TAMPERPROOF SACK SYSTEM FOR HOME PACKAGE DELIVERIES
20230157472 · 2023-05-25
Assignee
Inventors
Cpc classification
A47G29/20
HUMAN NECESSITIES
A47G29/141
HUMAN NECESSITIES
International classification
A47G29/20
HUMAN NECESSITIES
Abstract
A tamperproof sack system includes a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack including a body and an adjustable opening portion formed in a top side of the body, the adjustable opening portion being configured to open and close; a door strap configured to secure the tamperproof sack to a door such that a rear side of the body is held against the door, the door strap being attached to the body and being configured to wrap around the door, the door strap including a door strap fastener configured to fasten the door strap to the door; and a lock including a keypad configured to receive user input, the lock configured to unlock the adjustable opening portion and thereby unlock the tamperproof sack based on whether the user input received at the keypad includes a valid access code.
Claims
1. A tamperproof sack system to securely contain a package, the tamperproof sack system comprising: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack comprising: a body having a bottom side and a top side opposite, wherein the body defines an interior configured to house a package therein; and an opening portion formed in the top side, the opening portion being configured to opened and closed; wherein the predetermined cut-resistance standard is European Standard EN-2 or above.
2. The tamperproof sack system according to claim 1, further comprising: a strap configured to affix the tamperproof sack to a fixed object; and a lock.
3. The tamperproof sack system according to claim 2, wherein the fixed object is a door.
4. The tamperproof sack system according to claim 2, wherein the door strap is made of the same type of material as the body.
5. The tamperproof sack system according to claim 4, wherein the strap is integrally formed with the body.
6. The tamperproof sack system according to claim 1, wherein the body is made from a material selected from the group consisting of one or more of high performance polyethylene, ultra-high molecular weight polyethylene, para-aramid, polyvinyl acetate, polyvinyl acetate yarn, steel wire, metal fiber, and fiberglass yarn, or combinations thereof.
7. The tamperproof sack system according to claim 6, wherein the body is made from ultra-high molecular weight polyethylene.
8. The tamperproof sack system according to claim 1, wherein the body is made from a single unperforated piece of material.
9. The tamperproof sack system according to claim 8, wherein the single unperforated piece of material is a single unperforated piece of ultra-high molecular weight polyethylene.
10. The tamperproof sack system according to claim 1, further comprising: a drawstring affixed to the opening portion and configured to open and close the opening portion; and a zip tie configured to keep the opening portion of the tamperproof bag closed.
11. The tamperproof sack system according to claim 1, wherein the body does not comprise perforations or holes other than the opening portion.
12. The tamperproof sack system according to claim 1, wherein the predetermined cut-resistance standard is European Standard EN-3 or above.
13. The tamperproof sack system according to claim 1, wherein the predetermined cut-resistance standard is European Standard EN-4 or above.
14. The tamperproof sack system according to claim 1, wherein the body is 0.1 to 6 feet long.
15. The tamperproof sack system according to claim 1, wherein the body is 6 to 60 feet long.
16. A method of preventing the unauthorized removal of items from the tamperproof sack system according to claim 1, the method comprising steps of: filling the tamperproof sack; attaching the tamperproof sack to a fixed object; and informing an authorized user of a method by which to open the tamperproof sack or detach the tamperproof sack from the fixed object.
17. The method according to claim 16, further comprising a step of opening of the tamperproof sack by the authorized user.
18. A method of delivering objects, the method comprising steps of, in order: a first authorized user accessing the tamperproof sack system according to claim 1 and opening the tamperproof sack, inserting an object into the tamperproof sack, and closing the tamperproof sack.
19. The method according to claim 18, further comprising, after the step of closing the tamperproof sack, a step of a second authorized user opening the tamperproof sack.
20. The method according to claim 18, further comprising a step of securing the tamperproof sack to a fixed object either before or after the step of inserting the object into the tamperproof sack.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0046] These and/or other aspects will become apparent and more readily appreciated from the following description of the exemplary embodiments, taken in conjunction with the accompanying drawings in which:
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
DETAILED DESCRIPTION
[0058] Hereinafter, a tamperproof sack system according to exemplary embodiments will be described with reference to the accompanying drawings.
