US20230157472A1 - Tamperproof sack system for home package deliveries - Google Patents
Tamperproof sack system for home package deliveries Download PDFInfo
- Publication number
- US20230157472A1 US20230157472A1 US17/990,095 US202217990095A US2023157472A1 US 20230157472 A1 US20230157472 A1 US 20230157472A1 US 202217990095 A US202217990095 A US 202217990095A US 2023157472 A1 US2023157472 A1 US 2023157472A1
- Authority
- US
- United States
- Prior art keywords
- tamperproof
- sack
- lock
- door
- opening portion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012384 transportation and delivery Methods 0.000 title description 62
- 239000000463 material Substances 0.000 claims abstract description 84
- 238000000034 method Methods 0.000 claims description 54
- 239000002184 metal Substances 0.000 claims description 12
- 229920000785 ultra high molecular weight polyethylene Polymers 0.000 claims description 10
- 239000004699 Ultra-high molecular weight polyethylene Substances 0.000 claims description 9
- 239000011118 polyvinyl acetate Substances 0.000 claims description 6
- 229920002689 polyvinyl acetate Polymers 0.000 claims description 5
- 239000000835 fiber Substances 0.000 claims description 4
- 239000004698 Polyethylene Substances 0.000 claims description 3
- 229910000831 Steel Inorganic materials 0.000 claims description 3
- 229920003235 aromatic polyamide Polymers 0.000 claims description 3
- 239000011152 fibreglass Substances 0.000 claims description 3
- -1 polyethylene Polymers 0.000 claims description 3
- 229920000573 polyethylene Polymers 0.000 claims description 3
- 239000010959 steel Substances 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 41
- 230000007246 mechanism Effects 0.000 description 19
- 230000004044 response Effects 0.000 description 10
- 240000006390 Heliconia caribaea Species 0.000 description 8
- 235000000046 Heliconia caribaea Nutrition 0.000 description 8
- 238000007789 sealing Methods 0.000 description 8
- 238000009958 sewing Methods 0.000 description 4
- 238000005520 cutting process Methods 0.000 description 3
- 239000000853 adhesive Substances 0.000 description 2
- 230000001070 adhesive effect Effects 0.000 description 2
- 229910045601 alloy Inorganic materials 0.000 description 2
- 239000000956 alloy Substances 0.000 description 2
- 239000004744 fabric Substances 0.000 description 2
- 241000238565 lobster Species 0.000 description 2
- 229910001092 metal group alloy Inorganic materials 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000001454 recorded image Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 229910001369 Brass Inorganic materials 0.000 description 1
- 208000025721 COVID-19 Diseases 0.000 description 1
- 229920000271 Kevlar® Polymers 0.000 description 1
- 229920000426 Microplastic Polymers 0.000 description 1
- 241000209140 Triticum Species 0.000 description 1
- 235000021307 Triticum Nutrition 0.000 description 1
- 229920000561 Twaron Polymers 0.000 description 1
- 229920010741 Ultra High Molecular Weight Polyethylene (UHMWPE) Polymers 0.000 description 1
- 240000008042 Zea mays Species 0.000 description 1
- 235000005824 Zea mays ssp. parviglumis Nutrition 0.000 description 1
- 235000002017 Zea mays subsp mays Nutrition 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000010951 brass Substances 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 235000005822 corn Nutrition 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000003475 lamination Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 229940127554 medical product Drugs 0.000 description 1
- 229920003023 plastic Polymers 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000004051 prolonged sun exposure Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 239000010935 stainless steel Substances 0.000 description 1
- 229910001220 stainless steel Inorganic materials 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
- 238000004078 waterproofing Methods 0.000 description 1
- 238000009941 weaving Methods 0.000 description 1
Images
Classifications
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/14—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
- A47G29/20—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels with appliances for preventing unauthorised removal of the deposited articles
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/14—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
- A47G29/141—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/14—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
- A47G29/141—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
- A47G2029/144—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means the receptacle being transportable and attachable to a building
Definitions
- Exemplary embodiments disclosed herein relate to a tamperproof sack system for package delivery, protection, or transportation and more particularly, relate to a tamperproof sack system that includes one or more of a tamperproof sack, a strap, and a lock that can be accessed by a delivery person delivering a package.
- a delivery person delivers a package to a home
- the delivery person drops the package off at or near the front door of the home.
- the delivery person may also take a photograph of the package or otherwise document the delivery.
- the package itself remains completely unsecured until the homeowner returns home and brings the package inside. While the package is left outside, the package may be exposed to harsh weather conditions such as rain or snow, and also may be stolen or otherwise tampered with.
- harsh weather conditions such as rain or snow
- Exemplary embodiments disclosed herein relate to a tamperproof sack system including a tamperproof sack and one or more of a lock and a door strap, the tamperproof sack being attachable to a door via the door strap and configured to be locked and unlocked via the lock.
- the tamperproof sack system provides a sack for home deliveries that is tamperproof and weatherproof, easy to lock and unlock using an access code provided to a delivery person, and simple to attach to and detach from a door.
- a tamperproof sack system to securely contain a package
- the tamperproof sack system including: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack including: a body having a bottom side, a top side opposite the bottom side, a left side that is substantially perpendicular to the bottom side, a right side that is substantially parallel to the left side, a front side, and a rear side opposite the front side, the body being configured to house the package therein; and an adjustable opening portion formed in the top side, the adjustable opening portion being configured to open and close; a door strap configured to secure the tamperproof sack to a door such that the rear side of the body is held against the door, the door strap being attached to the left side and the right side of the body and being configured to wrap around the door, the door strap including a door strap fastener configured to fasten the door strap to the door
- the lock may include: a lock body; a shackle comprising: a fixed end that is fixed to the lock body and rotatable, and a loose end that can be pulled up and out of a hole formed in the lock body to unlock the shackle and pushed back into the hole to lock the shackle; and a locking mechanism provided within the lock body and configured to release the loose end of the shackle in response to the valid access code being entered into the keypad.
- the lock may further include: communication circuitry configured to receive an access code transmitted from a first digital communication device; and a memory configured to store the received access code as the valid access code.
- the lock may further include a central processing unit (CPU) configured to, in response to the communication circuitry receiving the access code, overwrite any access codes previously stored in the memory with the received access code and store the received access code as the valid access code.
- CPU central processing unit
- the communication circuitry may receive the access code at a predetermined frequency or based on a detected event.
- the lock may further include: a sensor configured to sense an event occurring in a vicinity of the tamperproof sack system, wherein, in response to the sensor detecting the event, the CPU controls the communication circuitry to transmit a notification to the first digital communication device.
- the lock may further include: a camera configured to record images or videos, wherein the CPU is configured to control the communication circuitry to transmit the recorded images or videos to the first digital communication device.
- the tamperproof sack system may further include a drawstring provided in or otherwise affixed to the adjustable opening portion, the drawstring including: a cord including two ends; a barrel cord lock configured to lock the drawstring in a fixed position, the two ends passing through the barrel cord lock; and loops formed on the cord, wherein the drawstring is configured such that, when the barrel cord lock is pressed open and the two ends are pulled through the barrel cord lock, the loops are pulled outside of the adjustable opening portion so that the shackle can be passed through the loops to thereby lock the adjustable opening portion into a locked position.
- a drawstring provided in or otherwise affixed to the adjustable opening portion, the drawstring including: a cord including two ends; a barrel cord lock configured to lock the drawstring in a fixed position, the two ends passing through the barrel cord lock; and loops formed on the cord, wherein the drawstring is configured such that, when the barrel cord lock is pressed open and the two ends are pulled through the barrel cord lock, the loops are pulled outside of the adjustable
- the tamperproof sack system may further include: a flap configured to be pulled over the adjustable opening portion to thereby cover the adjustable opening portion; and a flap fastener including: a flap fastener inserting portion including a flap fastener inserting portion strap attached to an end of the flap and at least one protruding member attached to the flap fastener inserting portion strap; and a flap fastener receiving portion including a flap fastener receiving portion strap attached to the front side of the body and a hollow part configured to receive and attach to the at least one protruding member.
- the flap fastener may include a side-release buckle strap.
- the flap fastener inserting portion may further include a hole provided in the flap fastener inserting portion strap, the hole being configured to allow the shackle to pass therethrough so that the shackle can lock the flap fastener inserting portion in a closed position.
- the door strap fastener may be implemented as a swivel lobster claw fastener comprising a swivel lobster claw clasp and an eye and is located inside of the door when fastened together.
- the strap which in certain embodiments is a door strap, may be made of the same type of material as the body that satisfies the predetermined cut-resistance standard.
- the cut-resistance standard may be a standard established by European Standard (EN) or American National Standards Institute (ANSI).
- a tamperproof sack system to securely contain a package
- the tamperproof sack system including: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack including a body having a bottom side, a top side opposite the bottom side, a left side that is substantially perpendicular to the bottom side, a right side that is substantially parallel to the left side, a front side, and a rear side opposite the front side, the body being configured to house the package therein; a door strap configured to secure the tamperproof sack to a door such that the rear side of the body is held against the door, the door strap being attached to the left side and the right side of the body and being configured to wrap around the door, the door strap including a door strap fastener configured to fasten the door strap to the door; a zipper and a track provided on the front side of the body, the zipper being configured to slide
- the lock may include: a lock body; a shackle including: a fixed end that is fixed to the lock body and rotatable, and a loose end that can be pulled up and out of a hole formed in the lock body to unlock the shackle and pushed back into the hole to lock the shackle; a locking mechanism provided within the lock body and configured to release the loose end of the shackle in response to the valid access code being entered into the keypad; communication circuitry configured to receive an access code transmitted from a first digital communication device; and a memory configured to store the received access code as the valid access code.
- the tamperproof sack system may further include at least one loop fixed on the top side of the tamperproof sack.
- the zipper may include: a slider connected to the track; and a zipper pull connected to the slider, the zipper pull being configured to be pulled by a user to slide the slider back and forth along the track and thereby open and close the front side of the tamperproof sack, wherein the zipper pull includes a zipper pull hole formed therein, and wherein, when the zipper is pulled into the closed position which closes the track, the shackle is configured to pass through the zipper pull hole and the at least one loop, to thereby fix the zipper in place in the closed position.
- the tamperproof sack system may further include: a zipper flap configured to cover the zipper; a flap configured to cover the zipper flap; a front side loop fixed on the front side of the tamperproof sack; a rear side loop fixed on the flap; and a flap fastener including a flap fastener inserting portion and a flap fastener receiving portion, wherein, when the zipper is pulled into a closed position and covered by the zipper flap and the flap is pulled over the zipper flap and fastened by the flap fastener, the shackle is configured to pass through the front side loop and the rear side loop, to thereby lock the flap in place and prevent access to the zipper.
- a method of delivering a package including: receiving, at a second digital communication device, an access code transmitted from a first digital communication device; entering the access code into a keypad provided on a lock that locks closed an adjustable opening portion of a tamperproof sack to thereby unlock the lock, the tamperproof sack including a body having a bottom side, a top side opposite the bottom side, a left side that is substantially perpendicular to the bottom side, a right side that is substantially parallel to the left side, a front side, and a rear side opposite the front side, the body being configured to house the package therein, the adjustable opening portion being formed in the top side and configured to open and close, the tamperproof sack being secured to a door with a door strap that wraps around the door; opening the adjustable opening portion and placing the package inside the body of the tamperproof sack; and closing the adjustable opening portion and locking the adjustable opening portion closed using the lock.
- a tamperproof sack system to securely contain a package
- the tamperproof sack system comprising: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack comprising: a body having a bottom side and a top side opposite, wherein the body defines an interior configured to house a package therein; and an opening portion formed in the top side, the opening portion being configured to opened and closed.
- the predetermined cut-resistance standard is European Standard EN-2 or above.
- the tamperproof sack system further comprises a strap configured to affix the tamperproof sack to a fixed object, and a lock.
- the fixed object is a door.
- the door strap is made of the same type of material as the body.
- the strap is integrally formed with the body.
- the body is made from a material selected from the group consisting of one or more of high performance polyethylene, ultra-high molecular weight polyethylene, para-aramid, polyvinyl acetate, polyvinyl acetate yarn, steel wire, metal fiber, and fiberglass yarn, or combinations thereof. In an aspect of this embodiment, the body is made from ultra-high molecular weight polyethylene.
- the body is made from a single unperforated piece of material.
- the single unperforated piece of material is a single unperforated piece of ultra-high molecular weight polyethylene.
- the tamperproof sack system further comprises a drawstring affixed to the opening portion and configured to open and close the opening portion, and a zip tie configured to keep the opening portion of the tamperproof bag closed.
- the body does not comprise perforations or holes other than the opening portion.
- the predetermined cut-resistance standard is European Standard EN-3 or above.
- the predetermined cut-resistance standard is European Standard EN-4 or above.
- the body is 0.1 to 6 feet long.
- the body is 6 to 60 feet long.
- Another embodiment of the present disclosure is a method of preventing the unauthorized removal of items from the tamperproof sack system.
- the method includes the steps of: filling the tamperproof sack, attaching the tamperproof sack to a fixed object, and informing an authorized user of a method by which to open the tamperproof sack or detach the tamperproof sack from the fixed object.
- the method further includes a step of opening of the tamperproof sack by the authorized user.
- Another embodiment of the present disclosure is a method of delivering objects, the method comprising the steps of, in order: a first authorized user accessing the tamperproof sack system and opening the tamperproof sack, inserting an object into the tamperproof sack, and closing the tamperproof sack.
- FIG. 1 A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to an exemplary embodiment
- FIG. 1 B is a perspective view of the tamperproof sack system of FIG. 1 A , from the perspective of somebody standing inside of the home;
- FIG. 2 A is a view of the drawstring used in the tamperproof sack system of FIG. 1 A being opened and closed;
- FIG. 2 B is a close-up view of the tamperproof sack system of FIG. 1 A being opened and closed using the drawstring of FIG. 2 A ;
- FIG. 3 is a cross-sectional view showing the components of the lock, according to an exemplary embodiment
- FIG. 4 A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to another exemplary embodiment
- FIG. 4 B is a close-up view of the tamperproof sack system of FIG. 4 being opened and closed;
- FIG. 5 is a close-up view of a modified version of the tamperproof sack system of FIG. 4 A , according to yet another exemplary embodiment.
- FIGS. 6 A, 6 B, 6 C, and 6 D illustrate a method of delivering a package to a home using the tamperproof sack system according to an exemplary embodiment.
- FIGS. 7 A and 7 B are views of an embodiment of the tamperproof sack with a closing mechanism.
- FIGS. 8 A, 8 B, and 8 C are views of an embodiment of the tamperproof sack.
- the tamperproof sack system includes a combination of features that achieve a remarkably safe and easy-to-use system to ensure the security of home deliveries.
- the tamperproof sack system includes one or more of a tamperproof sack made of tamperproof and weatherproof material, a strap that enables the tamperproof sack to be securely fastened to a door or other fixture of a home or any other desired object, and an electronic lock that locks the tamperproof sack closed.
- a homeowner can transmit an access code to a delivery person, and the delivery person can then use the access code to unlock the electronic lock and store a package in the tamperproof sack.
- the delivery person can then lock the tamperproof sack to secure the package.
- the access code can be generated according to various criteria, such as generating the access code based on a predetermined frequency (e.g., daily, hourly) or based on an event (e.g., detecting the delivery person's arrival), to ensure that the access code changes frequently.
- the door strap is configured to be easily fastened and unfastened to a door or other fixture, so that a homeowner can easily attach or detach the tamperproof sack to the door based on whether a package is expected.
- the tamperproof sack may take the form of a bag or a box or another container.
- the tamperproof sack may have soft or hard sides defining an interior volume that may be filled with an object or used to contain an object, depending on the embodiment.
- the tamperproof bag may have openings in its sides to permit, for example, breathability, so long as those openings do not allow for the unauthorized removal of an item therein or otherwise compromise the tamperproof nature of the sack.
- the tamperproof sack according to the present disclosure is easy to set up and take down. It is lightweight based on the materials used as disclosed herein.
- FIG. 1 is a cross-sectional view illustrating a tamperproof sack system according to an exemplary embodiment.
- the tamperproof sack system 100 includes a tamperproof sack 102 , a door strap 118 , and a lock 130 .
- the door strap 118 secures the tamperproof sack 102 to a door 101
- the lock 130 which includes a shackle 132 , a lock body 134 , and a keypad 136 , can be locked and unlocked in response to a valid access code being input into the keypad 136 , to thereby open and close the tamperproof sack 102 .
- the tamperproof sack 102 includes a body 104 and an adjustable opening portion 106 .
- the body 104 includes a bottom side 104 a , a top side 104 b opposite the bottom side 104 a , a left side 104 c that is substantially perpendicular to the bottom side 104 a , a right side 104 d that is substantially parallel to the left side 104 c , a front side 104 e (i.e., the side facing out in FIG. 1 A ), and a rear side 104 f opposite the front side (the rear side 104 f facing in and contacting the door 101 ).
- the body 104 further includes an adjustable opening portion 106 formed in the top side 104 b .
- an opening 108 is formed in the top side 104 b so that a delivery person can insert a package into the tamperproof sack 102 or a homeowner can remove the package from the tamperproof sack 102 .
- the opening 108 is closed.
