Methods, Apparatus and Systems for Accepting, Returning or Exchanging Parcels and Deliveries
20170055751 ยท 2017-03-02
Inventors
Cpc classification
A47G29/20
HUMAN NECESSITIES
A47G2029/147
HUMAN NECESSITIES
E05B2047/0094
FIXED CONSTRUCTIONS
A47G29/141
HUMAN NECESSITIES
E05B2047/0095
FIXED CONSTRUCTIONS
E05B47/0001
FIXED CONSTRUCTIONS
E05B73/0011
FIXED CONSTRUCTIONS
E05B45/005
FIXED CONSTRUCTIONS
A47G2029/144
HUMAN NECESSITIES
International classification
A47G29/124
HUMAN NECESSITIES
E05B1/00
FIXED CONSTRUCTIONS
A47G29/20
HUMAN NECESSITIES
E05B73/00
FIXED CONSTRUCTIONS
E05B47/00
FIXED CONSTRUCTIONS
A47G29/122
HUMAN NECESSITIES
Abstract
This invention involves a novel method, device, system and apparatus to receive, return or exchange parcels securely. The invention involves a novel security apparatus and one or more parcel receptacles. The novel security apparatus can be securely connected to an object such as a door knob or door handle or door knockers or door or any object to which my security apparatus can be securely connected. The parcel receptacles can be of many types. The locking mechanism in the security apparatus and on the parcel receptacle can be of technological in nature using the latest advancements in wireless technology, or alternatively, involve simple physical lock and key mechanisms. The apparatus allows access to parcels to authenticated users only, and involve many safety features including an audible alarm and other tamper-proof mechanisms to ensure safety of parcels.
Claims
1. A system for securely receiving, returning or exchanging a parcel comprising: a. a security attachment having a locking mechanism configured in the security attachment, wherein the locking mechanism is configured to lock the attachment to a fixed location; and b. a parcel receptacle connected to the security attachment.
2. The system as recited in claim 1, wherein the fixed location is selected from a group consisting of doorknob, door handle, door knockers, door, or any immovable object to which the attachment can be securely connected.
3. The system of claim 1, further comprising an unlocking mechanism integrated with the locking mechanism configured to release the security attachment from the fixed location.
4. The system as recited in claim 3, wherein the locking mechanism and the unlocking mechanism are selected from a group consisting of a physical lock and key solution, an electrically-powered lock/unlock solution, a combination lock, an RFID-based solution, a bluetooth-based solution, a Wi-Fi-based solution, a mobile-app based solution, a wireless solution and a NFC-based solution.
5. The system of claim 1, further comprising a parcel locking mechanism attached to the parcel receptacle, wherein the parcel locking mechanism is configured to lock and prevent the parcel receptacle from opening; and a parcel unlocking mechanism integrated with the parcel locking mechanism configured to unlock the parcel locking mechanism and allow the parcel receptacle to open.
6. The system as recited in claim 1, further including an audible alarm connected to the system that sounds to deter any unauthorized tampering of the security attachment or the parcel receptacle.
7. The system as recited in claim 1, wherein said parcel receptacle further comprises a mechanism to keep parcels inside cold and refrigerated.
8. The system as recited in claim 1, wherein the security attachment is capable of expanding and contracting about the fixed location to decrease likelihood of unauthorized removal of the security attachment from the fixed location.
9. The system as recited in claim 1, wherein said parcel receptacle is configured to expand or contract in size.
10. A method for securely receiving, returning or exchanging a parcel, comprising: a. providing a security apparatus configured to securely connect to an object; b. providing a parcel receptacle; and c. providing a connection mechanism for connecting the security apparatus to the object, and connecting the parcel receptacle to the security apparatus.
11. The method as recited in claim 10, wherein the parcel receptacle further comprises a locking mechanism configured to prevent the opening of the parcel receptacle by an unauthorized individual.
12. The method as recited in claim 10, wherein the security apparatus can be connected to the object, and disconnected from the object only by authorized individuals.
13. The method as recited in claim 10, wherein the object includes doorknob or door handle or door knockers or door or any object to which said security apparatus can be securely connected.
14. The method as recited in claim 10, wherein said connection mechanism and security apparatus are integrated in said parcel receptacle, and said parcel receptacle is configured to connect directly to said object.
15. A device for securely receiving, returning or exchanging a parcel, comprising: a. a parcel receptacle; b. said parcel receptacle connected to a security apparatus using a connection mechanism; and c. said security apparatus connected to an object.
16. The device as recited in claim 15, wherein the object is selected from a group consisting of doorknob, door handle, door knockers, door, or any immovable object to which the security apparatus can be securely connected.
17. The device for securely receiving, returning or exchanging a parcel, as recited in claim 15, further comprising a locking mechanism, said locking mechanism is configured to lock the security apparatus to the object so that the security apparatus cannot be removed from the object, and an unlocking mechanism integrated with the locking mechanism so that the security apparatus can be released from the object.
