TAMPERPROOF SACK SYSTEM FOR HOME PACKAGE DELIVERIES

20230157472 · 2023-05-25

Assignee

Inventors

Cpc classification

International classification

Abstract

A tamperproof sack system includes a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack including a body and an adjustable opening portion formed in a top side of the body, the adjustable opening portion being configured to open and close; a door strap configured to secure the tamperproof sack to a door such that a rear side of the body is held against the door, the door strap being attached to the body and being configured to wrap around the door, the door strap including a door strap fastener configured to fasten the door strap to the door; and a lock including a keypad configured to receive user input, the lock configured to unlock the adjustable opening portion and thereby unlock the tamperproof sack based on whether the user input received at the keypad includes a valid access code.

Claims

1. A tamperproof sack system to securely contain a package, the tamperproof sack system comprising: a tamperproof sack made of material that satisfies a predetermined cut-resistance standard, the tamperproof sack comprising: a body having a bottom side and a top side opposite, wherein the body defines an interior configured to house a package therein; and an opening portion formed in the top side, the opening portion being configured to opened and closed; wherein the predetermined cut-resistance standard is European Standard EN-2 or above.

2. The tamperproof sack system according to claim 1, further comprising: a strap configured to affix the tamperproof sack to a fixed object; and a lock.

3. The tamperproof sack system according to claim 2, wherein the fixed object is a door.

4. The tamperproof sack system according to claim 2, wherein the door strap is made of the same type of material as the body.

5. The tamperproof sack system according to claim 4, wherein the strap is integrally formed with the body.

6. The tamperproof sack system according to claim 1, wherein the body is made from a material selected from the group consisting of one or more of high performance polyethylene, ultra-high molecular weight polyethylene, para-aramid, polyvinyl acetate, polyvinyl acetate yarn, steel wire, metal fiber, and fiberglass yarn, or combinations thereof.

7. The tamperproof sack system according to claim 6, wherein the body is made from ultra-high molecular weight polyethylene.

8. The tamperproof sack system according to claim 1, wherein the body is made from a single unperforated piece of material.

9. The tamperproof sack system according to claim 8, wherein the single unperforated piece of material is a single unperforated piece of ultra-high molecular weight polyethylene.

10. The tamperproof sack system according to claim 1, further comprising: a drawstring affixed to the opening portion and configured to open and close the opening portion; and a zip tie configured to keep the opening portion of the tamperproof bag closed.

11. The tamperproof sack system according to claim 1, wherein the body does not comprise perforations or holes other than the opening portion.

12. The tamperproof sack system according to claim 1, wherein the predetermined cut-resistance standard is European Standard EN-3 or above.

13. The tamperproof sack system according to claim 1, wherein the predetermined cut-resistance standard is European Standard EN-4 or above.

14. The tamperproof sack system according to claim 1, wherein the body is 0.1 to 6 feet long.

15. The tamperproof sack system according to claim 1, wherein the body is 6 to 60 feet long.

16. A method of preventing the unauthorized removal of items from the tamperproof sack system according to claim 1, the method comprising steps of: filling the tamperproof sack; attaching the tamperproof sack to a fixed object; and informing an authorized user of a method by which to open the tamperproof sack or detach the tamperproof sack from the fixed object.

17. The method according to claim 16, further comprising a step of opening of the tamperproof sack by the authorized user.

18. A method of delivering objects, the method comprising steps of, in order: a first authorized user accessing the tamperproof sack system according to claim 1 and opening the tamperproof sack, inserting an object into the tamperproof sack, and closing the tamperproof sack.

19. The method according to claim 18, further comprising, after the step of closing the tamperproof sack, a step of a second authorized user opening the tamperproof sack.

20. The method according to claim 18, further comprising a step of securing the tamperproof sack to a fixed object either before or after the step of inserting the object into the tamperproof sack.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0046] These and/or other aspects will become apparent and more readily appreciated from the following description of the exemplary embodiments, taken in conjunction with the accompanying drawings in which:

[0047] FIG. 1A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to an exemplary embodiment;

[0048] FIG. 1B is a perspective view of the tamperproof sack system of FIG. 1A, from the perspective of somebody standing inside of the home;

[0049] FIG. 2A is a view of the drawstring used in the tamperproof sack system of FIG. 1A being opened and closed;

[0050] FIG. 2B is a close-up view of the tamperproof sack system of FIG. 1A being opened and closed using the drawstring of FIG. 2A;

[0051] FIG. 3 is a cross-sectional view showing the components of the lock, according to an exemplary embodiment;

[0052] FIG. 4A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to another exemplary embodiment;

[0053] FIG. 4B is a close-up view of the tamperproof sack system of FIG. 4 being opened and closed;

[0054] FIG. 5 is a close-up view of a modified version of the tamperproof sack system of FIG. 4A, according to yet another exemplary embodiment; and

[0055] FIGS. 6A, 6B, 6C, and 6D illustrate a method of delivering a package to a home using the tamperproof sack system according to an exemplary embodiment.

[0056] FIGS. 7A and 7B are views of an embodiment of the tamperproof sack with a closing mechanism.

[0057] FIGS. 8A, 8B, and 8C are views of an embodiment of the tamperproof sack.

DETAILED DESCRIPTION

[0058] Hereinafter, a tamperproof sack system according to exemplary embodiments will be described with reference to the accompanying drawings.

[0059] The tamperproof sack system according to exemplary embodiments includes a combination of features that achieve a remarkably safe and easy-to-use system to ensure the security of home deliveries. In particular, according to certain exemplary embodiments, the tamperproof sack system includes one or more of a tamperproof sack made of tamperproof and weatherproof material, a strap that enables the tamperproof sack to be securely fastened to a door or other fixture of a home or any other desired object, and an electronic lock that locks the tamperproof sack closed. A homeowner can transmit an access code to a delivery person, and the delivery person can then use the access code to unlock the electronic lock and store a package in the tamperproof sack. The delivery person can then lock the tamperproof sack to secure the package. The access code can be generated according to various criteria, such as generating the access code based on a predetermined frequency (e.g., daily, hourly) or based on an event (e.g., detecting the delivery person's arrival), to ensure that the access code changes frequently. Moreover, the door strap is configured to be easily fastened and unfastened to a door or other fixture, so that a homeowner can easily attach or detach the tamperproof sack to the door based on whether a package is expected.

[0060] The tamperproof sack may take the form of a bag or a box or another container. The tamperproof sack may have soft or hard sides defining an interior volume that may be filled with an object or used to contain an object, depending on the embodiment. In some embodiments, the tamperproof bag may have openings in its sides to permit, for example, breathability, so long as those openings do not allow for the unauthorized removal of an item therein or otherwise compromise the tamperproof nature of the sack.

