The present disclosure generally relates to containers and in particular, to containers that protect a person's valuables and transmit a signal during emergency situations.
Severe weather, natural disasters, fires and other extreme conditions can force the evacuation of large numbers of people. Often, people are unprepared for evacuation, and in the urgent rush to evacuate with family members and pets, important objects and documents can be left behind and eventually destroyed.
There is a need in the art for a container that can protect valuables and important documents during an emergency situation and a service for locating and securing these containers.
In one aspect, a method of securing items in anticipation of a disaster includes providing a container to a first end-user, and receiving and recording a registration of the container from the first end-user. The method also includes determining that a region in which the container is located is likely to experience an emergency situation, and in response to this determination, dispatching a transport vehicle to a first location to retrieve the container. Furthermore, the method includes retrieving and transporting the container to a secure facility designed to protect and safeguard the container.
In another aspect, a system for protecting and securing a container located in a region that is likely to be affected by a disaster includes a processor and machine-readable media including instructions which, when executed by the processor, cause the processor to receive and record a registration of the container from the first end-user, receive information about a disaster in the region, and then, in response to the information, dispatch a transport vehicle to a first location to retrieve and transport the container to a secure facility designed to protect and safeguard the container.
In another aspect, a container for the secure storage of items in anticipation of a disaster, includes a housing unit having an interior space defined by a plurality of outer walls, a resealable closing system formed in the housing unit providing access to the interior space, and a beacon configured to emit a location signal. The container further includes a secured access system associated with an exterior surface of at least a first outer wall. The secured access system is configured to verify an identity of the specific user intending to access the interior space once the container is sealed, based upon at least one of the following: (a) a PIN entered by the user; (b) a biometric identification; (c) a key inserted into a lock mechanism; and (d) an RFID signal.
Other systems, methods, features, and advantages of the disclosure will be, or will become, apparent to one of ordinary skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description and this summary, be within the scope of the disclosure, and be protected by the following claims.
The disclosure can be better understood with reference to the following drawings and description. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. Moreover, in the figures, like reference numerals designate corresponding parts throughout the different views.
The following embodiments provide a container apparatus that can store and protect valuables during an emergency situation, as well as a service and method to retrieve and secure such containers. Emergency situations as used herein refer to situations that are caused by natural disasters such as hurricanes or wildfires, as well as accidents and other man-caused disasters. The disclosed containers may allow a user to safely store items, and in case of emergency, offer a readily available means of securing the items. For example, in some instances, an emergency situation may cause an unsafe environment such as flooding or fires. The container may allow the stored items to remain protected from water and/or fire. In some situations where flooding may occur, some embodiments of the system may provide a waterproof vessel for items in the container to remain dry and float. In other embodiments, the container may include a beacon that signals rescuers of its location. In addition, a service may deploy a vehicle to retrieve and hold the container in safekeeping in response to emergency situations, freeing the owner to focus on the safety of their own person and family. In some embodiments, the container system may include biometric locks to ensure only the original user can access its contents. Such a system may facilitate the preservation of the user's belongings and the integrity of their property.
