output signal is received by a receiver, the input and output signals can be compared with one another by the help of a processor. If signal connection is lost because of the penetration of a sharp object like drill or for high temperature of cutting device or laser, output signal will be also lost and these two signals won ' t be compatible because of a direction change or short connection between some of the lines. If binary codes are used, tolerance of device error in the compatibility of input signals and output signals could be reduced to zero. In case random codes, code production digital generator can develop billions of indiscriminate codes which would never be predicted. So, distracting the network with a shortcut in part of the circuit is impossible without reaction. On the other hand, the calculation of message crossing time through network enables the calculation of receiving and sending when there is a change in network ' s length. Henceforth, if there happens to be a connection between two unusual sections of the network by deactivating part of the network for penetration, this can be easily detected by the processor and then alarm can go off. The proximity of lines to each other and disorganized pattern of inside cause the means and equipment for piercing the safe damage the safety system for alarm.

The present invention is equipped with a controller which has some inputs and some outputs. This controller system has some inputs which enter the system through sensors and enacts one output after effecting a change in input and announcing it to the processing unit. For example, it activates theft alarm in the place or police office or sends a text message to the manager or simultaneously causes several outputs and other operation altogether. Among different outputs, activation of internal anti-theft locks which are activated by receiving electronic messages from central controller and blocks the access to inside of the safe even for its owner impossible without cutting and destruction. The system processes the inputs once again after contacting the manager. Sending text message and calling are done by GSM modem and cell phone. For making decision, a processor is used. For system inputs, current loop method is employed. Diagram block of the system is simply made of five parts and each part has diagram block and each diagram block is comprised of some parts. System can be divided to input and output blocks, analysis block, power supply, and GSM modem. Analog circuits exist only in input block and power supply and operation happens in a logical and conditional manner in other blocks. Circuit of power supply block (fig.6) which can enjoy any kind of chargeable battery or power supply system is responsible for providing power to other blocks. This block is an essential part of analysis unit and input and output blocks.Any error in steady state of the system for this block means the lack of power for operating next blocks. This block has an input of 0 to 16 volt.

These numbers could be considered in normal scopes. Output is 4.2 volt and ripple from central axis is permitted 20%. Output is considered 2 ampere for 4.2 volt and block can resist a temperature of 80 centigrade. In case of further changes and discrepancy from the planned condition, message sending and warning alarm gets activated. Among the features of this block is the supply of output current for transition in input line and high impedance for adaptation with transition line and low reliance on temperature.

In input section of the system, they enjoy inputs which obtain necessary information from Nano- sensors which enter the system in the first layer after external cabinet of the safe so that an output gets activated with change in input and its announcement to the processing unit after making decision about each input and condition of an output. System inputs use current loop method. Nano-sensors are indeed conductive ink which have been sketched by a plotter on paper surfaces (tablets) in either vertical or horizontal manner in certain intervals meticulously so they get installed in the first layer after external cabinet of the safe. They are covered by epoxy resin (eel 30) and hardener (w340) which have been mixed with each other. In fact, the resin makes the data transition tablet water-proof so that they don’t get damaged between cement and water layers. Controller prepares the information of input blocks so they enter the analysis block. Analysis unit measures the input and makes a decision according to the input and previous conditions. Data is categorized in this unit and sent by modem if necessary. Output gets activated when inputs are provoked. We expect the system to continue operating without error under steady condition, does not face problems in operational interruption, and environmental factors like temperature, the humidity, pressure and noise do not prevent it from normal functioning in this block. We also expect this block to analyze all the data transition and reception algorithms accurately.

Output unit in diagram block (fig.5) shows the result of analysis unit. Output unit has the feature of transiting the order easily. It doesn’t have complicated calculation in electronic terms. It only needs to be resistant against temperature and humidity and noise.

In present invention, after the safe is locked by its owner, system controls safety, and security of the door, body and the bottom. Controller tablets include the first layer of external cabinet and thin tablets behind the locks. As regards the relation of blocks with each other, each block has an input and an output and develops the input and output proportionate to the activity. In figure No.7 the relation of different blocks is shown. In input block, we have an output for each input which converts two connections to an amount for measurement. Output analyzer converts the input block to digital number and transfers it to the output after making decision.

In behavioral terms, blocks are function of a system which has algorithmic or derivative essence or are linear or non-linear. Controller systems are defined in S or Z field space as the ability to control and other parameters are calculated there. And finally a controller is developed for it. Here, blocks are linear functions and do not change according to time and can change only one parameter. In input block, only one connection turns into voltage. Thus, function is totally a line of a key which opens or closes in an uncertain time period.

Conversional function is not offered for micro-controller systems because of their combinational circuit. For such systems, decision-making algorithms and solution procedure is provided. For output, conversional function relies on decision-making conditions and is similar to input, and is a linear function of decision-making conditions. Power supply does not have a particular conversional function in its steady condition and is the same UT.

Inputs block is comprised of 8 paired inputs each of which uses a current supply. The reason for employing a current supply is that conducted noises affect voltage. At the same time, using current makes the circuit ' s functioning independent of covered distance.

The kind of current is Source. If output current is considered as 2 milliampere with a resistance of 1 kilo-Ohis, output voltage will be 2 volt. Resistance tolerance of 5% changes the output volt tol .9 to 2.1 which does not cause a remarkable error for this tolerance. The rest of the block does not have a specific signal as they directly depend on analysis unit.

After input block ' s signal enters the analysis unit, data should be converted to concrete digital numbers. For this purpose, an analog-digital convertor is applied. Thus, the first block is the analysis circuit of analog-digital convertor. After converting each signal to its digital equivalent, the data is compared and considering its previous condition, output gets activated or deactivated. At the same time, data is sent to GSM modem. As soon as changes in input occur, outputs turn on and in fact by the time variables are activated, algorithm becomes sensitive to change. Data is always sent to the manager ' s number as text message.

The invention of anti-theft system and alarming system for warning interpretation into safes, vault doors and ATM boxes include paper with conductive printing, code reception sending system, battery and text messaging of theft occurrence based on GSM modem, in which the detection of penetration happens by the help of electronic connection in one or several closed circuits through which currents flow. If penetration happens and the currents ' track suffers damage, controller circuit announces the damage. The resistance rate of the closed circuit is calculated and if it varies, we can decide on the penetration. Closed circuit is developed for the transition of electric current by wire, conductive ink or any element, compound or chemical material which is able to pass the electricity through. The electric current which flows through the closed circuit can be either alternating current or direct current, with any frequency and closed circuits with any length and diameter. The amount of passing current does not affect the detection ability. Sending code by the transmitter in the beginning of the closed track and its reception at the end of it by the receiver happens and in case code is not received penetration is detected. Using thermocouple mode of metals shape a closed circuit the damage to which or the loss of connection in part of it leads to penetration detection. The use of voltage supply at the beginning of track and the calculation of voltage amount will lead to detecting the penetration. Closed circuit (track) method can be used in safes ' body, vault doors, ATM boxes and anti-theft doors as a detection method of penetration by destroying or drilling. Among its advantages is alert time reduction for infringement. In the present invention: Alarm goes off with the first effort to theft. On the other hand, by the first effort to penetrate, anti-theft system of locking gets activated electronically and makes the penetration through safe door impossible with destroying the body of safe. Striking blows against the lock and accordingly recession of the lock further back causes the damage to controller tablet and thus gets the text message to be sent to analysis unit. This in turn leads to the activation of anti-theft lock and the thief can ' t open the safe door.

Among other advantages of this invention is the development of controller tablets across the surface of safe door. In fact, wide coverage of the door by controller tablets and direct contact with the surface of the door and, in fact, controller tablet is located between door and cement and this prevents damage and disorder to controller tablets and releases the anti-theft lock electronically. In turn, any chance for drilling anti-theft lock and placing the pin in it is taken away and by the alarm going off, the thief is made to leave the scene and sending text message to the owner informs them of the incident.

BRIEF DESCRIPTION OF FIGURES:

Figure number one displays a simple safe box without a neural network.

Figure number two displays a safe box equipped with neural network.

Figure number three displays the structure of a safe box door and the position of neural network

Figure number four displays the door from outside and the position of neural network

Figure number five displays the diagram block of GSM modem.

Figure number six shows how blocks are related to each other. Figure number seven is an example of data and probable signals. Figure number eight is a sheet that printed both sides.