[0061] The tamperproof sack according to the present disclosure is easy to set up and take down. It is lightweight based on the materials used as disclosed herein.

[0062] FIG. 1 is a cross-sectional view illustrating a tamperproof sack system according to an exemplary embodiment. As shown therein, the tamperproof sack system 100 includes a tamperproof sack 102, a door strap 118, and a lock 130. The door strap 118 secures the tamperproof sack 102 to a door 101, and the lock 130, which includes a shackle 132, a lock body 134, and a keypad 136, can be locked and unlocked in response to a valid access code being input into the keypad 136, to thereby open and close the tamperproof sack 102.

[0063] The tamperproof sack 102 includes a body 104 and an adjustable opening portion 106. The body 104 includes a bottom side 104a, a top side 104b opposite the bottom side 104a, a left side 104c that is substantially perpendicular to the bottom side 104a, a right side 104d that is substantially parallel to the left side 104c, a front side 104e (i.e., the side facing out in FIG. 1A), and a rear side 104f opposite the front side (the rear side 104f facing in and contacting the door 101). The body 104 further includes an adjustable opening portion 106 formed in the top side 104b. When the adjustable opening portion 106 is opened, an opening 108 is formed in the top side 104b so that a delivery person can insert a package into the tamperproof sack 102 or a homeowner can remove the package from the tamperproof sack 102. When the adjustable opening portion 106 is closed, the opening 108 is closed. In the example shown in FIG. 1A, the left and right sides 104c and 104d are longer than the top and the bottom sides 104b and 104a to form a substantially rectangular sack shape. However, exemplary embodiments of the tamperproof sack 102 are not limited to any particular dimensions, size, or shape.

[0064] The body 104 of the tamperproof sack 102 is made of a material that is tamperproof and weatherproof, to protect packages from theft and harsh weather conditions, such as rain, wind, sleet, snow, and prolonged sun exposure. The body 104 may be made of a material that is cut-resistant, tear resistant or and/or puncture-resistant so that the body 104 cannot be easily cut, torn, or punctured by thieves. For example, the body 104 may be made of various types of fabrics manufactured by Kozane®, which achieve maximum cut, tear, and puncture resistance. Of course, the body 104 is not limited to being made of any particular type of material, and may be made of many different types of materials, such as ultra-high molecular weight polyethylene (UHMWPE), para-aramids (such as Twaron® or Kevlar®), high performance polyethylene (HPPE) (such as Dyneema® or Spectra®), polyvinyl acetate (PVA), special PVA yarns (such as SupraBlock®), steel wire, metal fibers, chain links made from various materials, fiberglass yarns, or the like, or combinations thereof. In some embodiments, the body includes at least 90% by weight of the materials listed above. In other embodiments, the body includes at least 95%, 98%, or 99% by weight of the materials listed above. In certain embodiments, the body consists of 100% by weight of the materials listed above. In some embodiments, the material making up the body does not include metal fibers or does not include chain links, in particular chain links made from metal. In other embodiments, the material making up the body does not include wire. In other embodiments, the body does not include wire and/or does not include metal at any point surrounding a drawstring, but may include wire and/or metal in other parts of the body. Thus, a drawstring, if affixed to the body, does not go through wire and/or metal at any point in certain embodiments. The body 104 may be manufactured to comply with various types of cut resistance standards and other types of standards, such as standards governing puncture resistance and tear resistance. Examples of these standards include the European Union (EN) standards and the American National Standards Institute (ANSI)/ISEA standards. The term “tamperproof” as used throughout this specification may refer to a material that provides a predetermined degree of resistance to tampering, theft, cutting, tearing, or puncturing. In other words, the “tamperproof” material satisfies certain standards with respect to at least one of cut-resistance, tear-resistance, and/or puncture-resistance. For example, the “tamperproof” material may satisfy an EN cut-level 3 (where the EN levels range from 1-5). In preferred embodiments, the tamperproof sack satisfies an EN cut-level of 2 or more. In other embodiments, an EN-3 cut-resistance level may be used. For higher levels of tamperproof behavior, an EN cut-level of 4 or 5 may be used. The level of cut-resistance that may be present in the material for the tamperproof sack is not particularly limited, and may be selected from any range within the EN-1 to EN-5 range. Alternatively, the “tamperproof” material may satisfy an ANSI cut-level A6 (where the ANSI levels range from A1-A9). Also, different versions of the tamperproof sack 102 could be manufactured to satisfy different “tamperproof” standards according to EN1-EN5 or A1-A9. For example, a lightweight tamperproof sack 102 might be manufactured to satisfy a lower cut-resistance level (e.g., ANSI cut-level A2), whereas a heavyweight tamperproof sack 102 might be manufactured to satisfy a higher cut-resistance level (e.g., ANSI cut-level A8 or above). Higher tamperproof resistance may be provided by using material having a cut-resistance level of A4 or above. In preferred embodiments, the cut-resistance level is A2 or above, for example to A9. In more preferred embodiments, the cut-resistance level is from level A4-A7. The range of cut-level resistance in the material is not particularly limited, and may be from A1-A9 as appropriate for a given application. Many different options are possible. The material used for the tamperproof material is not particularly limited as long as it meets the tamperproof standards noted herein. In certain embodiments, the tamperproof sack may be made to be waterproof. The means of waterproofing the tamperproof sack is not particularly limited. In preferred embodiments, the material may be UHMWPE and may provide an ANSI-A6 level of protection or above. The UHMWPE preferably has a Mw of over 1,000,000, and is preferably in the range of from 1,000,000 to 10,000,000 or above. In preferred embodiments, the Mw is in a range of from 1,000,000 to 7,500,000. An appropriate Mw may be selected as long as it provides the desired tamperproof properties and yield strength (for example, a desired cut resistance).

[0065] In some embodiments, the tamperproof sack does not contain holes or openings other than the opening 108 through which an object may be inserted into the tamperproof sack. Accordingly, in those embodiments, the tamperproof sack has only one opening—opening 108. In other embodiments, the tamperproof sack may contain perforations or holes that are not large enough for an unauthorized user to touch, or in some embodiments to remove, an object inside the tamperproof sack. For example, the tamperproof sack may contain perforations or openings other than the main opening, for example, on its sides, that are no larger than 4 inches in diameter, length, or width. Preferably, the perforations or openings are less than 3 inches, less than 2 inches, or less than 1 inch in diameter, length, or width. In preferred embodiments, the openings are less than ½ inch or less than ¼ inch in diameter, length, or width. On other embodiments, the openings are less than 1/10 inch or less than 1/100 inch in diameter, length or width. Other embodiments may include perforations or openings 1 micron or less in diameter, length, or width.