- the left and right sides 104 c and 104 d are longer than the top and the bottom sides 104 b and 104 a to form a substantially rectangular sack shape.
- exemplary embodiments of the tamperproof sack 102 are not limited to any particular dimensions, size, or shape.
- the body 104 of the tamperproof sack 102 is made of a material that is tamperproof and weatherproof, to protect packages from theft and harsh weather conditions, such as rain, wind, sleet, snow, and prolonged sun exposure.
- the body 104 may be made of a material that is cut-resistant, tear resistant or and/or puncture-resistant so that the body 104 cannot be easily cut, torn, or punctured by thieves.
- the body 104 may be made of various types of fabrics manufactured by Kozane®, which achieve maximum cut, tear, and puncture resistance.
- the body 104 is not limited to being made of any particular type of material, and may be made of many different types of materials, such as ultra-high molecular weight polyethylene (UHMWPE), para-aramids (such as Twaron® or Kevlar®), high performance polyethylene (HPPE) (such as Dyneema® or Spectra®), polyvinyl acetate (PVA), special PVA yarns (such as SupraBlock®), steel wire, metal fibers, chain links made from various materials, fiberglass yarns, or the like, or combinations thereof.
- UHMWPE ultra-high molecular weight polyethylene
- para-aramids such as Twaron® or Kevlar®
- HPPE high performance polyethylene
- PVA polyvinyl acetate
- special PVA yarns such as SupraBlock®
- steel wire metal fibers, chain links made from various materials, fiberglass yarns, or the like, or combinations thereof.
- the body includes at least 90% by weight of the materials listed above.
- the body includes
- the body consists of 100% by weight of the materials listed above.
- the material making up the body does not include metal fibers or does not include chain links, in particular chain links made from metal.
- the material making up the body does not include wire.
- the body does not include wire and/or does not include metal at any point surrounding a drawstring, but may include wire and/or metal in other parts of the body.
- a drawstring if affixed to the body, does not go through wire and/or metal at any point in certain embodiments.
- the body 104 may be manufactured to comply with various types of cut resistance standards and other types of standards, such as standards governing puncture resistance and tear resistance.
- tamperproof as used throughout this specification may refer to a material that provides a predetermined degree of resistance to tampering, theft, cutting, tearing, or puncturing.
- the “tamperproof” material satisfies certain standards with respect to at least one of cut-resistance, tear-resistance, and/or puncture-resistance.
- the “tamperproof” material may satisfy an EN cut-level 3 (where the EN levels range from 1-5).
- the tamperproof sack satisfies an EN cut-level of 2 or more.
- an EN-3 cut-resistance level may be used.
- an EN cut-level of 4 or 5 may be used.
- the level of cut-resistance that may be present in the material for the tamperproof sack is not particularly limited, and may be selected from any range within the EN-1 to EN-5 range.
- the “tamperproof” material may satisfy an ANSI cut-level A6 (where the ANSI levels range from A1-A9).
- different versions of the tamperproof sack 102 could be manufactured to satisfy different “tamperproof” standards according to EN1-EN5 or A1-A9.
- a lightweight tamperproof sack 102 might be manufactured to satisfy a lower cut-resistance level (e.g., ANSI cut-level A2), whereas a heavyweight tamperproof sack 102 might be manufactured to satisfy a higher cut-resistance level (e.g., ANSI cut-level A8 or above).
- Higher tamperproof resistance may be provided by using material having a cut-resistance level of A4 or above.
- the cut-resistance level is A2 or above, for example to A9.
- the cut-resistance level is from level A4-A7.
- the range of cut-level resistance in the material is not particularly limited, and may be from A1-A9 as appropriate for a given application. Many different options are possible.
- the material used for the tamperproof material is not particularly limited as long as it meets the tamperproof standards noted herein.
- the tamperproof sack may be made to be waterproof.
- the means of waterproofing the tamperproof sack is not particularly limited.
- the material may be UHMWPE and may provide an ANSI-A6 level of protection or above.
- the UHMWPE preferably has a Mw of over 1,000,000, and is preferably in the range of from 1,000,000 to 10,000,000 or above. In preferred embodiments, the Mw is in a range of from 1,000,000 to 7,500,000.
- An appropriate Mw may be selected as long as it provides the desired tamperproof properties and yield strength (for example, a desired cut resistance).
- the tamperproof sack does not contain holes or openings other than the opening 108 through which an object may be inserted into the tamperproof sack. Accordingly, in those embodiments, the tamperproof sack has only one opening—opening 108 . In other embodiments, the tamperproof sack may contain perforations or holes that are not large enough for an unauthorized user to touch, or in some embodiments to remove, an object inside the tamperproof sack. For example, the tamperproof sack may contain perforations or openings other than the main opening, for example, on its sides, that are no larger than 4 inches in diameter, length, or width.
- the perforations or openings are less than 3 inches, less than 2 inches, or less than 1 inch in diameter, length, or width. In preferred embodiments, the openings are less than 1 ⁇ 2 inch or less than 1 ⁇ 4 inch in diameter, length, or width. On other embodiments, the openings are less than 1/10 inch or less than 1/100 inch in diameter, length or width. Other embodiments may include perforations or openings 1 micron or less in diameter, length, or width.
- the tamperproof sack may be made using one layer of material or multiple layers of material.
- the layers of material may be made from the same or different materials as noted herein, so long as the tamperproof nature of the tamperproof sack is not compromised.
- the layers of material may be arranged such that even if the perforations or openings in an individual layer are larger than those values listed above, the multiple layers are arranged such that the openings of the tamperproof sack as a whole are not larger than the values noted above.
- the body 104 further includes the adjustable opening portion 106 which can be adjustably opened and closed using various opening and closing mechanisms.
- the adjustable opening portion 106 is the portion of the body 104 that forms a perimeter around the opening 108 , and is a substantially circular shape.
- the tamperproof sack 102 includes a drawstring 110 (see FIG. 2 A ) that is used to open and close the adjustable opening portion 106 .
- the drawstring 110 includes a cord 110 a which is a long, thin piece of material.
- FIG. 2 A illustrates the drawstring 110 by itself
- FIG. 2 B illustrates the drawstring 110 in use in the tamperproof sack 102 .
- the cord 110 a may be made of various types of materials, such as metal wire, plastic, various types of fabrics, etc.
- the cord 110 a may be made of material similar to the body 104 , such that the cord 110 a is also cut-resistant, tear resistance or and/or puncture-resistant.
- the two ends 110 b of the cord 110 a are passed through respective openings in a barrel cord lock 110 d and typically tied together or otherwise fastened together, to thereby maintain the cord 110 a in a large loop shape.
- the barrel cord lock 110 d is a cylindrical locking mechanism having a main cylindrical body that includes two openings to allow the respective cord ends 110 b to pass therethrough, and further includes a smaller cylinder provided inside of the main cylindrical body.
- a spring or other elastic mechanism is typically provided inside of the main cylindrical body to keep the smaller cylinder into a locked position.
- the drawstring 110 further includes two loops 110 c through which a shackle 132 of the lock 130 can be passed therethrough to lock the adjustable opening portion 106 into a closed position.
- the drawstring 110 is fixed in an open position
- the drawstring 110 is fixed in a closed position
- a user presses the barrel cord lock 110 d to release the cord 110 a from the fixed open position and then pulls the cord ends 110 b through the barrel cord lock 110 d , to thereby tighten the drawstring 110 into the closed position. Then, the user can release the barrel cord lock 110 d to fix the drawstring into the closed position.
- FIG. 2 B illustrates the drawstring 110 in use with the tamperproof sack 102 .
- the drawstring 110 is almost completely sealed within the adjustable opening portion 106 , except for the cord ends 110 b and barrel cord lock 110 d that are exposed outside of the adjustable opening portion.
- the drawstring 110 can be sealed within the adjustable opening portion 106 using various techniques, such as, for example, by sewing the drawstring 110 within the adjustable opening portion 106 .
- the user presses the barrel cord lock 110 d to release the cord 110 a from the fixed open position, pulls the cord ends 110 b to thereby pull the cord 110 a into a closed position, and then releases the barrel cord lock 110 d to fix the cord 110 a and the adjustable opening portion 106 into the fixed closed position (shown on the right-hand side of FIG. 2 B ).
- the user can pull the cord ends 110 b until the two loops 110 c on the cord 110 are pulled out of the adjustable opening portion 106 and are exposed outside.
- the two loops 110 c can be configured such that, in the fixed closed position, the adjustable opening portion 106 is completely sealed or almost completely sealed so that a thief could not reach his or her hand into the tamperproof sack 102 .
- FIGS. 2 A and 2 B illustrates a drawstring configuration having two loops 110 c
- exemplary embodiments are not limited to using two loops 110 c , and three or more loops may be used in various arrangements.
- the tamperproof sack 102 further includes a flap 112 which is configured to be pulled over the adjustable opening portion 106 and fastened in place.
- the flap 112 is optional and provides an additional layer of covering for the adjustable opening portion 106 and the lock 130 .
- the flap 112 includes a flap fastener inserting portion 114 attached to an end of the flap 112 .
- the flap fastener inserting portion 114 incudes a flap fastener inserting portion strap 114 a , at least one protruding member 114 b , and a hole 114 c .
- the tamperproof sack 102 includes a flap fastener receiving portion 116 which is fixed to the front side 104 e .
- the flap fastener receiving portion 116 includes a flap fastener receiving portion strap 116 a and a hollow part 116 b .
- the flap fastener inserting portion 114 and the flap fastener receiving portion 116 may collectively be referred to as the “flap fastener”.
- the flap fastener inserting portion 114 may be attached to the flap 112 in various ways, such as by sewing the flap fastener inserting portion strap 114 a to the flap 112 or by manufacturing the flap fastener inserting portion 114 out of the same piece of material as the flap 112 .
- the flap fastener receiving portion 116 may be formed in a similar fashion. In the exemplary embodiment shown in FIGS.
- the flap fastener is implemented as a side-release buckle strap, where the flap fastener inserting portion 114 includes the flap fastener inserting portion strap 114 a and three protruding members 114 b formed at the end thereof, and the flap fastener receiving portion 116 includes the flap fastener receiving portion strap 116 a having a hollow part 116 b that has holes in the sidewalls formed at the end thereof.
- the flap fastener can optionally be configured to be locked by the lock 130 .
- the shackle 132 of the lock 130 can pass through the hole 114 c when the flap fastener is locked, to thereby lock the flap 112 in place. This configuration provides an additional layer of security.
- the flap fastener can be locked to the lock 130 using many different types of configurations, e.g., holes in the strap, additional fastening devices, etc., and exemplary embodiments are not limited to any particular configuration.
- the tamperproof sack 102 further includes a strap configured to affix the tamperproof sack to a fixed object.
- the strap may be configured to affix the tamperproof sack to any suitable object, such as a door, mailbox, fence, fence post, railing, tree, support column, gate, car, truck, truck bed, an item anchored or bolted into the ground or other object, or other fixed object that is difficult to move.
- Element 118 illustrates an embodiment of the strap as a door strap 118 that is configured to be wrapped around a door 101 .
- the door strap 118 can be made of a material that is cut-resistant, tear resistance or and/or puncture-resistant so that the body 104 cannot be easily cut, torn, or punctured by thieves, similar to the material used to make the tamperproof sack 102 .
- the door strap 118 is not limited to being made of any particular type of material.
- the door strap 118 can be integrally formed from the same piece of material as the tamperproof sack 102 , or can be formed as a separate piece that is attached to sides of the tamperproof sack 102 .
- ends of the door strap 118 can be respectively connected to the left side 104 c and right side 104 d of the tamperproof sack 102 using various techniques, such as sewing the ends of the door strap 118 to the left and right sides 104 c and 104 d .
- the strap may be made from the same material as the tamperproof sack or may be made from a different material.
- the strap may be integrally formed with the tamperproof sack from a single piece of material or from the same pieces of material as the tamperproof sack. In other embodiments, the strap may be attached to the tamperproof sack.
- the method for attaching the strap to the tamperproof sack is not particularly limited, but should not diminish the tamperproof ability of the combined tamperproof sack and strap.
- the strap may be affixed to the tamperproof sack using a method disclosed below relating to how the tamperproof sack may be made.
- FIG. 1 B which is a perspective view of the tamperproof sack system 100 from the perspective of somebody standing inside of the home
- the door strap 118 wraps around the door 101 and is fixed in place using the door strap fastener 122 .
- the door strap may include a thin portion 120 where the door strap 118 wraps around corners of the door 101 .
- the door strap fastener 122 is implemented as a swivel lobster claw-style fastener, which includes a swivel lobster claw clasp 122 a and an eye 122 .
- a user opens the swivel lobster claw clasp 122 a , hooks the opened lobster claw clasp 122 a into the eye 122 b , and then closes the swivel lobster claw clasp 122 a to lock the swivel lobster claw clasp 122 a in place.
- the swivel lobster claw-style fastener is very easy to fasten and unfasten, and can be designed using high-strength metal alloy components that enhance the strength of the system 100 .
- exemplary embodiments are not limited to using a swivel lobster claw clasp as the door strap fastener 122 , and many other types of fasteners can alternatively be used as the door strap fastener 122 , such as buckles (e.g., side-release buckle straps), Velcro straps, buttons, zippers, hooks, etc.
- buckles e.g., side-release buckle straps
- Velcro straps e.g., buttons, zippers, hooks, etc.
- FIG. 3 is a cross-sectional view showing the components of the lock 130 , according to an exemplary embodiment.
- the lock 130 includes the shackle 132 , the lock body 134 , a keypad 136 , a locking mechanism 338 , communication circuitry 340 , a central processing unit (CPU) 342 , a memory 344 , sensors 346 , and a camera 348 .
- CPU central processing unit
- the shackle 132 is made out of brass, stainless steel, hardened streel, an alloy or combination of alloys, or some other type of high-strength material.
- the shackle 132 typically includes metal or metal alloy, although is not limited to such.
- the shackle 132 has a curved shape resembling an upside-down U, and has two ends 132 a and 132 b connected to the lock body 132 .
- the first end 132 a (also referred to as the “fixed end 132 a ”) is fixed to the lock body 132 and is rotatable, and the second end 132 b (also referred to as “loose end 132 b ”) can be pulled up and out of a hole 132 c formed in the lock body 132 to unlock the lock 130 , and can be inserted back into the hole 132 c to lock the lock 130 .
- the loose end 132 b can be pulled up and out of the lock body 132 and rotated about the rotatable first end 132 a , so that the shackle 132 can be passed through various components (e.g., guided out of the loops 110 c ).
- the lock body 134 houses each of the electrical and locking components therein, and is made out of a high-strength material, similar to the shackle 132 .
- the lock body 134 has a substantially circular shape, although exemplary embodiments are not limited thereto, and the lock body 134 can have many different shapes and sizes, e.g., rectangular, square, cylindrical, etc.
- the keypad 136 includes a series of keys that can be pressed by a user to lock and unlock the lock 130 .
- the keys can include any combination of numbers, letters, or symbols.
- the keypad 136 can include a standard numerical layout including twelve keys, one for each single-digit number and two additional keys for the pound (#) and star (*) symbols, as is frequently used on phones.
- the keypad 136 can include only a few keys, e.g., three keys, four keys, five keys, etc., with corresponding numbers (e.g., keys 1-5).
- the keypad 136 includes a series of twelve keys 137 that are implemented as physically protruding mechanical buttons sticking out from the lock body 134 .
- the keypad 136 can be implemented as electronic pushbuttons, a digital touch screen, a dial, or any other device that can be used to input an access code.
- the keypad 136 can be electronic (e.g., battery powered) or manual.
- the locking mechanism 338 is a series of components that collectively function together to lock and unlock the shackle 132 based on whether an access code is correctly input to the keypad 136 .
- the locking mechanism 338 can include, for example, a series of spring-loaded pins, racks, gears, and other physical hardware components that interoperate to lock and unlock the shackle.
- the locking mechanism unlocks the shackle 132 .
- an incorrect (e.g., invalid) access code is input to the keypad 136 , the locking mechanism keeps the shackle 132 locked.
- the locking mechanism 338 is not limited to any particular configuration, and many different types or combinations of locking mechanisms 338 may be used in the lock body 130 .
- the communication circuitry 340 is circuitry configured to transmit data to and receive data from other digital devices, such as digital devices being used by a homeowner and a delivery person.
- the communication circuitry 340 is implemented as at least one network module having at least one antenna 341 .
- a network module includes a combination of hardware and software that is specially configured to transmit and receive data according to at least one type of data telecommunications standard, e.g., 4G, 5G, BLUETOOTH, Wi-Fi, etc., using the antenna 341 .
- the network module may a chipset, system on chip (SoC), or component thereof that supports data communication.
- SoC system on chip
- the antenna 341 may be configured as one or a plurality of multiple input, multiple output (MIMO) antenna groups. Exemplary embodiments are not limited to any particular configuration of antennas. For example, the antenna may be physically located inside or outside of the respective network module.
- the CPU 342 controls overall operations of the components located within the lock body 134 . Specifically, the CPU 342 controls operations of the keypad 136 , the communication circuitry 340 , the memory 344 , the sensors 346 , the camera 348 , and the battery 350 .
- the CPU 342 may be connected to the other components via electrical wire 343 .
