BACKGROUND
This section is intended to introduce the reader to aspects of art that may be related to various aspects of the present disclosure described herein, which are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure described herein. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
The value of personal belongings and their replacement costs carried by most people have generally increased over time. Some of these expensive belongings can include mobile devices, electronic car keys, laptops, tablets, designer bags and wallets, jewelry, watches, and the like. It can be a very stressful and inconvenient event to have these types of belongings stolen or misplaced, including the financial burden and cost of having to have them replaced. In addition, any of these devices may have private personal data stored on them which could lead to potential identity theft as well. Further, it is difficult for one person to safeguard these valuable items at all times, such as having to leave the items unattended while going for a swim at the beach, working out at a gym, or leaving the items at a public table for a short period of time, among others.
There have been various attempted solutions to the foregoing problem, which include bags that have physical locking mechanisms or other special features to keep them closed. In addition, there are specialized locking containers which generally featuring methods to anchor the container to a fixture, wall, a larger item, and/or more permanent and combination locks. Other anchoring devices are available that can serve to only keep a standard bag in a specific location where a user left it, but do not necessarily keep the bag closed and secured, whereby objects inside the bag are still at risk of being taken out. Further, there are standard alarm devices that can make a loud sound or flash bright lights when tampered with, thereby leveraging community/social attention to deter further action from the thief. In addition, there are concealment products which allow people to either camouflage their belongings or keep them on their person in difficult settings like water, such as when swimming. However, none of the foregoing conventional solutions provide a simple, effect, and automated method of securing and managing one's belongings.
Hence, what is needed is a simple, effective, and automated method and system for an anti-theft storage bag that can securely hold personal belongings and be effective in not only preventing theft of the belongings but also being able to track the location of the bag and deterring potential thieves, among others.
BRIEF SUMMARY
In one aspect of the disclosure described herein, an anti-theft storage bag and key system is disclosed that can securely hold personal belongings of a user and be effective in not only preventing theft of the belongings but also being able to track the location of the bag, among other advantages. The anti-theft storage bag can include one or more compartments for storing one or more items, one or more motion and proximity sensors, and one or more speakers. In addition, the anti-theft storage bag can also include a controller in communication with the one or more motion and proximity sensors and one or more speakers, wherein the controller is adapted to detect proximity of the key relative to the vessel, and upon detecting movement of the vessel, sounding an alarm via the one or more speakers.
In another aspect of the disclosure described herein, an anti-theft storage vessel and key system is disclosed having one or more compartments for storing one or more items, one or more motion sensors, and one or more speakers. In addition, the anti-theft storage vessel and key system can include a controller in communication with the one or more motion sensors and the one or more speakers, wherein the controller is adapted to detect proximity of the key relative to the vessel, and upon detecting movement of the vessel and proximity of the key, outputting an audible notification via the one or more speakers.
In addition, the vessel may output the audible notification upon detecting that the key is not within a pre-defined proximity relative to the vessel upon detecting movement of the vessel.
Further, the vessel may include a docking station.
Moreover, the docking station may include a cut-out region for securely docking the key with the docking station.
Also, the vessel can include a status indicator in order to provide a visual indicia with respect to the status of the key or the bag.
In addition, the status indicator can include visual indicia to indicate whether the bag is armed or disarmed.
Further, the anti-theft storage vessel and key system of claim may include a wristband for securing the key thereto.
Moreover, the wristband can include a partial enclosure for partially encasing the key.
Further, the docking station can be disposed within the vessel.
Also, the cut-out region may include upper and side regions substantially shaped in the same configuration as the key.
In addition, the proximity of the key relative to the vessel can be predefined by a geographic radius.
Further, the vessel may include at least one of: a bag, luggage, suitcase, briefcase, purse, wallet, container, or backpack.
In another aspect of the disclosure described herein, an anti-theft storage bag and key system is disclosed having one or more compartments for storing one or more items within the bag, one or more motion sensors affixed to the bag, and one or more speakers affixed to the bag. In addition, the anti-theft storage bag and key system can include a controller affixed to the bag and in communication with the one or more motion sensors and one or more speakers, wherein the controller can be adapted to detect whether the key is outside of a pre-defined proximity relative to the bag, and upon detecting the key outside of the pre-defined proximity relative to the bag and a movement of the bag, transmitting a notification to one or more users.
In addition, the bag may include a first network device in communication with a second network device of the key.
Also, the anti-theft storage bag and key system may include an adjustable wristband for holding the key.
Further, the bag may include a docking port adapted to secure, charge, and communicate with the key.