[0066] The tamperproof sack may be made using one layer of material or multiple layers of material. The layers of material may be made from the same or different materials as noted herein, so long as the tamperproof nature of the tamperproof sack is not compromised. Where the tamperproof sack has perforations or openings as noted above, the layers of material may be arranged such that even if the perforations or openings in an individual layer are larger than those values listed above, the multiple layers are arranged such that the openings of the tamperproof sack as a whole are not larger than the values noted above.

[0067] The body 104 further includes the adjustable opening portion 106 which can be adjustably opened and closed using various opening and closing mechanisms. In the exemplary embodiment shown in FIG. 1A, the adjustable opening portion 106 is the portion of the body 104 that forms a perimeter around the opening 108, and is a substantially circular shape. The tamperproof sack 102 includes a drawstring 110 (see FIG. 2A) that is used to open and close the adjustable opening portion 106.

[0068] As shown in FIG. 2A, the drawstring 110 includes a cord 110a which is a long, thin piece of material. FIG. 2A illustrates the drawstring 110 by itself, and FIG. 2B illustrates the drawstring 110 in use in the tamperproof sack 102. The cord 110a may be made of various types of materials, such as metal wire, plastic, various types of fabrics, etc. The cord 110a may be made of material similar to the body 104, such that the cord 110a is also cut-resistant, tear resistance or and/or puncture-resistant. The two ends 110b of the cord 110a (also referred to as “cord ends”) are passed through respective openings in a barrel cord lock 110d and typically tied together or otherwise fastened together, to thereby maintain the cord 110a in a large loop shape. The barrel cord lock 110d is a cylindrical locking mechanism having a main cylindrical body that includes two openings to allow the respective cord ends 110b to pass therethrough, and further includes a smaller cylinder provided inside of the main cylindrical body. A spring or other elastic mechanism is typically provided inside of the main cylindrical body to keep the smaller cylinder into a locked position. When a user presses the smaller cylinder, the openings in the main cylindrical body are opened to allow the cord ends 110b to pass through, thereby allowing the cord 110a to be pulled tighter or loosened up. When a user releases the smaller cylinder, the openings in the main cylindrical body are closed to fix the cord 110a into a fixed position. The drawstring 110 further includes two loops 110c through which a shackle 132 of the lock 130 can be passed therethrough to lock the adjustable opening portion 106 into a closed position.

[0069] More specifically, as shown in FIG. 2A, on the left-hand side of FIG. 2A, the drawstring 110 is fixed in an open position, and on the right-hand side of FIG. 2A, the drawstring 110 is fixed in a closed position. To transition from the open to closed position, a user presses the barrel cord lock 110d to release the cord 110a from the fixed open position and then pulls the cord ends 110b through the barrel cord lock 110d, to thereby tighten the drawstring 110 into the closed position. Then, the user can release the barrel cord lock 110d to fix the drawstring into the closed position.

[0070] FIG. 2B illustrates the drawstring 110 in use with the tamperproof sack 102. As shown in the left-hand side of FIG. 2B, in the open position, the drawstring 110 is almost completely sealed within the adjustable opening portion 106, except for the cord ends 110b and barrel cord lock 110d that are exposed outside of the adjustable opening portion. The drawstring 110 can be sealed within the adjustable opening portion 106 using various techniques, such as, for example, by sewing the drawstring 110 within the adjustable opening portion 106. To close the adjustable opening portion 106, the user presses the barrel cord lock 110d to release the cord 110a from the fixed open position, pulls the cord ends 110b to thereby pull the cord 110a into a closed position, and then releases the barrel cord lock 110d to fix the cord 110a and the adjustable opening portion 106 into the fixed closed position (shown on the right-hand side of FIG. 2B). The user can pull the cord ends 110b until the two loops 110c on the cord 110 are pulled out of the adjustable opening portion 106 and are exposed outside. At this point, the user can pass the shackle 132 of the lock 130 through the two loops 110c and lock the shackle 132 into place, thereby locking the adjustable opening portion 106 into a closed position. The two loops 110c can be configured such that, in the fixed closed position, the adjustable opening portion 106 is completely sealed or almost completely sealed so that a thief could not reach his or her hand into the tamperproof sack 102. Also, although the example in FIGS. 2A and 2B illustrates a drawstring configuration having two loops 110c, exemplary embodiments are not limited to using two loops 110c, and three or more loops may be used in various arrangements.

[0071] The tamperproof sack 102 further includes a flap 112 which is configured to be pulled over the adjustable opening portion 106 and fastened in place. The flap 112 is optional and provides an additional layer of covering for the adjustable opening portion 106 and the lock 130. As shown in FIG. 2B, the flap 112 includes a flap fastener inserting portion 114 attached to an end of the flap 112. The flap fastener inserting portion 114 incudes a flap fastener inserting portion strap 114a, at least one protruding member 114b, and a hole 114c. Moreover, the tamperproof sack 102 includes a flap fastener receiving portion 116 which is fixed to the front side 104e. The flap fastener receiving portion 116 includes a flap fastener receiving portion strap 116a and a hollow part 116b. The flap fastener inserting portion 114 and the flap fastener receiving portion 116 may collectively be referred to as the “flap fastener”. The flap fastener inserting portion 114 may be attached to the flap 112 in various ways, such as by sewing the flap fastener inserting portion strap 114a to the flap 112 or by manufacturing the flap fastener inserting portion 114 out of the same piece of material as the flap 112. The flap fastener receiving portion 116 may be formed in a similar fashion. In the exemplary embodiment shown in FIGS. 2A and 2B, the flap fastener is implemented as a side-release buckle strap, where the flap fastener inserting portion 114 includes the flap fastener inserting portion strap 114a and three protruding members 114b formed at the end thereof, and the flap fastener receiving portion 116 includes the flap fastener receiving portion strap 116a having a hollow part 116b that has holes in the sidewalls formed at the end thereof. When the protruding members 114b are inserted into the hollow part 116b, the protruding members bend to fit inside of the hollow part 116b and then snap back out of the holes in the sidewalls, to thereby fasten the flap fastener inserting portion 114 to the flap fastener receiving portion 116. Also, the flap fastener can optionally be configured to be locked by the lock 130. For example, the shackle 132 of the lock 130 can pass through the hole 114c when the flap fastener is locked, to thereby lock the flap 112 in place. This configuration provides an additional layer of security. The flap fastener can be locked to the lock 130 using many different types of configurations, e.g., holes in the strap, additional fastening devices, etc., and exemplary embodiments are not limited to any particular configuration.