- the electrical wire 343 may be implemented as a series of a wires, a bus, or any other configuration that enables data communication between the CPU 342 and the other components.
- the memory 344 stores access codes that are used to lock and unlock the lock 130 .
- the memory 344 may be implemented as various types of memory devices, such as RAM, SRAM, DRAM, PROM, EPROM, EEPROM, flash memory, on-chip memory, ROM, optical disc drives, cloud-based storage, and other types of non-transitory storage media.
- the CPU 342 controls the memory 344 to store the new access code as a valid access code.
- the CPU 432 may control the memory 344 to overwrite any previously stored access codes or otherwise mark the previously stored access codes as invalid.
- the sensors 346 include at least one sensor that may be used to detect events occurring near the tamperproof sack system 100 .
- the sensors 346 may include a photosensor that detects an ambient brightness level.
- the sensors 346 may sense the sudden increase in brightness level and generate an alert that can be transmitted (via the communication circuitry 340 ) to a homeowner, to inform the homeowner that somebody is accessing the tamperproof sack system 100 .
- the sensors 346 may alternatively be implemented as a noise sensor (e.g., a microphone, to detect noise), a motion sensor (e.g., an accelerometer, to detect whether the sack 102 is being moved), and/or other types or combinations of sensors. Moreover, the sensors 346 may also include various types of sensors that are configured to exchange data with another device. For example, the sensors 346 may include a near-field communication (NFC) sensor to exchange data with a delivery person or somebody else. The sensors 346 may also be omitted.
- NFC near-field communication
- the camera 348 is an optical recording device that can record images or video and transmit the recorded images or video to a homeowner.
- the camera 348 can be implemented as many different types of camera, e.g., compact digital cameras, NEST® cameras, etc.
- the camera 348 can be used to transmit videos to the homeowner to alert the homeowner that somebody is accessing the tamperproof sack system 100 in real-time.
- the camera 348 can also be used in combination with the sensors 346 .
- the sensors 346 can indicate that the tamperproof sack system 100 is being accessed, which can trigger an alert to the user (via the communication circuitry 340 ), and can also trigger a command to the camera 348 to turn on and start recording.
- the camera 348 can simply record video without providing real-time alerts.
- the battery 350 provides electrical power to the other electrical components within the lock body 134 , including the communication circuitry 340 , the CPU 342 , the memory 344 , the keypad 136 , the sensors 346 , and the camera 348 . Also, if the locking mechanism 338 includes electrically powered components, the battery 350 may also provide electrical power to the locking mechanism 338 .
- the lock 130 operates as follows. First, the homeowner uses her or his digital device 350 (also referred to as a “first digital communication device 350 ”) to generate a new access code 360 (also referred to as an “access code 360 ”) which is a valid access code that can be used to unlock the lock 130 .
- the access code 360 can be any series if numbers, letters, or symbols that are compatible with the keypad 136 .
- the first digital communication device 350 can be a smartphone, a laptop computer, a desktop computer, a security system interface, a combination of devices, or any other type of digital device configured to transmit data.
- the smartphone can generate the new access code 360 by using an application 352 stored on the smartphone.
- the application 352 can be a specially configured program designed to generate new access codes based on a predefined event or a predetermined frequency.
- the application 352 can generate a new access code 360 in response to a user manually selecting an option to generate the new access code 360 .
- the application 352 can generate a new access code 360 according to a predefined frequency, such as generating a new access code 360 once a day or once an hour.
- the application 352 can generate the new access code 360 in response to detecting an event, such as the sensors 346 detecting the presence of a Delivery person in a vicinity of the tamperproof sack 102 .
- an event such as the sensors 346 detecting the presence of a Delivery person in a vicinity of the tamperproof sack 102 .
- Many different criteria may be used to generate the new access code 360 .
- the first digital communication device 350 transmits the new access code 360 to both the lock 130 and the delivery person's digital device 352 (also referred to as a “second digital communication device 352 ”).
- the delivery person can provide his or her phone number or email ahead of time, and the homeowner can manually text or email the access code 360 using the phone number or email address, or the application 352 can automatically transmit the access code to the phone number or email address.
- the first digital communication device 350 can automatically transmit any newly generated access codes 360 to a central phone number or email controlled by the delivery company, such as a central phone number or email used by Amazon®. The delivery company can then, in turn, provide the access code 360 to the delivery person.
- the lock 130 receive the new access code 360 via the communication circuitry 340 and the CPU 342 stores the access code 360 in the memory 344 . If the memory 344 is currently storing a previously generated access code, the CPU 342 can overwrite the previously generated access code with the new access code 360 .
- the memory 344 can simply store every new access code 360 without overwriting or erasing the previously stored access codes.
- the memory 344 can store a “master” access code that is only known by the homeowner and that is not updated or changed, and is not shared with any delivery people.
- the “master” access code is a fixed code that the homeowner can use to access the tamperproof sack system 100 anytime, and is distinct from the dynamically changing access code 360 that is sent to delivery people.
- the delivery person looks up the access code 360 stored in his or her digital device 360 (the second digital communication device 360 ) and enters the access code 360 into the keypad 136 .
- the CPU 342 controls the locking mechanism 338 to unlock the shackle 132 .
- the delivery person then removes the lock 130 by pulling the shackle 132 out from the two loops 110 c (and optionally from the hole 115 in the flap fastener inserting portion 114 , if the flap fastener inserting portion 114 is being used as an additional security layer), opens the adjustable opening portion 106 of the tamperproof sack 102 using the drawstring 110 , and inserts the package into the body 104 of the tamperproof sack 102 .
- the delivery person closes the adjustable opening portion 106 using the drawstring 110 , passes the shackle 132 back through the two loops 110 c (and optionally the hole 115 ), and presses the loose end of shackle 132 down into a corresponding hole on the lock body 134 to lock the shackle 132 in place, thereby closing and locking the tamperproof sack 102 .
- the package is now safely delivered inside of the tamperproof sack 102 and is ready to be picked up by the homeowner.
- FIG. 4 A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to another exemplary embodiment.
- the tamperproof sack system 400 shown in FIG. 4 A is similar to the tamperproof sack system 100 shown in FIG. 1 A , except that the tamperproof sack system 400 includes a zipper 440 provided on the front side 104 e of the tamperproof sack 402 , and does not include the adjustable opening portion 106 .
- the tamperproof sack system 400 includes a tamperproof sack 402 , a door strap 418 , and a lock 430 .
- the tamperproof sack 402 includes a body 404 including a bottom side 404 a , a top side 404 b opposite the bottom side 404 a , a left side 404 c that is substantially perpendicular to the bottom side 404 a , a right side 404 d that is substantially parallel to the left side 404 c , a front side 404 e (i.e., the side facing out in FIG.
- the top side 404 b in the exemplary embodiment shown in FIGS. 4 A and 4 B does not have the adjustable opening portion 106 .
- the flap fastener inserting portion 414 and the flap fastener receiving portion 416 may collectively be referred to as the “flap fastener”.
- a hole 415 may be formed in the flap fastener inserting portion 414 .
- the lock 430 includes a shackle 432 , a lock body 434 , and a keypad 436 .
- Each of the components including the tamperproof sack 402 , door strap 418 , and lock 430 described above may have the same structure and functionality as the tamperproof sack 102 , door strap 118 , and lock 430 described with respect to FIG. 1 A , respectively.
- the tamperproof sack 402 further includes a zipper 440 and a track 442 .
- the zipper 440 includes a zipper pull 440 a , a zipper pull hole 440 b , and a slider 440 c .
- the track 442 includes a series of protrusions on the left and right sides (also known as “teeth”), which are arranged such that each tooth on the left side of the track 442 fits into the gap between two adjacent teeth on the right side of the track 442 , and each tooth on the right side of the track 442 fits into the gap between two adjacent teeth on the left side of the track 442 , in an interlocking fashion.
- the slider 440 c is connected to the track 442 and is configured to slide up the track 442 to thereby interlock together the two opposing strips of teeth together, and is configured to slide down the track 442 to unlock the two opposing strips of teeth.
- the zipper pull 440 a is connected to the slider 440 c and is used to pull the slider 440 c up and down the track 442 .
- the zipper pull 440 a includes a zipper pull hole 440 b formed therein. The shackle 432 can pass through the zipper pull hole 440 b , to thereby lock the zipper 440 in place in a locked position.
- the tamperproof sack 402 also includes a front side loop 444 and a back side loop 446 which are fixed in place.
- the front side loop 444 is formed on a front portion of the top side 404 b
- the rear side loop 446 is formed on a rear portion of the top side 404 b .
- the shackle 432 can pass through each of the front side loop 444 , the rear side loop 446 , and the zipper pull hole 440 c , thereby fixing the zipper 440 into a closed portion.
- the exemplary embodiment shown in FIGS. 4 A and 4 B does not include the drawstring 110 or the adjustable opening portion 106 .
- FIG. 1 A and FIG. 4 A it is also possible to combine the exemplary embodiments shown in FIG. 1 A and FIG. 4 A to add a drawstring 106 in the top portion 404 b of the tamperproof sack 402 , if desired.
- FIG. 4 B illustrates two loops 444 and 446 , it is also possible to use only one loop, or use three or more loops.
- the tamperproof sack system 400 is especially useful for handling larger package deliveries, since the zipper 400 allows the entire front side 404 e of the tamperproof sack 402 to be unzipped.
- FIG. 5 is a close-up view of a modified version of the tamperproof sack system of FIG. 4 A , according to yet another exemplary embodiment.
- the tamperproof sack system 500 of FIG. 5 is substantially similar to the tamperproof sack system 400 of FIGS. 4 A and 4 B , except that, in the tamperproof sack system 500 , the flap 412 is used to secure the tamperproof sack system 500 closed.
- the zipper flap 502 can be folded over to cover the zipper 440 .
- the zipper flap 502 can be fastened shut with snaps 504 (or some other fastening mechanism, such as Velcro, etc.). As shown in the right-hand side of FIG. 5 , once the zipper 440 is securely covered with the zipper flap 502 , the flap 412 can be folded over the top of the tamperproof sack 502 and fastened closed using the flap fastener (i.e., the flap fastener inserting portion 414 and the flap fastener receiving portion 416 ).
- the flap fastener i.e., the flap fastener inserting portion 414 and the flap fastener receiving portion 416 .
- the front side loop 544 is located lower down on the front side of the tamperproof sack 502 than the front side loop 444 ( FIG. 4 B ), because in the modified version shown in FIG. 5 , since the zipper 440 is covered under the zipper flap 502 , the zipper hole 440 c is not used to help secure the shackle 432 .
- the front side loop 544 is located lower down on the front side of the tamperproof sack, and a rear side loop 546 is fixed on the flap 412 , so that the front side loop 544 and the rear side loop 546 can be locked together and thereby lock the flap 412 in place to cover the zipper and thus prevent access to the zipper, as shown on the right-hand side of FIG. 5 .
- FIGS. 6 A, 6 B, 6 C, and 6 D illustrate a method of delivering a package to a home using the tamperproof sack system according to an exemplary embodiment.
- the tamperproof sack system 100 is shown for illustrative purposes.
- the method shown in FIGS. 6 A- 6 D can also be used with other tamperproof sack systems, such as tamperproof sack system 400 ( FIG. 4 A ), tamperproof sack system 500 ( FIG. 5 ), or some other modified version of the tamperproof sack systems according to exemplary embodiments.
- a delivery person 600 delivering a package receives a new access code 360 .
- the delivery person 600 receives the new access code 360 that is transmitted from the homeowner's digital communication device 350 (the first digital communication device 350 ) to the delivery person's digital communication device 352 (the second digital communications device 352 ).
- the access code 360 can be transmitted according to various criteria and using various techniques.
- the access code 360 can be directly transmitted to the delivery person's digital communications device 352 in response to a request from the delivery person, can be transmitted automatically to the delivery person at a certain time of day, can be transmitted automatically to the delivery person based on proximity (e.g., when the delivery person gets within a certain radius of the homeowner's digital communication device 350 ), or based on some other criteria.
- the sensors 346 and/or camera 348 can be used to sense or detect when the delivery person 600 arrives, and the access code 360 can be transmitted in response to sensing or detecting the arrival.
- the access code 360 can be indirectly transmitted to the delivery person's digital communications device 360 through an intermediate node or network.
- the access code 360 can be transmitted to the delivery company (e.g., AMAZON®) and stored by the delivery company, and then transmitted from the delivery company to the delivery person 600 at an appropriate time.
- the delivery person 600 unlocks the tamperproof sack system 100 using the access code 360 and inserts the package 602 into the tamperproof sack 102 .
- the delivery person 600 can enter the access code 360 into the keypad 136 , to thereby cause the locking mechanism 338 to unlock one end of the shackle 132 .
- the delivery person 600 then removes the shackle 132 and opens the adjustable opening portion 106 , e.g., by loosening the drawstring 110 .
- the delivery person 600 then slides the package 602 into the tamperproof sack 102 .
- the delivery person 600 locks the tamperproof sack 102 back up by tightening the adjustable opening portion 106 (e.g., by tightening the drawstring 110 ), passing the loose end of the shackle 132 back through the loops 110 c of the drawstring 110 , and pressing the loose end of the shackle 132 into the lock body 134 to lock the tamperproof sack 102 .
- the delivery person 600 then leaves the premises.
- the homeowner 604 arrives home and unlocks the tamperproof sack 102 to thereby take possession of the package 602 .
- the homeowner 604 can use the same access code 360 transmitted to the delivery person 600 , or can use some other access code (e.g., a “master” access code).
- the homeowner 604 can unfasten the entire temporary sack 102 from the door 101 by unfastening the door strap fastener 122 , and can then store the temporary sack 102 for later use.
- FIGS. 7 A and 7 B illustrate an embodiment in which a closing mechanism, in this case a lock 701 , is part of a zip tie used to secure the tamperproof sack 702 .
- a closing mechanism in this case a lock 701
- the tamperproof sack is secured to a door 703 using the lock 701 .
- the zip tie 701 is pulled tightly enough that the opening 704 of the tamperproof sack cannot fit through the zip tie until it is unlocked.
- the tamperproof sack may be unlocked by a user who knows how to unlock the lock 701 (in the illustrated embodiment, the user will know the combination to the lock), the opening 704 may be opened and filled with the desired item, the opening 704 may then be closed using the drawstring 705 , and the lock 701 may be placed as shown, preventing the tamperproof sack 702 from being opened or removed from the door 703 until another authorized user removes the lock 701 .
- FIGS. 8 A, 8 B, and 8 C illustrate an embodiment of the tamperproof sack 801 without a strap or a lock, although it is envisioned that a strap or a lock may be added in certain embodiments.
- the tamperproof sack is shown with a closed end 802 and an open end 803 .
- a drawstring 804 is shown at open end 803 and is attached around the periphery of open end 803 so as to provide for the closing of open end 803 when the drawstring 804 is tightened. Closed end 802 may be formed by virtue of any method known in the art or disclosed herein.
- closed end 802 may be formed by virtue of folding a single piece of material such that sides 805 are sealed together and open end 803 is thereby formed.
- the methods by which sides 805 may be sealed in such an embodiment are not particularly limited, and may be those known in the art or disclosed herein.
- closed end 802 may also be formed by providing a tubular material to form the tamperproof sack 801 and then sealing the closed end using a method disclosed herein or a method known in the art.
- the method of sealing closed end 802 or sides 805 is a method that will not reduce the tamperproof nature of the tamperproof sack.
- a method of closing the open end 803 is not particularly limited as long as it does not reduce the tamperproof nature of the tamperproof sack.
- FIG. 8 B illustrates opening the open end 803 .
- the drawstring 804 may be drawn closed after an object is placed inside the tamperproof sack, thereby closing open end 803 as illustrated in FIG. 8 C .
- FIG. 8 C illustrates an embodiment in which the tamperproof sack is closed and partially folded over.
- the tamperproof sack does not need to include a drawstring and in some embodiments does not include a drawstring.
- the tamperproof sack may be closed using any method known in the art or disclosed herein.
- the material from which the tamperproof sack may be made has been described previously.
- the material may be UHMWPE having a molecular weight as discussed above, and providing a level of protection of ANSI-A2 or above, in other embodiments is ANSI-A4 or above, and in other embodiments ANSI-A6 or above.
- the level of protection in terms of EN cut resistance is preferably EN-2 or above, in other embodiments EN-4 or above, and in other embodiments EN-5 or EN-6.
- the tamperproof sack is made from a single unperforated piece of material.
- the single unperforated piece of material may be a tube.
- the cross-sectional shape of the tube is not particularly limited, and may be circular, oval, rectangular, or the like.
- the tube may be formed by weaving the material on a circular loom.
- the single unperforated material may also be a sheet in certain embodiments, where the sheet is later adhered to itself to form the tamperproof sack.
- the tamperproof sack is made from multiple pieces of material adhered to each other to form the tamperproof sack. For example 2, 3, 4, or more pieces of material may be adhered to each other so as to form the tamperproof sack.
- the material may be necessary to perforate the material to, for example, sew it to other materials or to itself.
- the perforations do not cause a structural weakness in the tamperproof sack that would permit someone to open the bag in an unauthorized manner (such as by cutting into it, tearing the tamperproof sack, or entering the tamperproof sack by any means other than the opening through which the interior of the bag is intended to be accessed).