[0059] The tamperproof sack system according to exemplary embodiments includes a combination of features that achieve a remarkably safe and easy-to-use system to ensure the security of home deliveries. In particular, according to certain exemplary embodiments, the tamperproof sack system includes one or more of a tamperproof sack made of tamperproof and weatherproof material, a strap that enables the tamperproof sack to be securely fastened to a door or other fixture of a home or any other desired object, and an electronic lock that locks the tamperproof sack closed. A homeowner can transmit an access code to a delivery person, and the delivery person can then use the access code to unlock the electronic lock and store a package in the tamperproof sack. The delivery person can then lock the tamperproof sack to secure the package. The access code can be generated according to various criteria, such as generating the access code based on a predetermined frequency (e.g., daily, hourly) or based on an event (e.g., detecting the delivery person's arrival), to ensure that the access code changes frequently. Moreover, the door strap is configured to be easily fastened and unfastened to a door or other fixture, so that a homeowner can easily attach or detach the tamperproof sack to the door based on whether a package is expected.
[0060] The tamperproof sack may take the form of a bag or a box or another container. The tamperproof sack may have soft or hard sides defining an interior volume that may be filled with an object or used to contain an object, depending on the embodiment. In some embodiments, the tamperproof bag may have openings in its sides to permit, for example, breathability, so long as those openings do not allow for the unauthorized removal of an item therein or otherwise compromise the tamperproof nature of the sack.
[0061] The tamperproof sack according to the present disclosure is easy to set up and take down. It is lightweight based on the materials used as disclosed herein.
[0062]
[0063] The tamperproof sack 102 includes a body 104 and an adjustable opening portion 106. The body 104 includes a bottom side 104a, a top side 104b opposite the bottom side 104a, a left side 104c that is substantially perpendicular to the bottom side 104a, a right side 104d that is substantially parallel to the left side 104c, a front side 104e (i.e., the side facing out in
[0064] The body 104 of the tamperproof sack 102 is made of a material that is tamperproof and weatherproof, to protect packages from theft and harsh weather conditions, such as rain, wind, sleet, snow, and prolonged sun exposure. The body 104 may be made of a material that is cut-resistant, tear resistant or and/or puncture-resistant so that the body 104 cannot be easily cut, torn, or punctured by thieves. For example, the body 104 may be made of various types of fabrics manufactured by Kozane®, which achieve maximum cut, tear, and puncture resistance. Of course, the body 104 is not limited to being made of any particular type of material, and may be made of many different types of materials, such as ultra-high molecular weight polyethylene (UHMWPE), para-aramids (such as Twaron® or Kevlar®), high performance polyethylene (HPPE) (such as Dyneema® or Spectra®), polyvinyl acetate (PVA), special PVA yarns (such as SupraBlock®), steel wire, metal fibers, chain links made from various materials, fiberglass yarns, or the like, or combinations thereof. In some embodiments, the body includes at least 90% by weight of the materials listed above. In other embodiments, the body includes at least 95%, 98%, or 99% by weight of the materials listed above. In certain embodiments, the body consists of 100% by weight of the materials listed above. In some embodiments, the material making up the body does not include metal fibers or does not include chain links, in particular chain links made from metal. In other embodiments, the material making up the body does not include wire. In other embodiments, the body does not include wire and/or does not include metal at any point surrounding a drawstring, but may include wire and/or metal in other parts of the body. Thus, a drawstring, if affixed to the body, does not go through wire and/or metal at any point in certain embodiments. The body 104 may be manufactured to comply with various types of cut resistance standards and other types of standards, such as standards governing puncture resistance and tear resistance. Examples of these standards include the European Union (EN) standards and the American National Standards Institute (ANSI)/ISEA standards. The term “tamperproof” as used throughout this specification may refer to a material that provides a predetermined degree of resistance to tampering, theft, cutting, tearing, or puncturing. In other words, the “tamperproof” material satisfies certain standards with respect to at least one of cut-resistance, tear-resistance, and/or puncture-resistance. For example, the “tamperproof” material may satisfy an EN cut-level 3 (where the EN levels range from 1-5). In preferred embodiments, the tamperproof sack satisfies an EN cut-level of 2 or more. In other embodiments, an EN-3 cut-resistance level may be used. For higher levels of tamperproof behavior, an EN cut-level of 4 or 5 may be used. The level of cut-resistance that may be present in the material for the tamperproof sack is not particularly limited, and may be selected from any range within the EN-1 to EN-5 range. Alternatively, the “tamperproof” material may satisfy an ANSI cut-level A6 (where the ANSI levels range from A1-A9). Also, different versions of the tamperproof sack 102 could be manufactured to satisfy different “tamperproof” standards according to EN1-EN5 or A1-A9. For example, a lightweight