18. The device as recited in claim 17, wherein the locking mechanism and the unlocking mechanism selected from the group consisting of a physical lock and key solution, an electrically-powered lock/unlock solution, a combination lock, an RFID-based solution, a bluetooth-based solution, a Wi-Fi-based solution, a mobile-app based solution, a wireless solution and a NFC-based solution.
19. The device as recited in claim 15, further comprising an alarm and a speaker, said alarm operatively triggering the speaker when the security apparatus or parcel receptacle is attempted to be tampered.
20. The device for securing a parcel as recited in claim 15, wherein the security apparatus or the parcel receptacle further comprises a camera, said camera configured to collect data.
21. The device as recited in 20, wherein, said data is stored in internet cloud, said internet cloud configured to collect or distribute or share data between authenticated devices and authenticated users.
22. The device as recited in claim 20, wherein said camera is configured to scan codes, said codes selected from a group consisting of QR codes and barcodes and UPC codes.
23. The device as recited in claim 20, wherein said data is configured to be transmitted via wired or wireless mechanism.
24. The device for securely receiving, returning or exchanging a parcel as recited in claim 15, wherein said security apparatus further comprises a finger print reader to capture finger print, said captured finger print configured to authenticate individuals.
25. The device for securely receiving, returning or exchanging a parcel as recited in claim 15, wherein said security apparatus further comprises a text display, said text display selected from a group consisting of lock/unlock status and alerts and battery levels and messages.
26. The device as recited in claim 25, wherein, the text display is configured to display codes; said codes configured for multiple purposes, said purposes comprising delivery authentications and for providing access to lock and unlock said security apparatus.
27. The device for securely receiving, returning or exchanging a parcel as recited in claim 15, wherein said security apparatus further comprises a battery to power locking and unlocking mechanisms and electrical and electronics hardware in the security apparatus.
28. The device for securely receiving, returning or exchanging a parcel as recited in claim 15, wherein the secure apparatus or the parcel receptacle further comprises a GPS module, said GPS module configured to be activated remotely.
29. The device as recited in claim 26, wherein, said codes, upon authentication, operatively control locking and unlocking mechanisms of said parcel receptacles.
30. A system for securely receiving, returning or exchanging a parcel comprising: a. an attachment having a locking mechanism integrated with the attachment, wherein the locking mechanism is configured to secure the attachment; and b. a parcel receptacle connected to the attachment.
Description
DESCRIPTION OF THE DRAWINGS
[0005] The invention can be better explained and illustrated by reference to several Figures included herein. For ease of understanding, visualization and explanation, significant number of parts and components are numbered and referenced in many of the included Figures. These numbered parts and components are described and explained in great detail in Table 1 in a sequential fashion for ease of reference. In addition, the numbered parts and components are explained where appropriate in other relevant sections of this application also.
[0006]
[0007]
[0008]
[0009] For the purposes of this invention, the word cable as used anywhere in this document denotes a generic component member made of metal or non-metal, of sufficient strength, flexibility and characteristics to suit the intended application. The word cable could refer to a rope or chain or cable, of any suitable material. And some portions of the cable can be rigid and some portions can be flexible, and non-rigid. The cable when used around a doorknob shall have flexibility, strength and characteristics so as to form a tight loop around the doorknob so that no unauthorized individual is able to tamper or remove.
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035] It should be noted that all the parts and components of my security apparatus and parcel receptacle can be modified in a significant number of ways to fulfill the intended purposes of the invention without departing from the spirit and scope of the invention, and the design presented herein is a typical example to explain the features and functionality in a conceptual manner, and the designs shall not interpreted to limit the configurations or designs as shown only.
EMBODIMENT 1
Typical Operation on a Circular Doorknob to Receive Parcels
[0036] An example of a typical use of an embodiment is described below to help in understanding the application of this invention. This scenario is to provide a general understanding of a typical application and operation. It should be noted, that any real-world applications of the various embodiments can be significantly broader, and should not be limited to the application or operation described in this section. In addition, there are features of various embodiments, some of which could be optional in nature, (for example an electronic solution involving technologies such as RFID, Bluetooth, Wi-Fi, mobile phone based applications, NFC and other wireless solutions), which could involve steps that are slightly different when compared to the steps of using a non-electronic or physical mechanism that involve a manual lock and key solution described herein. For the sake of brevity, and to avoid over complication of explanations by compounding all possible permutations and combinations of optional features, those optional features or procedures may not be explained or described adequately in this section. However, several electronic parts and components are shown in multiple figures, and for anyone familiar with the art, operation of those electronic or wireless components is fairly straight-forward and can be inferred by careful analysis and review of all parts and components mentioned or described in this document.