- the material used to make the tamperproof sack is sewn at any point, it is preferable that the sewing is located on the interior of the bag so that it is not exposed to the outside world.
- all perforations are located only on the interior of the tamperproof sack, and no perforations are located on the exterior of the tamperproof sack.
- the stitching may be made from any suitable material. However, it is preferred that the stitching is made from a material that is tamperproof. In certain embodiments, the stitching is made from the same material as the tamperproof sack. It is preferred that the stitching have an EN or ANSI cut rating at least as high as the material used to make the tamperproof sack.
- the material used to make the tamperproof sack is preferably bonded to itself or other materials using non-perforating methods, such as adhesives, zip ties of various materials (including metal and those made from the same material as the tamperproof sack), clamps, tapes, heat sealing, lamination, or other known methods.
- any non-perforating means of sealing the tamperproof sack is located only on the interior of the tamperproof sack, and no non-perforating means of sealing the tamperproof sack are located on the exterior of the tamperproof sack.
- a non-perforating means of sealing at least one end of the tamperproof sack comprises using a non-perforating method (such as a zip tie or heat seal) to bind one end of a tube of material, where the material is then flipped outside-in such that the sealing means is located on the interior of the tamperproof sack, thus forming a closed end of the tamperproof sack.
- a non-perforating method such as a zip tie or heat seal
- the tamperproof sack is stitch-free. In other embodiments, the tamperproof bag does not have any perforations. In still other embodiments, the tamperproof bag contains no holes or perforations on its exterior.
- the size of the tamperproof sack is not particularly limited, and may be dictated by the size of the items that one desires to keep inside of it.
- the tube may be, for example, from 0.1-6 feet long. However, for uses that are larger, the tube may be anywhere from 1-60 feet or longer.
- the diameter of the tube is also not particularly limited, and may be, for example, anywhere from 0.1 feet to 20 feet or more. For example, if the tamperproof sack were to be used to protect a load on a semitruck, the tamperproof sack could be 10-60 feet long and 3-12 feet or more in diameter.
- the tamperproof sack may be envisioned as having a closed end and an open end.
- the closed end may be referred to as the bottom of the tamperproof sack, and the open end may be referred to as the opening or the top of the tamperproof sack.
- the closed end is sealed as discussed herein, and materials to be stored in the tamperproof sack enter and exit the tamperproof sack through the opening.
- the opening of the tamperproof sack is closed using a drawstring held in place at the top, or opening, of the tamperproof sack.
- the drawstring may be kept in place by a perforating method or a non-perforating method such as those listed above.
- the drawstring is kept in place by a sleeve stitched around the opening of the tamperproof sack.
- the drawstring is kept in place by a sleeve formed around the opening of the tamperproof sack via heat sealing or an adhesive.
- the tamperproof sack may be locked in a closed position by using a clamp to keep the opening of the tamperproof bag closed.
- the clamp may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein.
- the clamp in certain embodiments may be integrally formed with the lock.
- the tamperproof sack may be locked in a closed position by using a zip tie to keep the opening of the tamperproof bag closed.
- the zip tie may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein.
- the zip tie in certain embodiments may be integrally formed with the lock.
- the lock may be integrally formed with either the strap or the tamperproof sack.
- the material that may be protected or stored in the tamperproof sack is not particularly limited and may include packages and other items that may be sent via mail.
- the material that may be protected or stored in the tamperproof sack may be material that is abrasive or sharp, where the tamperproof bag provides protection to the user.
- Such material may include medical products (such as needles and the like), bulk cargo, plastic pellets, metal, glass, scrap, waste, and the like.
- the material that may be protected or stored in the tamperproof sack may be a commodity, such as corn or wheat.
- the tamperproof sack may be used as a method to transport cargo.
- a large filled tamperproof sack may be transported via truck or ship.
- the present disclosure also relates to methods of preventing the unauthorized removal of items from the tamperproof sack.
- Such methods may include the steps of filling the tamperproof sack as noted above and securing the tamperproof sack to a fixed object as noted above.
- the step of securing the tamperproof sack to a fixed object may include the use of a lock and locking the tamperproof sack to a fixed object.
- the method may further include informing an authorized user of a method by which to un-secure or open the tamperproof sack from the fixed object, and the subsequent un-securing of the tamperproof sack from the fixed object or opening of the tamperproof sack by the authorized user.
- the step of informing the authorized user of the method by which to un-secure or open the tamperproof sack from the fixed object is not particularly limited and may be any method known in the art, including but not limited to verbally or non-verbally (such as via an electronic communication) informing the authorized user of a combination to the lock.
- the present disclosure also relates to a method of delivering objects, where the method includes an authorized user opening the tamperproof sack, inserting an object into the tamperproof sack, and then closing the tamperproof sack.
- the tamperproof sack prior to the delivery may or may not be secured to a fixed object. In instances where the tamperproof sack is secured to a fixed object prior to delivery, the step of opening the tamperproof sack may not require the tamperproof sack to be un-secured from the fixed object.
- the authorized user may then secure the tamperproof sack to a fixed object either before or after inserting the object into the tamperproof sack.
- the step of closing the tamperproof sack may include a step of locking the tamperproof sack or another method as disclosed herein.
- the present disclosure also relates to a method of secure transportation of an object from a first location to a second location.
- the method may include inserting an object into a tamperproof sack at a first location, closing the tamperproof sack such that only an authorized user may open it, and then transporting it to a second location.
- the closing of the tamperproof sack may occur at the second location.
- the tamperproof sack may then be secured to a fixed object at the second location such that an authorized user could open or un-secure the tamperproof sack at the second location.
- an authorized user at a second location may open the tamperproof bag and remove the object from the tamperproof bag.
- the method of secure transportation of an object from a first location to a second location may also include one or more of the steps and methods disclosed above relating to a method of delivering objects and/or preventing the unauthorized removal of items from the tamperproof sack.
- an authorized user is a person or entity that has permission from the owner or originator of the tamperproof sack to open, close, or otherwise use as described herein the tamperproof sack.
- the authorized user in most instances will be informed of a method by which to open or close the tamperproof sack without cutting or otherwise damaging the tamperproof sack. This information may be provided by the owner of the tamperproof sack or another person or entity permitted by the owner.
- the authorized user may be an Amazon® delivery person who has received instructions on how to open the tamperproof sack from either Amazon® (at the permission of the owner of the tamperproof sack) or the owner of the tamperproof sack, so as to deliver a package into the tamperproof sack.
- a second, usually different, authorized user may then open the tamperproof package after delivery so as to retrieve the delivered object.
- the exemplary embodiments described herein should be considered in a descriptive sense only and not for purposes of limitation. Descriptions of features or aspects within each exemplary embodiment should typically be considered as available for other similar features or aspects in other exemplary embodiments.
- the drawstring 110 shown in FIG. 2 A can also be used in the tamperproof sack system 400 ( FIG. 4 A ) or the tamperproof sack system 500 ( FIG. 5 ).
- FIG. 4 A illustrates a single zipper 440
- multiple zippers can be used in various configurations.
- FIG. 1 A, 1 B, and 4 A illustrate the temporary sack systems as being fastened to a door 101
- the temporary sack systems can also be fastened to other objects as well, e.g., windows, trees, fences, etc.
- the strap fastener 122 may have holes formed therein through which the shackle 132 can pass, or may have separate attachment devices that can be locked in place by the shackle 132 . As a result, the entire tamperproof sack system 100 can be safely and securely left outside.
Landscapes
- Engineering & Computer Science (AREA)
- Food Science & Technology (AREA)
- Bag Frames (AREA)
Abstract
A tamperproof sack system includes a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack including a body and an adjustable opening portion formed in a top side of the body, the adjustable opening portion being configured to open and close; a door strap configured to secure the tamperproof sack to a door such that a rear side of the body is held against the door, the door strap being attached to the body and being configured to wrap around the door, the door strap including a door strap fastener configured to fasten the door strap to the door; and a lock including a keypad configured to receive user input, the lock configured to unlock the adjustable opening portion and thereby unlock the tamperproof sack based on whether the user input received at the keypad includes a valid access code.
Description
- This application claims benefit to U.S. Provisional Application No. 63/281,266 filed Nov. 19, 2021, the entire contents of which are hereby incorporated by reference.
- Exemplary embodiments disclosed herein relate to a tamperproof sack system for package delivery, protection, or transportation and more particularly, relate to a tamperproof sack system that includes one or more of a tamperproof sack, a strap, and a lock that can be accessed by a delivery person delivering a package.
- Recently, there has been a surge in demand for products to be delivered to consumers through home delivery. In particular, with the 2020 global COVID-19 pandemic and with the ascension of Amazon® as a global powerhouse in online shopping, consumers have demanded an ever-increasing amount of goods to be delivered to their homes. Consumers can now purchase a remarkable variety of items to be delivered to their house, from home goods and clothing to luxury items, toiletries, food, electronics, and many other types of items.
- Generally, when a delivery person delivers a package to a home, the delivery person drops the package off at or near the front door of the home. The delivery person may also take a photograph of the package or otherwise document the delivery. However, quite frequently, the package itself remains completely unsecured until the homeowner returns home and brings the package inside. While the package is left outside, the package may be exposed to harsh weather conditions such as rain or snow, and also may be stolen or otherwise tampered with. According to several news reports, one in three Americans report having at least one Amazon® package stolen per year, resulting in $25 million of lost goods and services for Amazon® alone each day.
- Thus, there is clearly a significant need for a home delivery system that can ensure the safety of packages delivered to a home.
- There is further a need for a home delivery system that can be efficiently accessed by both a homeowner and a delivery person.
- There is also a need for a home delivery system that has a flexible configuration and can be attached to and detached from various types of doors and fixtures of a house or dwelling.
- Exemplary embodiments disclosed herein relate to a tamperproof sack system including a tamperproof sack and one or more of a lock and a door strap, the tamperproof sack being attachable to a door via the door strap and configured to be locked and unlocked via the lock.
- The tamperproof sack system according to exemplary embodiments disclosed herein provides a sack for home deliveries that is tamperproof and weatherproof, easy to lock and unlock using an access code provided to a delivery person, and simple to attach to and detach from a door.
- Additional aspects will be set forth in part in the description which follows and, in part, will be apparent from the description, or may be learned by practice of the presented exemplary embodiments.
- According to an aspect of an exemplary embodiment, there is provided a tamperproof sack system to securely contain a package, the tamperproof sack system including: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack including: a body having a bottom side, a top side opposite the bottom side, a left side that is substantially perpendicular to the bottom side, a right side that is substantially parallel to the left side, a front side, and a rear side opposite the front side, the body being configured to house the package therein; and an adjustable opening portion formed in the top side, the adjustable opening portion being configured to open and close; a door strap configured to secure the tamperproof sack to a door such that the rear side of the body is held against the door, the door strap being attached to the left side and the right side of the body and being configured to wrap around the door, the door strap including a door strap fastener configured to fasten the door strap to the door; and a lock including a keypad configured to receive user input, the lock configured to unlock the adjustable opening portion and thereby unlock the tamperproof sack based on whether the user input received at the keypad comprises a valid access code.
- The lock may include: a lock body; a shackle comprising: a fixed end that is fixed to the lock body and rotatable, and a loose end that can be pulled up and out of a hole formed in the lock body to unlock the shackle and pushed back into the hole to lock the shackle; and a locking mechanism provided within the lock body and configured to release the loose end of the shackle in response to the valid access code being entered into the keypad.
- The lock may further include: communication circuitry configured to receive an access code transmitted from a first digital communication device; and a memory configured to store the received access code as the valid access code.
- The lock may further include a central processing unit (CPU) configured to, in response to the communication circuitry receiving the access code, overwrite any access codes previously stored in the memory with the received access code and store the received access code as the valid access code.
- The communication circuitry may receive the access code at a predetermined frequency or based on a detected event.
- The lock may further include: a sensor configured to sense an event occurring in a vicinity of the tamperproof sack system, wherein, in response to the sensor detecting the event, the CPU controls the communication circuitry to transmit a notification to the first digital communication device.
- The lock may further include: a camera configured to record images or videos, wherein the CPU is configured to control the communication circuitry to transmit the recorded images or videos to the first digital communication device.
- The tamperproof sack system may further include a drawstring provided in or otherwise affixed to the adjustable opening portion, the drawstring including: a cord including two ends; a barrel cord lock configured to lock the drawstring in a fixed position, the two ends passing through the barrel cord lock; and loops formed on the cord, wherein the drawstring is configured such that, when the barrel cord lock is pressed open and the two ends are pulled through the barrel cord lock, the loops are pulled outside of the adjustable opening portion so that the shackle can be passed through the loops to thereby lock the adjustable opening portion into a locked position.
- The tamperproof sack system may further include: a flap configured to be pulled over the adjustable opening portion to thereby cover the adjustable opening portion; and a flap fastener including: a flap fastener inserting portion including a flap fastener inserting portion strap attached to an end of the flap and at least one protruding member attached to the flap fastener inserting portion strap; and a flap fastener receiving portion including a flap fastener receiving portion strap attached to the front side of the body and a hollow part configured to receive and attach to the at least one protruding member.
- The flap fastener may include a side-release buckle strap.
- The flap fastener inserting portion may further include a hole provided in the flap fastener inserting portion strap, the hole being configured to allow the shackle to pass therethrough so that the shackle can lock the flap fastener inserting portion in a closed position.
- The door strap fastener may be implemented as a swivel lobster claw fastener comprising a swivel lobster claw clasp and an eye and is located inside of the door when fastened together.
- The strap, which in certain embodiments is a door strap, may be made of the same type of material as the body that satisfies the predetermined cut-resistance standard.
- The cut-resistance standard may be a standard established by European Standard (EN) or American National Standards Institute (ANSI).
- According to an aspect of another exemplary embodiment, there is provided a tamperproof sack system to securely contain a package, the tamperproof sack system including: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack including a body having a bottom side, a top side opposite the bottom side, a left side that is substantially perpendicular to the bottom side, a right side that is substantially parallel to the left side, a front side, and a rear side opposite the front side, the body being configured to house the package therein; a door strap configured to secure the tamperproof sack to a door such that the rear side of the body is held against the door, the door strap being attached to the left side and the right side of the body and being configured to wrap around the door, the door strap including a door strap fastener configured to fasten the door strap to the door; a zipper and a track provided on the front side of the body, the zipper being configured to slide along the track to thereby open and close the tamperproof sack; and a lock including a keypad configured to receive user input, the lock configured to unlock the zipper from a closed position and thereby allow the zipper to slide along the track and unlock the tamperproof sack based on whether the user input received at the keypad comprises a valid access code.
- The lock may include: a lock body; a shackle including: a fixed end that is fixed to the lock body and rotatable, and a loose end that can be pulled up and out of a hole formed in the lock body to unlock the shackle and pushed back into the hole to lock the shackle; a locking mechanism provided within the lock body and configured to release the loose end of the shackle in response to the valid access code being entered into the keypad; communication circuitry configured to receive an access code transmitted from a first digital communication device; and a memory configured to store the received access code as the valid access code.
- The tamperproof sack system may further include at least one loop fixed on the top side of the tamperproof sack.
- The zipper may include: a slider connected to the track; and a zipper pull connected to the slider, the zipper pull being configured to be pulled by a user to slide the slider back and forth along the track and thereby open and close the front side of the tamperproof sack, wherein the zipper pull includes a zipper pull hole formed therein, and wherein, when the zipper is pulled into the closed position which closes the track, the shackle is configured to pass through the zipper pull hole and the at least one loop, to thereby fix the zipper in place in the closed position.
- The tamperproof sack system may further include: a zipper flap configured to cover the zipper; a flap configured to cover the zipper flap; a front side loop fixed on the front side of the tamperproof sack; a rear side loop fixed on the flap; and a flap fastener including a flap fastener inserting portion and a flap fastener receiving portion, wherein, when the zipper is pulled into a closed position and covered by the zipper flap and the flap is pulled over the zipper flap and fastened by the flap fastener, the shackle is configured to pass through the front side loop and the rear side loop, to thereby lock the flap in place and prevent access to the zipper.
- According to an aspect of another exemplary embodiment, there is provided a method of delivering a package, the method including: receiving, at a second digital communication device, an access code transmitted from a first digital communication device; entering the access code into a keypad provided on a lock that locks closed an adjustable opening portion of a tamperproof sack to thereby unlock the lock, the tamperproof sack including a body having a bottom side, a top side opposite the bottom side, a left side that is substantially perpendicular to the bottom side, a right side that is substantially parallel to the left side, a front side, and a rear side opposite the front side, the body being configured to house the package therein, the adjustable opening portion being formed in the top side and configured to open and close, the tamperproof sack being secured to a door with a door strap that wraps around the door; opening the adjustable opening portion and placing the package inside the body of the tamperproof sack; and closing the adjustable opening portion and locking the adjustable opening portion closed using the lock.
- According to an embodiment of the present disclosure, there is a tamperproof sack system to securely contain a package, the tamperproof sack system comprising: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack comprising: a body having a bottom side and a top side opposite, wherein the body defines an interior configured to house a package therein; and an opening portion formed in the top side, the opening portion being configured to opened and closed. In this embodiment, the predetermined cut-resistance standard is European Standard EN-2 or above.