Moreover, the docking port may be disposed within an interior compartment of the bag.
Also, the bag may further include an indicator on its exterior surface, wherein the indicator is adapted to visually or audibly indicate a status of the bag or the key.
In addition, the indicator may include a pair of openings adapted to receive a strap therethrough, thereby securing the indicator to the bag.
In another aspect of the disclosure described herein, an anti-theft storage container and key system is disclosed having a storage container including one or more compartments for storing one or more items, the storage container further including one or more motion or mobility sensors for detecting movement of the storage container. In addition, the storage container can further include a controller affixed to the bag and in communication with the one or more motion or mobility sensors, wherein the controller is adapted to detect whether the key is outside of a pre-defined distance relative to the bag, and upon detecting the key outside of the pre-defined distance relative to the bag and a movement of the bag, transmitting a notification to one or more users.
The above summary is not intended to describe each and every disclosed embodiment or every implementation of the disclosure. The Description that follows more particularly exemplifies the various illustrative embodiments.
BRIEF DESCRIPTION OF THE DRAWINGS
The following description should be read with reference to the drawings, in which like elements in different drawings are numbered in like fashion. The drawings, which are not necessarily to scale, depict selected embodiments and are not intended to limit the scope of the disclosure. The disclosure may be more completely understood in consideration of the following detailed description of various embodiments in connection with the accompanying drawings, in which:
FIG. 1 illustrates a general network architecture for the anti-theft bag and key of the present disclosure described herein, according to one non-limiting exemplary embodiment.
FIG. 2A illustrates a perspective front view of a status indicator for the key and bag of the disclosure described herein, according to one non-limiting exemplary embodiment.
FIG. 2B illustrates a perspective rear view of the key of the disclosure described herein of, according to one non-limiting exemplary embodiment.
FIG. 3A illustrates a left side view of the anti-theft bag and key of the disclosure described herein.
FIG. 3B illustrates a front view of the anti-theft bag and key of the disclosure described herein of FIG. 3A.
FIG. 4A illustrates a right side view of the anti-theft bag and key of the disclosure described herein of FIG. 3A.
FIG. 4B illustrates a rear view of the anti-theft bag of the disclosure described herein of FIG. 3A.
FIG. 4C illustrates a top view of the anti-theft bag of the disclosure described herein of FIG. 3A.
FIG. 4D illustrates a bottom view of the anti-theft bag of the disclosure described herein of FIG. 3A.
FIG. 5A illustrates a left close-up view of a top region of the anti-theft bag of the disclosure described herein of FIG. 3A, shown with the top closed.
FIG. 5B illustrates a front perspective view of the anti-theft bag and key of the disclosure described herein of FIG. 3A, shown with the top opened.
FIG. 6A illustrates a top view of the anti-theft bag and key of the disclosure described herein of FIG. 3A, illustrating the interior of the storage bag, according to one non-limiting exemplary embodiment.
FIG. 6B illustrates a partial cross-sectional front interior view of the storage bag of FIG. 6A, according to one non-limiting exemplary embodiment.
FIG. 6C illustrates a partial cross-sectional front interior view of the storage bag of FIG. 6B, illustrating a zipper pocket compartment.
FIG. 6D illustrates a simplified top view of a docking port for the key of the disclosure described herein, according to one non-limiting exemplary embodiment.
FIG. 6E illustrates a simplified cross-sectional side view of the docking port for the key of the disclosure described herein of FIG. 6D.
FIG. 6F illustrates another simplified top view of the key and docking port for the bag of the disclosure described herein.
FIG. 6G illustrates a simplified cross-sectional side view of the key and docking port of FIG. 6F.
FIG. 7 illustrates a perspective exploded front view of a wristband and the anti-theft device of the disclosure described herein, according to one non-limiting exemplary embodiment.
FIG. 8A illustrates another perspective rear view of the wristband and the anti-theft device of the disclosure described herein of FIG. 7.
FIG. 8B illustrates another perspective view of the wristband and anti-theft device of the disclosure described herein of FIG. 7, shown in alternative configuration.
FIG. 9 illustrates a perspective view of the wristband and key of the disclosure described herein of FIG. 7, shown in an alternative configuration.
FIG. 10A illustrates a left or right side view of the wristband and anti-theft device of the disclosure described herein.
FIG. 10B illustrates a top view of the wristband and anti-theft device of the disclosure described herein.
FIG. 10C illustrates a bottom view of the wristband and anti-theft device of the disclosure described herein.
