Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
MONITORING SECURED BAGS
Document Type and Number:
WIPO Patent Application WO/2016/042537
Kind Code:
A1
Abstract:
According to embodiments of the invention, systems, methods and devices are provided for monitoring movements by non-owners with respect to a physical bag and capturing identities of the non-owners when the bag is misappropriated. The bag may have multiple sensors and/or interfaces for communicating with the surrounding environment as well as wireless communication via a wireless network. Cameras and/or touch screens are used to capture identifying data about potential thieves and/or unauthorized individuals accessing the contents of the bag. The bag may be wireless network enabled (via a SIM card) and may also have a GPS receiver for determining location information. A processor associated with the bag compares acquired identifying data which that of a data stored in memory in order to determine if an individual is permitted to access the contents of the bag.

Inventors:
PAULINE LI (CN)
Application Number:
PCT/IB2015/057266
Publication Date:
March 24, 2016
Filing Date:
September 21, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ERINA LTD (CN)
International Classes:
A45C13/18
Foreign References:
CN101953561A2011-01-26
CN2751625Y2006-01-18
CN103536007A2014-01-29
US20090226050A12009-09-10
Download PDF:
Claims:
A physical bag for monitoring movements by non-owners and capturing identities of the non-owners when the bag is misappropriated, comprising:

a bag with a body and a flappable member;

a locking member attachable to the flappable member, wherein the locking member is revealed when the flappable member is flapped up;

a first camera associated with the locking member, wherein the first camera is

concealed until the flappable member is flapped up and a tab attached to the body is disengaged, further wherein the first camera automatically captures images whenever the locking member and the tab is disengaged, the captured images being images of items being checked-in or checked-out from the bag and a user attempting to open the bag;

a touch screen associated with the tab, wherein the touch screen captures fingerprint information of the user attempting to open the bag;

a set of integrated circuits programmable to access stored images tagged with identity information related to goods, individuals, and how individuals are related;

a second camera associated with the flappable member,

a location component included in the bag;

a SIM card installed in the bag, wherein the SIM card sends information to an owner of the bag instantly, the information including the images captured by the first camera and the second camera when the bag is being opened by the user, and the fingerprint information detected by the touch screen; a processor; and

a memory storing instructions that cause the processor to execute a method, the

method comprising:

detecting that the locking member is being disengaged from the tab:

verifying an identity of the user, wherein the verification is made by:

using the touch screen to detect the fingerprints of the user; and

comparing the fingerprints of the user detected with the fingerprints of the owner of the bag, wherein the fingerprints of the owner of the bag are pre-regi tered in the memory.

2. The physical bag of claim 1, wherein if the identity of the user is confirmed to belong to the owner, the bag remains pending and no action is taken.

3. The physical bag of claim 1 , wherein if the identity of the user is confirmed to belong to a non- owner:

taking images using the second camera, wherein the images include a face of the user and items removed by the user from the bag,

contacting the owner of the bag using the SIM card;

reporting the current location of the bag using the location component;

reporting the actions taken by the user with respect to the bag; and

sending the images taken by the camera.

4. The physical bag of claim 3, wherein the images, the current location, and the actions taken by the user are all transmitted via a wireless network to a device associated with the owner of the bag.

5. The physical bag of claim 1, wherein it is determined if a direct relationship exists between the user and the owner of the bag based on the tagged information of the stored images.

6. The physical bag of claim 5, wherein if a direct relationship is determined to exist, information regarding the direct relationship is sent to the owner.

7. The physical bag of claim 1, where it is determined if an indirect relationship exists between the user and the owner of the bag based the tagged information of the stored images and how individuals of the stored images are related.

8. The physical bag of claim 1 , wherein the method further comprises a step of:

determining that an item is a stolen when no records indicate that the item was re-inserted into the bag at a later time.

9. The physical bag of claim 8, wherein the method further comprises a step of:

determining if a potential loss of trade secret has occurred upon indication that the item is re-inserted into the bag at a later time.

10. A method for securing contents of a bag, the method comprising the foll owing detecting, using a sensor associated with the bag, that the bag is being manipulated; reading fingerprints of a user manipulating the bag using a touch screen disposed on a portion of the bag; and

comparing the fingerprints to pre-registered fingerprints of the owner.

