Container with a lid

文档序号:395424 发布日期:2021-12-14 浏览:16次 中文

阅读说明:本技术 容器 (Container with a lid ) 是由 J·多伊尔 于 2020-03-17 设计创作,主要内容包括:一种用于储存包裹的安全容器,所述安全容器包括:锁,所述锁将所述容器锁定;传感器,所述传感器感测所述安全容器被解锁;收发器,所述收发器与电信网络通信;控制器,所述控制器被配置成响应于所述传感器感测到所述安全容器被解锁,借助于所述收发器经由所述电信网络将警告传送到网络设备。(A secure container for storing packages, the secure container comprising: a lock that locks the container; a sensor that senses that the secure container is unlocked; a transceiver in communication with a telecommunications network; a controller configured to transmit an alert to a network device via the telecommunications network by way of the transceiver in response to the sensor sensing that the secure container is unlocked.)

1. A secure container for storing packages, the secure container comprising:

a lock that locks the container;

a sensor that senses that the secure container is unlocked;

a transceiver in communication with a telecommunications network;

a controller configured to transmit an alert to a network device via the telecommunications network by way of the transceiver in response to the sensor sensing that the secure container is unlocked; and

an alarm, wherein the controller is further configured to trigger the alarm in response to the sensor sensing that the secure container is unlocked.

2. The secure container of claim 1, wherein the alert is transmitted to the network device only after the alarm is triggered.

3. The secure container of claim 2, wherein the controller is configured to prevent the alert from being transmitted to the network device in accordance with the sensor sensing that the container is subsequently locked prior to transmitting the alert.

4. The secure container of any of the preceding claims, further comprising:

a closure closing the safety container;

a further sensor sensing that the security container is closed by means of the closure; and is

Wherein the controller is further configured to transmit the alert to the network device by way of the transceiver in response to the other sensor sensing that the closure is opened.

5. The security container of claim 4, wherein the controller is further configured to trigger the alarm in response to the other sensor sensing that the closure is opened.

6. The secure container of any of the preceding claims, wherein the controller is configured to detect authorized use of the secure container.

7. The secure container of claim 6, wherein the secure container is configured to transmit the alert in accordance with detecting authorized use of the secure container.

8. The secure container of claim 6 or 7, wherein the secure container is configured to trigger the alarm upon detection of authorized use of the secure container.

9. The secure container of any of claims 6 to 8, wherein authorized use is detected according to: a schedule specifying authorized usage periods; receiving a valid identifier; and/or no malicious tampering is detected by a tamper sensor of the secure container.

10. The secure container of any of the preceding claims, wherein the controller is configured to identify an authorized user of the secure container.

11. The secure container of claim 10, wherein the alert includes information identifying the identified authorized user.

12. The secure container of claim 10 or 11, wherein the controller is further configured to identify the network device according to the identified authorized user.

13. A method of operating a secure container for storing a package, the secure container comprising an alarm and being configured to communicate with a telecommunications network, the method comprising the steps of:

sensing that the secure container is unlocked;

in response to sensing that the container is unlocked, transmitting an alert to a network device via the telecommunications network and triggering the alarm.

14. A system for operating a secure container, the system comprising:

the security container of any one of claims 1 to 12; and

a telecommunications network.

Technical Field

The present invention relates to a secure container for storing packages, a method of operating a secure container and a system for operating a secure container.

Background

A logistics service provider (such as a courier) may choose to deliver a package to a secure container that is accessible to both the logistics service provider and the intended recipient of the package (such as a consumer, e.g., a retail customer or a worker), but that prevents others from accessing the contents of the secure container.

However, the security of such a secure container depends only on trust and capabilities of its users. Security will suffer if the container is (un) intentionally unprotected by the logistics server or other legitimate user.

It is an object of the present invention to at least alleviate the above problems.

Disclosure of Invention

According to a first aspect of the present invention there is provided a secure container for storing packages, the secure container comprising: a lock that locks the container; a sensor that senses that the secure container is unlocked; a transceiver in communication with a telecommunications network; a controller configured to transmit an alert to a network device via the telecommunications network by way of the transceiver in response to the sensor sensing that the secure container is unlocked.