- According to an aspect of this embodiment, the tamperproof sack system according further comprises a strap configured to affix the tamperproof sack to a fixed object, and a lock. In one aspect of this embodiment, the fixed object is a door. In another aspect of this embodiment, the door strap is made of the same type of material as the body. In another aspect of this embodiment, the strap is integrally formed with the body.
- In an aspect of this embodiment, the body is made from a material selected from the group consisting of one or more of high performance polyethylene, ultra-high molecular weight polyethylene, para-aramid, polyvinyl acetate, polyvinyl acetate yarn, steel wire, metal fiber, and fiberglass yarn, or combinations thereof. In an aspect of this embodiment, the body is made from ultra-high molecular weight polyethylene.
- In an aspect of this embodiment, the body is made from a single unperforated piece of material. An aspect of this embodiment includes that the single unperforated piece of material is a single unperforated piece of ultra-high molecular weight polyethylene.
- In an aspect of this embodiment, the tamperproof sack system further comprises a drawstring affixed to the opening portion and configured to open and close the opening portion, and a zip tie configured to keep the opening portion of the tamperproof bag closed.
- According to an aspect of this embodiment, the body does not comprise perforations or holes other than the opening portion.
- According to an aspect of this embodiment, the predetermined cut-resistance standard is European Standard EN-3 or above.
- According to an aspect of this embodiment, the predetermined cut-resistance standard is European Standard EN-4 or above.
- According to an aspect of this embodiment, the body is 0.1 to 6 feet long.
- According to an aspect of this embodiment, the body is 6 to 60 feet long.
- Another embodiment of the present disclosure is a method of preventing the unauthorized removal of items from the tamperproof sack system. The method includes the steps of: filling the tamperproof sack, attaching the tamperproof sack to a fixed object, and informing an authorized user of a method by which to open the tamperproof sack or detach the tamperproof sack from the fixed object.
- According to an aspect of this embodiment, the method further includes a step of opening of the tamperproof sack by the authorized user.
- Another embodiment of the present disclosure is a method of delivering objects, the method comprising the steps of, in order: a first authorized user accessing the tamperproof sack system and opening the tamperproof sack, inserting an object into the tamperproof sack, and closing the tamperproof sack.
- According to an aspect of this embodiment, there is also a step of, after the step of closing the tamperproof sack, a second authorized user opening the tamperproof sack.
- According to an aspect of this embodiment, there is also a step of securing the tamperproof sack to a fixed object either before or after the step of inserting the object into the tamperproof sack.
- These and/or other aspects will become apparent and more readily appreciated from the following description of the exemplary embodiments, taken in conjunction with the accompanying drawings in which:
-
FIG. 1A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to an exemplary embodiment; -
FIG. 1B is a perspective view of the tamperproof sack system ofFIG. 1A , from the perspective of somebody standing inside of the home; -
FIG. 2A is a view of the drawstring used in the tamperproof sack system ofFIG. 1A being opened and closed; -
FIG. 2B is a close-up view of the tamperproof sack system ofFIG. 1A being opened and closed using the drawstring ofFIG. 2A ; -
FIG. 3 is a cross-sectional view showing the components of the lock, according to an exemplary embodiment; -
FIG. 4A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to another exemplary embodiment; -
FIG. 4B is a close-up view of the tamperproof sack system ofFIG. 4 being opened and closed; -
FIG. 5 is a close-up view of a modified version of the tamperproof sack system ofFIG. 4A , according to yet another exemplary embodiment; and -
FIGS. 6A, 6B, 6C, and 6D illustrate a method of delivering a package to a home using the tamperproof sack system according to an exemplary embodiment. -
FIGS. 7A and 7B are views of an embodiment of the tamperproof sack with a closing mechanism. -
FIGS. 8A, 8B, and 8C are views of an embodiment of the tamperproof sack. - Hereinafter, a tamperproof sack system according to exemplary embodiments will be described with reference to the accompanying drawings.
- The tamperproof sack system according to exemplary embodiments includes a combination of features that achieve a remarkably safe and easy-to-use system to ensure the security of home deliveries. In particular, according to certain exemplary embodiments, the tamperproof sack system includes one or more of a tamperproof sack made of tamperproof and weatherproof material, a strap that enables the tamperproof sack to be securely fastened to a door or other fixture of a home or any other desired object, and an electronic lock that locks the tamperproof sack closed. A homeowner can transmit an access code to a delivery person, and the delivery person can then use the access code to unlock the electronic lock and store a package in the tamperproof sack. The delivery person can then lock the tamperproof sack to secure the package. The access code can be generated according to various criteria, such as generating the access code based on a predetermined frequency (e.g., daily, hourly) or based on an event (e.g., detecting the delivery person's arrival), to ensure that the access code changes frequently. Moreover, the door strap is configured to be easily fastened and unfastened to a door or other fixture, so that a homeowner can easily attach or detach the tamperproof sack to the door based on whether a package is expected.
- The tamperproof sack may take the form of a bag or a box or another container. The tamperproof sack may have soft or hard sides defining an interior volume that may be filled with an object or used to contain an object, depending on the embodiment. In some embodiments, the tamperproof bag may have openings in its sides to permit, for example, breathability, so long as those openings do not allow for the unauthorized removal of an item therein or otherwise compromise the tamperproof nature of the sack.
- The tamperproof sack according to the present disclosure is easy to set up and take down. It is lightweight based on the materials used as disclosed herein.
-
FIG. 1 is a cross-sectional view illustrating a tamperproof sack system according to an exemplary embodiment. As shown therein, thetamperproof sack system 100 includes atamperproof sack 102, adoor strap 118, and alock 130. Thedoor strap 118 secures thetamperproof sack 102 to adoor 101, and thelock 130, which includes ashackle 132, alock body 134, and akeypad 136, can be locked and unlocked in response to a valid access code being input into thekeypad 136, to thereby open and close thetamperproof sack 102. - The
tamperproof sack 102 includes abody 104 and anadjustable opening portion 106. Thebody 104 includes a bottom side 104 a, a top side 104 b opposite the bottom side 104 a, a left side 104 c that is substantially perpendicular to the bottom side 104 a, a right side 104 d that is substantially parallel to the left side 104 c, a front side 104 e (i.e., the side facing out inFIG. 1A ), and a rear side 104 f opposite the front side (the rear side 104 f facing in and contacting the door 101). Thebody 104 further includes anadjustable opening portion 106 formed in the top side 104 b. When theadjustable opening portion 106 is opened, anopening 108 is formed in the top side 104 b so that a delivery person can insert a package into thetamperproof sack 102 or a homeowner can remove the package from thetamperproof sack 102. When theadjustable opening portion 106 is closed, theopening 108 is closed. In the example shown inFIG. 1A , the left and right sides 104 c and 104 d are longer than the top and the bottom sides 104 b and 104 a to form a substantially rectangular sack shape. However, exemplary embodiments of thetamperproof sack 102 are not limited to any particular dimensions, size, or shape. - The
body 104 of thetamperproof sack 102 is made of a material that is tamperproof and weatherproof, to protect packages from theft and harsh weather conditions, such as rain, wind, sleet, snow, and prolonged sun exposure. Thebody 104 may be made of a material that is cut-resistant, tear resistant or and/or puncture-resistant so that thebody 104 cannot be easily cut, torn, or punctured by thieves. For example, thebody 104 may be made of various types of fabrics manufactured by Kozane®, which achieve maximum cut, tear, and puncture resistance. Of course, thebody 104 is not limited to being made of any particular type of material, and may be made of many different types of materials, such as ultra-high molecular weight polyethylene (UHMWPE), para-aramids (such as Twaron® or Kevlar®), high performance polyethylene (HPPE) (such as Dyneema® or Spectra®), polyvinyl acetate (PVA), special PVA yarns (such as SupraBlock®), steel wire, metal fibers, chain links made from various materials, fiberglass yarns, or the like, or combinations thereof. In some embodiments, the body includes at least 90% by weight of the materials listed above. In other embodiments, the body includes at least 95%, 98%, or 99% by weight of the materials listed above. In certain embodiments, the body consists of 100% by weight of the materials listed above. In some embodiments, the material making up the body does not include metal fibers or does not include chain links, in particular chain links made from metal. In other embodiments, the material making up the body does not include wire. In other embodiments, the body does not include wire and/or does not include metal at any point surrounding a drawstring, but may include wire and/or metal in other parts of the body. Thus, a drawstring, if affixed to the body, does not go through wire and/or metal at any point in certain embodiments. Thebody 104 may be manufactured to comply with various types of cut resistance standards and other types of standards, such as standards governing puncture resistance and tear resistance. Examples of these standards include the European Union (EN) standards and the American National Standards Institute (ANSI)/ISEA standards. The term “tamperproof” as used throughout this specification may refer to a material that provides a predetermined degree of resistance to tampering, theft, cutting, tearing, or puncturing. In other words, the “tamperproof” material satisfies certain standards with respect to at least one of cut-resistance, tear-resistance, and/or puncture-resistance. For example, the “tamperproof” material may satisfy an EN cut-level 3 (where the EN levels range from 1-5). In preferred embodiments, the tamperproof sack satisfies an EN cut-level of 2 or more. In other embodiments, an EN-3 cut-resistance level may be used. For higher levels of tamperproof behavior, an EN cut-level of 4 or 5 may be used. The level of cut-resistance that may be present in the material for the tamperproof sack is not particularly limited, and may be selected from any range within the EN-1 to EN-5 range. Alternatively, the “tamperproof” material may satisfy an ANSI cut-level A6 (where the ANSI levels range from A1-A9). Also, different versions of thetamperproof sack 102 could be manufactured to satisfy different “tamperproof” standards according to EN1-EN5 or A1-A9. For example, a lightweighttamperproof sack 102 might be manufactured to satisfy a lower cut-resistance level (e.g., ANSI cut-level A2), whereas a heavyweighttamperproof sack 102 might be manufactured to satisfy a higher cut-resistance level (e.g., ANSI cut-level A8 or above). Higher tamperproof resistance may be provided by using material having a cut-resistance level of A4 or above. In preferred embodiments, the cut-resistance level is A2 or above, for example to A9. In more preferred embodiments, the cut-resistance level is from level A4-A7. The range of cut-level resistance in the material is not particularly limited, and may be from A1-A9 as appropriate for a given application. Many different options are possible. The material used for the tamperproof material is not particularly limited as long as it meets the tamperproof standards noted herein. In certain embodiments, the tamperproof sack may be made to be waterproof. The means of waterproofing the tamperproof sack is not particularly limited. In preferred embodiments, the material may be UHMWPE and may provide an ANSI-A6 level of protection or above. The UHMWPE preferably has a Mw of over 1,000,000, and is preferably in the range of from 1,000,000 to 10,000,000 or above. In preferred embodiments, the Mw is in a range of from 1,000,000 to 7,500,000. An appropriate Mw may be selected as long as it provides the desired tamperproof properties and yield strength (for example, a desired cut resistance). - In some embodiments, the tamperproof sack does not contain holes or openings other than the
opening 108 through which an object may be inserted into the tamperproof sack. Accordingly, in those embodiments, the tamperproof sack has only one opening—opening 108. In other embodiments, the tamperproof sack may contain perforations or holes that are not large enough for an unauthorized user to touch, or in some embodiments to remove, an object inside the tamperproof sack. For example, the tamperproof sack may contain perforations or openings other than the main opening, for example, on its sides, that are no larger than 4 inches in diameter, length, or width. Preferably, the perforations or openings are less than 3 inches, less than 2 inches, or less than 1 inch in diameter, length, or width. In preferred embodiments, the openings are less than ½ inch or less than ¼ inch in diameter, length, or width. On other embodiments, the openings are less than 1/10 inch or less than 1/100 inch in diameter, length or width. Other embodiments may include perforations or openings 1 micron or less in diameter, length, or width. - The tamperproof sack may be made using one layer of material or multiple layers of material. The layers of material may be made from the same or different materials as noted herein, so long as the tamperproof nature of the tamperproof sack is not compromised. Where the tamperproof sack has perforations or openings as noted above, the layers of material may be arranged such that even if the perforations or openings in an individual layer are larger than those values listed above, the multiple layers are arranged such that the openings of the tamperproof sack as a whole are not larger than the values noted above.