tamperproof sack 102 might be manufactured to satisfy a lower cut-resistance level (e.g., ANSI cut-level A2), whereas a heavyweight tamperproof sack 102 might be manufactured to satisfy a higher cut-resistance level (e.g., ANSI cut-level A8 or above). Higher tamperproof resistance may be provided by using material having a cut-resistance level of A4 or above. In preferred embodiments, the cut-resistance level is A2 or above, for example to A9. In more preferred embodiments, the cut-resistance level is from level A4-A7. The range of cut-level resistance in the material is not particularly limited, and may be from A1-A9 as appropriate for a given application. Many different options are possible. The material used for the tamperproof material is not particularly limited as long as it meets the tamperproof standards noted herein. In certain embodiments, the tamperproof sack may be made to be waterproof. The means of waterproofing the tamperproof sack is not particularly limited. In preferred embodiments, the material may be UHMWPE and may provide an ANSI-A6 level of protection or above. The UHMWPE preferably has a Mw of over 1,000,000, and is preferably in the range of from 1,000,000 to 10,000,000 or above. In preferred embodiments, the Mw is in a range of from 1,000,000 to 7,500,000. An appropriate Mw may be selected as long as it provides the desired tamperproof properties and yield strength (for example, a desired cut resistance).
[0065] In some embodiments, the tamperproof sack does not contain holes or openings other than the opening 108 through which an object may be inserted into the tamperproof sack. Accordingly, in those embodiments, the tamperproof sack has only one opening—opening 108. In other embodiments, the tamperproof sack may contain perforations or holes that are not large enough for an unauthorized user to touch, or in some embodiments to remove, an object inside the tamperproof sack. For example, the tamperproof sack may contain perforations or openings other than the main opening, for example, on its sides, that are no larger than 4 inches in diameter, length, or width. Preferably, the perforations or openings are less than 3 inches, less than 2 inches, or less than 1 inch in diameter, length, or width. In preferred embodiments, the openings are less than ½ inch or less than ¼ inch in diameter, length, or width. On other embodiments, the openings are less than 1/10 inch or less than 1/100 inch in diameter, length or width. Other embodiments may include perforations or openings 1 micron or less in diameter, length, or width.
[0066] The tamperproof sack may be made using one layer of material or multiple layers of material. The layers of material may be made from the same or different materials as noted herein, so long as the tamperproof nature of the tamperproof sack is not compromised. Where the tamperproof sack has perforations or openings as noted above, the layers of material may be arranged such that even if the perforations or openings in an individual layer are larger than those values listed above, the multiple layers are arranged such that the openings of the tamperproof sack as a whole are not larger than the values noted above.
[0067] The body 104 further includes the adjustable opening portion 106 which can be adjustably opened and closed using various opening and closing mechanisms. In the exemplary embodiment shown in
[0068] As shown in
[0069] More specifically, as shown in
[0070]
[0071] The tamperproof sack 102 further includes a flap 112 which is configured to be pulled over the adjustable opening portion 106 and fastened in place. The flap 112 is optional and provides an additional layer of covering for the adjustable opening portion 106 and the lock 130. As shown in
[0072] The tamperproof sack 102 further includes a strap configured to affix the tamperproof sack to a fixed object. The strap may be configured to affix the tamperproof sack to any suitable object, such as a door, mailbox, fence, fence post, railing, tree, support column, gate, car, truck, truck bed, an item anchored or bolted into the ground or other object, or other fixed object that is difficult to move. Element 118 illustrates an embodiment of the strap as a door strap 118 that is configured to be wrapped around a door 101. The door strap 118 can be made of a material that is cut-resistant, tear resistance or and/or puncture-resistant so that the body 104 cannot be easily cut, torn, or punctured by thieves, similar to the material used to make the tamperproof sack 102. The door strap 118 is not limited to being made of any particular type of material. The door strap 118 can be integrally formed from the same piece of material as the tamperproof sack 102, or can be formed as a separate piece that is attached to sides of the tamperproof sack 102. When formed as a separate piece, ends of the door strap 118 can be respectively connected to the left side 104c and right side 104d of the tamperproof sack 102 using various techniques, such as sewing the ends of the door strap 118 to the left and right sides 104c and 104d. The strap may be made from the same material as the tamperproof sack or may be made from a different material. In some embodiments, the strap may be integrally formed with the tamperproof sack from a single piece of material or from the same pieces of material as the tamperproof sack. In other embodiments, the strap may be attached to the tamperproof sack. The method for attaching the strap to the tamperproof sack is not particularly limited, but should not diminish the tamperproof ability of the combined tamperproof sack and strap. For example, the strap may be affixed to the tamperproof sack using a method disclosed below relating to how the tamperproof sack may be made.