Preferably, the network device is remote to the secure container. Optionally, the network device is a server; a cellular telecommunications device; and/or a computer. Optionally, the network device hosts a user account. Optionally, the network device forwards the alert to another network device.

Optionally, the telecommunications network comprises a wireless telecommunications network, and for example a cellular telecommunications network and/or a satellite telecommunications network. Optionally, the telecommunications network is a 2G cellular telecommunications network, and may be a 3G, 4G and/or 5G cellular telecommunications network.

Optionally, the alert is a notification and/or instruction that triggers a notification and/or alarm at the network device. Optionally, the alert further includes information uniquely identifying the secure container and/or providing a geographic location of the secure container.

Optionally, the safety container is battery powered. Optionally, the secure container is a parcel store or a safe. Optionally, the safety container is movable, as it is not fixed. Optionally, the lock is a mechanical lock; and/or an electromagnetic lock.

Preferably, the secure container further comprises an alarm, wherein the controller is further configured to trigger the alarm in response to the sensor sensing that the secure container is unlocked. Preferably, the alarm is an audible alarm and/or a visual alarm. Optionally, the alarm is remote from but proximate to the secure container, and wherein the alarm is configured to be triggered by means of wireless communication from the transceiver.

Preferably, the alert is transmitted to the network device only after triggering the alarm. Alternatively, the alarm and the warning are triggered simultaneously, more preferably only after a predetermined period of time. Preferably, the controller is configured to prevent the alert from being transmitted to the network device in dependence on the sensor sensing that the container is subsequently locked prior to transmitting the alert.

Preferably, the safety container further comprises: a closure closing the safety container; a further sensor which senses that the safety container is closed by means of the closure; and wherein the controller is further configured to transmit the alert to the network device by way of the transceiver in response to the further sensor sensing that the closure is opened.

Preferably, a lock is used to lock the closure to lock the closed security container. Optionally, the closure is in the form of: a cover; a door; a cover; a blind window; a cap or a plug. Optionally, the sensor and/or the further sensor are in the form of: a pressure sensor; a contact sensor; a proximity sensor; a microswitch; a light/optical sensor; a magnetic field sensor; and/or an electrical, magnetic or mechanical switch.

Optionally, the alarm is triggered and/or a warning is transmitted only when the sensor and/or another sensor senses that the security container is unlocked and/or the closure is opened for a predetermined period of time. Optionally, the predetermined time for triggering the alarm is different from the time for triggering the warning.

Preferably, the controller is further configured to trigger the alarm in response to the further sensor sensing that the closure is opened. Preferably, the alarm is deactivated once the security container has been locked and/or the closure has been closed. Preferably, once the security container has been locked and/or the closure has been closed, a further warning is sent to the network device.

Preferably, the controller is configured to detect authorized use of the secure container. As used herein, the term "authorized" in the context of a secure container preferably means used in a manner that indicates legitimate use of the secure container and/or by an individual that has or is expected to have permission to use the secure container, and more preferably also when such permission continues to function, so that authorized use precludes forced entry and malicious tampering (e.g., vandalism), and thus precludes opening in a manner other than unlocking the secure container by a predetermined manner. Further, as used herein, the term "use" in the context of "authorized use" preferably means unlocking or opening or otherwise accessing the secure container.

Preferably, the secure container is configured to transmit the alert upon detection of authorized use of the secure container, and more preferably only upon detection of such authorized use.

Preferably, the secure container is configured to trigger the alarm upon detection of authorized use of the secure container and only upon detection of such authorized use. Optionally, the secure container is configured to transmit the alert and/or alarm only upon detecting authorized use of the secure container. Preferably, authorized use is detected according to: a schedule specifying a period of authorized use; receiving a valid identifier; and/or no malicious tampering is detected by a tamper sensor of the secure container.

Optionally, the schedule is predefined and/or updated by means of communications received by the transceiver. Optionally, the identifier is received by the secure container by means of an input device. Optionally, the input device is: a keyboard; a reader and/or a sensor.

Optionally, the input device is: an RFID reader; a biometric sensor; a camera; an optical reader for bar codes and/or QR codes; a magnetic sensor; the transceiver or another transceiver; and/or network devices and transceivers.

Optionally, the identifier is: passwords (e.g., passwords, Personal Identification Numbers (PINs), and/or any (expected) secret alphabetic, numeric, and/or alphanumeric string); a one-time authentication certificate and/or token; and/or biometric information.

Optionally, the interference sensor is in the form of: a vibration detector; a force detector; a position detector; a violation detector; a temperature detector; and/or a detector for detecting malicious network communications. Preferably, the controller is configured to identify authorized use of the secure container. Optionally, the authorized user is the intended recipient of the package being deposited (or intended to be deposited or already deposited). Optionally, the authorized user is uniquely identified.

Optionally, the controller is configured to receive identity information for identifying an authorized user by means of the input device or another input device. Optionally, the identity information is the identifier or another identifier. Optionally, the authorized use is identified based on identifying an authorized user. Optionally, the authorized user is identified based on the detected authorization usage.

Alternatively, the authorized use and the authorized user are identified in the same way and may be identified by the same identifier. Optionally, the identifier or the further identifier is generated by the telecommunications network or the network device or another network device. Optionally, the lock is configured to unlock upon detection of authorized use and/or upon identification of an authorized user.

Optionally, the secure container is configured to trigger an alarm and/or to transmit an alert upon identification of an authorized user (and optionally only upon identification of an authorized user). Optionally, the identified authorized user is the most recently identified authorized user. Optionally, the identified authorized user is a future anticipated authorized user.

Optionally, the identified authorized user is an authorized user that is sensed to be proximate to the secure container, and the sensing may be performed by: a telecommunications network, a security container; and/or a network device. Preferably, the alert includes information identifying the identified authorized user.

Preferably, the controller (or remote device and/or telecommunications network) is further configured to identify the network device in dependence on the identified authorized user. Optionally, the network device is (optionally uniquely) associated with the identified authorized user.

Optionally, a table is provided that associates the identified authorized users with network devices, which table may be arranged as part of: a safety container; a telecommunications network (especially the core of the network); and/or the network device or another network device (e.g., a server).

Optionally, the table is populated to associate the identified authorized users with the network device as part of the process in which the users are registered as authorized users.

Optionally, identifying the network device comprises identifying a network address of the network device, and wherein the network address may be: a mobile phone number; IMSI and/or IMEI; a data network address (e.g., URL, MAC, and/or IP address; a user account; and/or an email address).

Optionally, the identifier for identifying authorized use and/or the identifier for identifying an authorized user or another identifier comprises or is derived from a network address of the network device.

According to another aspect of the present invention, there is provided a method of operating a security container configured to communicate with a telecommunications network, the method comprising the steps of: sensing that the secure container is unlocked; and in response to sensing that the container is unlocked, transmitting an alert to a network device via the telecommunications network. Optionally, the method further comprises the step performed by a safety container as described above.

According to yet another aspect of the present invention, there is provided a system for operating a safety container, the system comprising: a safety container as described above; and a telecommunications network as described above. Optionally, the system further comprises a network device.

The invention extends to any novel aspect or feature described and/or exemplified herein. The invention extends to a method and/or apparatus substantially as described herein and/or illustrated with reference to the accompanying drawings. The present invention also provides computer programs and computer program products for performing any of the methods described herein and/or for embodying any of the apparatus features described herein, and computer readable media having stored thereon instructions for performing any of the methods described herein and/or for embodying any of the apparatus features described herein.

The present invention also provides a signal embodying a computer program for performing any of the methods described herein and/or for embodying any of the apparatus features described herein, a method of transmitting such a signal, and a computer product having an operating system supporting a computer program for performing any of the methods described herein and/or for embodying any of the apparatus features described herein.

Any device feature as described herein may also be provided as a method feature, and any method feature as described herein may also be provided as a device feature. As used herein, device plus function features may alternatively be expressed in terms of their corresponding structure, such as a suitably programmed controller 190 and associated memory.

Any feature in one aspect of the invention may be applied to other aspects of the invention in any suitable combination. In particular, method aspects may apply to apparatus aspects, and apparatus aspects may apply to method aspects. Furthermore, any, some, and/or all features of one aspect may be applied to any, some, and/or all features of any other aspect in any suitable combination. It is also to be understood that particular combinations of the various features described and defined in any aspect of the invention may be implemented and/or provided and/or used independently.

In this specification, unless stated otherwise, the word "or" may be construed as either exclusive or inclusive. Furthermore, features implemented in hardware may typically be implemented in software, and features implemented in software may typically be implemented in hardware. Any reference herein to software features and hardware features should be construed accordingly.

The invention extends to a security container, a method of operating a security container and a system for operating a security container as described herein and/or substantially as illustrated with reference to the accompanying drawings. The invention will now be described, by way of example only, with reference to the accompanying drawings, in which:

FIG. 1 illustrates a security container and a system including the security container; and

fig. 2 and 3 illustrate a process of operating the safety container.

Detailed Description

Fig. 1 shows a security container 100, the security container 100 comprising: a lock 110, the lock 110 locking the security container; a sensor 120, the sensor 120 sensing the security of the secure container; a transceiver 130, the transceiver 130 in communication with a telecommunications network 140; and an alarm 150 (e.g., in the form of an audible alarm and/or a visual alarm).

The secure container 100 is formed to define a chamber for receiving the packages, and the secure container has any suitable dimensions to accommodate at least one package within the chamber.

The security container 100 also includes a closure 160 (shown in the form of a hinged lid) for sealing the chamber. As a result, the closure 160 may be closed and the lock 120 may be actuated to secure the closure in the closed position to securely contain the package within the chamber of the security container.

Further, the sensors 120 include a lock sensor 120-1 and a closure sensor 120-2 for sensing whether the closure 160 is locked by means of the lock 110 and whether the closure 160 is closed, respectively.

The secure container 100 also includes a controller 190, the controller 190 for controlling the transceiver 130 and the alarm 150 and receiving and processing input from the sensor 120. The controller 190 is also configured to receive instructions from a user to set the secure container for use.

Thus, in accordance with the controller 190 receiving an input from the lock sensor 120-1 and/or the closure sensor 120-2, respectively, that the secure container is unlocked and/or not closed, the controller 190 is configured to:

● trigger the alarm 150; and/or

● cause the transceiver 130 to generate an alert communication to the telecommunications network 140.

The alert communication generated by the transceiver 130 is configured to be transmitted by the telecommunications network 140 to the network device 180. In one example, the network device 180 is a mobile telecommunication device 180. In another example, the network device is a server, and the server can be used to host applications and/or user accounts.

Fig. 2 and 3 illustrate a process of operating the safety container 100.

Fig. 2 shows an overview of a process 200 for operating the secure container 100. Thus, in a first step 210, the secure container senses that it has been unlocked and/or opened, as sensed by the sensor (as the case may be) and processed by the controller 190.

In a next step 220-1, the controller 190 executes a query 220 as to whether the secure container has subsequently been closed and locked.

Step 220-1 is triggered, for example, by:

● a timer configured to run step 220 after a predetermined delay; and/or

● events, such as:

detecting (by means of another suitable sensor (not shown), such as a weight sensor or an optical sensor) removal or addition of the package from or to the secure container; and/or

Sensing that the closure has been closed, but not locked (within a predetermined time period).

If it is determined at step 220-1 that the secure container 100 has not been closed and locked, the controller 190 activates the alarm 230. In this manner, a user approaching the secure container may be alerted to the fact that the secure container has not been locked and/or closed, thereby prompting the user to take remedial action. In a next step 220-2, the controller 190 executes another instance of the query 220 to evaluate whether the security container 100 has been closed and locked after the alarm has been triggered for a predetermined period of time.

If it is determined at step 220-2 that the secure container is not yet locked and closed, the controller 190 triggers 240 the transceiver 130 to transmit an alert communication to the telecommunications network 140 and to the network device 180. In this manner, a user associated with the network device 180 may be alerted that the secure container 100 is insecure, and therefore may take remedial action to protect the container.

However, if it is determined at step 220-1 or 220-2 that the secure container 100 has been locked and closed, the process 200 ends because it is sensed that the secure container has become secure.

In another example, the secure container is configured, by way of the controller 190, to identify authorized use of the secure container.

The authorized use of the secure container is used by an authorized user (past, present, or anticipated), and the authorized user has permission to use the secure container (in an appropriate manner and/or at an appropriate time).