- The
body 104 further includes theadjustable opening portion 106 which can be adjustably opened and closed using various opening and closing mechanisms. In the exemplary embodiment shown inFIG. 1A , theadjustable opening portion 106 is the portion of thebody 104 that forms a perimeter around theopening 108, and is a substantially circular shape. Thetamperproof sack 102 includes a drawstring 110 (seeFIG. 2A ) that is used to open and close theadjustable opening portion 106. - As shown in
FIG. 2A , thedrawstring 110 includes a cord 110 a which is a long, thin piece of material.FIG. 2A illustrates thedrawstring 110 by itself, andFIG. 2B illustrates thedrawstring 110 in use in thetamperproof sack 102. The cord 110 a may be made of various types of materials, such as metal wire, plastic, various types of fabrics, etc. The cord 110 a may be made of material similar to thebody 104, such that the cord 110 a is also cut-resistant, tear resistance or and/or puncture-resistant. The two ends 110 b of the cord 110 a (also referred to as “cord ends”) are passed through respective openings in a barrel cord lock 110 d and typically tied together or otherwise fastened together, to thereby maintain the cord 110 a in a large loop shape. The barrel cord lock 110 d is a cylindrical locking mechanism having a main cylindrical body that includes two openings to allow the respective cord ends 110 b to pass therethrough, and further includes a smaller cylinder provided inside of the main cylindrical body. A spring or other elastic mechanism is typically provided inside of the main cylindrical body to keep the smaller cylinder into a locked position. When a user presses the smaller cylinder, the openings in the main cylindrical body are opened to allow the cord ends 110 b to pass through, thereby allowing the cord 110 a to be pulled tighter or loosened up. When a user releases the smaller cylinder, the openings in the main cylindrical body are closed to fix the cord 110 a into a fixed position. Thedrawstring 110 further includes two loops 110 c through which ashackle 132 of thelock 130 can be passed therethrough to lock theadjustable opening portion 106 into a closed position. - More specifically, as shown in
FIG. 2A , on the left-hand side ofFIG. 2A , thedrawstring 110 is fixed in an open position, and on the right-hand side ofFIG. 2A , thedrawstring 110 is fixed in a closed position. To transition from the open to closed position, a user presses the barrel cord lock 110 d to release the cord 110 a from the fixed open position and then pulls the cord ends 110 b through the barrel cord lock 110 d, to thereby tighten thedrawstring 110 into the closed position. Then, the user can release the barrel cord lock 110 d to fix the drawstring into the closed position. -
FIG. 2B illustrates thedrawstring 110 in use with thetamperproof sack 102. As shown in the left-hand side ofFIG. 2B , in the open position, thedrawstring 110 is almost completely sealed within theadjustable opening portion 106, except for the cord ends 110 b and barrel cord lock 110 d that are exposed outside of the adjustable opening portion. Thedrawstring 110 can be sealed within theadjustable opening portion 106 using various techniques, such as, for example, by sewing thedrawstring 110 within theadjustable opening portion 106. To close theadjustable opening portion 106, the user presses the barrel cord lock 110 d to release the cord 110 a from the fixed open position, pulls the cord ends 110 b to thereby pull the cord 110 a into a closed position, and then releases the barrel cord lock 110 d to fix the cord 110 a and theadjustable opening portion 106 into the fixed closed position (shown on the right-hand side ofFIG. 2B ). The user can pull the cord ends 110 b until the two loops 110 c on thecord 110 are pulled out of theadjustable opening portion 106 and are exposed outside. At this point, the user can pass theshackle 132 of thelock 130 through the two loops 110 c and lock theshackle 132 into place, thereby locking theadjustable opening portion 106 into a closed position. The two loops 110 c can be configured such that, in the fixed closed position, theadjustable opening portion 106 is completely sealed or almost completely sealed so that a thief could not reach his or her hand into thetamperproof sack 102. Also, although the example inFIGS. 2A and 2B illustrates a drawstring configuration having two loops 110 c, exemplary embodiments are not limited to using two loops 110 c, and three or more loops may be used in various arrangements. - The
tamperproof sack 102 further includes aflap 112 which is configured to be pulled over theadjustable opening portion 106 and fastened in place. Theflap 112 is optional and provides an additional layer of covering for theadjustable opening portion 106 and thelock 130. As shown inFIG. 2B , theflap 112 includes a flapfastener inserting portion 114 attached to an end of theflap 112. The flapfastener inserting portion 114 incudes a flap fastener inserting portion strap 114 a, at least one protruding member 114 b, and a hole 114 c. Moreover, thetamperproof sack 102 includes a flapfastener receiving portion 116 which is fixed to the front side 104 e. The flapfastener receiving portion 116 includes a flap fastener receiving portion strap 116 a and a hollow part 116 b. The flapfastener inserting portion 114 and the flapfastener receiving portion 116 may collectively be referred to as the “flap fastener”. The flapfastener inserting portion 114 may be attached to theflap 112 in various ways, such as by sewing the flap fastener inserting portion strap 114 a to theflap 112 or by manufacturing the flapfastener inserting portion 114 out of the same piece of material as theflap 112. The flapfastener receiving portion 116 may be formed in a similar fashion. In the exemplary embodiment shown inFIGS. 2A and 2B , the flap fastener is implemented as a side-release buckle strap, where the flapfastener inserting portion 114 includes the flap fastener inserting portion strap 114 a and three protruding members 114 b formed at the end thereof, and the flapfastener receiving portion 116 includes the flap fastener receiving portion strap 116 a having a hollow part 116 b that has holes in the sidewalls formed at the end thereof. When the protruding members 114 b are inserted into the hollow part 116 b, the protruding members bend to fit inside of the hollow part 116 b and then snap back out of the holes in the sidewalls, to thereby fasten the flapfastener inserting portion 114 to the flapfastener receiving portion 116. Also, the flap fastener can optionally be configured to be locked by thelock 130. For example, theshackle 132 of thelock 130 can pass through the hole 114 c when the flap fastener is locked, to thereby lock theflap 112 in place. This configuration provides an additional layer of security. The flap fastener can be locked to thelock 130 using many different types of configurations, e.g., holes in the strap, additional fastening devices, etc., and exemplary embodiments are not limited to any particular configuration. - The
tamperproof sack 102 further includes a strap configured to affix the tamperproof sack to a fixed object. The strap may be configured to affix the tamperproof sack to any suitable object, such as a door, mailbox, fence, fence post, railing, tree, support column, gate, car, truck, truck bed, an item anchored or bolted into the ground or other object, or other fixed object that is difficult to move.Element 118 illustrates an embodiment of the strap as adoor strap 118 that is configured to be wrapped around adoor 101. Thedoor strap 118 can be made of a material that is cut-resistant, tear resistance or and/or puncture-resistant so that thebody 104 cannot be easily cut, torn, or punctured by thieves, similar to the material used to make thetamperproof sack 102. Thedoor strap 118 is not limited to being made of any particular type of material. Thedoor strap 118 can be integrally formed from the same piece of material as thetamperproof sack 102, or can be formed as a separate piece that is attached to sides of thetamperproof sack 102. When formed as a separate piece, ends of thedoor strap 118 can be respectively connected to the left side 104 c and right side 104 d of thetamperproof sack 102 using various techniques, such as sewing the ends of thedoor strap 118 to the left and right sides 104 c and 104 d. The strap may be made from the same material as the tamperproof sack or may be made from a different material. In some embodiments, the strap may be integrally formed with the tamperproof sack from a single piece of material or from the same pieces of material as the tamperproof sack. In other embodiments, the strap may be attached to the tamperproof sack. The method for attaching the strap to the tamperproof sack is not particularly limited, but should not diminish the tamperproof ability of the combined tamperproof sack and strap. For example, the strap may be affixed to the tamperproof sack using a method disclosed below relating to how the tamperproof sack may be made. - As shown in
FIG. 1B , which is a perspective view of thetamperproof sack system 100 from the perspective of somebody standing inside of the home, thedoor strap 118 wraps around thedoor 101 and is fixed in place using thedoor strap fastener 122. The door strap may include athin portion 120 where thedoor strap 118 wraps around corners of thedoor 101. In the example shown inFIG. 1B , thedoor strap fastener 122 is implemented as a swivel lobster claw-style fastener, which includes a swivel lobster claw clasp 122 a and aneye 122. To fasten thedoor strap fastener 122 into place, a user opens the swivel lobster claw clasp 122 a, hooks the opened lobster claw clasp 122 a into the eye 122 b, and then closes the swivel lobster claw clasp 122 a to lock the swivel lobster claw clasp 122 a in place. The swivel lobster claw-style fastener is very easy to fasten and unfasten, and can be designed using high-strength metal alloy components that enhance the strength of thesystem 100. Of course, exemplary embodiments are not limited to using a swivel lobster claw clasp as thedoor strap fastener 122, and many other types of fasteners can alternatively be used as thedoor strap fastener 122, such as buckles (e.g., side-release buckle straps), Velcro straps, buttons, zippers, hooks, etc. -
FIG. 3 is a cross-sectional view showing the components of thelock 130, according to an exemplary embodiment. As shown therein, thelock 130 includes theshackle 132, thelock body 134, akeypad 136, alocking mechanism 338,communication circuitry 340, a central processing unit (CPU) 342, amemory 344,sensors 346, and acamera 348. - The
shackle 132 is made out of brass, stainless steel, hardened streel, an alloy or combination of alloys, or some other type of high-strength material. Theshackle 132 typically includes metal or metal alloy, although is not limited to such. Theshackle 132 has a curved shape resembling an upside-down U, and has two ends 132 a and 132 b connected to thelock body 132. The first end 132 a (also referred to as the “fixed end 132 a”) is fixed to thelock body 132 and is rotatable, and the second end 132 b (also referred to as “loose end 132 b”) can be pulled up and out of a hole 132 c formed in thelock body 132 to unlock thelock 130, and can be inserted back into the hole 132 c to lock thelock 130. When theshackle 132 is unlocked, the loose end 132 b can be pulled up and out of thelock body 132 and rotated about the rotatable first end 132 a, so that theshackle 132 can be passed through various components (e.g., guided out of the loops 110 c). - The
lock body 134 houses each of the electrical and locking components therein, and is made out of a high-strength material, similar to theshackle 132. In the example shown inFIG. 3 , thelock body 134 has a substantially circular shape, although exemplary embodiments are not limited thereto, and thelock body 134 can have many different shapes and sizes, e.g., rectangular, square, cylindrical, etc. - The
keypad 136 includes a series of keys that can be pressed by a user to lock and unlock thelock 130. The keys can include any combination of numbers, letters, or symbols. For example, thekeypad 136 can include a standard numerical layout including twelve keys, one for each single-digit number and two additional keys for the pound (#) and star (*) symbols, as is frequently used on phones. Alternatively, thekeypad 136 can include only a few keys, e.g., three keys, four keys, five keys, etc., with corresponding numbers (e.g., keys 1-5). In the example shown inFIG. 2B , thekeypad 136 includes a series of twelvekeys 137 that are implemented as physically protruding mechanical buttons sticking out from thelock body 134. However, exemplary embodiments are not limited to this configuration. For example, thekeypad 136 can be implemented as electronic pushbuttons, a digital touch screen, a dial, or any other device that can be used to input an access code. Thekeypad 136 can be electronic (e.g., battery powered) or manual. - The
locking mechanism 338 is a series of components that collectively function together to lock and unlock theshackle 132 based on whether an access code is correctly input to thekeypad 136. Thelocking mechanism 338 can include, for example, a series of spring-loaded pins, racks, gears, and other physical hardware components that interoperate to lock and unlock the shackle. When the correct (e.g., valid) access code is input to thekeypad 136, the locking mechanism unlocks theshackle 132. When an incorrect (e.g., invalid) access code is input to thekeypad 136, the locking mechanism keeps theshackle 132 locked. Thelocking mechanism 338 is not limited to any particular configuration, and many different types or combinations of lockingmechanisms 338 may be used in thelock body 130. - The
communication circuitry 340 is circuitry configured to transmit data to and receive data from other digital devices, such as digital devices being used by a homeowner and a delivery person. Thecommunication circuitry 340 is implemented as at least one network module having at least oneantenna 341. Generally, a network module includes a combination of hardware and software that is specially configured to transmit and receive data according to at least one type of data telecommunications standard, e.g., 4G, 5G, BLUETOOTH, Wi-Fi, etc., using theantenna 341. The network module may a chipset, system on chip (SoC), or component thereof that supports data communication. Theantenna 341 may be configured as one or a plurality of multiple input, multiple output (MIMO) antenna groups. Exemplary embodiments are not limited to any particular configuration of antennas. For example, the antenna may be physically located inside or outside of the respective network module. - The
CPU 342 controls overall operations of the components located within thelock body 134. Specifically, theCPU 342 controls operations of thekeypad 136, thecommunication circuitry 340, thememory 344, thesensors 346, thecamera 348, and thebattery 350. TheCPU 342 may be connected to the other components viaelectrical wire 343. Theelectrical wire 343 may be implemented as a series of a wires, a bus, or any other configuration that enables data communication between theCPU 342 and the other components. - The
memory 344 stores access codes that are used to lock and unlock thelock 130. Thememory 344 may be implemented as various types of memory devices, such as RAM, SRAM, DRAM, PROM, EPROM, EEPROM, flash memory, on-chip memory, ROM, optical disc drives, cloud-based storage, and other types of non-transitory storage media. In operation, when a new access code is received by thecommunication circuitry 341, theCPU 342 controls thememory 344 to store the new access code as a valid access code. Also, theCPU 432 may control thememory 344 to overwrite any previously stored access codes or otherwise mark the previously stored access codes as invalid. - The
sensors 346 include at least one sensor that may be used to detect events occurring near thetamperproof sack system 100. For example, thesensors 346 may include a photosensor that detects an ambient brightness level. Thus, when a delivery person approaches thetamperproof sack system 100 and unfastens theflap 112, thesensors 346 may sense the sudden increase in brightness level and generate an alert that can be transmitted (via the communication circuitry 340) to a homeowner, to inform the homeowner that somebody is accessing thetamperproof sack system 100. Thesensors 346 may alternatively be implemented as a noise sensor (e.g., a microphone, to detect noise), a motion sensor (e.g., an accelerometer, to detect whether thesack 102 is being moved), and/or other types or combinations of sensors. Moreover, thesensors 346 may also include various types of sensors that are configured to exchange data with another device. For example, thesensors 346 may include a near-field communication (NFC) sensor to exchange data with a delivery person or somebody else. Thesensors 346 may also be omitted. - The
camera 348 is an optical recording device that can record images or video and transmit the recorded images or video to a homeowner. Thecamera 348 can be implemented as many different types of camera, e.g., compact digital cameras, NEST® cameras, etc. In operation, thecamera 348 can be used to transmit videos to the homeowner to alert the homeowner that somebody is accessing thetamperproof sack system 100 in real-time. In this case, thecamera 348 can also be used in combination with thesensors 346. For example, thesensors 346 can indicate that thetamperproof sack system 100 is being accessed, which can trigger an alert to the user (via the communication circuitry 340), and can also trigger a command to thecamera 348 to turn on and start recording. Alternatively, thecamera 348 can simply record video without providing real-time alerts. - The
battery 350 provides electrical power to the other electrical components within thelock body 134, including thecommunication circuitry 340, theCPU 342, thememory 344, thekeypad 136, thesensors 346, and thecamera 348. Also, if thelocking mechanism 338 includes electrically powered components, thebattery 350 may also provide electrical power to thelocking mechanism 338. - To securely facilitate the delivery of packages using the
tamperproof sack system 100, thelock 130 operates as follows. First, the homeowner uses her or his digital device 350 (also referred to as a “firstdigital communication device 350”) to generate a new access code 360 (also referred to as an “access code 360”) which is a valid access code that can be used to unlock thelock 130. Theaccess code 360 can be any series if numbers, letters, or symbols that are compatible with thekeypad 136. The firstdigital communication device 350 can be a smartphone, a laptop computer, a desktop computer, a security system interface, a combination of devices, or any other type of digital device configured to transmit data. When the firstdigital communication device 350 is a smartphone, the smartphone can generate thenew access code 360 by using anapplication 352 stored on the smartphone. Theapplication 352 can be a specially configured program designed to generate new access codes based on a predefined event or a predetermined frequency. For example, theapplication 352 can generate anew access code 360 in response to a user manually selecting an option to generate thenew access code 360. Alternatively, theapplication 352 can generate anew access code 360 according to a predefined frequency, such as generating anew access code 360 once a day or once an hour. As another alternative, theapplication 352 can generate thenew access code 360 in response to detecting an event, such as thesensors 346 detecting the presence of a Delivery person in a vicinity of thetamperproof sack 102. Many different criteria may be used to generate thenew access code 360. - Once the
application 352 generates thenew access code 360, the firstdigital communication device 350 transmits thenew access code 360 to both thelock 130 and the delivery person's digital device 352 (also referred to as a “seconddigital communication device 352”). Many different techniques and communication channels can be used to ensure that theaccess code 360 is correctly transmitted to the seconddigital communication device 352. For example, the delivery person can provide his or her phone number or email ahead of time, and the homeowner can manually text or email theaccess code 360 using the phone number or email address, or theapplication 352 can automatically transmit the access code to the phone number or email address. Alternatively, the firstdigital communication device 350 can automatically transmit any newly generatedaccess codes 360 to a central phone number or email controlled by the delivery company, such as a central phone number or email used by Amazon®. The delivery company can then, in turn, provide theaccess code 360 to the delivery person. - The
lock 130 receive thenew access code 360 via thecommunication circuitry 340 and theCPU 342 stores theaccess code 360 in thememory 344. If thememory 344 is currently storing a previously generated access code, theCPU 342 can overwrite the previously generated access code with thenew access code 360. - Alternatively, the
memory 344 can simply store everynew access code 360 without overwriting or erasing the previously stored access codes. Also, optionally, thememory 344 can store a “master” access code that is only known by the homeowner and that is not updated or changed, and is not shared with any delivery people. The “master” access code is a fixed code that the homeowner can use to access thetamperproof sack system 100 anytime, and is distinct from the dynamically changingaccess code 360 that is sent to delivery people. - Then, to deliver a package, the delivery person looks up the
access code 360 stored in his or her digital device 360 (the second digital communication device 360) and enters theaccess code 360 into thekeypad 136. In response to avalid access code 360 being input, theCPU 342 controls thelocking mechanism 338 to unlock theshackle 132. The delivery person then removes thelock 130 by pulling theshackle 132 out from the two loops 110 c (and optionally from thehole 115 in the flapfastener inserting portion 114, if the flapfastener inserting portion 114 is being used as an additional security layer), opens theadjustable opening portion 106 of thetamperproof sack 102 using thedrawstring 110, and inserts the package into thebody 104 of thetamperproof sack 102. To lock thetamperproof sack 102 back up, the delivery person closes theadjustable opening portion 106 using thedrawstring 110, passes theshackle 132 back through the two loops 110 c (and optionally the hole 115), and presses the loose end ofshackle 132 down into a corresponding hole on thelock body 134 to lock theshackle 132 in place, thereby closing and locking thetamperproof sack 102. The package is now safely delivered inside of thetamperproof sack 102 and is ready to be picked up by the homeowner. -
FIG. 4A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to another exemplary embodiment. The tamperproof sack system 400 shown inFIG. 4A is similar to thetamperproof sack system 100 shown inFIG. 1A , except that the tamperproof sack system 400 includes azipper 440 provided on the front side 104 e of the tamperproof sack 402, and does not include theadjustable opening portion 106. - More specifically, the tamperproof sack system 400 includes a tamperproof sack 402, a door strap 418, and a
lock 430. The tamperproof sack 402 includes a body 404 including a bottom side 404 a, a top side 404 b opposite the bottom side 404 a, a left side 404 c that is substantially perpendicular to the bottom side 404 a, a right side 404 d that is substantially parallel to the left side 404 c, a front side 404 e (i.e., the side facing out inFIG. 4A ), a rear side 404 f opposite the front side (the read side facing in and contacting the door 101), aflap 412, a flapfastener inserting portion 414 attached to an end of theflap 112, and a flapfastener receiving portion 416 which is fixed to the front side 104 e. Unlike the exemplary embodiment inFIG. 1A , the top side 404 b in the exemplary embodiment shown inFIGS. 4A and 4B does not have theadjustable opening portion 106. The flapfastener inserting portion 414 and the flapfastener receiving portion 416 may collectively be referred to as the “flap fastener”. Ahole 415 may be formed in the flapfastener inserting portion 414. Thelock 430 includes ashackle 432, alock body 434, and akeypad 436. Each of the components including the tamperproof sack 402, door strap 418, and lock 430 described above may have the same structure and functionality as thetamperproof sack 102,door strap 118, and lock 430 described with respect toFIG. 1A , respectively. - As shown in
FIG. 4B , the tamperproof sack 402 further includes azipper 440 and atrack 442. Thezipper 440 includes a zipper pull 440 a, a zipper pull hole 440 b, and a slider 440 c. Thetrack 442 includes a series of protrusions on the left and right sides (also known as “teeth”), which are arranged such that each tooth on the left side of thetrack 442 fits into the gap between two adjacent teeth on the right side of thetrack 442, and each tooth on the right side of thetrack 442 fits into the gap between two adjacent teeth on the left side of thetrack 442, in an interlocking fashion. The slider 440 c is connected to thetrack 442 and is configured to slide up thetrack 442 to thereby interlock together the two opposing strips of teeth together, and is configured to slide down thetrack 442 to unlock the two opposing strips of teeth. The zipper pull 440 a is connected to the slider 440 c and is used to pull the slider 440 c up and down thetrack 442. Also, the zipper pull 440 a includes a zipper pull hole 440 b formed therein. Theshackle 432 can pass through the zipper pull hole 440 b, to thereby lock thezipper 440 in place in a locked position. - The tamperproof sack 402 also includes a front side loop 444 and a
back side loop 446 which are fixed in place. The front side loop 444 is formed on a front portion of the top side 404 b, and therear side loop 446 is formed on a rear portion of the top side 404 b. When thezipper 440 is zipped up, theshackle 432 can pass through each of the front side loop 444, therear side loop 446, and the zipper pull hole 440 c, thereby fixing thezipper 440 into a closed portion. Unlike the exemplary embodiment shown inFIG. 1A , the exemplary embodiment shown inFIGS. 4A and 4B does not include thedrawstring 110 or theadjustable opening portion 106. However, it is also possible to combine the exemplary embodiments shown inFIG. 1A andFIG. 4A to add adrawstring 106 in the top portion 404 b of the tamperproof sack 402, if desired. Also, althoughFIG. 4B illustrates twoloops 444 and 446, it is also possible to use only one loop, or use three or more loops. - The tamperproof sack system 400 is especially useful for handling larger package deliveries, since the zipper 400 allows the entire front side 404 e of the tamperproof sack 402 to be unzipped.