[0073] As shown in
[0074]
[0075] The shackle 132 is made out of brass, stainless steel, hardened streel, an alloy or combination of alloys, or some other type of high-strength material. The shackle 132 typically includes metal or metal alloy, although is not limited to such. The shackle 132 has a curved shape resembling an upside-down U, and has two ends 132a and 132b connected to the lock body 132. The first end 132a (also referred to as the “fixed end 132a”) is fixed to the lock body 132 and is rotatable, and the second end 132b (also referred to as “loose end 132b”) can be pulled up and out of a hole 132c formed in the lock body 132 to unlock the lock 130, and can be inserted back into the hole 132c to lock the lock 130. When the shackle 132 is unlocked, the loose end 132b can be pulled up and out of the lock body 132 and rotated about the rotatable first end 132a, so that the shackle 132 can be passed through various components (e.g., guided out of the loops 110c).
[0076] The lock body 134 houses each of the electrical and locking components therein, and is made out of a high-strength material, similar to the shackle 132. In the example shown in
[0077] The keypad 136 includes a series of keys that can be pressed by a user to lock and unlock the lock 130. The keys can include any combination of numbers, letters, or symbols. For example, the keypad 136 can include a standard numerical layout including twelve keys, one for each single-digit number and two additional keys for the pound (#) and star (*) symbols, as is frequently used on phones. Alternatively, the keypad 136 can include only a few keys, e.g., three keys, four keys, five keys, etc., with corresponding numbers (e.g., keys 1-5). In the example shown in
[0078] The locking mechanism 338 is a series of components that collectively function together to lock and unlock the shackle 132 based on whether an access code is correctly input to the keypad 136. The locking mechanism 338 can include, for example, a series of spring-loaded pins, racks, gears, and other physical hardware components that interoperate to lock and unlock the shackle. When the correct (e.g., valid) access code is input to the keypad 136, the locking mechanism unlocks the shackle 132. When an incorrect (e.g., invalid) access code is input to the keypad 136, the locking mechanism keeps the shackle 132 locked. The locking mechanism 338 is not limited to any particular configuration, and many different types or combinations of locking mechanisms 338 may be used in the lock body 130.
[0079] The communication circuitry 340 is circuitry configured to transmit data to and receive data from other digital devices, such as digital devices being used by a homeowner and a delivery person. The communication circuitry 340 is implemented as at least one network module having at least one antenna 341. Generally, a network module includes a combination of hardware and software that is specially configured to transmit and receive data according to at least one type of data telecommunications standard, e.g., 4G, 5G, BLUETOOTH, Wi-Fi, etc., using the antenna 341. The network module may a chipset, system on chip (SoC), or component thereof that supports data communication. The antenna 341 may be configured as one or a plurality of multiple input, multiple output (MIMO) antenna groups. Exemplary embodiments are not limited to any particular configuration of antennas. For example, the antenna may be physically located inside or outside of the respective network module.
[0080] The CPU 342 controls overall operations of the components located within the lock body 134. Specifically, the CPU 342 controls operations of the keypad 136, the communication circuitry 340, the memory 344, the sensors 346, the camera 348, and the battery 350. The CPU 342 may be connected to the other components via electrical wire 343. The electrical wire 343 may be implemented as a series of a wires, a bus, or any other configuration that enables data communication between the CPU 342 and the other components.