Controller 190 is thus configured to detect authorized use (either explicitly or by inference) and/or uniquely identify an authorized user; this is performed, for example, by:

● a sensor (not shown) for sensing tampering with the secure container is not triggered, wherein examples of such sensors include:

vibration and/or force sensors such that excessive vibration and/or force may indicate malicious use (e.g., strong)

Row entry);

o position sensor, where excessive geographic movement of the secure container may indicate malicious use (e.g., theft)

Theft);

damage sensors, such as light and/or infrared sensors within the chamber;

temperature sensors, where overheating or overcooling may indicate forced in; and/or

A sensor for sensing malicious network communications (e.g., applicable to a situation where the lock 110 may be unlocked by means of network communications received by the transceiver 130).

● sense unlocking and/or opening of the secure container at a time (e.g., time of day and/or date) during which authorized use is scheduled, such authorized use may be scheduled according to:

pre-specified times (e.g., working days and only working hours), where:

■ may be accessible by the controller 190 at a pre-specified time, for example as part of a memory associated with the controller; and/or

■ may be available for updating, for example by receiving at the transceiver 130 a network communication from the telecommunications network 140 that updates the pre-specified time;

a subscription schedule in which authorized users of the secure container are available to subscribe to a period of access to the secure container 100, wherein:

■ are transmitted to the secure container 100 by way of the telecommunications network 140, as received by the transceiver 130 and stored by the controller 190; and/or

■ the subscription may be performed by means of the network device 180, for example using an application that inputs the user identity (e.g. via login details associated with the user account).

● and/or receiving an identifier indicating an authorized user, wherein the identifier is:

■ biometric information such as fingerprints, speech, and/or face recognition;

■ passwords, such as Personal Identification Numbers (PINs) or passwords;

■ authentication certificates or tokens, e.g., communicated to the security container by the network device 180 or another network device 180;

■ as part of a bar code, QR code, magnetic strip, and/or RFID tag; and/or

■ are read by a reader (not shown), such as a reader for reading any of the above identifiers, wherein the reader is provided as part of:

● safety container 100; and/or

● can be connected to the network (e.g., via the telecommunications network 140 and/or a local area network, such as WiFiTMOr BluetoothTM) The identifier (and/or the identifier indicating the determination of the authorized user) is communicated to the network device 180 or another network device 180 of the secure container.

In some examples (particularly where an identifier is used), detecting authorized use also allows controller 190 to unlock the security controller and/or prevent unlocking and/or opening of the secure container in the event malicious use is detected.

In another example, fig. 3 illustrates a process 300 of operating the secure container 100 to trigger the alarm 150 and/or the transmission of an alert communication to prompt a user to correct an unsafe condition of the secure container 100.

According to process 200, in a first step the security container 100 is sensed by means of the sensor 120 as having been unlocked and/or opened 210. Next, controller 190 evaluates whether the unlock and/or opening sensed in step 210 constitutes an authorized use 310 (e.g., as described above). For example, the secure container 100 receives a one-time token that allows the lock to be unlocked and indicates authorized use (e.g., by means of a keypad (not shown) associated with the secure container). For example, the token is generated by a network device 180, the network device 180 being in the form of a server for managing the security container and communicating with another network device (not shown) in the form of a mobile phone (which is associated with an authorized user in the server) and with the security container via the telecommunications network 140.

If it is determined that the use of the secure container is unauthorized, it is determined that the use is malicious tampering, in which case the secure container 100 may be used to trigger a security program 320, the security program 320 including, for example:

● alert a security service (e.g., police) via the transceiver 130, wherein the alert includes a location and/or a unique identifier associated with the security container 100;

● prevent future unlocking and/or opening of the secure container 100 (until the state is reset);

● triggers a monitoring system, such as a security camera (not shown) provided as part of the secure container and/or as part of a remote system (whereby the security camera is triggered by communication from the transceiver 130, such as through the telecommunications network 140); and/or

● trigger the alarm 150.

However, if controller 190 identifies an authorized use, controller may be configured to identify or infer the identity of the authorized user in a next step 330, for example, by identifying the authorized use in the same manner (e.g., an identifier and/or using a secure container at a time associated with the subscription) and/or by receiving another identity information.

Process 300 then proceeds as per steps 220-1, 230 and 220-2, 240, which are performed as described with reference to FIG. 2.