11. The method of claim 10, further comprising a step of:

taking images with a camera disposed on the bag if the fingerprints of the user do not match those of the owner.

12. The method of claim 11, further comprising a step of:

transmitting the images to the owner of the bag.

13. A physical bag for monitoring movements by non-owners and capturing identities of the non-owners when the bag is misappropriated, comprising:

a bag with a body and a flappable member;

a locking member attachable to the flappable member, wherein the locking member can only be revealed when the flappable member is flapped up;

a camera associated with the locking member, wherein the camera is invincible until the flappable member is flapped up, wherein the camera automatically captures images whenever the locking member and the tab is about to be disengaged, the captured images including images of items being checked-in or checked-out from the bag, the user attempting to open the bag;

a touch screen associated with a tab attached to the body that can be engaged with the locking member, wherein the touch screen is used to capture fingerprint information of a user attempting to open the bag;

a set of integrated circuits that is programmed to access stored images tagged with identity information related to goods, individuals, and how individuals are related; a camera associated with the f!appable member,

a location component included in the bag;

a SIM card installed in the bag, wherein the card can be triggered to send information to an owner of the bag instantly, the information including the images captured by the camera when the bag is being opened by a non-owner, , and the fingerprint information detected by the touch screen;

a processor; and

a memory storing instructions that cause the processor to execute a method, the

method comprising:

detecting whether the bag is being moved made by a person, wherein the detection is made when the locking member is being disengaged with the tab,

after detecting that the bag has been moved by the person,

verifying an identity of the person, wherein the verification is made by:

using the touch screen to detect the fingerprints of the person; and comparing the fingerprints of the person detected with the fingerprints of the owner of the bag, wherein the fi ngerprints of the owner of the bag have been pre-registered in the memory;

if the identity of the person is confirmed to belong to the owner, the bag remains pending and no action needs to be taken;

if the identity of the person is confirmed to belong to the non- owner:

taking images by the camera mounted on the inside of the flappable member, wherein the images include face of the non-owner and actions by the person including the items being taken out by the person from the bag;

contacting the owner of the bag by using the SIM card installed in the bag;

reporting the current location of the bag by using the location component included in the bag;

reporting, to the owner, the actions taken by the person regarding the bag; and sending the images taken by the camera to the owner;

determining if an item belongs to a stolen item when no records indicate that the item is re-inserted into the bag at a later time; and

determining if a potential loss of trade secret is found despite no physical property is lost when the records indicate that the item is re-inserted into the bag at a later time.

Description:
[001 ] This invention generally relates to personal security. Specifically, this invention relates providing security and surveillance of personal items carried in a bag by an individual.

BACKGROUND OF THE INVENTION

[002] Keeping bags safe is important. Unfortunately, many owners are not very careful with their bags by leaving them unattended. When that happens, the bags as well as the invaluable items would become a theft target. In some cases, the persons who misappropriate the bags may not be known to the bag owner. However, this person may be somehow connected to the owner indirectly. For example, the person may be a friend of the wife of the owner. In such a case, it would be helpful to know the background of the person for purpose of recovering the items.

[003] Additionally, other detailed information with respect to the misappropriation may also be of interest to the owner, including the objects being misappropriated, and the time and place where the event occurred. On the other hand, intangible property, as well as physical property, can also be the target of misappropriation. For example, a bag left unattended may be opened and searched by a third party and nothing has been stolen or taken out from the bag. However, in such a case, important information inside the bag may have already been leaked to the public domain by the third party. It would be crucial for the bag owner to know what has been searched or looked out by whom and when and what remedial actions can be taken promptly to recover the loss of the valuable property in order to rectify the situation.

[004] Therefore, it is an objective of the disclosed technology allowing bag owners to monitor the contents of the bag and at the same scaitinizing any individuals from accessing the interior of the bag and/or the contents.