Use of a Circular Doorknob Security Apparatus [FIG. 2A Through FIG. 6E]:
[0037] There are 3 specific events that potentially take place while implementing the various embodiments to fulfill one's objective of receiving a parcel or delivery securely, and to eliminate or reduce the risk of losing one's parcel due to theft in front of one's front door. They are as follows: [0038] 1. Event 1A: Actions of a parcel recipient or owner associated with setting up a security apparatus and parcel receptacle in front of one's apartment or place of stay to enable the receipt of parcel. [0039] 2. Event 2A: Actions of a mail carrier while delivering, placing and securing the parcel inside the parcel receptacle at the time of delivery. [0040] 3. Event 3A: Actions of the parcel recipient or owner collecting the parcel upon his/her return to his/her residence or business or place of stay.
Event 1A: Setting Up the Parcel Receptacle to Enable Receipt of a Parcel
[0041] The following outlines a typical sequence of steps that are performed: [0042] 1. Take a circular doorknob security apparatus (example
[0054] The parcel receptacle's zipper position (
Event 2A: Receiving Parcel or Deliveries
[0056] When the delivery personnel arrive at the front-door, he/she puts the parcel inside the parcel receptacle (103), and moves the zipper 139 from its open position in
Event 3A: Retrieving Parcel or Package
[0057] Upon return to one's residence, business or place of stay, the parcel recipient can use a key (106 or its electronic or wireless equivalents) or any authorized unlocking mechanism to open the doorknob security apparatus such that the locking pin (
EMBODIMENT 2
Typical Operation on a Straight Doorknob to Receive Parcels
[0058] An example of a typical use of an embodiment is described below to help in understanding the application of this invention. This scenario is to provide a general understanding of a typical application and operation. It should be noted, that any real-world applications of the various embodiments can be significantly broader, and should not limited to the application described in this section. In addition, there are features of various embodiments, some of which are optional in nature, and for sake of brevity, those optional features may not be explained or described in this section, however, those can be inferred by careful analysis and review of already presented operational procedures of various parts and components elsewhere in this document.
Use of a Straight Doorknob Security Apparatus [FIG. 7A Through FIG. 9D]:
[0059] Please refer to
Event 1B: Setting Up the Parcel Receptacle to Enable Receipt of a Parcel
[0063] The following outlines a sequence of steps that can be performed: [0064] 1. Take a straight doorknob security apparatus (example
Event 2B: Receiving Parcel or Deliveries
[0080] This event is very similar to that of Event 2A. Please see the steps described in Event 2A.
Event 3B: Retrieving Parcel or Package
[0081] Upon return to one's residence, business or place of stay, the parcel recipient can use a key (106 or its electronic, electrical or wireless equivalents) or any authorized unlocking mechanism to open the doorknob security apparatus such that the locking pin (
EMBODIMENT 3
Typical Operation on a Door Handle to Receive Parcels
[0082] The typical installation and operation on a door handle to receive parcels is very similar to that of installation and operation of a straight doorknob security apparatus on a straight doorknob. For example, the tip of cable strap latch (
EMBODIMENT 4
Integrated Security Apparatus and Parcel Receptacle
[0083] The pictorial representation and display of figures described so far in these embodiments typically involve a first cable assembly that wraps around a typical doorknob, a security apparatus that is connected to the first cable assembly, a parcel receptacle, and a second cable assembly that connects the security apparatus to the parcel receptacle. The above list of components was convenient to draw pictorially, and was convenient to explain from an operational stand-point. However, it is very important to note, that an embodiment can easily be made wherein the first cable assembly can be integrated within the security apparatus so as to not become a separate component. Additionally, it is also straight forward to extend the geometry of the security apparatus and/or the geometry of the parcel receptacle so as to remove the second cable assembly. In other words, it is very straight forward to configure the security apparatus and parcel receptacle to integrate the purpose and function of the second cable assembly within and structure of the security apparatus and the parcel receptacle themselves, and not contain a second cable assembly separately. So, it is important to note that an embodiment can be made to fulfill the spirit and scope of this invention by use of a security apparatus and a parcel receptacle, without specifically calling out for first or second cable assembly, or for that matter, without requiring any other cables. It is very important to reflect and note these important distinction and points while creating, reviewing and acceptance of my claims.
Other Relevant Operations and Functions
Typical Operation of a Return of a Parcel
[0084] An example of a typical scenario during return of a parcel is described below to help in understanding the application of this invention. This scenario is to provide a general understanding of a typical application and operation. It should be noted, that any real-world applications of the various embodiments can be significantly broader, and should not limited to the application described in this section. In addition, there are features of various embodiments, some of which are optional in nature, and for sake of brevity, those optional features may not be explained or described in this section, however, those can be inferred by careful analysis and review of already presented operational procedures of various parts and components described elsewhere in this document.
