Not applicable
The following is a tabulation of some prior art that presently appears relevant:
With the increasing volume of home package delivery, fueled in large part by the advent of online shopping, there is a growing need for secure receipt of parcels in absentia. Commercial carriers such as FedEx, UPS, USPS and others perform most deliveries during common working hours (i.e., Monday through Friday, 9 am-5 pm), so it's no surprise that often times packages must be left unattended at the recipient's home while he or she is away at work.
Exacerbating the issue is the fact that carriers are sometimes unable or unwilling to leave a package unattended due to concerns of package theft. This leads to the dreaded door tag, or a written notice (often stuck to the recipient's front door) that informs the recipient that the carrier could not leave the package. In the best-case scenario, this delays receipt of the package by 1 day. Worse case, it may take several attempts to coordinate the pickup. Not only is this an inconvenience for the package recipient, it is also costly for the carrier to make multiple attempts at delivery. Particularly given their fee for delivery is most often fixed and does not increase with each attempt, thus each failed delivery erodes profits.
Lastly there is an environmental impact to failed deliveries. According to Edwards, failed package delivery, resulting most often from no one home to receive, can increase CO2 emissions by up to 75% per drop location per delivery attempt. The impact is even more severe when trips made by an individual in a car to pickup a package at a central depot are factored in, which by one calculation may produce the equivalent of 26 delivery attempts' worth of CO2.
There exist a number of approaches to addressing the problems associated with unattended package delivery. They generally fall into a few categories. The approach with the lowest initial investment is to effectively do nothing. That is to say, continue business as normal and accept the risk. On an individual level, delivery personnel may make a best effort attempt to hide packages from would be thieves (e.g., placing a box behind a front step planter), and some carriers allow recipients to provide delivery instructions that may help mitigate concerns (e.g., place package on back steps).
As already stated, the status quo, even with some amount of individual effort still leaves recipients exposed to casual theft. These crimes of opportunity, as they are sometimes called, can be committed by thieves without any sort of preparation or tools. Furthermore, the feeling of exposure to such a low barrier crime can cause anxiety-particularly on those occasions when a package is known to be sitting and waiting on the front steps, but the recipient is unable to return home immediately to secure it.
Another approach to addressing the issue of unattended package delivery is to not deliver the package to an unattended location at all. Instead, in this case, packages are sent to a location known to be secure. This takes on a couple forms, including automated parcel kiosks, such as Amazon Locker, USPS gopost, and DHL Packstation, and attended pack drops like a FedEx store, post office or other businesses contracted to receive and hold packages on behalf of recipients.
In a way, this is a non-solution to the problem of unattended home package delivery because the packages are not actually delivered to the home. These approaches require the recipient to travel to a package depot of some kind to pick up a package. This is an inconvenience, and largely defeats one of the primary motivations for shopping online-which is to avoid a trip to the store. Also, these options are often not viable for those living in less densely populated areas due to the lack of availability.
Yet another category of approach uses some means to provide package security at the recipient address. One well-known method involves deploying a lockable box, often made of metal, such as the commercially available Elephantrunk, and various other inventions similar to U.S. Pat. No. 5,774,053 to Porter (1998).
A problem with this approach is that it often requires installation of a receptacle. The receptacle itself may be heavy and/or expensive. These issues may render this approach impractical for some. Furthermore, the size of the receptacle, and thus the capacity, may be at odds with the aesthetic sensibilities of the resident(s). In other words, a large receptacle is necessary to receive large packages, but this may be an unwelcome sight at or near the front door or anywhere else for that matter.
There have been attempts in the art to mitigate the concerns related to receptacle size, as disclosed in U.S. patent application 20,120,269,461 by Proctor et al. (publ. 2012), U.S. Pat. No. 11,399,649 to Raphael (2022), U.S. Pat. No. 11,185,181 to Khatchikian (2020), U.S. Pat. No. 10,786,103 to Teoh (2020), U.S. Pat. No. 10,653,261 to Loures (2020), U.S. Pat. No. 6,871,184 to Liberman (2005), U.S. Pat. No. 6,426,699 to Porter (2002), and to a lesser extent U.S. Pat. No. 9,926,108 to Wiley (2018), U.S. Pat. No. 5,624,071 to Sosan (1997), and U.S. Pat. No. 8,358,199 to Nesling (2013). However, these inventions provide only a partial solution with limited container collapsibility and tidiness. For example, those cited and others, often include one or more rigid surfaces or otherwise have some structural impediment that prevents the container from achieving a fully flexible, and very low-volume profile when deployed and ready to receive packages.
Moreover, there has been little attention paid to ease of use of the secure container, particularly from the perspective of delivery personnel. As illustrated in the cited prior art, attention has instead been directed to cumbersome locking schemes of mainly solid doors, discrete flats and zippers. These schemes sometimes require a pre-exchange of keys or codes with the parcel carrier. In these ways, all secure doorstep parcel receptacles heretofore known suffer from unnecessarily bulky or untidy presentation, and overly difficult operation.
In accordance with one embodiment, a secure package apparatus comprises a flexible cut and tear resistant cable mesh container that is closed at the bottom with a wide opening at the top. The container, when not securing a package, lies nearly flat-having the appearance of a disk when viewed from above. The container is separately secured to a rail, post, door or other fixed attachment point near the place of parcel delivery using a cut resistant cable and pad lock or similar.
To operate, a package is placed on top of the container (disk), the container's sides are pulled up around and over the package and the top is securely cinched closed by means of a drawstring cinching cable. The cinching mechanism requires no key to close and can be operated very quickly and easily by pulling the end of the cinching cable while holding the container in place (like starting a lawn mower). The recipient uses a key to release the top cinch, widen the opening and then remove the package. Once the package is removed, the container collapses naturally into its ready-to-receive package state.
Accordingly several advantages of one ore more aspects are as follows: a low-profile appearance, extremely compact when collapsed, lightweight, relatively inexpensive construction, easy to deploy and operate, with security similar to a bike cable lock or better when a plurality of securing features are incorporated. Other advantages of one or more aspects will be understood by persons skilled in the art in view of the following detailed description and the accompanying drawings.
In accordance with one embodiment, a secure package container comprises a flexible cut and tear resistant cable mesh tube 10, permanently closed at the bottom 12 with a cinching drawstring closure at the top. This container assembly is depicted in
The collapsible container tube 10 is composed of braided steel cable that is strategically woven into an articulating lattice structure.
The flex joints 30 articulate in plane with the cable mesh allowing the lattice structure to move freely from a collapsed (
The base of the container 12 is composed of a similar cut and tear resistant material as the tube 10, but does not require the same type of articulation so it may optionally use a simplified, or otherwise more suitable, cable weave. At or near the connection point of the container tube 10 and the container base 12 is a base ring 18 that is composed of a larger diameter cable than that used in the wire mesh container tube 10, or another semi-rigid flexible material. This component gives the container assembly a circular shape, which helps it maintain a ready to receive state and improves overall tidiness of the apparatus.
At the top of the container 10 is a cinching lock 13 that controls the movement of the cinching cable 16 and thus the size of the container opening 11. The outside end of the cinching cable 16 is terminated with a pull handle 14 to facilitate cinching. The maximum diameter of the container opening 11 is slightly larger than the base ring 18 diameter to make it easier to pull the cinching cable 16 up and over packages 28
Attached to the base ring 18 is a securing cable 26. The point of attachment 20 is achieved by looping the securing cable 26 around the base ring 18 then permanently clamping it back on itself. The other end of the securing cable 26 can be looped around any fixed structure 22, such as a handrail, gate, or door handle, then locked in place using a padlock 24 or other cable locking means commonly known. In this way, the secure container assembly can be easily deployed and removed from service in a matter of a few minutes by a single layperson.
In order to secure a package 28, the package is placed on the base disk 12 within the bounds of the base ring 18, then the cinching cable 16 is lifted over the top of the package 28, effectively expanding the container tube 10 and then the container is cinched closed. The cinching closure on the top of the container 10, comprised of 131416, is operated by holding the cinching lock 13 and pulling on the cinching cable handle 14 so as to close the container opening 11 by shortening the amount of cinching cable 16 on the container side of the lock 13.
To open the secure container and remove the package 28, the cinching lock mechanism 13 must be unlocked with a key, combination or through another authenticated method, to allow the cinching cable 16 to be released. Once released, the cinching cable 16 can move freely allowing a user to effectively widen the container opening 11 and remove the package.
In this way, a package can very easily be secured within the container without the need for additional steps, such as opening or closing a door, or unlocking any portion of the apparatus. No key or code is required by a parcel carrier or anyone wishing to secure a package. Simply place the package insider the container, pull up the wire mesh tube and cinch.
In another embodiment, the cinching lock 13 is equipped with a battery, sensors and wireless communication componentry. An optical sensor, similar in function to that found in a modern computer mouse, is available to monitor the movement of the securing cable 26 through the cinching lock 13. Compact gyroscopic sensors, similar to those found in modern smartphones and familiar to one skilled in the art, can detect movement of the apparatus. Wireless communication componentry, again similar to that found in modern smartphones and familiar to one skilled in the art, is used to communicate over an available Wi-Fi network with a paired Internet based service.
Equipped as such, any tightening or loosening of the cinching cable 16, or any movement or jostling of the cinching lock 13 or assembly in general, is detected as a change in status (known as an event). Each event is communicated to the paired Internet based service over an available Wi-Fi connection. From there the paired Internet service uses software-based logic to determine if, when and how to notify registered subscribers of said event. Subscribers can include, but are not limited to, parcel recipients, parcel carriers, and other computer systems. Notifications can be sent from the paired Internet based service via email, SMS/MMS text message or some other form of communication. Likewise, instructions can be sent from the Internet based service to the apparatus to trigger certain behaviors. For example, remotely unlocking the cinching cable 16. Keylessly unlocking the cinching cable can also be accomplished without the need for communication with an Internet based service, for example by storing authorization codes within durable memory on the lock mechanism 13 and then passing an authorized code to the lock mechanism from a device capable of communicating with the lock mechanism wirelessly.
As a variation of the alternate embodiment previously described, a compact digital camera sensor, similar to one found in a modern smartphone is incorporated into the lock mechanism 13, and used to detect a barcode or other computer recognizable image. This image acts as an authentication mechanism, and with the help of the Internet based service, can trigger authorized behavior such as keyless unlocking of the cinching cable 16.
In yet another embodiment, the container tube 10, base 12, cinching cable 16, securing cable 26 and any other component that can be cut or torn to create a breach of container security, incorporate an alarm similar to that disclosed in U.S. Pat. No. 3,824,540 to Smith (1974) and housed within the lock mechanism 13, whereby cutting or tearing the securing material, or otherwise tampering with the storage apparatus triggers a loud audible alarm as a deterrent to theft. In the case of the present embodiment, a status change event is also detected leading to a notification message being sent as previously described.
From the description above, a number of advantages of some embodiments of the storage apparatus become evident:
While the above description contains many specificities, these should not be construed as limitations on the scope, but rather as exemplifications of a number of embodiments. Many other variations are possible. For example the wire mesh container 10 can be constructed of any suitably flexible and durable material, in any shape, with fixed joints or articulating joints similar to 30, so long as it resists cutting and tearing and can achieve a low profile when not in use. The container 10 can employ a weather resistant cover to further protect a contained package 28 from rain or other environmental damage. When said cover is also opaque, this can obscure the contents and add a level of privacy. Furthermore, the cinching lock mechanism 13 can provide the ability to more easily tighten the cinching cable 16, by use of gearing, pulleys or other means, such that pulling the handle 14 results in a relatively greater reduction of the circumference of the container opening 11 than the distance the handled 14 is pulled. Further still, the container closure mechanism can use an approach other than an cinching drawstring. For example, a clamshell type hinge mechanism can be used to quickly and easily fold closed the container opening 11 with a lock at the hinge or clasp that prevents unauthorized opening. Various means of apparatus storage are also possible, including but not limited to, tucking into a small storage bin or hanging it on a hook near the place of delivery when not in use.
Additionally, the container base 12 can be integrated with or concealed within a doormat 37 where the doormat itself serves as the base of the container.
On the issue of wireless communication, a protocol other than Wi-Fi can be employed such as Bluetooth, Bluetooth low energy (Bluetooth LE) or any other available means to wirelessly communicate with the apparatus.
Accordingly, the scope should be determined not by the embodiments illustrated, but by the appended claims and their legal equivalents.
Number | Name | Date | Kind |
---|---|---|---|
4785960 | Belisle | Nov 1988 | A |
6026662 | Schlipper | Feb 2000 | A |
6871184 | Liberman | Mar 2005 | B1 |
10076204 | Sadeghi | Sep 2018 | B1 |
10143320 | Batts | Dec 2018 | B1 |
10282951 | Kulick | May 2019 | B1 |
10786104 | Pappas | Sep 2020 | B1 |
11330927 | Loures | May 2022 | B2 |
11412876 | Kadlub | Aug 2022 | B1 |
11492172 | Izquierdo | Nov 2022 | B1 |
11877681 | Willhoit | Jan 2024 | B2 |
11889937 | Meddah | Feb 2024 | B2 |
11944217 | Sutherland | Apr 2024 | B1 |
12133604 | Courtney | Nov 2024 | B2 |
12193585 | de Jonge | Jan 2025 | B2 |
20120269461 | Proctor | Oct 2012 | A1 |
20130077896 | Wiley | Mar 2013 | A1 |
20150305538 | Sundaresan | Oct 2015 | A1 |
20160051073 | Heinz | Feb 2016 | A1 |
20170055751 | Sundaresan | Mar 2017 | A1 |
20180162612 | Bojic | Jun 2018 | A1 |
20180177320 | Chambers | Jun 2018 | A1 |
20180202199 | Critz | Jul 2018 | A1 |
20190038062 | Sundaresan | Feb 2019 | A1 |
20190104876 | Loures | Apr 2019 | A1 |
20190133362 | Gilligan | May 2019 | A1 |
20190223644 | Hopp | Jul 2019 | A1 |
20190231104 | Dunkelberger | Aug 2019 | A1 |
20190246828 | Miller | Aug 2019 | A1 |
20200015617 | Izquierdo Gonzalez | Jan 2020 | A1 |
20200060460 | Farrar | Feb 2020 | A1 |
20200331675 | Jones | Oct 2020 | A1 |
20200388095 | Agbeyo | Dec 2020 | A1 |
20200390313 | Pappas | Dec 2020 | A1 |
20210045563 | Bartley-Clark | Feb 2021 | A1 |
20210212493 | Khatchikian | Jul 2021 | A1 |
20220151420 | Pappas | May 2022 | A1 |
20220183491 | Cooper | Jun 2022 | A1 |
20220233010 | Sundaresan | Jul 2022 | A1 |
20230029102 | de Jonge | Jan 2023 | A1 |
20230124995 | Yu | Apr 2023 | A1 |
20230157472 | Barkman | May 2023 | A1 |
20230322456 | Parks | Oct 2023 | A1 |
20240197097 | Gregory | Jun 2024 | A1 |