-
FIG. 5 is a close-up view of a modified version of the tamperproof sack system ofFIG. 4A , according to yet another exemplary embodiment. The tamperproof sack system 500 ofFIG. 5 is substantially similar to the tamperproof sack system 400 ofFIGS. 4A and 4B , except that, in the tamperproof sack system 500, theflap 412 is used to secure the tamperproof sack system 500 closed. Specifically, as shown in the left-hand side ofFIG. 5 , when thezipper 440 is zipped up to a closed position, azipper flap 502 can be folded over to cover thezipper 440. Thezipper flap 502 can be fastened shut with snaps 504 (or some other fastening mechanism, such as Velcro, etc.). As shown in the right-hand side ofFIG. 5 , once thezipper 440 is securely covered with thezipper flap 502, theflap 412 can be folded over the top of thetamperproof sack 502 and fastened closed using the flap fastener (i.e., the flapfastener inserting portion 414 and the flap fastener receiving portion 416). - In the modified version shown in
FIG. 5 , thefront side loop 544 is located lower down on the front side of thetamperproof sack 502 than the front side loop 444 (FIG. 4B ), because in the modified version shown inFIG. 5 , since thezipper 440 is covered under thezipper flap 502, the zipper hole 440 c is not used to help secure theshackle 432. Thus, thefront side loop 544 is located lower down on the front side of the tamperproof sack, and arear side loop 546 is fixed on theflap 412, so that thefront side loop 544 and therear side loop 546 can be locked together and thereby lock theflap 412 in place to cover the zipper and thus prevent access to the zipper, as shown on the right-hand side ofFIG. 5 . -
FIGS. 6A, 6B, 6C, and 6D illustrate a method of delivering a package to a home using the tamperproof sack system according to an exemplary embodiment. InFIGS. 6A-6D , thetamperproof sack system 100 is shown for illustrative purposes. However, the method shown inFIGS. 6A-6D can also be used with other tamperproof sack systems, such as tamperproof sack system 400 (FIG. 4A ), tamperproof sack system 500 (FIG. 5 ), or some other modified version of the tamperproof sack systems according to exemplary embodiments. - In
operation 610 shown inFIG. 6A , adelivery person 600 delivering a package receives anew access code 360. Thedelivery person 600 receives thenew access code 360 that is transmitted from the homeowner's digital communication device 350 (the first digital communication device 350) to the delivery person's digital communication device 352 (the second digital communications device 352). Theaccess code 360 can be transmitted according to various criteria and using various techniques. For example, theaccess code 360 can be directly transmitted to the delivery person'sdigital communications device 352 in response to a request from the delivery person, can be transmitted automatically to the delivery person at a certain time of day, can be transmitted automatically to the delivery person based on proximity (e.g., when the delivery person gets within a certain radius of the homeowner's digital communication device 350), or based on some other criteria. As another alternative, thesensors 346 and/orcamera 348 can be used to sense or detect when thedelivery person 600 arrives, and theaccess code 360 can be transmitted in response to sensing or detecting the arrival. Also, theaccess code 360 can be indirectly transmitted to the delivery person'sdigital communications device 360 through an intermediate node or network. For example, theaccess code 360 can be transmitted to the delivery company (e.g., AMAZON®) and stored by the delivery company, and then transmitted from the delivery company to thedelivery person 600 at an appropriate time. - In
operation 620 shown inFIG. 6B , thedelivery person 600 unlocks thetamperproof sack system 100 using theaccess code 360 and inserts thepackage 602 into thetamperproof sack 102. For example, thedelivery person 600 can enter theaccess code 360 into thekeypad 136, to thereby cause thelocking mechanism 338 to unlock one end of theshackle 132. Thedelivery person 600 then removes theshackle 132 and opens theadjustable opening portion 106, e.g., by loosening thedrawstring 110. Thedelivery person 600 then slides thepackage 602 into thetamperproof sack 102. - In
operation 630 shown inFIG. 6C , thedelivery person 600 locks thetamperproof sack 102 back up by tightening the adjustable opening portion 106 (e.g., by tightening the drawstring 110), passing the loose end of theshackle 132 back through the loops 110 c of thedrawstring 110, and pressing the loose end of theshackle 132 into thelock body 134 to lock thetamperproof sack 102. Thedelivery person 600 then leaves the premises. - In
operation 640 shown inFIG. 6D , thehomeowner 604 arrives home and unlocks thetamperproof sack 102 to thereby take possession of thepackage 602. Thehomeowner 604 can use thesame access code 360 transmitted to thedelivery person 600, or can use some other access code (e.g., a “master” access code). Moreover, if thehomeowner 604 desires, thehomeowner 604 can unfasten the entiretemporary sack 102 from thedoor 101 by unfastening thedoor strap fastener 122, and can then store thetemporary sack 102 for later use. - Another embodiment of the present disclosure is illustrated in
FIGS. 7A and 7B .FIGS. 7A and 7B illustrate an embodiment in which a closing mechanism, in this case alock 701, is part of a zip tie used to secure thetamperproof sack 702. In this embodiment, the tamperproof sack is secured to adoor 703 using thelock 701. Thezip tie 701 is pulled tightly enough that theopening 704 of the tamperproof sack cannot fit through the zip tie until it is unlocked. In this embodiment, the tamperproof sack may be unlocked by a user who knows how to unlock the lock 701 (in the illustrated embodiment, the user will know the combination to the lock), theopening 704 may be opened and filled with the desired item, theopening 704 may then be closed using thedrawstring 705, and thelock 701 may be placed as shown, preventing thetamperproof sack 702 from being opened or removed from thedoor 703 until another authorized user removes thelock 701. -
FIGS. 8A, 8B, and 8C illustrate an embodiment of thetamperproof sack 801 without a strap or a lock, although it is envisioned that a strap or a lock may be added in certain embodiments. InFIG. 8A , the tamperproof sack is shown with aclosed end 802 and anopen end 803. Adrawstring 804 is shown atopen end 803 and is attached around the periphery ofopen end 803 so as to provide for the closing ofopen end 803 when thedrawstring 804 is tightened.Closed end 802 may be formed by virtue of any method known in the art or disclosed herein. For example,closed end 802 may be formed by virtue of folding a single piece of material such that sides 805 are sealed together andopen end 803 is thereby formed. The methods by which sides 805 may be sealed in such an embodiment are not particularly limited, and may be those known in the art or disclosed herein. In another embodiment,closed end 802 may also be formed by providing a tubular material to form thetamperproof sack 801 and then sealing the closed end using a method disclosed herein or a method known in the art. Preferably, the method of sealingclosed end 802 orsides 805 is a method that will not reduce the tamperproof nature of the tamperproof sack. A method of closing theopen end 803 is not particularly limited as long as it does not reduce the tamperproof nature of the tamperproof sack. -
FIG. 8B illustrates opening theopen end 803. In this embodiment, thedrawstring 804 may be drawn closed after an object is placed inside the tamperproof sack, thereby closingopen end 803 as illustrated inFIG. 8C .FIG. 8C illustrates an embodiment in which the tamperproof sack is closed and partially folded over. - It should be noted that although some of the figures illustrate the tamperproof sack including a drawstring, the tamperproof sack does not need to include a drawstring and in some embodiments does not include a drawstring. The tamperproof sack may be closed using any method known in the art or disclosed herein.
- The material from which the tamperproof sack may be made has been described previously. In certain preferred embodiments, the material may be UHMWPE having a molecular weight as discussed above, and providing a level of protection of ANSI-A2 or above, in other embodiments is ANSI-A4 or above, and in other embodiments ANSI-A6 or above. The level of protection in terms of EN cut resistance is preferably EN-2 or above, in other embodiments EN-4 or above, and in other embodiments EN-5 or EN-6.
- In certain embodiments, the tamperproof sack is made from a single unperforated piece of material. For example, the single unperforated piece of material may be a tube. The cross-sectional shape of the tube is not particularly limited, and may be circular, oval, rectangular, or the like. The tube may be formed by weaving the material on a circular loom. The single unperforated material may also be a sheet in certain embodiments, where the sheet is later adhered to itself to form the tamperproof sack.
- In other embodiments, the tamperproof sack is made from multiple pieces of material adhered to each other to form the tamperproof sack. For example 2, 3, 4, or more pieces of material may be adhered to each other so as to form the tamperproof sack.
- In certain embodiments, it may be necessary to perforate the material to, for example, sew it to other materials or to itself. In instances where it is necessary to perforate the tamperproof sack, it is preferable that the perforations do not cause a structural weakness in the tamperproof sack that would permit someone to open the bag in an unauthorized manner (such as by cutting into it, tearing the tamperproof sack, or entering the tamperproof sack by any means other than the opening through which the interior of the bag is intended to be accessed). For example, if the material used to make the tamperproof sack is sewn at any point, it is preferable that the sewing is located on the interior of the bag so that it is not exposed to the outside world. Preferably, all perforations are located only on the interior of the tamperproof sack, and no perforations are located on the exterior of the tamperproof sack.
- If the tamperproof sack contains stitching, the stitching may be made from any suitable material. However, it is preferred that the stitching is made from a material that is tamperproof. In certain embodiments, the stitching is made from the same material as the tamperproof sack. It is preferred that the stitching have an EN or ANSI cut rating at least as high as the material used to make the tamperproof sack.
- The material used to make the tamperproof sack is preferably bonded to itself or other materials using non-perforating methods, such as adhesives, zip ties of various materials (including metal and those made from the same material as the tamperproof sack), clamps, tapes, heat sealing, lamination, or other known methods. In one embodiment, any non-perforating means of sealing the tamperproof sack is located only on the interior of the tamperproof sack, and no non-perforating means of sealing the tamperproof sack are located on the exterior of the tamperproof sack. In another embodiment, a non-perforating means of sealing at least one end of the tamperproof sack comprises using a non-perforating method (such as a zip tie or heat seal) to bind one end of a tube of material, where the material is then flipped outside-in such that the sealing means is located on the interior of the tamperproof sack, thus forming a closed end of the tamperproof sack.
- In certain embodiments, the tamperproof sack is stitch-free. In other embodiments, the tamperproof bag does not have any perforations. In still other embodiments, the tamperproof bag contains no holes or perforations on its exterior.
- The size of the tamperproof sack is not particularly limited, and may be dictated by the size of the items that one desires to keep inside of it. Where the tamperproof sack is shaped like a tube, the tube may be, for example, from 0.1-6 feet long. However, for uses that are larger, the tube may be anywhere from 1-60 feet or longer. The diameter of the tube is also not particularly limited, and may be, for example, anywhere from 0.1 feet to 20 feet or more. For example, if the tamperproof sack were to be used to protect a load on a semitruck, the tamperproof sack could be 10-60 feet long and 3-12 feet or more in diameter.
- In certain embodiments, the tamperproof sack may be envisioned as having a closed end and an open end. The closed end may be referred to as the bottom of the tamperproof sack, and the open end may be referred to as the opening or the top of the tamperproof sack. The closed end is sealed as discussed herein, and materials to be stored in the tamperproof sack enter and exit the tamperproof sack through the opening.
- In one embodiment, the opening of the tamperproof sack is closed using a drawstring held in place at the top, or opening, of the tamperproof sack. The drawstring may be kept in place by a perforating method or a non-perforating method such as those listed above. In certain embodiments, the drawstring is kept in place by a sleeve stitched around the opening of the tamperproof sack. In other embodiments, the drawstring is kept in place by a sleeve formed around the opening of the tamperproof sack via heat sealing or an adhesive.
- In certain embodiments, the tamperproof sack may be locked in a closed position by using a clamp to keep the opening of the tamperproof bag closed. The clamp may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein. The clamp in certain embodiments may be integrally formed with the lock.
- In certain embodiments, the tamperproof sack may be locked in a closed position by using a zip tie to keep the opening of the tamperproof bag closed. The zip tie may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein. The zip tie in certain embodiments may be integrally formed with the lock.
- In certain embodiments, the lock may be integrally formed with either the strap or the tamperproof sack.
- The material that may be protected or stored in the tamperproof sack is not particularly limited and may include packages and other items that may be sent via mail. In other embodiments, the material that may be protected or stored in the tamperproof sack may be material that is abrasive or sharp, where the tamperproof bag provides protection to the user. Such material may include medical products (such as needles and the like), bulk cargo, plastic pellets, metal, glass, scrap, waste, and the like. In other embodiments, the material that may be protected or stored in the tamperproof sack may be a commodity, such as corn or wheat.
- In certain embodiments, the tamperproof sack may be used as a method to transport cargo. For example, a large filled tamperproof sack may be transported via truck or ship.
- The present disclosure also relates to methods of preventing the unauthorized removal of items from the tamperproof sack. Such methods may include the steps of filling the tamperproof sack as noted above and securing the tamperproof sack to a fixed object as noted above. The step of securing the tamperproof sack to a fixed object may include the use of a lock and locking the tamperproof sack to a fixed object. The method may further include informing an authorized user of a method by which to un-secure or open the tamperproof sack from the fixed object, and the subsequent un-securing of the tamperproof sack from the fixed object or opening of the tamperproof sack by the authorized user. The step of informing the authorized user of the method by which to un-secure or open the tamperproof sack from the fixed object is not particularly limited and may be any method known in the art, including but not limited to verbally or non-verbally (such as via an electronic communication) informing the authorized user of a combination to the lock.
- The present disclosure also relates to a method of delivering objects, where the method includes an authorized user opening the tamperproof sack, inserting an object into the tamperproof sack, and then closing the tamperproof sack. The tamperproof sack prior to the delivery may or may not be secured to a fixed object. In instances where the tamperproof sack is secured to a fixed object prior to delivery, the step of opening the tamperproof sack may not require the tamperproof sack to be un-secured from the fixed object. In instances where the tamperproof sack is not secured to a fixed object prior to delivery, the authorized user may then secure the tamperproof sack to a fixed object either before or after inserting the object into the tamperproof sack. The step of closing the tamperproof sack may include a step of locking the tamperproof sack or another method as disclosed herein.
- The present disclosure also relates to a method of secure transportation of an object from a first location to a second location. The method may include inserting an object into a tamperproof sack at a first location, closing the tamperproof sack such that only an authorized user may open it, and then transporting it to a second location. In alternative embodiments, the closing of the tamperproof sack may occur at the second location. The tamperproof sack may then be secured to a fixed object at the second location such that an authorized user could open or un-secure the tamperproof sack at the second location. In certain embodiments, an authorized user at a second location may open the tamperproof bag and remove the object from the tamperproof bag.
- The method of secure transportation of an object from a first location to a second location may also include one or more of the steps and methods disclosed above relating to a method of delivering objects and/or preventing the unauthorized removal of items from the tamperproof sack.
- As used herein, an authorized user is a person or entity that has permission from the owner or originator of the tamperproof sack to open, close, or otherwise use as described herein the tamperproof sack. The authorized user in most instances will be informed of a method by which to open or close the tamperproof sack without cutting or otherwise damaging the tamperproof sack. This information may be provided by the owner of the tamperproof sack or another person or entity permitted by the owner. For example, if the tamperproof sack is used to receive packages from a certain company, for example, Amazon®, the authorized user may be an Amazon® delivery person who has received instructions on how to open the tamperproof sack from either Amazon® (at the permission of the owner of the tamperproof sack) or the owner of the tamperproof sack, so as to deliver a package into the tamperproof sack. A second, usually different, authorized user may then open the tamperproof package after delivery so as to retrieve the delivered object.
- It should be understood that the exemplary embodiments described herein should be considered in a descriptive sense only and not for purposes of limitation. Descriptions of features or aspects within each exemplary embodiment should typically be considered as available for other similar features or aspects in other exemplary embodiments. For example, the
drawstring 110 shown inFIG. 2A can also be used in the tamperproof sack system 400 (FIG. 4A ) or the tamperproof sack system 500 (FIG. 5 ). Also, althoughFIG. 4A illustrates asingle zipper 440, multiple zippers can be used in various configurations. Moreover, although the exemplary embodiments shown inFIGS. 1A, 1B, and 4A illustrate the temporary sack systems as being fastened to adoor 101, the temporary sack systems can also be fastened to other objects as well, e.g., windows, trees, fences, etc. Also, according to certain exemplary embodiments, it may be desirable to fasten thetamperproof sack system 100 to a fixture or anchored object located outside (e.g., a tree), in which case thestrap fastener 122 can be modified so that the strap fastener is also locked by thelock 130. For example, thestrap fastener 122 may have holes formed therein through which theshackle 132 can pass, or may have separate attachment devices that can be locked in place by theshackle 132. As a result, the entiretamperproof sack system 100 can be safely and securely left outside. - While one or more exemplary embodiments have been described with reference to the figures, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope as defined by the following claims.