[0085] The process of return of a parcel typically involves 2 steps, and they are described as events 1C and 2C below.
Event 1C: Setting Up the Parcel Receptacle to Enable Return of a Parcel
[0086] Connect the security apparatus to the doorknob as described in Event 1A or Event 2A described earlier. Place the parcel to be returned inside a parcel receptacle and lock the parcel receptacle. The parcel receptacle can be locked by a variety of ways depending on the specific embodiment and may involve technological or non-technological, physical solution. Once the parcel receptacle is locked, leave the entire assembly unattended and walk away, and you are ready to return the parcel, and wait for the next event to occur.
Event 2C: Returning a Parcel
[0087] The essential element in this process is to design and establish a way of authentication for the individual belonging to the mail carrier to whom an access to the parcel receptacle needs to be provided. The way of authentication can be of many types. The message pouch can be used as an instrument to communicate to the mail personnel as to how to authenticate themselves. For example, if the parcel receptacle lock is a combination lock, the message could state to enter the last x number of digits of the return material authorization (RMA) to allow access to the parcel receptacle. Another example could be to have the mail carrier scan against the camera, the barcode (UPC, QR code, etc.) that authorizes the return of the parcel, and if that is authenticated successfully, the LCD display (
Typical Operation of an Exchange of a Parcel
[0088] An exchange of a parcel essentially consists of the steps described in a parcel receipt combined with that of a parcel return. Scenarios and sequence of steps involved in a typical parcel receipt and parcel returns are both covered in great detail in those respective sections, and please refer to those sections for an understanding as to how a successful exchange of parcel could be implemented using my invention. Further, the message pouch can be used to communicate to the mail carrier personnel as to what they need to do when they arrive.
Interchangeability of Circular and Straight Doorknob Security Apparatus
[0089] In this patent application,
[0090] It is very important to note that one can easily add a few extra parts or remove a few extra parts and still make this security apparatus functional, and the design and descriptions stated herein is in no way expected to constrain the design or limit the applications to the highly sequential nature of steps described and outlined in this patent application. The design of the present invention may be modified and operated in a variety of configurations without departing from the spirit and scope of the invention. For example, the present invention may be configured in a number of ways in regards to the size, shape, positioning, orientation or materials of the various elements of the invention, and the described design is just one way of fulfilling the objectives of the invention. It is very important to note that one can inject many deviations of the described design to fulfill the intended objectives of the invention, and it is not my intention to limit my application as described only.
Additional Features and Intended Functionalities of Embodiments and Components and their Usage References
[0091] The typical operation of circular and straight doorknob security apparatus as illustrated earlier involved a very basic sequence of steps, and did not highlight many optional features that are expected to be added and integrated with the security apparatus and parcel receptacles. Here is an overview of many features that are to be integrated.
[0092] Doorknobs or Door Handles or Door Knockers or any Stationary Object:
[0093] The various embodiments of the invention described so far involved utilizing doorknobs and/or door handles or door knockers or doors. However, it is important to note that any existing stationary object present at or near a typical front door, that is conducive to be utilized in a meaningful way with the mentioned security apparatus, is expected to be utilized for achieving the intended purposes of this invention. So, when a doorknob or door handle or door knockers or door is referenced, it is understood that any other object, which can potentially be utilized like a doorknob or door handle or door knockers or door, is automatically included for the purposes of this invention, although the words such as any other object may not be referenced explicitly each time.
[0094] Parcel Receptacles:
[0095] The various embodiments of this invention involve utilization of a tamper-proof, weather-resistant, flexible or rigid or semi-rigid parcel receptacle. The parcel receptacle can be either a fixed size or a variable size to fulfill one's need to accommodate various scenarios associated with delivery, return or exchange of parcels. In addition, the parcel receptacles shall have one or more of locking and/or unlocking mechanisms described elsewhere in this application to identify authorized individuals and to facilitate access to the parcel receptacle. Also, in many practical implementations, multiple parcel receptacles may be necessary to receive multiple parcels and deliveries in a given day, and as such, every reference to a single parcel receptacle should automatically be interpreted as a reference to one or more parcel receptacles without requiring to be mentioned specifically as such. Additionally, in order to receive groceries and other goods that are perishable in nature, and that require cool temperature, parcel receptacles can be configured to be refrigerated by dry ice or other appropriate means in order to fulfill the intended use of the application.