For purposes of clarity, an overview of one embodiment of the proposed systems and methods is illustrated with reference to
Container 100 may be configured to be any shape or size. Referring to
In different embodiments, the container 100 can include an external housing unit with a perimeter having one or more edges. For example, a container 100 may include at least two outer panels or walls that include a perimeter. The term “outer wall” is used to generally describe the external housing or outermost structural panels of the container. It is not intended to imply that the sides of the container are necessarily rigid or flat. In
In some embodiments, one outer wall or a portion thereof can be hingedly or releasably connected or fastened to the remaining part of the wall or walls of the housing unit that are integrally joined together, providing a resealable closing system. For example, a portion of the housing can include a door, seal, or lid that permits a resealable opening through which the interior space 170 may be accessed and items may be added or removed. In this case, the upper wall 182 is a lid that includes a peripheral border portion that extends or protrudes out to ‘meet’ the upper edges of forward wall 186, rear wall 188, first side wall 190, and second side wall 192. The space 170 can be configured to receive or hold a plurality of valuable items (“valuables”). For example, in
Furthermore, as noted above, in some embodiments, the container 100 can include a locking mechanism or other secured access system 150 for securing the items 160 within the container 100. In some embodiments, the secured access system 150 or portions thereof can be associated or attached to an exterior or outwardly facing surface of an outermost wall or lid of the container 100. For example, the secured access system 150 may be configured to verify an identity of the specific user intending to access the interior space once the container is sealed, based upon a PIN entered by the user, a biometric identification, a key inserted into a lock mechanism, and/or an RFID signal. Thus, in some embodiments, the container 100 can be configured to restrict access to the interior of container 100 only to persons authorized to have such access (see
In some embodiments, the containers can be configured to be readily stackable, such that a user may obtain multiple containers and stack several containers in a stable tower, or allow the containers to be cleanly nested within one another when not in use. For example, the containers may be offered in ×1, ×½ and ×¼ unit sizes or other such readily expandable sizes. In different embodiments, the containers can be offered for sale through an online vendor, or at a retail location, such as a retail store, kiosk, factory outlet, or manufacturing store. In some cases, government organizations or other agencies may offer containers to the general public in anticipation of an emergency situation.
In some embodiments, containers may include identification features disposed on an exterior surface. The identification features may allow a user to identify their own container. Some examples of an identification mark can include; a barcode, alphanumerical code, label, icon, or quick response (QR) code. In other embodiments, any other kind of identifier or indicia could be used with the container. Some embodiments of the container can include multiple identification marks. In addition, in cases where a container is obtained online, the vendor may also provide a pre-registration service by which the user can establish a profile for their container(s). For example, a user can identify the primary address and owner of the container, their preferences for pick up or storage during a disaster, how specific items in the container should be handled in the event that the owner is not found or is unable to indicate their wishes, and/or a listing of other persons who are authorized to access or take custody of the container. Such a system can also pre-link the container's identification mark to the new owner, generating a record that will ensure the container's owner can always be identified and the owner's corresponding preferences readily determined. In another example, the pre-registration may allow a user to select a desired locking mechanism, be provided with a pre-assigned lock code, or link their own biometric data to the container profile such that the container is accessible only by that user even before the user has received the container. In yet another example, the user can receive a code to register the container via a mobile device software application, whereby the container profile can be created, modified, or updated, the location of the container can be displayed, or other information, including a password or other security token for accessing the profile or opening the container can be managed.
In some embodiments, a user may desire the services associated with the containers (e.g., location tracking, profile recording, retrieval during a disaster, and/or secure storage service until the user can return for the container) but not wish to use the containers currently being sold, and/or the user may feel the process of transferring their valuable items from their present location to the container is too challenging. In such cases, the retail system may offer an add-on or modification option by which the user can order or purchase a preconfigured and preregistered device that may be installed on a user-designated item or item(s). For example, in
Referring now to
Furthermore, as noted above, a container may include various mechanisms and systems for accessing and/or securing the contents stored in the interior void 430. A secured access system 450 can be configured to communicate and/or respond to, for example, signals emitted by near field communication (NFC) technology via a proximity sensor, for example, or an input mechanism (e.g., an Interactive display or keypad) for receiving input from a user to verify his or her identity or authority to access the container, by, for example, entering a PIN or a VIP code. In some embodiments, an interactive display may issue these instructions visibly on display. A VIP code is a code—often a numeric code—that is transmitted to a device held or viewed by the user and that is only valid for a short period, such as 30 seconds or a few minutes. It may alternatively issue these instructions audibly via a speaker incorporated into the container housing. The user's identity may also or alternatively be verified by biometric scanner, which could include, for example, using facial recognition based upon the user's facial features, voice recognition based upon a voiceprint of the user, a retinal scan and/or fingerprint identification.