FIG. 11 illustrates a process flow chart for a method of operating the anti-theft device of the disclosure described herein, according to one non-limiting exemplary embodiment.
FIG. 12 illustrates a simplified block diagram of various modules for a companion or associated application of the disclosure described herein, according to one non-limiting exemplary embodiment.
DETAILED DESCRIPTION
In the Brief Summary of the present disclosure above and in the Detailed Description of the disclosure described herein, and the claims below, and in the accompanying drawings, reference is made to particular features (including method steps) of the disclosure described herein. It is to be understood that the disclosure of the disclosure described herein in this specification includes all possible combinations of such particular features. For example, where a particular feature is disclosed in the context of a particular aspect or embodiment of the disclosure described herein, or a particular claim, that feature can also be used, to the extent possible, in combination with and/or in the context of other particular aspects and embodiments of the disclosure described herein, and in the disclosure described herein generally.
The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the disclosure described herein and illustrate the best mode of practicing the disclosure described herein. In addition, the disclosure described herein does not require that all the advantageous features and all the advantages need to be incorporated into every embodiment of the disclosure described herein.
In one implementation of the disclosure described herein, a display page may include information residing in the computing device's memory, which may be transmitted from the computing device over a network to a central database center and vice versa. The information may be stored in memory at each of the computing device, a data storage resided at the edge of the network, or on the servers at the central database centers. A computing device or mobile device may receive non-transitory computer readable media, which may contain instructions, logic, data, or code that may be stored in persistent or temporary memory of the mobile device, or may somehow affect or initiate action by a mobile device. Similarly, one or more servers may communicate with one or more mobile devices across a network, and may transmit computer files residing in memory. The network, for example, can include the Internet, wireless communication network, or any other network for connecting one or more mobile devices to one or more servers.
Any discussion of a computing or mobile device may also apply to any type of networked device, including but not limited to mobile devices and phones such as cellular phones (e.g., an iPhone®, iOS®, Android®, Blackberry®, or any “smart phone”), a personal computer, iPad®, server computer, or laptop computer; personal digital assistants (PDAs); a roaming device, such as a network-connected roaming device; a wireless device such as a wireless email device or other device capable of communicating wireless with a computer network; or any other type of network device that may communicate over a network and handle electronic transactions. Any discussion of any mobile device mentioned may also apply to other devices, such as devices including Bluetooth®, near-field communication (NFC), infrared (IR), and Wi-Fi functionality, among others.
Phrases and terms similar to “software”, “application”, “app”, and “firmware” may include any non-transitory computer readable medium storing thereon a program, which when executed by a computer, causes the computer to perform a method, function, or control operation.
Phrases and terms similar “network” may include one or more data links that enable the transport of electronic data between computer systems and/or modules. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer uses that connection as a computer-readable medium. Thus, by way of example, and not limitation, computer-readable media can also comprise a network or data links which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
Phrases and terms similar to “portal” or “terminal” may include an intranet page, internet page, locally residing software or application, mobile device graphical user interface, or digital presentation for a user. The portal may also be any graphical user interface for accessing various modules, features, options, and/or attributes of the disclosure described herein. For example, the portal can be a web page accessed with a web browser, mobile device application, or any application or software residing on a computing device.
Phrases and terms similar to “storage bag” or “bag” may also include any type of storage container, vessel, purse, handbag, suitcase, luggage, briefcase, backpack, wallet, clutch, bin, vault, box, or the like.
FIG. 1 illustrates one non-limiting embodiment of an anti-theft storage bag and key network system according to one or more embodiments. Referring to FIG. 1, end users 110, anti-theft storage bag 200, key 300, and admin terminal/dashboard users 130 (collectively referred to herein as users 110 and 130) can be in bi-directional communication over a secure network with each other and/or central servers or application servers 100 according to one or more embodiments. In addition, users 110, 130 may also be in direct bi-directional communication with each other via the network system of the present disclosure described herein according to one or more embodiments. Here, users 110 can be any type of user, owner, customer, or subscriber, among others, of storage bag 200 and key 300 or of a network system supporting storage bag 200 and key 300, such as users operating computing devices and user terminals A, B, and C. Each of users 110 can communicate with servers 100 via their respective terminals or portals, which can include applications and software residing thereon and communicating with bag 200 and key 300, or just with bag 200. Storage bag 200 can include any type of secure lockable container or vessel for storing, housing, or holding various items and belongings, including but not limited to, bags, suitcases, vaults, boxes, and the like. Further, any type of user may operate storage bag 200. Admin terminal/dashboard users 130 may be any type of user with access privileges for accessing a dashboard or management portal of the present disclosure described herein, wherein the dashboard portal can provide various user tools, GUI information, maps, locking configurations, user profiles, graphs, and support options, among others. It is contemplated within the scope of the present disclosure described herein that any of users 110 may also access the admin terminal/dashboard 130 of the present disclosure described herein.