[0081] The memory 344 stores access codes that are used to lock and unlock the lock 130. The memory 344 may be implemented as various types of memory devices, such as RAM, SRAM, DRAM, PROM, EPROM, EEPROM, flash memory, on-chip memory, ROM, optical disc drives, cloud-based storage, and other types of non-transitory storage media. In operation, when a new access code is received by the communication circuitry 341, the CPU 342 controls the memory 344 to store the new access code as a valid access code. Also, the CPU 432 may control the memory 344 to overwrite any previously stored access codes or otherwise mark the previously stored access codes as invalid.
[0082] The sensors 346 include at least one sensor that may be used to detect events occurring near the tamperproof sack system 100. For example, the sensors 346 may include a photosensor that detects an ambient brightness level. Thus, when a delivery person approaches the tamperproof sack system 100 and unfastens the flap 112, the sensors 346 may sense the sudden increase in brightness level and generate an alert that can be transmitted (via the communication circuitry 340) to a homeowner, to inform the homeowner that somebody is accessing the tamperproof sack system 100. The sensors 346 may alternatively be implemented as a noise sensor (e.g., a microphone, to detect noise), a motion sensor (e.g., an accelerometer, to detect whether the sack 102 is being moved), and/or other types or combinations of sensors. Moreover, the sensors 346 may also include various types of sensors that are configured to exchange data with another device. For example, the sensors 346 may include a near-field communication (NFC) sensor to exchange data with a delivery person or somebody else. The sensors 346 may also be omitted.
[0083] The camera 348 is an optical recording device that can record images or video and transmit the recorded images or video to a homeowner. The camera 348 can be implemented as many different types of camera, e.g., compact digital cameras, NEST® cameras, etc. In operation, the camera 348 can be used to transmit videos to the homeowner to alert the homeowner that somebody is accessing the tamperproof sack system 100 in real-time. In this case, the camera 348 can also be used in combination with the sensors 346. For example, the sensors 346 can indicate that the tamperproof sack system 100 is being accessed, which can trigger an alert to the user (via the communication circuitry 340), and can also trigger a command to the camera 348 to turn on and start recording. Alternatively, the camera 348 can simply record video without providing real-time alerts.
[0084] The battery 350 provides electrical power to the other electrical components within the lock body 134, including the communication circuitry 340, the CPU 342, the memory 344, the keypad 136, the sensors 346, and the camera 348. Also, if the locking mechanism 338 includes electrically powered components, the battery 350 may also provide electrical power to the locking mechanism 338.
[0085] To securely facilitate the delivery of packages using the tamperproof sack system 100, the lock 130 operates as follows. First, the homeowner uses her or his digital device 350 (also referred to as a “first digital communication device 350”) to generate a new access code 360 (also referred to as an “access code 360”) which is a valid access code that can be used to unlock the lock 130. The access code 360 can be any series if numbers, letters, or symbols that are compatible with the keypad 136. The first digital communication device 350 can be a smartphone, a laptop computer, a desktop computer, a security system interface, a combination of devices, or any other type of digital device configured to transmit data. When the first digital communication device 350 is a smartphone, the smartphone can generate the new access code 360 by using an application 352 stored on the smartphone. The application 352 can be a specially configured program designed to generate new access codes based on a predefined event or a predetermined frequency. For example, the application 352 can generate a new access code 360 in response to a user manually selecting an option to generate the new access code 360. Alternatively, the application 352 can generate a new access code 360 according to a predefined frequency, such as generating a new access code 360 once a day or once an hour. As another alternative, the application 352 can generate the new access code 360 in response to detecting an event, such as the sensors 346 detecting the presence of a Delivery person in a vicinity of the tamperproof sack 102. Many different criteria may be used to generate the new access code 360.
[0086] Once the application 352 generates the new access code 360, the first digital communication device 350 transmits the new access code 360 to both the lock 130 and the delivery person's digital device 352 (also referred to as a “second digital communication device 352”). Many different techniques and communication channels can be used to ensure that the access code 360 is correctly transmitted to the second digital communication device 352. For example, the delivery person can provide his or her phone number or email ahead of time, and the homeowner can manually text or email the access code 360 using the phone number or email address, or the application 352 can automatically transmit the access code to the phone number or email address. Alternatively, the first digital communication device 350 can automatically transmit any newly generated access codes 360 to a central phone number or email controlled by the delivery company, such as a central phone number or email used by Amazon®. The delivery company can then, in turn, provide the access code 360 to the delivery person.