In addition, as noted above, some embodiments may include provisions for tracking or otherwise locating or determining a route to a container. In some embodiments, a container could be provided with a tracking beacon (or tracking device), such as tracking beacon 460. Different kinds of tracking beacons could be used, including blue-tooth enabled tracking beacons, WiFi enabled tracking beacons, cellular enabled tracking beacons, GPS enabled tracking beacons or any other kinds of tracking beacons. Generally, the type of tracking beacon used may be selected to optimize the range of tracking and the power needs of the beacon. For example, blue tooth enabled beacons may have low power consumption but may only be detectable in a limited range. Various kinds of GPS enabled tracking systems may facilitate tracking over a longer range but may consume significant power. In some embodiments, a tracking beacon could be incorporated into the interior void 430 of the container 400 or integrated or attached to a surface of its housing.
In different embodiments, a container can include a power source, such as an onboard battery 470. The onboard battery 470 may be charged by connection of an electrical source 480 to an outlet and/or a solar panel (not shown) that may be installed on an outer wall of the container. In some embodiments, the onboard battery 470 may be any kind of battery known in the art. For example, onboard battery 470 could be a rechargeable lithium-ion battery. In embodiments where onboard battery 470 is rechargeable, power for recharging it could be supplied by a solar panel. In other embodiments, a non-rechargeable battery could be used. Onboard battery 470 may be used to power a variety of different items, including a user's cell phone or other device, as well as to provide power to tracking beacon 460. If an electronic locking system is used, such as a fingerprint reader or display, the battery 470 could also be used to power the such systems. The user can store the container in a charging mode until the container is moved to ensure the power supply remains full prior to any emergency situation.
As noted above, embodiments are not limited to the particular size and shape of container 400. In other embodiments, other types of containers could be used. For example, a container may include straps so that container may be worn as a backpack. In other embodiments, other types of containers could be provided, including shoulder bag containers, hand-held containers, duffle bag containers, rolling containers, compactable containers, as well as others.
In
Once the container 400 has been packed and sealed, it may remain so indefinitely, or be opened and accessed and items exchanged regularly by the owner. However, in the event of an emergency situation, the container 400 includes provisions for ensuring the items stored within are protected from external forces and elements, with the assumption that the location of the container 400 (such as residence 500) will not provide such protection. For example, some embodiments can include provisions that protect the contents of container in high temperature or fire conditions. In one embodiment, some or all exterior or outermost (exposed) portions of the container 400 can include a flame-resistant layer or coating. In some embodiments, flame-resistant layers may also be waterproof, such that the interior void of the container 400 remains dry when the container is immersed in liquid. Some embodiments can include provisions to increase the buoyancy of container 400 and/or to help to orient container 400 in water without human intervention, for example such that solar cells of a solar panel attached to the container are exposed upwards toward the sun while the opposite side of the container is generally submerged, allowing the solar cells to generate electricity. Container 100 can achieve this position automatically and without human intervention. In some embodiments, some or all portions of outer walls are buoyant or inflate upon contact with, submersion, and/or immersion in water.
As noted earlier, in some embodiments, an end-user can interact with and adjust settings associated with the proposed systems remotely.
In
In some embodiments, the interface 610 can include a welcome or header message 620, as shown in
It should be understood that the text and specific wording shown in the figures are for purposes of illustration only and in no way limit the manner by which the application may communicate or receive information. In addition, in other embodiments, one or more options or other fields and text may appear differently and/or may be displayed or generated anywhere else on the screen(s) associated with the client's system, including spaced apart from, adjacent to, or around the user interface. In other words, the figures present only one possible layout of the interface, and do not in any way limit the presentation arrangement of any of the disclosed features.
Furthermore, in some embodiments, the registration system may enable the user to enter various additional pieces of personal information that may be relevant to the care of the contents of their container, or special circumstances regarding its location or pick-up. As another example, the user may enter the names of family members or other persons that are authorized to access the container. Once all relevant information has been provided, the user may press “NEXT”, “SAVE”, or otherwise finalize their registration. In some embodiments, this registration process can also be performed over the phone with a service representative.