SUMMARY OF THE INVENTION

[005] According to embodiments of the invention, systems, methods and devices are provided for monitoring movements by non-owners with respect to a physical bag and capturing identities of the non-owners when the bag is misappropriated. The bag may have multiple sensors and/or interfaces for communicating with the surrounding environment as well as wireless communication via a wireless network. Cameras and/or touch screens are used to capture identifying data about potential thieves and/or unauthorized individuals accessing the contents of the bag. The bag may be wireless network enabled (via a SIM card) and may also have a GPS receiver for determining location information. A processor associated with the bag compares acquired identifying data which that of a data stored in memory in order to determine if an individual is permitted to access the contents of the bag,

[008] In an embodiment of the disclosed invention, a physical bag monitors movements by non-owners and captures identities of the non-owners when the bag is misappropriated. A "physical bag" or "bag", for purposes of this specification, is defined as any non-rigid, semi-rigid or rigid container for storing, carrying, and/or transporting items. The "bag" may be, but is not limited to, a handbag, a purse, a sack, a backpack, a duffle bag, a suitcase, a piece of luggage, a brief case, a wristlet, a tote bag, a travel bag, a satchel, a gunny sack, a messenger bag, and/or a pocketbook. The bag may be composed of a body and a flappable member. A locking member may be attachable to the flappable member such that the locking member is revealed when the flappable member is flapped p.

[007] The bag may have a first camera associated with the locking member such that the first camera is concealed until the flappable member is flapped up and a tab attached to the body is disengaged. The first camera automatically captures images whenever the locking member and the tab is disengaged. The captured images may be images of items being checked-in or checked-out from the bag and a user attempting to open the bag. A touch screen may also be associated with the tab. The touch screen may be configured to captures fingerprint information of the user attempting to open the bag.

[008] The bag may also have numerous other electronic and/or computing components. A set of integrated circuits associated with the hag may be programmable to access stored images tagged with identity information related to goods, individuals, and how individuals are related. A second camera may be associated with and/or disposed on the flappable member.

[009] A location component, such as a Global Positioning System ("GPS") receiver may also be included in the bag. Further, a SIM card may installed in the bag. The SIM card sends information to an owner of the bag instantly. The information may include the images captured by the first camera and the second camera when the bag is being opened by the user, and the fingerprint information detected by the touch screen. The images may be sent via a wireless network, such as a packet switch data network or a Wi-Fi network,

[0010] The bag may also have an associated processor and memory. The memory stores instructions that cause the processor to execute a method. The method may be carried out, not necessarily in the following order, by: a) detecting that the locking member is being disengaged from the tab; b) verifying an identity of the user, wherein the verification is made by: i) using the touch screen to detect the fingerprints of the user; and ii) comparing the fingerprints of the user detected with the fingerprints of the owner of the bag, wherein the fingerprints of the owner of the bag are pre-registered in the memory.

[001 1 ] In further embodiments of the disclosed physical bag, if the identity of the user is confirmed to belong to the owner, the bag remains pending and no action is taken. Alternatively, if the identity of the user is confirmed to belong to a non- owner then further steps may be carried out, including, but not limited to: a) taking images using the second camera, wherein the images include a face of the user and items removed by the user from the bag: b) contacting the owner of the bag using the SIM card; c) reporting the current location of the bag using the location component; d) reporting the actions taken by the user with respect to the bag; and e) sending the images taken by the camera. The images, the current location, and the actions taken by the user may ail be transmitted via a wireless network to a device associated with the owner of the bag. [0012] Still further, a determination may be made as to whether a direct relationship exists between the user and the owner of the bag based on the tagged information of the stored images. If a direct relationship is determined to exist, information regarding the direct relationship may then be sent to the owner. Next, it is determined if an indirect relationship exists between the user and the owner of the bag based the tagged information of the stored images and how individuals of the stored images are related.

[0013] In still further embodiments, the method may also include one or more of the following additional steps by: a) determining that an item is a stolen when no records indicate that the item was re-inserted into the bag at a later time; and b) determining if a potential loss of trade secret has occurred upon indication that the item is re-inserted into the bag at a later time.

[0014] In another embodiment of the disclosed technology, a method is used for securing the contents of a bag. The method is carried out, not necessarily in the following order, by: a) detecting, using a sensor associated with the bag, that the bag is being manipulated; b) reading fingerprints of a user manipulating the bag using a touch screen disposed on a portion of the bag; c) comparing the fingerprints to pre-registered fingerprints of the owner; d) taking images with a camera disposed on the bag if the fingerprints of the user do not match those of the owner; and/or e) transmitting the images to the owner of the.