After step 240 of the security container 100 triggering the transceiver 130 to transmit the alert communication to the telecommunications network 140, the network device 180 to which the alert communication is forwarded is identified at a next step 340. The identity of network device 180 is derived from the identity of the authorized user identified in step 330 based on a predefined association between the two.

The identified authorized user is associated with network device 180 (as part of a subscription made by the identified authorized user in a subscription schedule) and/or an identifier for uniquely identifying the authorized user (e.g., as described above). The identity of the network device 180 may be a network address that allows the telecommunications network 140 to communicate with the network device, such as: a mobile phone number; a cellular network subscriber identity; an email address; and/or a user account.

The identification of the network device 340 is performed, for example, by the telecommunications network 140 and/or an identification server (not shown) in communication with the telecommunications network 140. The identification server may be used to provide a subscription schedule and/or a user account associated with the secure container.

Once the network device 340 is identified, the identity of the network device is communicated to the telecommunications network 140 for transmission of the alert communication to the identified network device 180(350) identified as being associated with the identified authorized user.

In this manner, the process of prompting a legitimate user about the unsafe condition of the secure container is performed after authorized use of the secure container, and the user who is most likely to cause the unsafe condition of the secure container is prompted.

In one example, the controller 190 is configured to trigger an alarm and/or alert communication only when authorized use of the secure container is detected.

The telecommunications network 140 may be any form of telecommunications network including a wide area network (e.g., a cellular network or a satellite network) or a local area network (e.g., a Wi-Fi or bluetooth network). In particular, the telecommunications network operates according to 2G, 3G, 4G and/or 5G cellular technologies. Advantageously, the 2G cellular telecommunications network provides a power-saving way of transferring small amounts of data (i.e. alert communications) at irregular intervals (i.e. when it is triggered and when it is triggered). The telecommunications network may be used to interconnect with other networks, including private networks and/or the internet.

The alert communication may include:

● a time stamp;

● instructions (human-readable and/or machine-readable);

● a unique identifier for identifying the secure container that triggered the alert communication; and/or

● triggering of the secure container alerts the geographic location of the communication.

The secure container may be used for battery power, mains power and/or include an energy source (e.g. a solar panel).

Alternatives and modifications

In one alternative, the security container 100 is in the form of a stowage bin and the closure 160 is a door or a shutter.

The secure container 100 may be used to provide a portion of a batch of secure containers that are integrally formed together and/or functionally interconnected so as to share certain of the above-described components of the secure container 100 (e.g., as best shown in fig. 1 and described with reference to fig. 1), such as the controller 190, the alarm 150, and/or the transceiver 130.

Referring to fig. 3, if the identity of the authorized user cannot be determined (e.g., at step 330), if the associated network device cannot be identified (e.g., at step 340), and/or if the security container has not yet become secure (e.g., at step 350) after the alert communication has been sent (after a predetermined period of time), another alert communication may be available for transmission by the transceiver 130, the network device 180, and/or the telecommunications network 140 (as appropriate) to:

● a predefined owner of the secure container;

● a predefined intended recipient of a package that has (or is expected to have) been deposited in a secure container (associated with an authorized user or secure container, e.g., by means of a predefined subscription);

● another authorized user who has previously used (in the case of authorization) the secure container; and/or

● approaching an authorized user of the secure container, for example by:

broadcasting alert traffic as secure LAN traffic; and/or

Identifying the telecommunication network of such nearby authorized users, e.g. by means of cell tower triangulation;

● and/or an intended future authorized user of the secure container (such as an authorized user who has made a future subscription to use the secure container).

In yet another example, the alarm and/or alert communication is configured to be triggered in response to sensing a failure of a user (or an authorized user) to deposit or collect a package (particularly a correct package) from the secure container; this is performed, for example, by the sensor 120, wherein the sensor 120 further comprises, for example, a weight sensor and/or an identification sensor (such as an optical sensor for reading a barcode associated with the package and/or an RFID reader for reading an RF tag associated with the package).

The various features disclosed in the description and (where appropriate) the claims and drawings may be provided independently or in any appropriate combination.

Reference signs in the claims are provided merely as an illustration and do not limit the scope of the claims.

14页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:非对称真空隔热玻璃窗单元

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!