[0072] The tamperproof sack 102 further includes a strap configured to affix the tamperproof sack to a fixed object. The strap may be configured to affix the tamperproof sack to any suitable object, such as a door, mailbox, fence, fence post, railing, tree, support column, gate, car, truck, truck bed, an item anchored or bolted into the ground or other object, or other fixed object that is difficult to move. Element 118 illustrates an embodiment of the strap as a door strap 118 that is configured to be wrapped around a door 101. The door strap 118 can be made of a material that is cut-resistant, tear resistance or and/or puncture-resistant so that the body 104 cannot be easily cut, torn, or punctured by thieves, similar to the material used to make the tamperproof sack 102. The door strap 118 is not limited to being made of any particular type of material. The door strap 118 can be integrally formed from the same piece of material as the tamperproof sack 102, or can be formed as a separate piece that is attached to sides of the tamperproof sack 102. When formed as a separate piece, ends of the door strap 118 can be respectively connected to the left side 104c and right side 104d of the tamperproof sack 102 using various techniques, such as sewing the ends of the door strap 118 to the left and right sides 104c and 104d. The strap may be made from the same material as the tamperproof sack or may be made from a different material. In some embodiments, the strap may be integrally formed with the tamperproof sack from a single piece of material or from the same pieces of material as the tamperproof sack. In other embodiments, the strap may be attached to the tamperproof sack. The method for attaching the strap to the tamperproof sack is not particularly limited, but should not diminish the tamperproof ability of the combined tamperproof sack and strap. For example, the strap may be affixed to the tamperproof sack using a method disclosed below relating to how the tamperproof sack may be made.

[0073] As shown in FIG. 1B, which is a perspective view of the tamperproof sack system 100 from the perspective of somebody standing inside of the home, the door strap 118 wraps around the door 101 and is fixed in place using the door strap fastener 122. The door strap may include a thin portion 120 where the door strap 118 wraps around corners of the door 101. In the example shown in FIG. 1B, the door strap fastener 122 is implemented as a swivel lobster claw-style fastener, which includes a swivel lobster claw clasp 122a and an eye 122. To fasten the door strap fastener 122 into place, a user opens the swivel lobster claw clasp 122a, hooks the opened lobster claw clasp 122a into the eye 122b, and then closes the swivel lobster claw clasp 122a to lock the swivel lobster claw clasp 122a in place. The swivel lobster claw-style fastener is very easy to fasten and unfasten, and can be designed using high-strength metal alloy components that enhance the strength of the system 100. Of course, exemplary embodiments are not limited to using a swivel lobster claw clasp as the door strap fastener 122, and many other types of fasteners can alternatively be used as the door strap fastener 122, such as buckles (e.g., side-release buckle straps), Velcro straps, buttons, zippers, hooks, etc.

[0074] FIG. 3 is a cross-sectional view showing the components of the lock 130, according to an exemplary embodiment. As shown therein, the lock 130 includes the shackle 132, the lock body 134, a keypad 136, a locking mechanism 338, communication circuitry 340, a central processing unit (CPU) 342, a memory 344, sensors 346, and a camera 348.

[0075] The shackle 132 is made out of brass, stainless steel, hardened streel, an alloy or combination of alloys, or some other type of high-strength material. The shackle 132 typically includes metal or metal alloy, although is not limited to such. The shackle 132 has a curved shape resembling an upside-down U, and has two ends 132a and 132b connected to the lock body 132. The first end 132a (also referred to as the “fixed end 132a”) is fixed to the lock body 132 and is rotatable, and the second end 132b (also referred to as “loose end 132b”) can be pulled up and out of a hole 132c formed in the lock body 132 to unlock the lock 130, and can be inserted back into the hole 132c to lock the lock 130. When the shackle 132 is unlocked, the loose end 132b can be pulled up and out of the lock body 132 and rotated about the rotatable first end 132a, so that the shackle 132 can be passed through various components (e.g., guided out of the loops 110c).

[0076] The lock body 134 houses each of the electrical and locking components therein, and is made out of a high-strength material, similar to the shackle 132. In the example shown in FIG. 3, the lock body 134 has a substantially circular shape, although exemplary embodiments are not limited thereto, and the lock body 134 can have many different shapes and sizes, e.g., rectangular, square, cylindrical, etc.

[0077] The keypad 136 includes a series of keys that can be pressed by a user to lock and unlock the lock 130. The keys can include any combination of numbers, letters, or symbols. For example, the keypad 136 can include a standard numerical layout including twelve keys, one for each single-digit number and two additional keys for the pound (#) and star (*) symbols, as is frequently used on phones. Alternatively, the keypad 136 can include only a few keys, e.g., three keys, four keys, five keys, etc., with corresponding numbers (e.g., keys 1-5). In the example shown in FIG. 2B, the keypad 136 includes a series of twelve keys 137 that are implemented as physically protruding mechanical buttons sticking out from the lock body 134. However, exemplary embodiments are not limited to this configuration. For example, the keypad 136 can be implemented as electronic pushbuttons, a digital touch screen, a dial, or any other device that can be used to input an access code. The keypad 136 can be electronic (e.g., battery powered) or manual.

[0078] The locking mechanism 338 is a series of components that collectively function together to lock and unlock the shackle 132 based on whether an access code is correctly input to the keypad 136. The locking mechanism 338 can include, for example, a series of spring-loaded pins, racks, gears, and other physical hardware components that interoperate to lock and unlock the shackle. When the correct (e.g., valid) access code is input to the keypad 136, the locking mechanism unlocks the shackle 132. When an incorrect (e.g., invalid) access code is input to the keypad 136, the locking mechanism keeps the shackle 132 locked. The locking mechanism 338 is not limited to any particular configuration, and many different types or combinations of locking mechanisms 338 may be used in the lock body 130.

[0079] The communication circuitry 340 is circuitry configured to transmit data to and receive data from other digital devices, such as digital devices being used by a homeowner and a delivery person. The communication circuitry 340 is implemented as at least one network module having at least one antenna 341. Generally, a network module includes a combination of hardware and software that is specially configured to transmit and receive data according to at least one type of data telecommunications standard, e.g., 4G, 5G, BLUETOOTH, Wi-Fi, etc., using the antenna 341. The network module may a chipset, system on chip (SoC), or component thereof that supports data communication. The antenna 341 may be configured as one or a plurality of multiple input, multiple output (MIMO) antenna groups. Exemplary embodiments are not limited to any particular configuration of antennas. For example, the antenna may be physically located inside or outside of the respective network module.

[0080] The CPU 342 controls overall operations of the components located within the lock body 134. Specifically, the CPU 342 controls operations of the keypad 136, the communication circuitry 340, the memory 344, the sensors 346, the camera 348, and the battery 350. The CPU 342 may be connected to the other components via electrical wire 343. The electrical wire 343 may be implemented as a series of a wires, a bus, or any other configuration that enables data communication between the CPU 342 and the other components.

[0081] The memory 344 stores access codes that are used to lock and unlock the lock 130. The memory 344 may be implemented as various types of memory devices, such as RAM, SRAM, DRAM, PROM, EPROM, EEPROM, flash memory, on-chip memory, ROM, optical disc drives, cloud-based storage, and other types of non-transitory storage media. In operation, when a new access code is received by the communication circuitry 341, the CPU 342 controls the memory 344 to store the new access code as a valid access code. Also, the CPU 432 may control the memory 344 to overwrite any previously stored access codes or otherwise mark the previously stored access codes as invalid.

[0082] The sensors 346 include at least one sensor that may be used to detect events occurring near the tamperproof sack system 100. For example, the sensors 346 may include a photosensor that detects an ambient brightness level. Thus, when a delivery person approaches the tamperproof sack system 100 and unfastens the flap 112, the sensors 346 may sense the sudden increase in brightness level and generate an alert that can be transmitted (via the communication circuitry 340) to a homeowner, to inform the homeowner that somebody is accessing the tamperproof sack system 100. The sensors 346 may alternatively be implemented as a noise sensor (e.g., a microphone, to detect noise), a motion sensor (e.g., an accelerometer, to detect whether the sack 102 is being moved), and/or other types or combinations of sensors. Moreover, the sensors 346 may also include various types of sensors that are configured to exchange data with another device. For example, the sensors 346 may include a near-field communication (NFC) sensor to exchange data with a delivery person or somebody else. The sensors 346 may also be omitted.

[0083] The camera 348 is an optical recording device that can record images or video and transmit the recorded images or video to a homeowner. The camera 348 can be implemented as many different types of camera, e.g., compact digital cameras, NEST® cameras, etc. In operation, the camera 348 can be used to transmit videos to the homeowner to alert the homeowner that somebody is accessing the tamperproof sack system 100 in real-time. In this case, the camera 348 can also be used in combination with the sensors 346. For example, the sensors 346 can indicate that the tamperproof sack system 100 is being accessed, which can trigger an alert to the user (via the communication circuitry 340), and can also trigger a command to the camera 348 to turn on and start recording. Alternatively, the camera 348 can simply record video without providing real-time alerts.

[0084] The battery 350 provides electrical power to the other electrical components within the lock body 134, including the communication circuitry 340, the CPU 342, the memory 344, the keypad 136, the sensors 346, and the camera 348. Also, if the locking mechanism 338 includes electrically powered components, the battery 350 may also provide electrical power to the locking mechanism 338.

[0085] To securely facilitate the delivery of packages using the tamperproof sack system 100, the lock 130 operates as follows. First, the homeowner uses her or his digital device 350 (also referred to as a “first digital communication device 350”) to generate a new access code 360 (also referred to as an “access code 360”) which is a valid access code that can be used to unlock the lock 130. The access code 360 can be any series if numbers, letters, or symbols that are compatible with the keypad 136. The first digital communication device 350 can be a smartphone, a laptop computer, a desktop computer, a security system interface, a combination of devices, or any other type of digital device configured to transmit data. When the first digital communication device 350 is a smartphone, the smartphone can generate the new access code 360 by using an application 352 stored on the smartphone. The application 352 can be a specially configured program designed to generate new access codes based on a predefined event or a predetermined frequency. For example, the application 352 can generate a new access code 360 in response to a user manually selecting an option to generate the new access code 360. Alternatively, the application 352 can generate a new access code 360 according to a predefined frequency, such as generating a new access code 360 once a day or once an hour. As another alternative, the application 352 can generate the new access code 360 in response to detecting an event, such as the sensors 346 detecting the presence of a Delivery person in a vicinity of the tamperproof sack 102. Many different criteria may be used to generate the new access code 360.

[0086] Once the application 352 generates the new access code 360, the first digital communication device 350 transmits the new access code 360 to both the lock 130 and the delivery person's digital device 352 (also referred to as a “second digital communication device 352”). Many different techniques and communication channels can be used to ensure that the access code 360 is correctly transmitted to the second digital communication device 352. For example, the delivery person can provide his or her phone number or email ahead of time, and the homeowner can manually text or email the access code 360 using the phone number or email address, or the application 352 can automatically transmit the access code to the phone number or email address. Alternatively, the first digital communication device 350 can automatically transmit any newly generated access codes 360 to a central phone number or email controlled by the delivery company, such as a central phone number or email used by Amazon®. The delivery company can then, in turn, provide the access code 360 to the delivery person.

[0087] The lock 130 receive the new access code 360 via the communication circuitry 340 and the CPU 342 stores the access code 360 in the memory 344. If the memory 344 is currently storing a previously generated access code, the CPU 342 can overwrite the previously generated access code with the new access code 360.

[0088] Alternatively, the memory 344 can simply store every new access code 360 without overwriting or erasing the previously stored access codes. Also, optionally, the memory 344 can store a “master” access code that is only known by the homeowner and that is not updated or changed, and is not shared with any delivery people. The “master” access code is a fixed code that the homeowner can use to access the tamperproof sack system 100 anytime, and is distinct from the dynamically changing access code 360 that is sent to delivery people.

[0089] Then, to deliver a package, the delivery person looks up the access code 360 stored in his or her digital device 360 (the second digital communication device 360) and enters the access code 360 into the keypad 136. In response to a valid access code 360 being input, the CPU 342 controls the locking mechanism 338 to unlock the shackle 132. The delivery person then removes the lock 130 by pulling the shackle 132 out from the two loops 110c (and optionally from the hole 115 in the flap fastener inserting portion 114, if the flap fastener inserting portion 114 is being used as an additional security layer), opens the adjustable opening portion 106 of the tamperproof sack 102 using the drawstring 110, and inserts the package into the body 104 of the tamperproof sack 102. To lock the tamperproof sack 102 back up, the delivery person closes the adjustable opening portion 106 using the drawstring 110, passes the shackle 132 back through the two loops 110c (and optionally the hole 115), and presses the loose end of shackle 132 down into a corresponding hole on the lock body 134 to lock the shackle 132 in place, thereby closing and locking the tamperproof sack 102. The package is now safely delivered inside of the tamperproof sack 102 and is ready to be picked up by the homeowner.

[0090] FIG. 4A is a perspective view of a tamperproof sack system strapped to a door of a home, from the perspective of somebody standing outside of the home, according to another exemplary embodiment. The tamperproof sack system 400 shown in FIG. 4A is similar to the tamperproof sack system 100 shown in FIG. 1A, except that the tamperproof sack system 400 includes a zipper 440 provided on the front side 104e of the tamperproof sack 402, and does not include the adjustable opening portion 106.

[0091] More specifically, the tamperproof sack system 400 includes a tamperproof sack 402, a door strap 418, and a lock 430. The tamperproof sack 402 includes a body 404 including a bottom side 404a, a top side 404b opposite the bottom side 404a, a left side 404c that is substantially perpendicular to the bottom side 404a, a right side 404d that is substantially parallel to the left side 404c, a front side 404e (i.e., the side facing out in FIG. 4A), a rear side 404f opposite the front side (the read side facing in and contacting the door 101), a flap 412, a flap fastener inserting portion 414 attached to an end of the flap 112, and a flap fastener receiving portion 416 which is fixed to the front side 104e. Unlike the exemplary embodiment in FIG. 1A, the top side 404b in the exemplary embodiment shown in FIGS. 4A and 4B does not have the adjustable opening portion 106. The flap fastener inserting portion 414 and the flap fastener receiving portion 416 may collectively be referred to as the “flap fastener”. A hole 415 may be formed in the flap fastener inserting portion 414. The lock 430 includes a shackle 432, a lock body 434, and a keypad 436. Each of the components including the tamperproof sack 402, door strap 418, and lock 430 described above may have the same structure and functionality as the tamperproof sack 102, door strap 118, and lock 430 described with respect to FIG. 1A, respectively.

[0092] As shown in FIG. 4B, the tamperproof sack 402 further includes a zipper 440 and a track 442. The zipper 440 includes a zipper pull 440a, a zipper pull hole 440b, and a slider 440c. The track 442 includes a series of protrusions on the left and right sides (also known as “teeth”), which are arranged such that each tooth on the left side of the track 442 fits into the gap between two adjacent teeth on the right side of the track 442, and each tooth on the right side of the track 442 fits into the gap between two adjacent teeth on the left side of the track 442, in an interlocking fashion. The slider 440c is connected to the track 442 and is configured to slide up the track 442 to thereby interlock together the two opposing strips of teeth together, and is configured to slide down the track 442 to unlock the two opposing strips of teeth. The zipper pull 440a is connected to the slider 440c and is used to pull the slider 440c up and down the track 442. Also, the zipper pull 440a includes a zipper pull hole 440b formed therein. The shackle 432 can pass through the zipper pull hole 440b, to thereby lock the zipper 440 in place in a locked position.

[0093] The tamperproof sack 402 also includes a front side loop 444 and a back side loop 446 which are fixed in place. The front side loop 444 is formed on a front portion of the top side 404b, and the rear side loop 446 is formed on a rear portion of the top side 404b. When the zipper 440 is zipped up, the shackle 432 can pass through each of the front side loop 444, the rear side loop 446, and the zipper pull hole 440c, thereby fixing the zipper 440 into a closed portion. Unlike the exemplary embodiment shown in FIG. 1A, the exemplary embodiment shown in FIGS. 4A and 4B does not include the drawstring 110 or the adjustable opening portion 106. However, it is also possible to combine the exemplary embodiments shown in FIG. 1A and FIG. 4A to add a drawstring 106 in the top portion 404b of the tamperproof sack 402, if desired. Also, although FIG. 4B illustrates two loops 444 and 446, it is also possible to use only one loop, or use three or more loops.

[0094] The tamperproof sack system 400 is especially useful for handling larger package deliveries, since the zipper 400 allows the entire front side 404e of the tamperproof sack 402 to be unzipped.

[0095] FIG. 5 is a close-up view of a modified version of the tamperproof sack system of FIG. 4A, according to yet another exemplary embodiment. The tamperproof sack system 500 of FIG. 5 is substantially similar to the tamperproof sack system 400 of FIGS. 4A and 4B, except that, in the tamperproof sack system 500, the flap 412 is used to secure the tamperproof sack system 500 closed. Specifically, as shown in the left-hand side of FIG. 5, when the zipper 440 is zipped up to a closed position, a zipper flap 502 can be folded over to cover the zipper 440. The zipper flap 502 can be fastened shut with snaps 504 (or some other fastening mechanism, such as Velcro, etc.). As shown in the right-hand side of FIG. 5, once the zipper 440 is securely covered with the zipper flap 502, the flap 412 can be folded over the top of the tamperproof sack 502 and fastened closed using the flap fastener (i.e., the flap fastener inserting portion 414 and the flap fastener receiving portion 416).

[0096] In the modified version shown in FIG. 5, the front side loop 544 is located lower down on the front side of the tamperproof sack 502 than the front side loop 444 (FIG. 4B), because in the modified version shown in FIG. 5, since the zipper 440 is covered under the zipper flap 502, the zipper hole 440c is not used to help secure the shackle 432. Thus, the front side loop 544 is located lower down on the front side of the tamperproof sack, and a rear side loop 546 is fixed on the flap 412, so that the front side loop 544 and the rear side loop 546 can be locked together and thereby lock the flap 412 in place to cover the zipper and thus prevent access to the zipper, as shown on the right-hand side of FIG. 5.

[0097] FIGS. 6A, 6B, 6C, and 6D illustrate a method of delivering a package to a home using the tamperproof sack system according to an exemplary embodiment. In FIGS. 6A-6D, the tamperproof sack system 100 is shown for illustrative purposes. However, the method shown in FIGS. 6A-6D can also be used with other tamperproof sack systems, such as tamperproof sack system 400 (FIG. 4A), tamperproof sack system 500 (FIG. 5), or some other modified version of the tamperproof sack systems according to exemplary embodiments.

[0098] In operation 610 shown in FIG. 6A, a delivery person 600 delivering a package receives a new access code 360. The delivery person 600 receives the new access code 360 that is transmitted from the homeowner's digital communication device 350 (the first digital communication device 350) to the delivery person's digital communication device 352 (the second digital communications device 352). The access code 360 can be transmitted according to various criteria and using various techniques. For example, the access code 360 can be directly transmitted to the delivery person's digital communications device 352 in response to a request from the delivery person, can be transmitted automatically to the delivery person at a certain time of day, can be transmitted automatically to the delivery person based on proximity (e.g., when the delivery person gets within a certain radius of the homeowner's digital communication device 350), or based on some other criteria. As another alternative, the sensors 346 and/or camera 348 can be used to sense or detect when the delivery person 600 arrives, and the access code 360 can be transmitted in response to sensing or detecting the arrival. Also, the access code 360 can be indirectly transmitted to the delivery person's digital communications device 360 through an intermediate node or network. For example, the access code 360 can be transmitted to the delivery company (e.g., AMAZON®) and stored by the delivery company, and then transmitted from the delivery company to the delivery person 600 at an appropriate time.

[0099] In operation 620 shown in FIG. 6B, the delivery person 600 unlocks the tamperproof sack system 100 using the access code 360 and inserts the package 602 into the tamperproof sack 102. For example, the delivery person 600 can enter the access code 360 into the keypad 136, to thereby cause the locking mechanism 338 to unlock one end of the shackle 132. The delivery person 600 then removes the shackle 132 and opens the adjustable opening portion 106, e.g., by loosening the drawstring 110. The delivery person 600 then slides the package 602 into the tamperproof sack 102.

[0100] In operation 630 shown in FIG. 6C, the delivery person 600 locks the tamperproof sack 102 back up by tightening the adjustable opening portion 106 (e.g., by tightening the drawstring 110), passing the loose end of the shackle 132 back through the loops 110c of the drawstring 110, and pressing the loose end of the shackle 132 into the lock body 134 to lock the tamperproof sack 102. The delivery person 600 then leaves the premises.

[0101] In operation 640 shown in FIG. 6D, the homeowner 604 arrives home and unlocks the tamperproof sack 102 to thereby take possession of the package 602. The homeowner 604 can use the same access code 360 transmitted to the delivery person 600, or can use some other access code (e.g., a “master” access code). Moreover, if the homeowner 604 desires, the homeowner 604 can unfasten the entire temporary sack 102 from the door 101 by unfastening the door strap fastener 122, and can then store the temporary sack 102 for later use.

[0102] Another embodiment of the present disclosure is illustrated in FIGS. 7A and 7B. FIGS. 7A and 7B illustrate an embodiment in which a closing mechanism, in this case a lock 701, is part of a zip tie used to secure the tamperproof sack 702. In this embodiment, the tamperproof sack is secured to a door 703 using the lock 701. The zip tie 701 is pulled tightly enough that the opening 704 of the tamperproof sack cannot fit through the zip tie until it is unlocked. In this embodiment, the tamperproof sack may be unlocked by a user who knows how to unlock the lock 701 (in the illustrated embodiment, the user will know the combination to the lock), the opening 704 may be opened and filled with the desired item, the opening 704 may then be closed using the drawstring 705, and the lock 701 may be placed as shown, preventing the tamperproof sack 702 from being opened or removed from the door 703 until another authorized user removes the lock 701.

[0103] FIGS. 8A, 8B, and 8C illustrate an embodiment of the tamperproof sack 801 without a strap or a lock, although it is envisioned that a strap or a lock may be added in certain embodiments. In FIG. 8A, the tamperproof sack is shown with a closed end 802 and an open end 803. A drawstring 804 is shown at open end 803 and is attached around the periphery of open end 803 so as to provide for the closing of open end 803 when the drawstring 804 is tightened. Closed end 802 may be formed by virtue of any method known in the art or disclosed herein. For example, closed end 802 may be formed by virtue of folding a single piece of material such that sides 805 are sealed together and open end 803 is thereby formed. The methods by which sides 805 may be sealed in such an embodiment are not particularly limited, and may be those known in the art or disclosed herein. In another embodiment, closed end 802 may also be formed by providing a tubular material to form the tamperproof sack 801 and then sealing the closed end using a method disclosed herein or a method known in the art. Preferably, the method of sealing closed end 802 or sides 805 is a method that will not reduce the tamperproof nature of the tamperproof sack. A method of closing the open end 803 is not particularly limited as long as it does not reduce the tamperproof nature of the tamperproof sack.

[0104] FIG. 8B illustrates opening the open end 803. In this embodiment, the drawstring 804 may be drawn closed after an object is placed inside the tamperproof sack, thereby closing open end 803 as illustrated in FIG. 8C. FIG. 8C illustrates an embodiment in which the tamperproof sack is closed and partially folded over.

[0105] It should be noted that although some of the figures illustrate the tamperproof sack including a drawstring, the tamperproof sack does not need to include a drawstring and in some embodiments does not include a drawstring. The tamperproof sack may be closed using any method known in the art or disclosed herein.

[0106] The material from which the tamperproof sack may be made has been described previously. In certain preferred embodiments, the material may be UHMWPE having a molecular weight as discussed above, and providing a level of protection of ANSI-A2 or above, in other embodiments is ANSI-A4 or above, and in other embodiments ANSI-A6 or above. The level of protection in terms of EN cut resistance is preferably EN-2 or above, in other embodiments EN-4 or above, and in other embodiments EN-5 or EN-6.

[0107] In certain embodiments, the tamperproof sack is made from a single unperforated piece of material. For example, the single unperforated piece of material may be a tube. The cross-sectional shape of the tube is not particularly limited, and may be circular, oval, rectangular, or the like. The tube may be formed by weaving the material on a circular loom. The single unperforated material may also be a sheet in certain embodiments, where the sheet is later adhered to itself to form the tamperproof sack.

[0108] In other embodiments, the tamperproof sack is made from multiple pieces of material adhered to each other to form the tamperproof sack. For example 2, 3, 4, or more pieces of material may be adhered to each other so as to form the tamperproof sack.

[0109] In certain embodiments, it may be necessary to perforate the material to, for example, sew it to other materials or to itself. In instances where it is necessary to perforate the tamperproof sack, it is preferable that the perforations do not cause a structural weakness in the tamperproof sack that would permit someone to open the bag in an unauthorized manner (such as by cutting into it, tearing the tamperproof sack, or entering the tamperproof sack by any means other than the opening through which the interior of the bag is intended to be accessed). For example, if the material used to make the tamperproof sack is sewn at any point, it is preferable that the sewing is located on the interior of the bag so that it is not exposed to the outside world. Preferably, all perforations are located only on the interior of the tamperproof sack, and no perforations are located on the exterior of the tamperproof sack.

[0110] If the tamperproof sack contains stitching, the stitching may be made from any suitable material. However, it is preferred that the stitching is made from a material that is tamperproof. In certain embodiments, the stitching is made from the same material as the tamperproof sack. It is preferred that the stitching have an EN or ANSI cut rating at least as high as the material used to make the tamperproof sack.

[0111] The material used to make the tamperproof sack is preferably bonded to itself or other materials using non-perforating methods, such as adhesives, zip ties of various materials (including metal and those made from the same material as the tamperproof sack), clamps, tapes, heat sealing, lamination, or other known methods. In one embodiment, any non-perforating means of sealing the tamperproof sack is located only on the interior of the tamperproof sack, and no non-perforating means of sealing the tamperproof sack are located on the exterior of the tamperproof sack. In another embodiment, a non-perforating means of sealing at least one end of the tamperproof sack comprises using a non-perforating method (such as a zip tie or heat seal) to bind one end of a tube of material, where the material is then flipped outside-in such that the sealing means is located on the interior of the tamperproof sack, thus forming a closed end of the tamperproof sack.

[0112] In certain embodiments, the tamperproof sack is stitch-free. In other embodiments, the tamperproof bag does not have any perforations. In still other embodiments, the tamperproof bag contains no holes or perforations on its exterior.