[0015] In still another embodiment of the disclosed technology, physical bag monitors movements by non-owners and captures identities of the non-owners when the bag is misappropriated. The bag may be composed of a body and a flappable member. A locking member may be attachable to the flappable member such that the locking member is revealed when the flappable member is flapped up. The bag may also have numerous other electronic and/or computing components. A set of integrated circuits associated with the bag may be programmable to access stored images tagged with identity information related to goods, individuals, and how individuals are related. A second camera may be associated with and/or disposed on the flappable member. A location component may also be included in the bag. Further, a SIM card may installed in the bag. The SIM card sends information to an owner of the bag instantly. The information may include the images captured by the first camera and the second camera when the bag is being opened by the user, and the fingerprint information detected by the touch screen may also have an associated processor and memory. The memory stores instructions that cause the processor to execute a method. The method may be carried out, not necessarily in the following order, by: 1) detecting whether the bag is being moved made by a person, wherein the detection is made when the locking member is being disengaged with the tab; 2) after detecting that the bag has been moved by the person, verifying an identity of the person, wherein the verification is made by: i) using the touch screen to detect the fingerprints of the person; and ii) comparing the fingerprints of the person detected with the fingerprints of the owner of the bag, wherein the fingerprints of the owner of the bag have been pre-registered in the memory; 3a) if the identity of the person is confirmed to belong to the owner, the bag remains pending and no action needs to be taken; 3b) if the identity of the person is confirmed to belong to the non- owner: i) taking images by the camera mounted on the inside of the fiappable member, wherein the images include face of the non-owner and actions by the person including the items being taken out by the person from the bag; ii) contacting the owner of the bag by using the SIM card installed in the bag; iii) reporting the current location of the bag by using the location component included in the bag; iv) reporting, to the owner, the actions taken by the person regarding the bag; and v) sending the images taken by the camera to the owner; 4) determining if an item belongs to a stolen item when no records indicate that the item is re-inserted into the bag at a later time; and 5) determining if a potential loss of trade secret is found despite no physical property is lost when the records indicate that the item is re-inserted into the bag at a later time.

[0016] In accordance with these and other objects which will become apparent hereinafter, the invention will now be described with particular reference to the drawings. BRIEF DESCRIPTION OF THE DRAWINGS

[0017] Figure 1 shows on-screen textual data regarding bag contents reported to the bag owner according to an embodiment of the disclosed technology.

[0018] Figure 2 shows on-screen textual data regarding individual reported to the bag owner to have interacted with the bag according to an embodiment of the disclosed technology, [0019] Figure 3 shows an overview of a physical bag with a camera according to an embodiment of the disclosed technology,

[0020] Figure 4 shows an overview of a physical bag with a camera and a touch screen according to an embodiment of the disclosed technology.

[0021 ] Figure 5 is a high-level block diagram of a microprocessor device that may be used to carry out the disclosed technology.

DETAILED DESCRIPTION

[0022] Embodiments of the invention, systems, methods and devices are directed to monitoring movements by non-owners with respect to a physical bag and capturing identities of the non-owners when the bag is misappropriated. The bag may have multiple sensors and/or interfaces for communicating with the surrounding environment as well as wireless communication via a wireless network. Cameras and/or touch screens are used to capture identifying data about potential thieves and/or unauthorized individuals accessing the contents of the bag. The bag may be wireless network enabled (via a SIM card) and may also have a GPS receiver for determining location information. A processor associated with the bag compares acquired identifying data which that of a data stored in memory- in order to determine if an individual is permitted to access the contents of the bag.

[0023] Referring now to the figures, Figure 1 shows on-screen textual data regarding bag contents reported to the bag owner according to an embodiment of the disclosed technology. The screen 10 may be a display on any type of electronic device. Such devices may include a computer, laptop, mobile phone, tablet, smartwatch, and/or any other network-connectable device. The screen 10 displays data transmitted from the bag and/or the bag's components. In the example shown, the transmitted text 12 describes the items that were either removed or placed into the bag. These items include a phone, a pen, and a newspaper. Each 'event' includes the type of item, whether it was placed into or out of the bag, and the date & time at which the event occurred.