Still referring to FIG. 1, central servers 100 of the present disclosure described herein can be in further bi-directional communication with database/third party servers 140, which may also include users. Here, servers 140 can include various services, such as theft or accident monitoring services, theft reporting services, notification and database systems, and other event related systems, among others. In addition, servers 140 can include servers and databases for sending and receiving various types of captured, collected, or aggregated data, such as current, real-time, and past location information, artificial intelligence (AI) processing, neural network models, machine learning, predictions, and simulations by servers 100. However, it is contemplated within the scope of the present disclosure described herein that the anti-theft storage container and key network system and method of the present disclosure described herein can include any type of general network architecture.
According to one or more embodiments, anti-theft storage bag 200 and key 300 are each adapted to include a computing device, microprocessor, memory, cameras, storage device, microphones, display, speakers, wireless network communication interfaces, internet/Bluetooth, RFID components, biometric sensors, location trackers, charging and communication ports and hubs, controller, and associated software for operating and managing bag 200 and key 300. In addition, in some embodiments, the storage bag may include a main housing with a lid, cover, or have a top that closes that can include a secure locking mechanism or an automated locking member, such as a motor/solenoid actuator lock. In addition, it is contemplated within the scope of the present disclosure described herein that bag 200 and key 300 may include one or more motion/mobility and proximity sensors, accelerometers, and gyroscopes, among others.
According to one or more embodiments, the anti-theft storage bag 200 (including its docking station) and its associated key 200 can be programmed with one or more user profiles for managing and operating bag 200 and/or key 300. For example, a user profile may include a unique passcode for unlocking and locking anti-theft storage bag 200 (with or without the use of key 300). In addition, in other embodiments, any type of biometric data may also be associated with a user profile for locking and unlocking the bag (in lieu of or in combination with key 300), such as fingerprint, iris/eyes, face or facial features, voice, and the like. Here, the one or more biometric sensors of the bag 200 can detect any of the foregoing biometric data of the user in order to lock and unlock the bag, such as fingerprint recognition, iris/eye recognition, facial recognition, voice recognition, and the like. Further, users may also be able to communicate and operate the storage bag via any user terminal, such as via an application or software on their mobile device, including but not limited to creating, editing, saving user profiles, and locking/unlocking bag 200 via their mobile device (such as via a passcode or biometrics on their mobile device). In addition, storage bag 200 may also be locked or unlocked in proximity to any type of keyless entry device/tags, such as via RFID and NFC devices/tags, among others. For example, a user may be able to wear a wristband having programmed tags and/or key 300 that can automatically lock and unlock the storage bag 200 when the tag/key 300 is in pre-defined proximity (or in contact) with bag 200. In addition, users may also be able to designate other authorized users (such as family members) to be able to lock and unlock bag 200 via a passcode, biometrics, or the wristband. In addition, storage bag 200 (or an application on a computing device) may be programmed to enable and disable notifications, alarms, and alerts, in addition to being able to remotely arm or disarm the alarm for the bag.
According to one or more embodiments, once bag 200 is locked and armed by the user, the one or more motion, mobility, and proximity sensors (and optionally, cameras) of bag 200 can operate to detect any movement of the storage bag. If any movement of storage bag 200 is detected (where key 300 is not coupled to the bag or within a predefined proximity or geo-perimeter), then an audible alarm (via speakers on the bag) can be automatically initiated by storage bag 200, wherein the alarm can operate for any pre-defined period of time (e.g., 10-seconds, 5 minutes, etc.) and at various intensities, patterns, or volumes (as previously defined/configured by the user). In addition, the anti-theft storage bag 200 can also notify and alert the central servers 100 and also one or more end users 110, such as via their user terminals, mobile device, and application(s) residing on the mobile device associated with the bag, and the like. Further, the optional cameras on bag 200 can also detect any persons or movement within a pre-defined distance relative to the anti-theft storage bag 200 (such as a person within 3-feet in proximity to the bag) using facial recognition or face capturing software. If any movement is detected within or outside of the pre-defined proximity of the key relative to the bag, then the anti-theft storage bag 200 may also similarly sound the audible alarm and notify the central servers 100 and also one or more end users 110 (such as via the associated application). In one embodiment, if bag 200 is moved when key 300 is not detected (such as not being within outside a pre-defined proximity of the bag), a brief warning chirp will sound, and if the bag 200 continues to detect movement with no key in range or proximity, then the alarm will sound at full volume. This should help prevent accidental false alarms by the user or user's companions if they forget and try to access the bag when the key is away.