[0096] Cable, Chain or Rope References:
[0097] The word cable or chain or rope are referenced a number of times in this application. It is important to note that these words have meanings that are similar and inter-changeable in the context of this application, and these words are not meant to be used in any restrictive manner intentionally or unintentionally. In addition, reference of cable, chain or rope, in general, infer that they are flexible in nature. However, some portions of these cable, chain or rope in our embodiments, need to be configured to be rigid so as to fulfill the purpose of its application in specific designs. So, it is important to note that references to cable, chain or rope are not only meant to be interchangeable in nature, but could also mean to refer to a rigid, semi-rigid or flexible material in nature, and no restrictive meaning is intended to be inferred or derived from their usage or reference. In addition, the reference and use of a first cable to wrap around a doorknob, could also mean usage of a solid, contoured piece of a material to hold a security apparatus to a door knob securely and can actually mean to refer to a coupling assembly rather than a cable assembly. So, in essence, the word cable, chain or rope or their respective assemblies such as cable assemblies mean to infer a way of connection between one component and another component in the embodiments in the context of this invention, and shall not be inferred to be restrictive in their meanings intentionally or unintentionally. All these are cable/rope/chain comments are applicable even in the context of creating a connection mechanism to connect two different parts or components together securely.
[0098] Expandable Chain or Cable or Rope:
[0099]
[0100] Locking and Unlocking Mechanism:
[0101] This is a very essential and important feature of this invention. There are a few places where locking mechanisms are utilized in this invention. First, close to the doorknob or door handle to which a cable or rope or chain mechanism of the security apparatus can be connected. Second, on the parcel receptacle to secure the parcel inside the parcel receptacle to ensure only authorized individuals have access to it. The locking and unlocking mechanism can be a) simple, conventional physical type involving combination locks or traditional locks or can optionally have other embodiments and utilize latest advancement in technologies such as b) RFID, c) Bluetooth d) mobile phone-based applications e) Fingerprint based activation, or f) any wireless based communication such as Near Field Communications (NFCs) protocols and other Wi-Fi and wireless technologies. In addition, the locking and unlocking mechanisms could involve electronically activated solutions such as a solenoid valve driven, electrically-activated locking and unlocking mechanisms. So, it is important to note that any reference to a locking or unlocking mechanism anywhere in this application automatically means the use of one or more of any of these solutions without requiring any specific mention or reference them.
[0102] Intrusion and Audible Alarm:
[0103] The various embodiments can have an intrusion alarm system if the cable or rope or chain is pulled forcefully or if the parcel receptacle and/or lock(s) are attempted to be opened or tampered with. The sound alarm will last for a preset time interval so as to not drain a battery or any source of energy and at the same time deter unauthorized person from continuing their intrusion or tampering. This can be an embodiment where additional security is desired in certain locations or applications. An additional embodiment is also to have a feature where the decibel level of the sound and time duration of the alarm can be adjusted.
[0104] Motion Sensor, Camera and Video:
[0105] To enhance usefulness of the product of our invention, a camera system can be configured to capture activities associated with various scenarios and events that occur while the system functions to fulfill its intended use. The camera system can be configured to capture pictures or videos of activities in and around its place of operation to enable monitoring and/or controlling and/or recording of activities. The camera system can be configured to be equipped with a motion sensor that is expected to trigger capturing of activities when there is any motion or tampering of the system, or when a record-worthy event occurs near the device. There are many record-worthy scenarios during which the camera and video recording can be configured to be used and not all scenarios can be adequately covered or explained in this application, but here are some common examples and scenarios during which the camera can capture activities. For example, the camera system can capture pictures or videos when a delivery personnel approach to deliver a parcel. The camera can capture when a customer or recipient intends to return a parcel and when a carrier personnel approach to retrieve the parcel from the parcel receptacle. The camera can capture when there is any movement near the vicinity of the security apparatus when such movement is expected, or unexpected or suspicious. The camera could also capture when there is any unexpected jerk or tampering of any of the components of the system/apparatus. The pictures and videos can be configured to be either stored, or communicated wirelessly or streamed instantaneously depending on the scenario.
[0106] In addition, camera can be configured to be used like a scanner to trigger various actions. For example, such actions could include monitoring or controlling of the locking and unlocking mechanisms of the security apparatus and/or parcel receptacle. For example, when a carrier scans the tracking number or order number, the camera can be configured to enable such scan, and if such parcel is expected or authenticated, allow unlocking of the parcel receptacle to enable placement of the parcel inside the parcel receptacle. In addition, integration of quick response (QR) codes or Universal Product Codes (UPCs), or other forms of barcodes with the camera scanning can be configured to monitor and control the locking and unlocking of the parcel receptacles. In appropriate cases, upon authentication, such actions can be configured to be integrated with the digital displays to communicate messages, alerts and codes.
[0107] Notifications, Communications and Alerts:
[0108] The various embodiments can be configured to utilize one or more of technologies to offer features to notify, communicate or alert the owner or recipient of the system/apparatus during appropriate events. For example, when a parcel is delivered, it can communicate the status to the recipient that a parcel has been delivered. The parcel delivery event can be configured in one of many ways. For example, when there is a movement in the vicinity of the assembly followed by an action where the parcel receptacle is locked, it can be configured to accept those activities and associate them to an event of parcel receipt. Similarly, when there is a movement in the vicinity of the unit, followed by an unlocking of the parcel receptacle, it can be configured to associate and conclude that a parcel has been collected by carrier personnel to return a parcel by the recipient. Similarly, where there is any movement in the vicinity of the assembly and when there is any unexpected tampering, it can be configured to notify the recipient to alert such uncommon activities. By integrating the parts of the system with appropriate computer programs, one can write appropriate algorithms to detect and transmit any appropriate notifications or alerts via email, phone or instant messages.
[0109] Device Software and Mobile-Phone Applications:
[0110] The various embodiments can be configured to utilize integration of appropriate mobile phone-based applications, commonly referred to as mobile phone app, or software installed on the device, to communicate various scenarios, events, statuses, notifications, alerts, pictures, videos, etc. to authorized individuals, so as to allow interaction with the security apparatus and parcel receptacle in a meaningful way. For example, locking and unlocking of the parcel receptacle or the security apparatus can be configured to be controlled wirelessly in many ways including control from a mobile-app or from an internet cloud-based software programs remotely.
[0111] Electronics and Computer Hardware:
[0112] Any technological solution comprises of electrical or electronic parts and one or more of computer hardware. Our security apparatus and/or our parcel receptacle will house the necessary electrical and electronic parts and one or more of the necessary computer hardware including the necessary PCBs (printed circuit boards) to support and fulfil the features and functionalities described in this invention. For pictorial purposes, some of these are displayed in multiple figures, and it is shown for conceptual reasons only and their actual location may be different from what is shown in these figures.
[0113] Energy Sources and Supply:
[0114] To power the electrical and/or electronic or computer hardware, the components need power or energy. Energy can be provided from a regular battery or a rechargeable battery, and can be housed either inside the security apparatus or optionally inside the parcel receptacle depending on its size and utilization. The displayed location of these energy sources is conceptual in nature, and their actual location may be altered depending on the design of a specific embodiment.
[0115] Data Storage & Transmission:
[0116] Data is powerful and in fact very crucial these days. When camera and/or video is activated either due to motion around the device, or due to a configured event such as parcel opening or closure, or tampering, etc., data is generated. To store data, a storage device such as a hard drive or a flash drive may be used and can be housed either inside the security apparatus or inside the parcel receptacle. In addition, through a mobile app or through software or programs installed on the device, and with wireless connectivity, data can be stored or transmitted remotely or streamed instantaneously to one or more external devices including to an internet cloud platform. Working with other electronic or computer hardware that is present in the embodiments, such data can be transmitted to appropriate authenticated devices via commonly available data transmission protocols. In addition, when data is not necessary to be transmitted instantaneously at the time of data collection, a mechanism can be configured to be provided to retrieve the data by a wired or wireless mechanism on an as needed basis. In addition, all data associated with the device can be configured to be stored, transferred or transmitted to external sources including an internet cloud platform.
[0117] Digital Displays:
[0118] As shown in many figures, part number 133 represents a digital text display mechanism that can be integrated into many embodiments, and can be configured to communicate several messages, codes, alerts, statuses, etc. in an interactive fashion to authorized individuals. From those displays and codes, locking and unlocking of locking assemblies and/or parcel receptacles can be configured and selective access to authenticated individuals can be provided.
[0119] Display Lights:
[0120] As shown in many figures, part number 158 represents a few display signals of varying colors. This can be integrated into many embodiments, and can be configured to communicate various statuses such a battery levels, or armed/unarmed status of security apparatus and/or parcel receptacles.
[0121] Wireless Technologies and Wireless Transmission:
[0122] In modern days, wireless technologies offer a great level of convenience. The data transmission, locking and unlocking mechanisms can all be operated either via physical means, or via wireless means. Wireless signals may fall into one or more categories such as RFID, Bluetooth, NFCs, Wi-Fi networks and technologies integrated with mobile-phone based apps. All these technologies are configured to be implemented with my invention so as to fulfill its intended use effectively even if these are not mentioned specifically each time for sake of brevity.
[0123] Fingerprint and Biometric Module:
[0124] A finger print or biometric module can be integrated in the doorknob security apparatus and/or the parcel receptacle. This feature could be utilized to identify authorized individuals, and upon such authentication, these modules can be configured to activate privileges of operation and access to security apparatus and/or parcel receptacle to those authenticated individuals.
[0125] GPS Module:
[0126] A global positioning system (GPS) module can be placed either in the doorknob security apparatus and/or the parcel receptacle. This feature could be activated if for any reason someone has tampered with the parcel receptacle and has managed to remove the parcel receptacle and walk away with it. By this GPS feature, one will be able to identify the current location of the parcel receptacle at any given point. For example, this feature exists in most of the smart phones these days to identify and locate a phone, and this feature can be integrated with the security apparatus and/or the parcel receptacle.
[0127] Cloud Platform Integration:
[0128] Technology, software and storage are important elements that are essential for the success of my invention. Internet cloud provides an amazing platform as all three of these are abundantly present in a typical cloud platform. So, wherever possible and appropriate, the cloud platform can be tightly integrated with my device in every aspect of my invention. Specifically, the cloud platform can be configured to connect to my devices through a variety of technological means discussed elsewhere in this document, and can provide numerous benefits associated with data collection and data dissemination to authenticated users real-time instantaneously or on an as-needed basis. Among other options, wired or wireless internet connectivity to the device is expected to enable optimum and efficient use of cloud platform and implementation of many described features.
[0129] Integration with Online Retailers and Freight Companies:
[0130] The main purpose of this invention is to facilitate online shopping, and to enable deliveries to occur securely and efficiently. So, integration of the locking and unlocking mechanisms of the parcel receptacle with both online retailers and freight carriers is an important feature. Integration of features such as order number, or tracking number and appropriate barcodes on the parcels can all be appropriately integrated with locking and unlocking mechanisms of the parcel receptacle. In addition, these features can be coordinated with online retailers and freight carriers to come up with a mechanism to authenticate delivery personnel and to provide appropriate access to lock or unlock the parcel receptacles. Such coordination can happen electronically including via emails from the online retailer or from the freight carrier and integration of those communications to trigger one or more actions on the security apparatus or parcel receptacle.
[0131] Placement Location of Parcel Receptacles:
[0132] As an example,
Table 1: Part Number and Description
[0133] The following table (Table 1) provides a list of referenced parts in many figures, and contains a brief description and illustration of the part where appropriate.
TABLE-US-00001 TABLE 1 Part Number and Its Description Part Number Description 101 Security apparatus or security attachment or locking assembly. This is the part that can connect to an object to secure parcel. 102 Cut-resistant cable or rope or chain 103 Parcel receptacle (or Parcel bag or parcel box) 104 Parcel receptacle lock. Can be of numerical combination type, or traditional physical type, or any other lock. The intention is to enable locking of parcel receptacle to allow access to only authorized individuals. 105 A typical circular doorknob. 106 Security apparatus key 107 Security apparatus stem. This stem can have many types of geometry and shapes to fulfill the objective of providing a tight and secure mechanism to prevent tampering of cable/rope/chain and ease of installation and operation of security apparatus. The stem can be straight or bent or can have any geometry to increase the tightness and ease of locking in tight spaces. 108 Security apparatus cable/rope/chain. This chain can be utilized in any of the embodiments to form a tight loop around an object. 109 Tall spring holder 110 A typical front door 111 A typical straight-shaped doorknob 112 A typical door handle 113 Coil Spring Groove. One outer edge of coil spring is held by this groove. The other inner edge of coil spring is held by the groove in the center pin of coil spring (FIG. 8M, 160). By this design, when the coil spring containing case (143) is rotated, it causes the coil spring inside to get wound, thereby creating tension in the coil spring. When the coil spring containing case (143) is unlocked and released, this tension allows the coil spring containing case to rotate freely and retract and return to its original position. 114 Tall spring holder 115 Wireless sensor. This is shown mainly for pictorial representation only. This could be an RFID or other wireless technology based solution such as a Bluetooth or mobile-based software application. Depending on exact technology utilized in a particular embodiment, this could be placed outside or inside, or could be integrated into the PCB board and other internal mechanisms that are not explicitly displayed outside. This can either replace a doorknob lock, or can be optional additional feature of doorknob security apparatus as alternate embodiments. 116 Speaker. [When an audible alarm is triggered, loud sound is produced if there is any attempted tampering of the parcel receptacle or the security apparatus or any inter-connecting cables.] 117 Dangling arrestor. This is just to offset the bend in stem 107 so that the doorknob security apparatus 101 is not dangling because of uneven weight distribution of a bent stem 107. 118 Opening for charging internal batteries or other electronical components. This is shown for conceptual purposes only, and could be supplemented with a typical USB-based charging solution as well. 119 Energy source such as a battery. Could be rechargeable or regular types. 120 Short lever 121 Tall lever 122 Slidable wedge 123 Slot for wedge 124 Extendable parcel receptacle design. Scissor type design is shown as one typical example, and it can have other designs as well. 125 GPS module. Comprises of all necessary parts to transmit necessary signals to reveal its present location to authenticated individuals. 126 Tall lever spring 127 Wedge spring 128 Slot for tall lever locking position 129 Cable strap latch lever sliding groove 130 Tip of cable strap latch 131 Coil spring rotation arresting lever 132 Fingerprint or biometric reader 133 Display panel (Can be LCD, LED or any type) to communicate lock or unlock codes, or an interface to communicate any kind of messages such as alerts, notifications, etc. 134 Camera or video recording device. It can be mounted on the security apparatus or placed on the parcel receptacle in some embodiments, or along the chain in some other embodiments. 135 A chain handle to pull the chain or cable or rope that can be utilized to pull and to facilitate in forming a tight loop around a doorknob or any secure object. 136 Cable connector 137 Printed Circuit Board (PCB) to manage electronic and computer circuits, programs and signal transmission, interchange and communication of signals 138 Parcel receptacle security cover or lid. 139 Parcel receptacle zipper 140 Cut-resistant and tamper-resistant cable/rope/chain that is integrated into the parcel receptacle to enhance its structural strength against tampering and vandalism and to improve safety of parcels. 141 Locking lever slider 142 Locking pin 143 Coil spring containing case 144 Coil spring. These are typically present inside any typical measuring tapes found in hardware stores. When a cable (108) is pulled, the coil spring gets wounded, and creates tension, and helps in retracting the cable when released. 145 Head of coil spring rotation arresting lever (131) 146 Vertically adjustable telescopic columns. This can be of many types to increase or decrease the height of parcel receptacles to accommodate varying requirements for varying parcel sizes and parcel delivery needs. This is shown for conceptual purposes only, and the actual design to achieve its intended purposes could involve significantly different design. 147 Hard drive or any type of data storage device. A cloud platform can either supplement or replace this. 148 Passage opening for chain (108) elongation and contraction 149 Bottom case of security apparatus 150a, b Lock and key mechanism for cable detachment. This is provided so that customers can buy multiple sizes of parcel receptacles 103 such as extra-small, small, medium, large and extra-large and can use the same security apparatus for each one by disconnecting one size of parcel receptacle, and attaching and locking another size of parcel receptacle. For identification purposes, 150a represents the female portion of this lock, and 150b represents the male portion of the lock. 151 Vertically adjustable parcel receptacle 152 Wireless module for enabling locking and unlocking mechanism for spring-based chains. Wireless mechanisms can be of many types including RFID, Bluetooth, Wi-Fi, mobile applications-based technologies, NFCs, among other wireless applications. 153 Locking mechanism that prevents movement of lockable lever (157) once the security apparatus (154) is locked with a locking key (171). 154 Spring-based chain security apparatus. 155 Spring-based chain component. The goal of this kind of chain component is that it expands itself as much as possible so that once locked in an expanded position after placing around a doorknob, no one can compress them subsequently upon locking. This can be very helpful especially in straight-doorknob situation to prevent easy removal of the chain from doorknobs, where a higher radius to turn is required to remove it from the doorknob. 156 A transparent message pouch. Can be used for any communication to a mail carrier. 157 Lockable lever for spring-based chain 158 This visual display of signals is shown for pictorial purposes only. This can be armed, disarmed, battery low indicator. A flashing status could also be used for timer-based and triggered mechanism, and could indicate when an wireless-activating device (example an RFID) is brought near to acknowledge receipt of a wireless signal, and display that control programs inside are working at a given time to perform an activity. 159 a, b Holes for connecting 2 edges of a compressed spring that keeps the lever (131) pushed toward the coil spring containing case (143) to arrest its rotation. In FIG. 5F, when head 145 is pushed toward 159A to release and unlock 143 so as to allow it rotate, this compressed spring will push it back once 145 is released. 160 Center pin of coil spring 161 Central drum around which cable/chain/rope are wound around 162 Flat circular plate on top of which coil spring (144) is placed for rotation 163 Space to fit doorknob or to place any tightly wrappable object 164 Parcel receptacle based wireless controller. Using wireless technologies, this controls both locking and unlocking mechanisms of parcel receptacles. Wireless technologies comprise of RFID, Bluetooth, NFCs, Wi-FI, and other mobile phone based applications and solutions that operate wirelessly. This controller also senses tampering and operatively triggers audible alarm and electronic communication of delivery, tampering, etc. to owner. 165 Cable stopper 166 Pulling lever 167 Cable strap latch 168 Pushable head for arresting rotation of coil spring case 169 Horizontally-mounted fins 170 Vertically-mounted fins 171 Locking key for spring-based doorknob chain. 172 Typical examples of door knockers. It can be in many geometrical shapes or patterns.
[0134] In the drawings, descriptions and specifications discussed above, a few typical embodiments of the invention are disclosed. Although specific terms and elements are used in description, they are used in a descriptive sense only, and not for the purpose of limitation. It is apparent, however, that various modifications and changes can be made in the specifications, designs, elements to create a greater number of embodiments without departing from the spirit and scope of the invention. The method, device, system and apparatus is a utility product that can have several embodiments and each embodiment has one or more features to securely receive, return and exchange a parcel. The essential advantages of the various embodiments of the apparatus, method and mechanism are many, and should not be limited to the particular examples illustrated in this document only.