[0113] The size of the tamperproof sack is not particularly limited, and may be dictated by the size of the items that one desires to keep inside of it. Where the tamperproof sack is shaped like a tube, the tube may be, for example, from 0.1-6 feet long. However, for uses that are larger, the tube may be anywhere from 1-60 feet or longer. The diameter of the tube is also not particularly limited, and may be, for example, anywhere from 0.1 feet to 20 feet or more. For example, if the tamperproof sack were to be used to protect a load on a semitruck, the tamperproof sack could be 10-60 feet long and 3-12 feet or more in diameter.

[0114] In certain embodiments, the tamperproof sack may be envisioned as having a closed end and an open end. The closed end may be referred to as the bottom of the tamperproof sack, and the open end may be referred to as the opening or the top of the tamperproof sack. The closed end is sealed as discussed herein, and materials to be stored in the tamperproof sack enter and exit the tamperproof sack through the opening.

[0115] In one embodiment, the opening of the tamperproof sack is closed using a drawstring held in place at the top, or opening, of the tamperproof sack. The drawstring may be kept in place by a perforating method or a non-perforating method such as those listed above. In certain embodiments, the drawstring is kept in place by a sleeve stitched around the opening of the tamperproof sack. In other embodiments, the drawstring is kept in place by a sleeve formed around the opening of the tamperproof sack via heat sealing or an adhesive.

[0116] In certain embodiments, the tamperproof sack may be locked in a closed position by using a clamp to keep the opening of the tamperproof bag closed. The clamp may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein. The clamp in certain embodiments may be integrally formed with the lock.

[0117] In certain embodiments, the tamperproof sack may be locked in a closed position by using a zip tie to keep the opening of the tamperproof bag closed. The zip tie may be locked in a closed position using a suitable lock, for example one of the locks disclosed herein. The zip tie in certain embodiments may be integrally formed with the lock.

[0118] In certain embodiments, the lock may be integrally formed with either the strap or the tamperproof sack.

[0119] The material that may be protected or stored in the tamperproof sack is not particularly limited and may include packages and other items that may be sent via mail. In other embodiments, the material that may be protected or stored in the tamperproof sack may be material that is abrasive or sharp, where the tamperproof bag provides protection to the user. Such material may include medical products (such as needles and the like), bulk cargo, plastic pellets, metal, glass, scrap, waste, and the like. In other embodiments, the material that may be protected or stored in the tamperproof sack may be a commodity, such as corn or wheat.

[0120] In certain embodiments, the tamperproof sack may be used as a method to transport cargo. For example, a large filled tamperproof sack may be transported via truck or ship.

[0121] The present disclosure also relates to methods of preventing the unauthorized removal of items from the tamperproof sack. Such methods may include the steps of filling the tamperproof sack as noted above and securing the tamperproof sack to a fixed object as noted above. The step of securing the tamperproof sack to a fixed object may include the use of a lock and locking the tamperproof sack to a fixed object. The method may further include informing an authorized user of a method by which to un-secure or open the tamperproof sack from the fixed object, and the subsequent un-securing of the tamperproof sack from the fixed object or opening of the tamperproof sack by the authorized user. The step of informing the authorized user of the method by which to un-secure or open the tamperproof sack from the fixed object is not particularly limited and may be any method known in the art, including but not limited to verbally or non-verbally (such as via an electronic communication) informing the authorized user of a combination to the lock.

[0122] The present disclosure also relates to a method of delivering objects, where the method includes an authorized user opening the tamperproof sack, inserting an object into the tamperproof sack, and then closing the tamperproof sack. The tamperproof sack prior to the delivery may or may not be secured to a fixed object. In instances where the tamperproof sack is secured to a fixed object prior to delivery, the step of opening the tamperproof sack may not require the tamperproof sack to be un-secured from the fixed object. In instances where the tamperproof sack is not secured to a fixed object prior to delivery, the authorized user may then secure the tamperproof sack to a fixed object either before or after inserting the object into the tamperproof sack. The step of closing the tamperproof sack may include a step of locking the tamperproof sack or another method as disclosed herein.

[0123] The present disclosure also relates to a method of secure transportation of an object from a first location to a second location. The method may include inserting an object into a tamperproof sack at a first location, closing the tamperproof sack such that only an authorized user may open it, and then transporting it to a second location. In alternative embodiments, the closing of the tamperproof sack may occur at the second location. The tamperproof sack may then be secured to a fixed object at the second location such that an authorized user could open or un-secure the tamperproof sack at the second location. In certain embodiments, an authorized user at a second location may open the tamperproof bag and remove the object from the tamperproof bag.

[0124] The method of secure transportation of an object from a first location to a second location may also include one or more of the steps and methods disclosed above relating to a method of delivering objects and/or preventing the unauthorized removal of items from the tamperproof sack.

[0125] As used herein, an authorized user is a person or entity that has permission from the owner or originator of the tamperproof sack to open, close, or otherwise use as described herein the tamperproof sack. The authorized user in most instances will be informed of a method by which to open or close the tamperproof sack without cutting or otherwise damaging the tamperproof sack. This information may be provided by the owner of the tamperproof sack or another person or entity permitted by the owner. For example, if the tamperproof sack is used to receive packages from a certain company, for example, Amazon®, the authorized user may be an Amazon® delivery person who has received instructions on how to open the tamperproof sack from either Amazon® (at the permission of the owner of the tamperproof sack) or the owner of the tamperproof sack, so as to deliver a package into the tamperproof sack. A second, usually different, authorized user may then open the tamperproof package after delivery so as to retrieve the delivered object.

[0126] It should be understood that the exemplary embodiments described herein should be considered in a descriptive sense only and not for purposes of limitation. Descriptions of features or aspects within each exemplary embodiment should typically be considered as available for other similar features or aspects in other exemplary embodiments. For example, the drawstring 110 shown in FIG. 2A can also be used in the tamperproof sack system 400 (FIG. 4A) or the tamperproof sack system 500 (FIG. 5). Also, although FIG. 4A illustrates a single zipper 440, multiple zippers can be used in various configurations. Moreover, although the exemplary embodiments shown in FIGS. 1A, 1B, and 4A illustrate the temporary sack systems as being fastened to a door 101, the temporary sack systems can also be fastened to other objects as well, e.g., windows, trees, fences, etc. Also, according to certain exemplary embodiments, it may be desirable to fasten the tamperproof sack system 100 to a fixture or anchored object located outside (e.g., a tree), in which case the strap fastener 122 can be modified so that the strap fastener is also locked by the lock 130. For example, the strap fastener 122 may have holes formed therein through which the shackle 132 can pass, or may have separate attachment devices that can be locked in place by the shackle 132. As a result, the entire tamperproof sack system 100 can be safely and securely left outside.

[0127] While one or more exemplary embodiments have been described with reference to the figures, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope as defined by the following claims.