[0087] The lock 130 receive the new access code 360 via the communication circuitry 340 and the CPU 342 stores the access code 360 in the memory 344. If the memory 344 is currently storing a previously generated access code, the CPU 342 can overwrite the previously generated access code with the new access code 360.
[0088] Alternatively, the memory 344 can simply store every new access code 360 without overwriting or erasing the previously stored access codes. Also, optionally, the memory 344 can store a “master” access code that is only known by the homeowner and that is not updated or changed, and is not shared with any delivery people. The “master” access code is a fixed code that the homeowner can use to access the tamperproof sack system 100 anytime, and is distinct from the dynamically changing access code 360 that is sent to delivery people.
[0089] Then, to deliver a package, the delivery person looks up the access code 360 stored in his or her digital device 360 (the second digital communication device 360) and enters the access code 360 into the keypad 136. In response to a valid access code 360 being input, the CPU 342 controls the locking mechanism 338 to unlock the shackle 132. The delivery person then removes the lock 130 by pulling the shackle 132 out from the two loops 110c (and optionally from the hole 115 in the flap fastener inserting portion 114, if the flap fastener inserting portion 114 is being used as an additional security layer), opens the adjustable opening portion 106 of the tamperproof sack 102 using the drawstring 110, and inserts the package into the body 104 of the tamperproof sack 102. To lock the tamperproof sack 102 back up, the delivery person closes the adjustable opening portion 106 using the drawstring 110, passes the shackle 132 back through the two loops 110c (and optionally the hole 115), and presses the loose end of shackle 132 down into a corresponding hole on the lock body 134 to lock the shackle 132 in place, thereby closing and locking the tamperproof sack 102. The package is now safely delivered inside of the tamperproof sack 102 and is ready to be picked up by the homeowner.
[0090]
[0091] More specifically, the tamperproof sack system 400 includes a tamperproof sack 402, a door strap 418, and a lock 430. The tamperproof sack 402 includes a body 404 including a bottom side 404a, a top side 404b opposite the bottom side 404a, a left side 404c that is substantially perpendicular to the bottom side 404a, a right side 404d that is substantially parallel to the left side 404c, a front side 404e (i.e., the side facing out in
[0092] As shown in
[0093] The tamperproof sack 402 also includes a front side loop 444 and a back side loop 446 which are fixed in place. The front side loop 444 is formed on a front portion of the top side 404b, and the rear side loop 446 is formed on a rear portion of the top side 404b. When the zipper 440 is zipped up, the shackle 432 can pass through each of the front side loop 444, the rear side loop 446, and the zipper pull hole 440c, thereby fixing the zipper 440 into a closed portion. Unlike the exemplary embodiment shown in
[0094] The tamperproof sack system 400 is especially useful for handling larger package deliveries, since the zipper 400 allows the entire front side 404e of the tamperproof sack 402 to be unzipped.
[0095]
[0096] In the modified version shown in
[0097]
[0098] In operation 610 shown in
[0099] In operation 620 shown in
[0100] In operation 630 shown in
[0101] In operation 640 shown in
[0102] Another embodiment of the present disclosure is illustrated in
[0103]
[0104]
[0105] It should be noted that although some of the figures illustrate the tamperproof sack including a drawstring, the tamperproof sack does not need to include a drawstring and in some embodiments does not include a drawstring. The tamperproof sack may be closed using any method known in the art or disclosed herein.
[0106] The material from which the tamperproof sack may be made has been described previously. In certain preferred embodiments, the material may be UHMWPE having a molecular weight as discussed above, and providing a level of protection of ANSI-A2 or above, in other embodiments is ANSI-A4 or above, and in other embodiments ANSI-A6 or above. The level of protection in terms of EN cut resistance is preferably EN-2 or above, in other embodiments EN-4 or above, and in other embodiments EN-5 or EN-6.