Claims (20)
1. A tamperproof sack system to securely contain a package, the tamperproof sack system comprising:
a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack comprising:
a body having a bottom side and a top side opposite, wherein the body defines an interior configured to house a package therein; and
an opening portion formed in the top side, the opening portion being configured to opened and closed;
wherein the predetermined cut-resistance standard is European Standard EN-2 or above.
2. The tamperproof sack system according to claim 1 , further comprising:
a strap configured to affix the tamperproof sack to a fixed object; and
a lock.
3. The tamperproof sack system according to claim 2 , wherein the fixed object is a door.
4. The tamperproof sack system according to claim 2 , wherein the door strap is made of the same type of material as the body.
5. The tamperproof sack system according to claim 4 , wherein the strap is integrally formed with the body.
6. The tamperproof sack system according to claim 1 , wherein the body is made from a material selected from the group consisting of one or more of high performance polyethylene, ultra-high molecular weight polyethylene, para-aramid, polyvinyl acetate, polyvinyl acetate yarn, steel wire, metal fiber, and fiberglass yarn, or combinations thereof.
7. The tamperproof sack system according to claim 6 , wherein the body is made from ultra-high molecular weight polyethylene.
8. The tamperproof sack system according to claim 1 , wherein the body is made from a single unperforated piece of material.
9. The tamperproof sack system according to claim 8 , wherein the single unperforated piece of material is a single unperforated piece of ultra-high molecular weight polyethylene.
10. The tamperproof sack system according to claim 1 , further comprising:
a drawstring affixed to the opening portion and configured to open and close the opening portion; and
a zip tie configured to keep the opening portion of the tamperproof bag closed.
11. The tamperproof sack system according to claim 1 , wherein the body does not comprise perforations or holes other than the opening portion.
12. The tamperproof sack system according to claim 1 , wherein the predetermined cut-resistance standard is European Standard EN-3 or above.
13. The tamperproof sack system according to claim 1 , wherein the predetermined cut-resistance standard is European Standard EN-4 or above.
14. The tamperproof sack system according to claim 1 , wherein the body is 0.1 to 6 feet long.
15. The tamperproof sack system according to claim 1 , wherein the body is 6 to 60 feet long.
16. A method of preventing the unauthorized removal of items from the tamperproof sack system according to claim 1 , the method comprising steps of:
filling the tamperproof sack;
attaching the tamperproof sack to a fixed object; and
informing an authorized user of a method by which to open the tamperproof sack or detach the tamperproof sack from the fixed object.
17. The method according to claim 16 , further comprising a step of opening of the tamperproof sack by the authorized user.
18. A method of delivering objects, the method comprising steps of, in order:
a first authorized user accessing the tamperproof sack system according to claim 1 and opening the tamperproof sack,
inserting an object into the tamperproof sack, and
closing the tamperproof sack.
19. The method according to claim 18 , further comprising, after the step of closing the tamperproof sack, a step of a second authorized user opening the tamperproof sack.
20. The method according to claim 18 , further comprising a step of securing the tamperproof sack to a fixed object either before or after the step of inserting the object into the tamperproof sack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/990,095 US20230157472A1 (en) | 2021-11-19 | 2022-11-18 | Tamperproof sack system for home package deliveries |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202163281266P | 2021-11-19 | 2021-11-19 | |
US17/990,095 US20230157472A1 (en) | 2021-11-19 | 2022-11-18 | Tamperproof sack system for home package deliveries |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230157472A1 true US20230157472A1 (en) | 2023-05-25 |
Family
ID=86384734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/990,095 Abandoned US20230157472A1 (en) | 2021-11-19 | 2022-11-18 | Tamperproof sack system for home package deliveries |
Country Status (1)
Country | Link |
---|---|
US (1) | US20230157472A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220233010A1 (en) * | 2014-04-17 | 2022-07-28 | Kumar SUNDARESAN | Systems and Methods to Enable Secure Exchange of Goods in Package Receptacles, and Remote Monitoring and Control of Package Receptacles and Its Surroundings |
US20230124995A1 (en) * | 2020-03-03 | 2023-04-20 | Renzhi Yu | Contactless express-item delivery bag |
US11854322B1 (en) * | 2022-07-28 | 2023-12-26 | Dell Products L.P. | Smart sustainable packaging system and process |
US11944217B1 (en) * | 2023-07-25 | 2024-04-02 | 2414227 Alberta Ltd. | Anti-theft package delivery apparatus and system |
US20240197097A1 (en) * | 2022-12-20 | 2024-06-20 | Lane Gregory | Reinforced Delivery Bag System and Methods of Delivering Packages Using the System |
US12133604B2 (en) * | 2022-09-16 | 2024-11-05 | Gerald Courtney | Secured receptacle for delivery packages |
US12262832B1 (en) * | 2022-12-12 | 2025-04-01 | Tommy C. Lipps, Jr. | Package delivery strongbox |
Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4785960A (en) * | 1987-02-05 | 1988-11-22 | Brice Belisle | Mailbox security bag |
CA2220810A1 (en) * | 1997-11-13 | 1999-05-13 | John Howard | Delivery protection container |
US20100085148A1 (en) * | 2006-11-16 | 2010-04-08 | Andrew Edward Nesling | Delivery container |
US20120269461A1 (en) * | 2011-04-19 | 2012-10-25 | Proctor Harry G | Security receptacle for packages |
US20130077896A1 (en) * | 2011-09-28 | 2013-03-28 | Gloria Selena Wiley | Secure Unattended Delivery Apparatus |
US20180162612A1 (en) * | 2016-12-14 | 2018-06-14 | George Bojic | Secure Storage Bag |
US20180202199A1 (en) * | 2017-01-19 | 2018-07-19 | John Critz | Novel Lockable Security Receptacle for Delivered Packages |
US20180228311A1 (en) * | 2017-02-14 | 2018-08-16 | Spectrum Brands, Inc. | Package Delivery Securement Device |
US10143320B1 (en) * | 2018-02-13 | 2018-12-04 | John R. Batts | Package locking system |
US20190038062A1 (en) * | 2014-04-17 | 2019-02-07 | Kumar SUNDARESAN | Methods, apparatus and systems for accepting, returning or exchanging parcels and deliveries |
US20190104876A1 (en) * | 2017-10-10 | 2019-04-11 | James Loures | Improved Package Receptacle and Theft Deterrent Device and System |
US10282951B1 (en) * | 2018-06-14 | 2019-05-07 | Thomas A. Kulick | Electrical continuity unattended package security apparatus and method of operation |
US20190133362A1 (en) * | 2017-11-08 | 2019-05-09 | Zyland NG, LLC | Systems and method for package retention |
US20190223644A1 (en) * | 2018-01-19 | 2019-07-25 | Jeffrey B. Hopp | Expandable, locking bag to prevent delivered packages from being stolen |
US20190231104A1 (en) * | 2018-01-31 | 2019-08-01 | David Kirk Dunkelberger | Secure delivery receptacle |
US20190246828A1 (en) * | 2018-02-12 | 2019-08-15 | Jorge Miller | Door Hanging Foldable and Detachable Mailbox |
US20190269268A1 (en) * | 2018-03-02 | 2019-09-05 | Mail Bag Receiving and Protection System, LLC | Apparatus for securing a package |
US20200015617A1 (en) * | 2018-07-12 | 2020-01-16 | Maxiocio, S.L. | Device for securely receiving a package and method of package delivery comprising the use of said device |
US20200060460A1 (en) * | 2018-08-22 | 2020-02-27 | Dynamis Solutions, Inc. | Shipped parcel secure receipt system |
US10842305B1 (en) * | 2019-10-29 | 2020-11-24 | German Alcolea | Package-securing device |
US20210045563A1 (en) * | 2019-08-16 | 2021-02-18 | Donna Bartley-Clark | Securable delivery container for temporarily securely storing deliveries and limiting access |
US20220183491A1 (en) * | 2020-12-16 | 2022-06-16 | Mitchell Cooper | Parcel Security Assembly |
US20220233010A1 (en) * | 2014-04-17 | 2022-07-28 | Kumar SUNDARESAN | Systems and Methods to Enable Secure Exchange of Goods in Package Receptacles, and Remote Monitoring and Control of Package Receptacles and Its Surroundings |
US11412876B1 (en) * | 2017-03-02 | 2022-08-16 | Thomas E Kadlub | Packaged delivery theft prevention system and method of use |
US20220395124A1 (en) * | 2021-06-15 | 2022-12-15 | Ismail Meddah | Apparatus and method for securing delivered packages |
US20230029102A1 (en) * | 2019-11-19 | 2023-01-26 | Alexander John de Jonge | Apparatus for receiving and storing delivered articles |
US20230322456A1 (en) * | 2022-03-22 | 2023-10-12 | Manuel Parks | Systems and methods to secure delivery of products |
US20240090693A1 (en) * | 2022-09-16 | 2024-03-21 | Gerald Courtney | Secured Receptacle for Delivery Packages |
US11944217B1 (en) * | 2023-07-25 | 2024-04-02 | 2414227 Alberta Ltd. | Anti-theft package delivery apparatus and system |
-
2022
- 2022-11-18 US US17/990,095 patent/US20230157472A1/en not_active Abandoned
Patent Citations (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4785960A (en) * | 1987-02-05 | 1988-11-22 | Brice Belisle | Mailbox security bag |
CA2220810A1 (en) * | 1997-11-13 | 1999-05-13 | John Howard | Delivery protection container |
US20100085148A1 (en) * | 2006-11-16 | 2010-04-08 | Andrew Edward Nesling | Delivery container |
US20120269461A1 (en) * | 2011-04-19 | 2012-10-25 | Proctor Harry G | Security receptacle for packages |
US20130077896A1 (en) * | 2011-09-28 | 2013-03-28 | Gloria Selena Wiley | Secure Unattended Delivery Apparatus |
US20220233010A1 (en) * | 2014-04-17 | 2022-07-28 | Kumar SUNDARESAN | Systems and Methods to Enable Secure Exchange of Goods in Package Receptacles, and Remote Monitoring and Control of Package Receptacles and Its Surroundings |
US20190038062A1 (en) * | 2014-04-17 | 2019-02-07 | Kumar SUNDARESAN | Methods, apparatus and systems for accepting, returning or exchanging parcels and deliveries |
US20180162612A1 (en) * | 2016-12-14 | 2018-06-14 | George Bojic | Secure Storage Bag |
US20180202199A1 (en) * | 2017-01-19 | 2018-07-19 | John Critz | Novel Lockable Security Receptacle for Delivered Packages |
US20180228311A1 (en) * | 2017-02-14 | 2018-08-16 | Spectrum Brands, Inc. | Package Delivery Securement Device |
US11412876B1 (en) * | 2017-03-02 | 2022-08-16 | Thomas E Kadlub | Packaged delivery theft prevention system and method of use |
US20190104876A1 (en) * | 2017-10-10 | 2019-04-11 | James Loures | Improved Package Receptacle and Theft Deterrent Device and System |
US11330927B2 (en) * | 2017-10-10 | 2022-05-17 | James Loures | Package receptacle and theft deterrent device and system |
US10653261B2 (en) * | 2017-10-10 | 2020-05-19 | James Loures | Package receptacle and theft deterrent device and system |
US20190133362A1 (en) * | 2017-11-08 | 2019-05-09 | Zyland NG, LLC | Systems and method for package retention |
US20190223644A1 (en) * | 2018-01-19 | 2019-07-25 | Jeffrey B. Hopp | Expandable, locking bag to prevent delivered packages from being stolen |
US10537197B2 (en) * | 2018-01-19 | 2020-01-21 | Jeffrey B. Hopp | Expandable, locking bag to prevent delivered packages from being stolen |
US20190231104A1 (en) * | 2018-01-31 | 2019-08-01 | David Kirk Dunkelberger | Secure delivery receptacle |
US10869570B2 (en) * | 2018-01-31 | 2020-12-22 | David Kirk Dunkelberger | Secure delivery receptacle |
US20190246828A1 (en) * | 2018-02-12 | 2019-08-15 | Jorge Miller | Door Hanging Foldable and Detachable Mailbox |
US10682002B2 (en) * | 2018-02-12 | 2020-06-16 | Jorge Miller | Door hanging foldable and detachable mailbox |
US10143320B1 (en) * | 2018-02-13 | 2018-12-04 | John R. Batts | Package locking system |
US20190269268A1 (en) * | 2018-03-02 | 2019-09-05 | Mail Bag Receiving and Protection System, LLC | Apparatus for securing a package |
US10282951B1 (en) * | 2018-06-14 | 2019-05-07 | Thomas A. Kulick | Electrical continuity unattended package security apparatus and method of operation |
US20200015617A1 (en) * | 2018-07-12 | 2020-01-16 | Maxiocio, S.L. | Device for securely receiving a package and method of package delivery comprising the use of said device |
US20200060460A1 (en) * | 2018-08-22 | 2020-02-27 | Dynamis Solutions, Inc. | Shipped parcel secure receipt system |
US20210045563A1 (en) * | 2019-08-16 | 2021-02-18 | Donna Bartley-Clark | Securable delivery container for temporarily securely storing deliveries and limiting access |
US10842305B1 (en) * | 2019-10-29 | 2020-11-24 | German Alcolea | Package-securing device |
US20230029102A1 (en) * | 2019-11-19 | 2023-01-26 | Alexander John de Jonge | Apparatus for receiving and storing delivered articles |
US20220183491A1 (en) * | 2020-12-16 | 2022-06-16 | Mitchell Cooper | Parcel Security Assembly |
US20220395124A1 (en) * | 2021-06-15 | 2022-12-15 | Ismail Meddah | Apparatus and method for securing delivered packages |
US11889937B2 (en) * | 2021-06-15 | 2024-02-06 | Ismail Meddah | Apparatus and method for securing delivered packages |
US20230322456A1 (en) * | 2022-03-22 | 2023-10-12 | Manuel Parks | Systems and methods to secure delivery of products |
US20240090693A1 (en) * | 2022-09-16 | 2024-03-21 | Gerald Courtney | Secured Receptacle for Delivery Packages |
US11944217B1 (en) * | 2023-07-25 | 2024-04-02 | 2414227 Alberta Ltd. | Anti-theft package delivery apparatus and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220233010A1 (en) * | 2014-04-17 | 2022-07-28 | Kumar SUNDARESAN | Systems and Methods to Enable Secure Exchange of Goods in Package Receptacles, and Remote Monitoring and Control of Package Receptacles and Its Surroundings |
US20230124995A1 (en) * | 2020-03-03 | 2023-04-20 | Renzhi Yu | Contactless express-item delivery bag |
US11854322B1 (en) * | 2022-07-28 | 2023-12-26 | Dell Products L.P. | Smart sustainable packaging system and process |
US12133604B2 (en) * | 2022-09-16 | 2024-11-05 | Gerald Courtney | Secured receptacle for delivery packages |
US12262832B1 (en) * | 2022-12-12 | 2025-04-01 | Tommy C. Lipps, Jr. | Package delivery strongbox |
US20240197097A1 (en) * | 2022-12-20 | 2024-06-20 | Lane Gregory | Reinforced Delivery Bag System and Methods of Delivering Packages Using the System |
US11944217B1 (en) * | 2023-07-25 | 2024-04-02 | 2414227 Alberta Ltd. | Anti-theft package delivery apparatus and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230157472A1 (en) | Tamperproof sack system for home package deliveries | |
US10180016B2 (en) | Lockable security receptacle for delivered packages | |
US9926108B2 (en) | Secure unattended delivery apparatus | |
US9932764B2 (en) | Flexible vault | |
US20200260897A1 (en) | Package Receptacle and Theft Deterrent Device and System | |
US8910679B2 (en) | Theft protectable carrying bag in particular for portable computers | |
US20190133362A1 (en) | Systems and method for package retention | |
US20100243114A1 (en) | Cut-proof anti-theft bag construction | |
US12133604B2 (en) | Secured receptacle for delivery packages | |
US20240197097A1 (en) | Reinforced Delivery Bag System and Methods of Delivering Packages Using the System | |
WO2004002259A2 (en) | Security bag | |
US7322476B2 (en) | Game ball bag | |
US12193585B2 (en) | Apparatus for receiving and storing delivered articles | |
CN110913721A (en) | Handbag with protection and safety features | |
US10273740B2 (en) | Portable safe | |
US10863844B2 (en) | Apparatus for deterring theft of packages | |
GB2369990A (en) | Luggage with security fittings. | |
AU2021104750A4 (en) | Apparatus for Receiving and Storing Delivered Articles | |
AU2005101082A4 (en) | A backpack | |
US20230211926A1 (en) | Anti-theft delivery bag | |
US20140193103A1 (en) | Lockable Bag with Secure Mounting Means | |
AU2015101543A4 (en) | Anti-theft bag | |
CN2674924Y (en) | Built-in anti-theft protecting bag for portable bag | |
WO2013079890A1 (en) | Bag security | |
WO2013005131A1 (en) | Anti-theft device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: JANUS LLC, LOUISIANA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARKMAN, MICHAEL;WAGNER, EMILE HUGH;REEL/FRAME:061825/0472 Effective date: 20221117 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |