Security case

ABSTRACT

The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably operated by an electronic key. The electronic key can be programmed to open the case or container dependent upon various different conditions, for example, location, time, identification of operator, etc. In addition to the electronic key, a biometric identification device can be employed. The exterior of the case or container is made from different materials which are impermeable and resistant to heat, drilling and ballistic impact. A GPS type of location device located within the case enables the case to be tracked from remote locations.

PRIORITY CLAIM

In accordance with 37 C.F.R. 1.76, a claim of priority is included in anApplication Data Sheet filed concurrently herewith. Accordingly, thepresent invention claims priority as a Continuation application to U.S.patent application Ser. No. 13/101,336, filed May 5, 2011, entitled“Security Case”. The contents of the above referenced application isincorporated herein by reference in its entirety.

FIELD OF THE INVENTION

The present invention relates to the secure transportation of valuableobjects; in particular, it relates to a portable container whichrestricts access to the contents within the container to authorizedindividuals and enables the container to be tracked.

BACKGROUND OF THE INVENTION

With crime always on the rise, especially today, it is imperative toprovide protection for valuable materials such as jewelry, financialfiles, financial documents, credit cards, intelligence files, etc. Sincethe transportation of these objects cannot always be restricted to armedand secure vehicles, individuals must be relied on to transport thesevaluables. To enable an individual to securely transport thesevaluables, a portable security case or container must be provided.

DESCRIPTION OF THE PRIOR ART

U.S. Published Patent Application No. 2005/0225432 discloses a method oftransporting an alarmed container. The alarmed container is used totransport valuables. The alarmed container includes a first electronicunit which functions to accept and permit deactivation and/or opening ofthe alarmed container. The container is opened with the aid of a primarykey which includes a second electronic unit that communicates with thefirst electronic unit in respect of initiating opening of the container.The primary key accompanies an individual transporting the container andthe container is opened and/or its alarm system deactivated at itsdestination with the aid of a code subset from the individual carryingthe primary key in co-action with a code subset obtained from adestination-located secondary key, therewith providing a total code-setrequired for initiating opening/deactivation of the container.

SUMMARY OF THE INVENTION

The present invention is a self contained, portable security case orcontainer. The case is secure in its locked condition by locks which arepreferably operated by an electronic key. The electronic key can beprogrammed to open the case or container dependent upon variousdifferent conditions; for example, location, time, identification ofoperator, etc. In addition to the electronic key, a biometricidentification device can be employed. The exterior of the case orcontainer is made from different materials which are impermeable andresistant to heat, drilling and ballistic impact. A GPS type of locationdevice located within the case enables the case to be tracked fromremote locations.

Accordingly, it is an objective of the present invention to provide asecurity case comprising a plurality of layers which are resistant tounauthorized entry thereinto.

It is a further objective of the present invention to provide a securitycase including a security system contained therein which permits entryinto the security case only by authorized individuals.

It is yet another objective of the present invention to provide asecurity case which includes a location device which permits anindividual to track the current and past locations of the security case.

It is a still further objective of the present invention to provide asecurity case including a security system which utilizes electronic keysto gain entry into the security case.

It is still another objective of the present invention to provide asecurity case including a location device which utilizes satellites torecord and transmit the location of the security case to an individualat a location remote from the security case.

Other objects and advantages of this invention will become apparent fromthe following description taken in conjunction with any accompanyingdrawings wherein are set forth, by way of illustration and example,certain embodiments of this invention. Any drawings contained hereinconstitute a part of this specification and include exemplaryembodiments of the present invention and illustrate various objects andfeatures thereof.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a top perspective view of the present invention;

FIG. 2 is a perspective view of the interior of the present invention;

FIG. 3 is a view of the locking mechanism of the present invention;

FIG. 4 is a view of the location device and hard drive of the presentinvention;

FIG. 5 is a cross sectional view of the present invention;

FIG. 6A is an exploded view of a lower portion of the case of thepresent invention;

FIG. 6B is a cross sectional view of a lower portion of the case of thepresent invention;

FIG. 6C is a cross sectional view of a lower portion of the case of thepresent invention;

FIG. 7 is a view of the electronic key of the present invention;

FIG. 8 is a schematic of the electronic locking system of the presentinvention;

FIG. 9 is a detailed view of a portion of FIG. 8;

FIG. 10 is a view of a biometric key of the present invention;

FIG. 11A is a cross sectional view of another embodiment of the presentinvention in a closed position;

FIG. 11B is a cross sectional view of the embodiment in FIG. 11A in anopen position; and

FIG. 12 is a view of another embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

While the present invention is susceptible of embodiment in variousforms, there is shown in the drawings and will hereinafter be describeda presently preferred, albeit not limiting, embodiment with theunderstanding that the present disclosure is to be considered anexemplification of the present invention and is not intended to limitthe invention to the specific embodiments illustrated.

FIGS. 1-11, which are now referenced, illustrate the present inventionand the manner in which it is assembled. A preferred embodiment of thepresent invention comprises a portable case or container 10 which isconstructed and arranged to securely transport valuable articles. Thecase is constructed of materials which are resistant to penetration bymeans such as drilling, impact, ballistic, thermal, etc. The specificmaterials of construction will be disclosed hereinafter. The case isalso designed to resist direct penetration into the interior byproviding a tortuous path from the joint of the lid and case into theinterior of the case.

FIGS. 1-7 illustrate a preferred embodiment of the present inventionwhich includes a body 10 comprising a cover or lid 12 hingedly securedto a lower portion or base 14. The lower portion 14 includes an insert16. The insert 16 includes a cavity or lower chamber 18, an upstandingwall or perimeter portion 20 and a spacer or buffer area 22. Thevaluable articles to be securely transported are housed within thecavity or chamber 18. As can be seen in FIG. 2, the cavity or chamber 18does not extend to the outermost edges of the lower portion 14. Theupstanding wall or perimeter portion 20 extends completely around cavity18. The spacer or buffer 22 extends outwardly from the cavity upstandingwall 20 to the edge of the lower portion of case 14. The upstanding wall20 and cavity spacer 22 provide a tortuous path from the edge of thecase 10 to the cavity 18, thereby preventing direct access to the cavity18. This prohibits someone from inserting a thin metal object or similaritem to gain access to the contents of cavity 18.

The cover or lid 12 of the case 10 includes an insert or spacer 24 and ahousing or upper chamber 26 (FIG. 2). The housing or upper chamber 26contains the locks 28 which secure the case 10 closed (FIG. 3). Thehousing or upper chamber 26 also contains a GPS location device 30 and ahard drive 32 (FIG. 4). The location device 30 and hard drive 32 arecontained within a depression or well 34 of the upper chamber 26. Thelocation device 30 and hard drive 32 are not illustrated in the upperchamber 26 of FIG. 3. The locks 28 are not illustrated in the upperchamber 26 of FIG. 4. The manner in which the locks 28 secure the lid 12to the lower portion 14 is illustrated in FIG. 6C. A pin or lockingmember 36 is an element of each of the four locks 28. The pin 36 movesin a longitudinal direction between an extended or locked position, asillustrated in FIGS. 2 and 6C and a retracted or open position. In theretracted or open position the pin 36 does not extend into an aperturein the side of the lower portion 14 of the case. In the locked position,the pin 36 extends into the aperture 38 in the side of the lower portion(FIG. 6C).

Each of the pins 36 is operated by a solenoid 40. The solenoids 40 arepreferably operated according to the schematic of FIG. 8. An electronickey 42 is utilized to open lock 44 (FIGS. 7 and 8). When lock 44 is openan electrical circuit is completed. The electrical circuit includes lock44, a battery 46, a fuse 48, and solenoids 40. While the battery ispreferably located within the depression or well 34, it could be locatedanywhere within the case 10. When the battery 46 is located within thewell 34, it is preferably a flat and relatively thin type of battery, asillustrated in FIG. 5. An electrical connection 50 is provided throughthe outer shell of the case. The electrical connection 50 is preferablyin the upper portion or lid of the case, but it can also be in the lowerportion of the case. The electrical connection 50 is electricallyconnected to a processor or controller 52 which regulates the amount andduration of current sent to the battery 46 to recharge the battery.Depending on the type of battery 46, nickel cadmium, nickel metalhydride, lithium ion, lithium ion polymer, etc., the amount of currentand rate at which the current is sent to the battery for recharging willbe variable in order to protect the battery from overcharging and/oroverheating. The electrical power or energy supplied to the connectionis preferably from a transformer which converts 120 AC (AlternatingCurrent) voltage to DC (Direct Current) voltage. The amount of DCvoltage delivered to the battery is dependent upon the type of batterybeing recharged. In place of solenoids 40, stepper motors can also beemployed. The stepper motors drive a worm which is connected to a wormgear (not shown), which in turn operates said locks 28. An advantage ofsaid stepper motor is that said locks 28 cannot be driven backward,thereby preventing access to the interior of said case.

The electronic key 42 can be programmed to only open specific locks 44.The electronic key 42 includes a plurality of contacts 43 whichelectrically connect with respective contacts (not shown) on the lock44. When the lock 44 receives the proper signals or indicators itpermits the electronic key to physically turn and open the lock 44.Preferably, an electronic key locks the case at a point of departure anda separate different electronic key at the final destination opens thecase. The electronic keys can also be programmed to only open the caseat a certain time or within a certain time frame or window. Anotherfeature of the electronic key is that it can be disabled or enabled froma signal transmitted by a satellite, a cell phone or a radio frequencytransmission.

Another embodiment of the present invention is illustrated in FIGS. 8and 9. In this embodiment a location device 30, a hard drive 32 and aproximity sensor 52 are located within the depression or well 34. Thelocation device utilizes GPS (Global Positioning System), GSM (GroupSpecial Mobile), and RF (Radio Frequency) signals to determine thelocation of the case 10. The GPS utilizes satellites and triangulationto determine the location of the case 10. The GSM and RF systems utilizecellular telephones and triangulation to determine the location of thecase 10. The location device can be programmed to monitor the variouslocations of the case as it travels from one location to another. Thisinformation is then stored in the hard drive 32. The location device 30can also communicate with a user's cellular phone or similar device totransmit the various locations of the case as it travels from onedestination to another. This information can be transmitted via RF orGSM. The location device 30 can also transmit a satellite picture of thelocation of the case or container to a user at a remote location. Inaddition, the ZigBee® wireless technology can be employed to transmitthe above noted information. This technology is an open global standardthat is often employed whenever there is difficulty with RFtransmissions, no cell phone towers, etc. When ZigBee® is used fortransmission of data, a chip is normally located adjacent the locationdevice 30. The location device 30 is preferably provided with a back-upbattery in the event that the main battery 46 goes dead. The back-upbattery can be used to transmit the location of the case.

The proximity sensor 52 will detect the presence of an individual whohas been provided with a smart key or similar device. The proximitysensor 52 is programmed to respond when a smart key or similar device iswithin a predetermined distance of the proximity sensor 52. Theelectronic smart key or similar device is normally given to the courierof the case 10. The proximity sensor then sends a signal to the harddrive that an individual with the proper credentials, the courier, iswithin a predetermined distance of the case. Should the courier gooutside of a predetermined distance or range, this is an indication thatthe courier has left or abandoned the case. Another signal is then sentto the hard drive to indicate this condition. The location device canalso be programmed to immediately transmit the signal that the courierhas left the case to the user. The user normally receives these reportsin the form of an e-mail notification. However, other types of cellularphone communications can be employed to notify the user of the locationof the case. The e-mail communications can also include a map of thecurrent and previous locations of the case. This enables a user to printout a hard copy of the current and past locations of the case. This alsoenables a user to track the path of the case as it moves from onelocation to another. Should the case move from a predetermined path, theuser may alert the authorities or similar individuals that the case hasbeen stolen or diverted from its predetermined path.

A processor or controller 54 can be provided adjacent to hard drive 32.The processor or controller 54 is programmed to control and monitorvarious operations of the case 10. For example, the controller 54 can beprogrammed to transmit the location of the case at predetermined timeintervals. The controller can also be programmed to transmit the savedlocations of the case to a user at predetermined times. The controllercan notify an individual immediately or at a predetermined delay if andwhen the courier has left or abandoned the case. The controller can beprogrammed to determine, from consecutive location transmissions, if thecase has been removed from or been diverted from a predetermined path.This would indicate that the contents of the case may have been tamperedwith.

A plurality of sensors 56 (FIG. 2) can be positioned around theperimeter of the case between the lower portion of the case and the lidof the case. These sensors 56 can determine if the lid of the case hasbeen moved, indicating that the case has been opened. A light sensor 59on the location device 30 can also be utilized to indicate if the casehas been opened. The controller can be programmed to transmit a signalif the case has been opened by an unauthorized individual, which is anindication of a potential robbery or theft. The controller can beprogrammed to recognize authorized opening of the case within a certaintime range. It can also be programmed to recognize authorized opening ofthe case at a specific predetermined location. Unauthorized opening orentry into the case is recognized by the controller and this informationis transmitted to an alarm 58. The alarm 58 can emit an audible signalwithin the case, a visual signal outside of the case, and/or it cantransmit the information of unauthorized entry to a remote location. Theremote location can be a user or a security monitoring service. Ineither situation, a user is ultimately notified that there is a problemwith the transportation or unauthorized entry into the case.

Another feature of the tracking system is that if the case has not movedwithin a predetermined time, 3 hours for example, the system goes into a“sleep” mode to conserve the battery. In the sleep mode the locationtracking and reporting of the case is suspended. The sleep mode of themonitoring system can be ended by movement of the bag or by transmittinga signal to the monitoring system to stop the sleep mode. This can alsobe accomplished by pressing a button on the case.

The lid 12 is also secured to the lower portion 14 of the case by a pairof gas shock hinges 60 and 62 (FIG. 2). These hinges pass through thetop of insert 16 through slots 64, 66. The hinge is pivotally secured tothe lower portion of the case, and also to the lid of the case. FIG. 6Bis a cross section of the lower portion of the case. An outer shell 68is preferably formed from Dyneema. This material can not be cut byconventional means. Next, a tub or trough shaped layer or element 70 islocated within the outer shell 68. The element 70 is preferably madefrom titanium; however, similar materials can be used which areresistant to penetration by drilling. The element 70 is provided withmounts 72 for the lower portions of hinges 60 and 62. The mounts 72permit the gas shock hinges to be pivotally secured to the lower portionof the case. The next element or layer 74 within element 70 is also tubor trough shaped. Element 74 is made from an aramid material. Thismaterial is resistant to ballistic penetration. Finally, the insert 16is located within element 74. Insert 16 is preferably made from apolycarbonate material.

A plurality of metal straps 76, 78 are secured to the outer portion ofouter shell 68. The straps 76, 78 are provided with a number of threadedstuds 80. The studs 80 pass through apertures 82 in element 70 and aresecured thereto by nuts or similar means. Element 74 is preferablyadhesively adhered to element 70 and insert 16. Other means to securethese elements together can also be employed. The lid 12 of the case isconstructed in a manner similar to the lower portion of the case. Thistype of construction prevents unauthorized entry into the case by mostmeans. The outer perimeter of the lid includes an O-ring or seal 84. TheO-ring or seal abuts the upright ridge 86 on the lower portion of thecase to form a fluid tight seal. This seal prevents penetration into thecase by any type of fluids. An additional seal 85 can be providedbetween the lid and the upper rim of insert 16 (FIGS. 11A and B). Theseal 85 extends completely around the lid and insert 16.

Referring to FIG. 1, a biometric detection device, such as a fingerprint detector 88, is preferably secured to the lid of the case. Thebiometric detection device 88 includes an aperture 90 for placement offinger therein. A sensor below the aperture 90 detects the finger printand sends this information to a controller or chip 92 (not shown)located adjacent controller 54. The controller 92 compares the currentfinger print against the authorized finger prints and permits the caseto be opened when a proper match is achieved. Additionally, a particularsensor can be employed which will only authorize entry into the casewhen a finger on the left hand of an individual is used. This system canbe programmed to only open one side of the case when the right hand ofan individual is placed into the sensor 88. Additionally, a portablebiometric sensor 94 (FIG. 10) can be utilized to gain entry into thecase. The portable biometric sensor 94 includes an aperture 96 intowhich an individual places their finger. The portable biometric sensor94 includes a USB connector 98. This USB connector can be inserted intoa USB receptacle or slot 100 located at the front of the lid, FIG. 2.

Additionally, a Faraday cage can be provided in the interior of the case10. The Faraday cage will prevent unauthorized RF transmissions into thecase. The titanium element 70 can also function as a Faraday cage.

FIG. 12 is an alternative embodiment of the present invention. In thisembodiment, the case 110 is substantially larger than case 10.Additionally, the case is provided with wheels 112 for ease of transportof the relatively large case. Further, a retractable handle 114 issecured to a rear portion of case 110. The interior construction of case110 is similar to the interior construction of case 10.

All patents and publications mentioned in this specification areindicative of the level of those skilled in the art to which theinvention pertains. All patents and publications are herein incorporatedby reference to the same extent as if each individual publication wasspecifically and individually indicated to be incorporated by reference.

It is to be understood that while a certain form of the invention isillustrated, it is not to be limited to the specific form or arrangementherein described and shown. It will be apparent to those skilled in theart that various changes may be made without departing from the scope ofthe invention and the invention is not to be considered limited to whatis shown and described in the specification and any drawings/figuresincluded herein.

One skilled in the art will readily appreciate that the presentinvention is well adapted to carry out the objectives and obtain theends and advantages mentioned, as well as those inherent therein. Theembodiments, methods, procedures and techniques described herein arepresently representative of the preferred embodiments, are intended tobe exemplary and are not intended as limitations on the scope. Changestherein and other uses will occur to those skilled in the art which areencompassed within the spirit of the invention and are defined by thescope of the appended claims. Although the invention has been describedin connection with specific preferred embodiments, it should beunderstood that the invention as claimed should not be unduly limited tosuch specific embodiments. Indeed, various modifications of thedescribed modes for carrying out the invention which are obvious tothose skilled in the art are intended to be within the scope of thefollowing claims.

What is claimed is:
 1. A security container for the storage andtransportation of valuables, the security container adapted to becarried by an authorized individual along a predetermined path under thesupervision of a third party, the security container comprising: a body,said body including a lid and a base, said lid and said base constructedand arranged for interfitting engagement with each other and havingwalls which define an interior of said body; said lid and said basebeing hingedly connected to each other for pivotal movement between openand closed positions; an insert positioned in said body, said insertincluding a lower chamber in a central portion of said insert, anupstanding wall extending around said lower chamber and a spacerextending between said upstanding wall and an inner perimeter of saidbody, said lower chamber not extending laterally to said inner perimeterof said body to create a space between said body and said lower chamberof said insert for electronics mounting, said electronics not visible oraccessible to a user of said security container; a seal positionedbetween said body and said insert at said inner perimeter of said body;a second insert positioned in said lid, said second insert including anupper chamber, said upper chamber sized to fit within said upstandingwall of said lower chamber, a second spacer extending outward toward aninner perimeter of said lid and secured to an inner surface of said lid,said upper chamber providing a space for electronics within said upperchamber so that said electronics are not visible or accessible to a userof said security container; a second seal positioned between said secondinsert and said inner surface of said lid; locks located within saidupper chamber or said space between said body and said lower chamber,said locks constructed and arranged to releasably engage said walls ofsaid base thereby locking said lid to said base; a security device foroperating said locks; a location device positioned within said upperchamber or said space between said body and said lower chamber, saidlocation device constructed and arranged to determine the location ofthe security container along the predetermined path, said locationdevice sending a cellular message to the third party if the securitycontainer leaves the predetermined path; and said security deviceincluding a proximity sensor, said proximity sensor detecting theproximity of said security container to the authorized individual andallowing said locks to be operated by the authorized individual onlywhen the authorized individual is within a predetermined distance fromthe security container.
 2. The security container of claim 1 whereinsaid base includes a first member which is resistant to cutting, asecond member positioned within said first member, said second memberbeing metallic and resistant to penetration by drilling, a third memberpositioned within said second member, said third member being ballisticresistant to penetration, and a fourth member, said fourth member formedof a polymer and positioned within said third member.
 3. The securitycontainer of claim 2 including a plurality of metallic straps secured toan outer portion of said first member, connection members secured tosaid straps and said second member thereby connecting said straps, saidfirst member, and said second member together.
 4. The security containerof claim 1 wherein said security device includes a biometric device,said biometric device being programmable to recognize specificauthorized individuals.
 5. The security container of claim 4 whereinsaid biometric device is positioned on an exterior portion of saidsecurity container.
 6. The security container of claim 4 wherein saidbiometric device is releasably connected to said security container. 7.The security container of claim 1 including a fluid seal positioned onand extending completely around one of said lid or said base, said fluidseal completely sealing the interior of said body from the introductionof fluids thereinto.
 8. The security container of claim 2 including aFaraday cage positioned within one of said lid or said base.
 9. Thesecurity container of claim 1 including servo motors operating saidlocks.
 10. The security container of claim 1 including stepper motorsoperating said locks.
 11. The security container of claim 1 including amemory connected to said security and said location device, said memoryrecording various locations of said security container and times whensaid security container is opened, said location device including atransmitting device transmitting information regarding the currentlocation, the past locations, and the opening of said security containerto a remote location.
 12. The security container of claim 11 whereinsaid transmitting device operates using satellite, group special mobileand/or radio frequency signals.
 13. The security container of claim 11including a backup battery connected to said security container, saidbackup battery operative to permit transmission of the location of saidsecurity container upon failure of a main battery of said securitydevice.
 14. The security container of claim 1 wherein said securitycontainer includes an electronic key, said electronic key beingprogrammable to permit entry into said security container at specificlocations and/or specific times.
 15. The security container of claim 14wherein said electronic key is programmable from a remote locationutilizing a signal from a satellite or a radio frequency signal.
 16. Thesecurity container of claim 2 wherein said lid includes a fifth memberwhich is resistant to cutting, a sixth member positioned within saidfifth member, said sixth member being metallic and resistant topenetration by drilling, a seventh member positioned within said sixthmember, said seventh member being ballistic resistant to penetration,and an eighth member, said eighth member formed of a polymer andpositioned within said seventh member.
 17. The security container ofclaim 16 including a plurality of metallic straps secured to an outerportion of said fifth member, connection members secured to said strapsand said sixth member thereby connecting said straps, said fifth memberand said sixth member together.