[0107] In certain embodiments, the tamperproof sack is made from a single unperforated piece of material. For example, the single unperforated piece of material may be a tube. The cross-sectional shape of the tube is not particularly limited, and may be circular, oval, rectangular, or the like. The tube may be formed by weaving the material on a circular loom. The single unperforated material may also be a sheet in certain embodiments, where the sheet is later adhered to itself to form the tamperproof sack.
[0108] In other embodiments, the tamperproof sack is made from multiple pieces of material adhered to each other to form the tamperproof sack. For example 2, 3, 4, or more pieces of material may be adhered to each other so as to form the tamperproof sack.
[0109] In certain embodiments, it may be necessary to perforate the material to, for example, sew it to other materials or to itself. In instances where it is necessary to perforate the tamperproof sack, it is preferable that the perforations do not cause a structural weakness in the tamperproof sack that would permit someone to open the bag in an unauthorized manner (such as by cutting into it, tearing the tamperproof sack, or entering the tamperproof sack by any means other than the opening through which the interior of the bag is intended to be accessed). For example, if the material used to make the tamperproof sack is sewn at any point, it is preferable that the sewing is located on the interior of the bag so that it is not exposed to the outside world. Preferably, all perforations are located only on the interior of the tamperproof sack, and no perforations are located on the exterior of the tamperproof sack.
[0110] If the tamperproof sack contains stitching, the stitching may be made from any suitable material. However, it is preferred that the stitching is made from a material that is tamperproof. In certain embodiments, the stitching is made from the same material as the tamperproof sack. It is preferred that the stitching have an EN or ANSI cut rating at least as high as the material used to make the tamperproof sack.
[0111] The material used to make the tamperproof sack is preferably bonded to itself or other materials using non-perforating methods, such as adhesives, zip ties of various materials (including metal and those made from the same material as the tamperproof sack), clamps, tapes, heat sealing, lamination, or other known methods. In one embodiment, any non-perforating means of sealing the tamperproof sack is located only on the interior of the tamperproof sack, and no non-perforating means of sealing the tamperproof sack are located on the exterior of the tamperproof sack. In another embodiment, a non-perforating means of sealing at least one end of the tamperproof sack comprises using a non-perforating method (such as a zip tie or heat seal) to bind one end of a tube of material, where the material is then flipped outside-in such that the sealing means is located on the interior of the tamperproof sack, thus forming a closed end of the tamperproof sack.
[0112] In certain embodiments, the tamperproof sack is stitch-free. In other embodiments, the tamperproof bag does not have any perforations. In still other embodiments, the tamperproof bag contains no holes or perforations on its exterior.
[0113] The size of the tamperproof sack is not particularly limited, and may be dictated by the size of the items that one desires to keep inside of it. Where the tamperproof sack is shaped like a tube, the tube may be, for example, from 0.1-6 feet long. However, for uses that are larger, the tube may be anywhere from 1-60 feet or longer. The diameter of the tube is also not particularly limited, and may be, for example, anywhere from 0.1 feet to 20 feet or more. For example, if the tamperproof sack were to be used to protect a load on a semitruck, the tamperproof sack could be 10-60 feet long and 3-12 feet or more in diameter.
[0114] In certain embodiments, the tamperproof sack may be envisioned as having a closed end and an open end. The closed end may be referred to as the bottom of the tamperproof sack, and the open end may be referred to as the opening or the top of the tamperproof sack. The closed end is sealed as discussed herein, and materials to be stored in the tamperproof sack enter and exit the tamperproof sack through the opening.
[0115] In one embodiment, the opening of the tamperproof sack is closed using a drawstring held in place at the top, or opening, of the tamperproof sack. The drawstring may be kept in place by a perforating method or a non-perforating method such as those listed above. In certain embodiments, the drawstring is kept in place by a sleeve stitched around the opening of the tamperproof sack. In other embodiments, the drawstring is kept in place by a sleeve formed around the opening of the tamperproof sack via heat sealing or an adhesive.
[0116] In certain embodiments, the tamperproof sack may be locked in a closed position by using a clamp to keep the opening of the tamperproof bag closed. The clamp may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein. The clamp in certain embodiments may be integrally formed with the lock.
[0117] In certain embodiments, the tamperproof sack may be locked in a closed position by using a zip tie to keep the opening of the tamperproof bag closed. The zip tie may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein. The zip tie in certain embodiments may be integrally formed with the lock.
[0118] In certain embodiments, the lock may be integrally formed with either the strap or the tamperproof sack.
[0119] The material that may be protected or stored in the tamperproof sack is not particularly limited and may include packages and other items that may be sent via mail. In other embodiments, the material that may be protected or stored in the tamperproof sack may be material that is abrasive or sharp, where the tamperproof bag provides protection to the user. Such material may include medical products (such as needles and the like), bulk cargo, plastic pellets, metal, glass, scrap, waste, and the like. In other embodiments, the material that may be protected or stored in the tamperproof sack may be a commodity, such as corn or wheat.
[0120] In certain embodiments, the tamperproof sack may be used as a method to transport cargo. For example, a large filled tamperproof sack may be transported via truck or ship.
[0121] The present disclosure also relates to methods of preventing the unauthorized removal of items from the tamperproof sack. Such methods may include the steps of filling the tamperproof sack as noted above and securing the tamperproof sack to a fixed object as noted above. The step of securing the tamperproof sack to a fixed object may include the use of a lock and locking the tamperproof sack to a fixed object. The method may further include informing an authorized user of a method by which to un-secure or open the tamperproof sack from the fixed object, and the subsequent un-securing of the tamperproof sack from the fixed object or opening of the tamperproof sack by the authorized user. The step of informing the authorized user of the method by which to un-secure or open the tamperproof sack from the fixed object is not particularly limited and may be any method known in the art, including but not limited to verbally or non-verbally (such as via an electronic communication) informing the authorized user of a combination to the lock.
[0122] The present disclosure also relates to a method of delivering objects, where the method includes an authorized user opening the tamperproof sack, inserting an object into the tamperproof sack, and then closing the tamperproof sack. The tamperproof sack prior to the delivery may or may not be secured to a fixed object. In instances where the tamperproof sack is secured to a fixed object prior to delivery, the step of opening the tamperproof sack may not require the tamperproof sack to be un-secured from the fixed object. In instances where the tamperproof sack is not secured to a fixed object prior to delivery, the authorized user may then secure the tamperproof sack to a fixed object either before or after inserting the object into the tamperproof sack. The step of closing the tamperproof sack may include a step of locking the tamperproof sack or another method as disclosed herein.
[0123] The present disclosure also relates to a method of secure transportation of an object from a first location to a second location. The method may include inserting an object into a tamperproof sack at a first location, closing the tamperproof sack such that only an authorized user may open it, and then transporting it to a second location. In alternative embodiments, the closing of the tamperproof sack may occur at the second location. The tamperproof sack may then be secured to a fixed object at the second location such that an authorized user could open or un-secure the tamperproof sack at the second location. In certain embodiments, an authorized user at a second location may open the tamperproof bag and remove the object from the tamperproof bag.
[0124] The method of secure transportation of an object from a first location to a second location may also include one or more of the steps and methods disclosed above relating to a method of delivering objects and/or preventing the unauthorized removal of items from the tamperproof sack.
[0125] As used herein, an authorized user is a person or entity that has permission from the owner or originator of the tamperproof sack to open, close, or otherwise use as described herein the tamperproof sack. The authorized user in most instances will be informed of a method by which to open or close the tamperproof sack without cutting or otherwise damaging the tamperproof sack. This information may be provided by the owner of the tamperproof sack or another person or entity permitted by the owner. For example, if the tamperproof sack is used to receive packages from a certain company, for example, Amazon®, the authorized user may be an Amazon® delivery person who has received instructions on how to open the tamperproof sack from either Amazon® (at the permission of the owner of the tamperproof sack) or the owner of the tamperproof sack, so as to deliver a package into the tamperproof sack. A second, usually different, authorized user may then open the tamperproof package after delivery so as to retrieve the delivered object.
[0126] It should be understood that the exemplary embodiments described herein should be considered in a descriptive sense only and not for purposes of limitation. Descriptions of features or aspects within each exemplary embodiment should typically be considered as available for other similar features or aspects in other exemplary embodiments. For example, the drawstring 110 shown in
[0127] While one or more exemplary embodiments have been described with reference to the figures, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope as defined by the following claims.