In other embodiments, such as in combination with movement being detected by the motion sensors and/or proximity sensors, the one or more cameras and microphones of the storage bag 200 may also begin capturing images, video, and audio, and automatically transmit the foregoing images, video, and audio to central servers 100 and/or the one or more end users 110. For example, such images/video may be able to help the user and law enforcement to identify a potential perpetrator for stealing or attempting to steal the bag. In addition, fingerprint sensors on bag 200 (such as on hand gripping surfaces like the handles, straps, etc.) may also be able to identify the perpetrator, such as by automatically (e.g., wirelessly) sending fingerprint data from the bag to a fingerprint matching network via one or more central servers 100.
According to one or more embodiments, the anti-theft storage bag 200 can also provide real-time location of the bag on a map, wherein the user can view such location of the bag on an application on their mobile device or via the web. Further, the user may also be able to relay voice and audio in real-time via the speakers of bag 200, such as speaking (to notify/deter the perpetrator) and further capturing audio in real time via their mobile device and associated application. In other embodiments, storage bag 200 can also include additional theft-deterrent systems and components, such as upon detecting movement of the bag (or someone in proximity), automatically releasing paint/liquids, unpleasant odors, flashing lights, and an electrical shock, among others.
FIG. 2A illustrates a perspective top view of a status indicator 500 for the key 300 and bag 200 of the disclosure described herein and FIG. 2B illustrates key 300. As used herein, key 300 may also be referred to herein as a tag, fob, locking or unlocking device, securement member, or the like. In some embodiments, key 300 may only provide bi-directional communication with bag 200, and in other embodiments, key 300 may communicate with bag 200 and one or more central servers or user mobile devices and associated application. Here, key 300 can be encased within a cover or housing 302. In addition, status indicator 500 secured to bag 200 can include an indicator light feature or indicator 508, such as a light emitting diode (LED), to provide various types of visual or audio feedback, alerts, notifications, and status to a user. In addition, indicator 500 can include a controller, processor, network device, communications port, memory, battery, and storage devices. For example, in one embodiment, the light indicator 508 can provide various RGB type colors depending on battery charge level (e.g., green (full charge), yellow (medium charge), red (little to no charge)) with respect key 300, bag 200, or enclosure 214 of bag 200. However, it is contemplated within the scope of the present disclosure described herein that indicator 500 may include other types of visual or audio notifications, such as via a graphical display or speakers emitting audio. As one example, indicator 500 can include audio components (such as speakers encased within the housing) for outputting a sound upon arming or disarming of bag 200 via key 300. Other functionalities of the indicator 500 can include blinking of light indicator 308 (or light that stays on/off for a predefined duration) operations and patterns to indicate programming, arming/disarming, locking/unlocking, and/or detection or proximity of key 300 relative to the bag. It is also contemplated within the scope of the present disclosure described herein that key 300 may include haptic functionality, such as allowing a user to press on the surface the surface to enter commands and/or the key physical vibrating via a motor to notify a user (such as when bag 200 is moved). Here, status indicator 500 can also include any type of network capabilities in order to communicate wirelessly with key 300, bag 200, or remotely with servers 100, in addition to including a computing system, controller, memory, storage, and a power source, among other components.
In addition, status indicator 500 can include a slotted opening 504 on both sides of the device, wherein openings 504 creates a channel or groove within the housing 502 in order to allow any type of strap or securement member to slide therethrough. For example, as shown, a strap 306 of bag 200 can pass through opening 504 in order to secure indicator 500 to bag 200. In addition, indicator 500 can also include communication and charging connector ports or pins, such as USB ports for connecting and communicating (including wirelessly) with other devices, such as computing devices, the docking station of bag 200, and/or key 300. Further, key 300, indicator 500, and bag 200 can each include various types of internal components (not shown) within their housings, which can include the following: a controller/processor or printed circuit board (PCB), network/wireless/Bluetooth communication device, an RGB LED status indicator, a haptic motor, accelerometer, gyroscope, and a power source, such as 30 mAh rechargeable battery. In some embodiments, the battery source of bag 200 and key 300 can hold a charge for up to a year or longer.