For purposes of illustration, some examples of a container retrieval service system (“system”) are shown with reference to
It will be understood that, in different embodiments, the initial determination of the preparatory action may be based on the amount of time remaining until the disaster when the initial determination is made. The forecast may provide a longer or shorter lead time before the disaster occurs. Also, a user may register with the container retrieval service system well ahead of a predicted disaster, or shortly before the disclosed disaster. Accordingly, the amount of time remaining before the predicted occurrence of the disaster is considered when determining when the retrieval is scheduled. In some embodiments, the system may alter the preparatory action to be executed based on a change in the location data received from the personal electronic device of the user or based on a change in the forecast data received regarding the predicted disaster, as well as the presence of other containers in the area. For example, if the preparatory action is determined by the system and scheduled to be made 72 hours before the disaster is forecast to begin, but 84 hours prior to the predicted disaster the forecast changes, the system may change the determined preparatory action. For instance, if the initial forecast called for a very severe storm, and recommendations were for the local residents to evacuate the area, the initial determination may have been for a relatively substantial preparatory action (e.g., it may be recommended to move any container from their residence). If the forecast changes, and the storm is not predicted to be as severe in the user's locality, the recommended preparatory action may be less substantial (e.g., it may be recommended to only move the container to a higher level in the home to avoid minor flooding). The opposite change may also be made. That is, if the forecast changes to a more severe disaster, the preparatory action to be made may be changed to be more substantial instead of less substantial. Further, the preparatory action may include coordinating an order, including determining a size of a vehicle based, at least in part, on the container profile.
In some cases, disasters may not be predictable, or any information about an impending disaster is not sufficiently timely or is too dynamic to reliably determine that retrieval is warranted. In some other cases, the disaster may cause damage of roadways or other transportation avenues that delay the retrieval of the container. Thus, there may be situations where a container remains in its original location during and after a disaster in the region. However, as soon as it becomes feasible to do so, the container retrieval service can dispatch a vehicle to the container location. In some cases, the container may remain at its original location following the disaster. However, in other cases, the location may have sustained significant impact from the disaster and caused a displacement of the container.
In
In other embodiments, the container may not include a tracking device, but instead the container profile may inform the system where the container is and/or where a container owner is located. In some embodiments, the container can include a beacon that emits a signal providing a map or directions to the container and/or person. One example of this is presented with reference to
CRS system 1100 includes a computing system 1102. Computing system 1102 may comprise a server, a cluster of servers, or any suitable configuration of computing resources including one or more processors 1104 and memory 1106. Memory 1106 may comprise a non-transitory computer readable medium. Instructions stored within memory 1106 may be executed by the one or more processors 1104.
Computing system 1102 may also include a navigation system 1110. Navigation system 1110 may be used for one or more purposes. For example, navigation system 1110 may be used to look up addresses. Navigation system 1110 may also be used to acquire directions to one or more addresses. Navigation system 1110 may also be used to convert geographic locations provided in one format (for example, a set of GPS coordinates) to other location formats (such as a street address).
CRS system 1100 may also include storage facilities 1120 and a transportation infrastructure 1130. As described in further detail below, one purpose of CRS system 1100 is to dispatch vehicles and agents to retrieve containers using transportation infrastructure 1130 to residents who have evacuated their residences because of a disaster or other emergency and secure the containers in storage facilities 1120.
The CRS system 1100 may communicate with various other systems over one or more networks 1140. Examples of networks that may be used to facilitate communication between different systems include, but are not limited to: Wi-Fi networks, cellular networks, local area networks (LANs), wide area networks (WANs), personal area networks (PANs), as well as any other suitable networks.
The CRS system 1100 may communicate with one or more disaster information providers 1150. As used herein, the term “disaster information provider” refers to any entity that may transmit information about pending or ongoing disasters. As an example, the Emergency Alert System (EAS) is a federal system used in the United States to provide emergency notifications, including emergency weather alerts for specific geographic areas. In other embodiments, disaster information providers 1150 could include any other organization (private or public) configured to deliver information about pending or ongoing disasters or emergencies. Alerts can be provided over any communication mode, including short messaging service (SMS) based texts, emails, or other suitable communication modes.
In addition, CRS system 1100 may also communicate with a Geographic Information System (GIS) provider 1160. For example, CRS system 1100 could retrieve maps and other related geographic information from GIS provider 1160. Furthermore, CRS system 1100 may also communicate with weather and traffic providers 1170. Specifically, CRS system 1100 may receive real-time or near real-time information about weather and traffic in specific geographic locations. In some cases, real-time traffic information may include information about road closures in an area.
In some embodiments, CRS system 1100 may communicate with residents through one or more devices. As an example, a resident-container owner device (“device”) 1180 is shown schematically in
Furthermore, as shown in
In cases of some natural disasters, it may be possible to learn in advance that the disaster is to occur, and for the retrieval to occur prior to the disaster. In other cases, the disaster may be unexpected, or there may not be sufficient warning prior to the impact of the disaster to retrieve the container. In such cases, the user(s) may evacuate the residence and leave the container, and the vehicle can make its way to the container once the roadways or other avenues of transportation permit such a recovery. A fifth step 1250 includes retrieving and then transporting the container to a secure facility designed to protect and safeguard the container, and ensure that the container is out of danger and in a known location where the user can easily recover the contents. In some embodiments, the secure storage facility is located outside the region affected by the disaster, while in other examples, the facility can be in a building that is designed to readily withstand the impact of the disaster event.
In other embodiments, the method may include additional steps or aspects. In one embodiment, the registration includes information about the container's location and an identity of an owner of the container. In some cases, the information includes an address of the container, and the first location corresponds to the address. In another embodiment, the secure facility is located outside the region that is to be affected by the emergency situation.
In some embodiments, the method can further include receiving a telemetry signal from a tracking device installed in the container, and the first location corresponds to a current location of the container as determined by the telemetry signal. In one embodiment, the method also includes steps of receiving a set of coordinates corresponding to the container's current GPS location from a tracking device installed in the container, where the first location is an address selected based on the current GPS location of the container.
In another example, the method also includes steps of determining that the region is no longer impacted by the emergency situation, and then initiating a response whereby the container is returned to the owner. For example, a request may be automatically generated to dispatch a second vehicle to recover the container from the secure facility and return it to a location designated by the owner (e.g., via the container profile). In some embodiments, the container may be returned to the first location after an assessment that the region is no longer in harm's way.
In another example, the method can include receiving a list of persons authorized to take custody of the container. This list can include the first end-user and a second end-user, such as a family member, friend, or business partner, as well as others. The list can also include verification information to ensure the individuals are correctly identified. The method can also include steps of receiving a request from a second end-user to take custody the container, determining that the second end-user is included in the list, and providing the container to the second end-user.
In some embodiments, the method may also include receiving a signal from a beacon device installed in the container (such as a homing or GPS signal), where the first location corresponds to a location of the container as described by the signal. In another example, the method may include receiving and recording the registration during an online purchasing session of the container by the first end-user. Furthermore, the method can include steps of presenting a registration interface to the first end-user on a display of a computing device associated with the first end-user, receiving a series of inputs from the first end-user through the registration interface, and generating and recording a container profile based on the series of inputs. The container profile can be later accessed, viewed, and modified by the user online.
It may therefore be appreciated that the embodiments provide a container for securing/protecting items in a disaster. The container can provide water and fire protection (via one or more fireproof and/or waterproof layers), security (via a locking mechanism), easy identification (via QR codes, for example), charging capabilities (via solar panels and/or onboard batteries), and tracking capabilities (via a tracking beacon). The container can be registered with a retrieval service that will deploy a vehicle to recover the container in the event of a disaster and store the container in a safe storage facility. The registration can allow the user to generate a profile describing the container and the identity of the user, persons authorized to access the container, and the user's preferences. Some embodiments may incorporate each of these features, while others could incorporate selective features.
The processes and methods of the embodiments described in this detailed description and shown in the figures can be implemented using any kind of computing system having one or more central processing units (CPUs) and/or graphics processing units (GPUs). The processes and methods of the embodiments could also be implemented using special purpose circuitry such as an application specific integrated circuit (ASIC). The processes and methods of the embodiments may also be implemented on computing systems including read only memory (ROM) and/or random access memory (RAM), which may be connected to one or more processing units. Examples of computing systems and devices include, but are not limited to: servers, cellular phones, smart phones, tablet computers, notebook computers, e-book readers, laptop or desktop computers, all-in-one computers, as well as various kinds of digital media players.
The processes and methods of the embodiments can be stored as instructions and/or data on non-transitory computer-readable media. The non-transitory computer readable medium may include any suitable computer readable medium, such as a memory, such as RAM, ROM, flash memory, or any other type of memory known in the art. In some embodiments, the non-transitory computer readable medium may include, for example, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of such devices. More specific examples of the non-transitory computer readable medium may include a portable computer diskette, a floppy disk, a hard disk, magnetic disks or tapes, a read-only memory (ROM), a random access memory (RAM), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), an erasable programmable read-only memory (EPROM or Flash memory), electrically erasable programmable read-only memories (EEPROM), a digital versatile disk (DVD and DVD-ROM), a memory stick, other kinds of solid state drives, and any suitable combination of these exemplary media. A non-transitory computer readable medium, as used herein, is not to be construed as being transitory signals, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Instructions stored on the non-transitory computer readable medium for carrying out operations of the present invention may be instruction-set-architecture (ISA) instructions, assembler instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, configuration data for integrated circuitry, state-setting data, or source code or object code written in any of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or suitable language, and procedural programming languages, such as the “C” programming language or similar programming languages.
Aspects of the present disclosure are described in association with figures illustrating flowcharts and/or block diagrams of methods, apparatus (systems), and computing products. It will be understood that each block of the flowcharts and/or block diagrams can be implemented by computer readable instructions. The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of various disclosed embodiments. Accordingly, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions. In some implementations, the functions set forth in the figures and claims may occur in an alternative order than listed and/or illustrated.
The embodiments may utilize any kind of network for communication between separate computing systems. A network can comprise any combination of local area networks (LANs) and/or wide area networks (WANs), using both wired and wireless communication systems. A network may use various known communications technologies and/or protocols. Communication technologies can include, but are not limited to: Ethernet, 802.11, worldwide interoperability for microwave access (WiMAX), mobile broadband (such as CDMA, and LTE), digital subscriber line (DSL), cable internet access, satellite broadband, wireless ISP, fiber optic internet, as well as other wired and wireless technologies. Networking protocols used on a network may include transmission control protocol/Internet protocol (TCP/IP), multiprotocol label switching (MPLS), User Datagram Protocol (UDP), hypertext transport protocol (HTTP), hypertext transport protocol secure (HTTPS) and file transfer protocol (FTP) as well as other protocols.
Data exchanged over a network may be represented using technologies and/or formats including hypertext markup language (HTML), extensible markup language (XML), Atom, JavaScript Object Notation (JSON), YAML, as well as other data exchange formats. In addition, information transferred over a network can be encrypted using conventional encryption technologies such as secure sockets layer (SSL), transport layer security (TLS), and Internet Protocol security (Ipsec).
While various embodiments of the invention have been described, the description is intended to be exemplary, rather than limiting, and it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible that are within the scope of the invention. Accordingly, the invention is not to be restricted except in light of the attached claims and their equivalents. Also, various modifications and changes may be made within the scope of the attached claims.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/927,510 filed on Oct. 29, 2019 and titled “Emergency Evacuation Container and Service for Protection of Valuables”, the disclosure of which is incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
20020172572 | Holt | Nov 2002 | A1 |
20060216966 | Selek | Sep 2006 | A1 |
20120158606 | Moudy | Jun 2012 | A1 |
20160284149 | Espig | Sep 2016 | A1 |
20190164368 | Ruth | May 2019 | A1 |
Number | Date | Country | |
---|---|---|---|
62927510 | Oct 2019 | US |