FIGS. 3A-6C illustrate various views of the anti-theft storage bag 200 of the disclosure described herein. As shown, bag 200 can include a housing 202 with a rolled top closure mechanism 204, which allows a user to roll down and close the top of the bag or roll up to open the top of the bag. In addition, bag 200 can include a center mounted strap 206 having one end 200A secured to the upper back region of bag 200. In addition, strap 206 is further connected to securement member 208 that allows the bag to be secured to strap 306 having an opposing securement member, such as male and female carabiner clips. In particular, one end 306A of strap 306 is secured to the front face of bag 200, thereby allowing indicator 500 to be secured to the front face of bag 200. The bag may also include an adjustable length carrying strap 220. In addition, securement member 208 further allows the top of the bag to remain folded and closed via its engagement with the opposing securement member of strap 206. FIG. 5A illustrates a close-up side view of the rolled down (closed) configuration of the top of the bag 200.
FIGS. 5B-6A illustrate bag 200 with its top open or in a rolled-up configuration. In particular, bag 200 may include a large interior compartment 210 for storing various items, such as laptops, computers, electronics, books, groceries, personal belongs, or the like. In addition, bag 200 can include its main docking station or circuitry enclosure 214 which allows bag 200 to communicate with key 300 and one or more servers or a mobile application on a user's device/terminal. Here, docking station or enclosure 214 can include any type of communication/power port 222 (such as a USB port) for charging an internal battery of the bag and/or sending/transmitting data to/from another computing device or storage device. In addition, enclosure 214 can further include the aforementioned electronic components (not shown), including but not limited to: a controller or printed circuit board (PCB), network/wireless/Bluetooth communication device, an RGB LED status indicator, a haptic motor, accelerometer, gyroscope, proximity sensors, a power source (such as 30 mAh rechargeable battery), speakers, microphones, scale, and cameras, among others. As one example, a weighted scale can be integrated within enclosure 214 (or an independent scale within the bag in communication with enclosure 214) can detect a shifting of weight with respect to the items within the bag as a result of the bag being moved and items pressed against the surface of enclosure 214 or any other scale within the bag to detect an altered weight and further sound an alarm to alert a user, among others. In addition, bag 200 can also include an internal waterproof zipped pocket or compartment 212 for storing various items therein. Further, bag 200 may also include additional dual pocket areas 224 for storing and holder various other items, such as cell phones or tablets, notepads, among others. It is contemplated within the scope of the present disclosure described herein that bag 200 may hold, for example, up to four cell phones, two sets of keys, two wallets or clutches, laptop, books, notepads, and assorted jewelry, among others.
Referring to FIGS. 6B and 6D-6G, bag 200 can also include a docking port 220 (as part of docking station or enclosure 214) that allows key 200 to be securely connected thereto, as will be later discussed with respect to FIGS. 6D-6G. Here, docking port include a cut-out shaped substantially similar to the shape of key 300, but longer relative thereto in order to provide a user space 224 in order for the user to place their finger under lip 330A of key 300 in order to easily detach and remove key 300. In particular, docking port 220 can include a raised support region (or ledge) 222 and a lower region 224, wherein the key mounts and secures to the raised region 222 such that the metal contacts 320 of key 300 directly engage the metal contacts 230 of port 220 (such as via a magnetic connection) in order to provide power and communication between key 300 and bag 200. It is noted that the configuration of port 220 (and its depth) allow the top surface of key 300 to stay “flush” or substantially parallel or substantially within the same horizontal plane as the surface of docking station/enclosure 214 to prevent any objects within bag 200 from engaging with key 300 thereby inadvertently detaching it from port 220. In some embodiments, once key 300 is coupled with port 220, then key 300 can go into a charging mode and/or low power state mode operation.
FIG. 7-10C illustrate one non-limiting exemplary embodiment for a band or wristband 400 for carrying key 300 of the disclosure described herein. Here, band 400 can include multiple openings 432 in order to allow the band to be secured to a person's wrist or ankle (or any other area on the person or another object) via coupling and inserting protrusion 422 within one or more openings 432 on the band in order to adjust the size of the loop. In addition, a buckle 404 secured to one end of the strap 402B for band 400 allows the opposing end of strap 402A to be fed through in order to create a secure loop, such as shown in the various alternative configurations of FIGS. 8A-8B. In particular, band 400 can include a flexible or expandable partial enclosure, casing, or wrap 410 that allows key 300 to be secured placed therein, such that enclosure 410 provides a tight or fitting wrap around the perimeter or borders of key 300. In other embodiments, enclosure 410 may entirely or substantially encase or cover key 300. Here, enclosure 410 may also include a raised area or protrusion 420 in order to securely engage and cover contacts 320 of key 300. It is contemplated within the scope of the present disclosure described herein that band 400 may include any number of openings 432 to allow for proper sizing and adjustment of the strap in order to any one or more of protruding members 422 in order to provide secure fitment around the user's wrist, ankle, or any other type of object for which band 400 will be secured thereto. Here, band 400 (including its straps) may be made of any rubber or silicone type material; however, it is contemplated within the scope of the present disclosure described herein that band 400 can be made of any other material, such as nylon, webbing, fabric, polyester, cotton, leather, or any type of textile or textile blend.
FIG. 11 illustrates another non-limiting exemplary embodiment for a method of operating and configuring the anti-theft storage bag 200 and key 300 of the disclosure described herein via the companion or associated mobile application 700. Here, the companion or associated mobile application 700 residing on a mobile device of a user can be configured to operate and work with bag 200 and key 300 of the disclosure described herein. Here, at step 600, the user can login or register with the application (and/or the network system of the disclosure described herein). Upon registering and logging in, such as via a username/password, the user can be presented with a main menu or home screen option that allows the user to configure and register bag 200 (or any number of bags 200) with one or more keys 300, wherein one or more keys can be included with bag 200 or purchased separately. Specifically, in one embodiment, at step 602, a user can place a key 300 within docking port 220 of bag 200 in order to create a direct communication channel between key 300 and bag 200. From here, bag 200 may automatically notify the user via the application that a new key (that had not been linked/registered before) has been detected. From here, the user can confirm that the key 300 should be linked and associated only with bag 200 (or any other bags 200 such as via each bag's identification/serial number, code, name, or value). In some embodiments, the user may be prompted to enter the identification/serial number (or any identification parameter) in order to safely and securely link that particular key 300 to that particular bag or bags 300 and grant user privileges/permissions. In addition, users can also remove user privileges/permissions with respect to the key via the application and/or reprogramming of the software 700 operating on bag 200.
Still referring to FIG. 11, at step 604, the user may also have the option to purchase additional keys 300 via the mobile application 700 and at step 610 to further program and configure those additional keys. Next, at step 606, the user can further set various alarm/alert and user notification parameters with respect to bag 200 and key 300. For example, the user can set certain thresholds for events such as proximity distance of key 300 relative to the bag 200 in order to sound an alarm (and the type/sound of the alarm) and for how long the alarm or alert should operate, among others. For example, in one embodiment, the user can program the parameters of the bag 200 to sound a low volume alarm when the proximity of the key 300 to the bag is outside of a 10 ft. radius or geo-perimeter relative to the bag and the bag detects movement, and for the bag to sound a high volume alarm when the proximity of the key to the bag when the proximity of the key 300 is outside a 30 ft. radius or geo-perimeter of the bag and the bag detects continued movement, among other variations. Accordingly, the application 700 can allow a user to set and define varying degrees/scale of alerts or alarms for bag 200 depending on the length of movement of the bag, severity/sudden movement of the bag, movement patterns of the bag, speed of movement of the bag, and other related parameters. In addition, such programmable parameters can include automatically notifying and reporting the theft (or movement of the bag) to law enforcement and to further provide real-time tracking of the bag on a map. Here, the mobile application (or the docking station 214 of the bag) can also indicate to the user the battery life of the docking station 214 of bag 200 and/or key 300 and when either component needs recharging, maintenance, or service. In addition, the user can set predefined parameters as to when and how the bag is armed/disarmed, such as the bag arming itself when the bag detects the key as moving outside of a predefined proximity, radius, or geo-perimeter, and similarly, disarming itself based on the foregoing parameters. In addition, at step 608, the user can also active and deactivate any number keys associated with a user's account and/or bags 200.
FIG. 12 illustrates one non-limiting exemplary embodiment for various modules of the associated or companion software application 700 that operates in conjunction with key 300 and bag 200. In particular, the software application 700 can be the interface between a user and bag 200, which can serve as a gateway to link and register their bag's unique ID to their user account, manage keys 300 that connected and able to disarm the bag's alarm, as well as controlling several other configurable features of bag 200.
Still referring to FIG. 12, application 700 can include a user account module 710, device integration module 720, configuration module 730, backend services module 740, security module 750, and maintenance and update module 760. The user account module 710 can allow a user to create an account using their email and user generated password, biometrics, or any other form of identification via the GUI of the application. The user account module 710 can also include authentication methods and procedures for authenticating and verifying users of the application 700, bag 200, and/or key 300. In addition, module 710 can also provide account management functionality via its portal or dashboard, such as allowing users to manage their personal information, password changes, notification settings, and devices linked to their account. Further, device integration module 720 can provide a unique encryption key assigned to each bag 200 during production and firmware loading by the manufacturer. This encryption key is stored on network servers (such as servers 100) and a QR code (or any ID code) provided in the packaging whereby the physical device points to that encryption key data. Under module 720, after a user creates an account via the app, the user can scan the QR code included with their bag, which provides that specific user account with the correct encryption key data to be able to communicate and configure their bag as well as monitor its battery life. Here, application 700 can link and manage multiple bags 200 based on the user's needs.
Still referring to FIG. 12, once the user account has been linked to the encryption key data for their bag, a configuration module 730 can allow a user to access and configure various settings of application 700, bag 200, and key 300. Here, key 300 can be docked into the bag 200 and then the user can follow the flows within the graphical user interface (GUI) of application 700 in order to configure key 300 to the unique encryption key of their bag, thereby allowing bag 200 and key 300 to communicate with each other and function as intended. In one embodiment, at least one key 300 can be included with the bag which can be configured during the first bag onboarding process. Additional keys 300 can be purchased and configured by inserting then into the docking port of bag 200 and following in-app flows for their configuration. In addition, any number of keys 300 may be linked to one bag. Further, in other embodiments, if multiple bag devices are linked to one user account, then it is possible for the user to dock a new key into any one of those bags and configure it either for that bag only, or for all of the user's linked bags at the same time, without having to dock that specific key in every single bag.
Still referring to FIG. 12 and module 730, the user may also custom configure an alarm duration for bag 200 via the GUI of application 700. In one embodiment, the user may select from a list of options if they want the bag alarm to sound for 1, 3, 5, 10, or 20 minutes after detecting motion. While the bag alarm is sounding, the user can manually stop the alarm by touching a capacitive touch button for 3 consecutive seconds while a key 300 is in range, or in the alternative, via a prompt in the application 700 after unlocking their phone and connecting it to the bag. In another embodiment, the bag device could be programmed at the manufacturing level to remove the foregoing alarm configurable feature, in which case the function of the alarm would be set to sound when motion is detected, but stop automatically after motion is no longer detected, or in the alternative, when a key 300 comes back into range of the bag, rather than stopping after a set period of time or via manual shutoff by the user, among other variations.
Still referring to FIG. 12 and module 730, an alarm activation range can also be configured by the user via the GUI of application 700. Here, the user may set the range, distance, or radius from key 300 to bag 200 at which the alarm switches to an armed state. Here, menu options from the GUI of application 700 can include close, medium, and far where close is the key within approximately 3 feet of the bag, medium is between approximately 3-10 feet of the bag, and far is more than 10 feet from the bag, among other variations. Alternatively, application 700 may be pre-programmed with predefined ranges. In other embodiments, the user can indicate via the GUI of application 700 the specific activity that the user is engaged, such as swimming at the beach and the application 700 will set the recommended range for the key relative to the bag for sounding the alarm (if the key is not within the range).
Still referring to FIG. 12, a backend services module 740 can include various backend and support services associated with application 700, bag 200, and key 300. In one embodiment, data from the manufacturing of key 300 and bag 200 can be stored in the backend and accessible by administrative users or users having certain access privileges. Information stored during manufacturing can include the date and time of programming, testing results, sales records, user account records, and user account and key 300 linked information, and the encryption key specific to a particular bag based on the bag's ID. Further, a security module 750 of application 700 can allow keys 300 and bags 200 to communicate using a pre-shared key to encrypt information over the air or wireless network. Further, a maintenance and update module 760 can allow the application 700 to be update via the applications' corresponding application store, such as via the web, Apple® App Store, and Google® Store, among others.
From the foregoing it will be seen that the present disclosure described herein is one well adapted to attain all ends and objectives herein-above set forth, together with the other advantages which are obvious and which are inherent to the invention.
Since many possible embodiments may be made of the invention without departing from the scope thereof, it is to be understood that all matters herein set forth or shown in the accompanying drawings are to be interpreted as illustrative, and not in a limiting sense.
While specific embodiments have been shown and discussed, various modifications may of course be made, and the invention is not limited to the specific forms or arrangement of parts described herein, except insofar as such limitations are included in following claims. Further, it will be understood that certain features and sub-combinations are of utility and may be employed without reference to other features and sub-combinations. This is contemplated by and is within the scope of the claims.