[0024] Figure 2 shows on-screen textual data regarding individual reported to the bag owner to have interacted with the bag according to an embodiment of the disclosed technology. The screen 20 shown in this example includes textual content 22 describing which individuals have interacted with a particular item in the bag. In this case, the item is a phone. If the individual is recognized, then the individual is identified as such. If not, the individual is regarded as a stranger.

[0025] In further embodiments of the disclosed physical bag, if the identity of the user is confirmed to belong to the owner, the bag remains pending and no action is taken. Alternatively, if the identity of the user is confirmed to belong to a non-owner then further steps may be carried out, including, but not limited to: a) taking images using a camera, wherein the images include a face of the user and items removed by the user from the bag; b) contacting the owner of the bag using the SIM card; c) reporting the current location of the bag using the location component; d) reporting the actions taken by the user with respect to the bag; and e) sending the images taken by the camera. The images, the current location, and the actions taken by the user may all be transmitted via a wireless network to a device associated with the owner of the bag. [0026] Still further, a determination may be made as to whether a direct relationship exists between the user and the owner of the bag based on the tagged information of the stored images. If a direct relationship is determined to exist, information regarding the direct relationship may then be sent to the owner. Next, it is determined if an indirect relationship exists between the user and the owner of the bag based the tagged information of the stored images and how individuals of the stored images are related.

[0027] In still further embodiments, the method may also include one or more of the following additional steps by: a) determining that an item is a stolen when no records indicate that the item was re-inserted into the bag at a later time; and b) determining if a potential loss of trade secret has occurred upon indication that the item is re-inserted into the bag at a later time, [0028] Figure 3 shows an overview of a physical bag with a camera according to an embodiment of the disclosed technology, A "physical bag" or "bag", for purposes of this specification, is defined as any non-rigid, semi-rigid or rigid container for storing, carrying, and/or transporting items. The "bag" may be, but is not limited to, a handbag, a purse, a sack, a backpack, a duffle bag, a suitcase, a piece of luggage, a brief case, a wristlet, a tote bag, a travel bag, a satchel, a gunny sack, a messenger bag, and/or a pocketbook. The bag 100 may be composed of a body 1 and a flappable member 2. A locking member 5 may be attachable to the flappable member such that the locking member is revealed when the flappable member is flapped up. [0029] Figure 4 shows an overview of a physical bag with a camera and a touch screen according to an embodiment of the disclosed technology. The bag 100 may have a first camera 6 associated with the locking member 5 such that the first camera is concealed until the flappable member 2 is flapped up and a tab 3 attached to the body is disengaged. The first camera 6 automatically captures images whenever the locking member 5 and the tab 3 is disengaged. The captured images may be images of items being checked-in or checked-out from the bag 100 and a user 200 attempting to open the bag. A touch screen 4 may also be associated with the tab 3. The touch screen 4 may be configured to capture fingerprint information from a hand 210 of the user 200 attempting to open the bag 100.

[0030] The bag 100 may also have numerous other electronic and/or computing components on an interior portion thereof, A set of integrated circuits associated with the bag 100 may be programmable to access stored images tagged with identity information related to goods, individuals, and how individuals are related. A second camera (not shown) may be associated with and/or disposed on the flappable member 2.

[0031 ] A location component, such as a Global Positioning System ("GPS") receiver may also be included in the bag 100. Further, a SIM card may installed in the bag 100. The SIM card sends information to an owner of the bag 100 instantly. The information may include the images captured by the first camera 6 and the second camera when the bag 100 is being opened by the user 200, and the fingerprint information detected by the touch screen 4, The images may be sent via a wireless network, such as a packet switch data network or a Wi-Fi network.

[0032] The bag may also have an associated processor and memory. The memory stores instructions that cause the processor to execute a method. The method may be carried out, not necessarily in the following order, by: a) detecting that the locking member is being disengaged from the tab; b) verifying an identity of the user, wherein the verification is made by: i) using the touch screen to detect the fingerprints of the user; and ii) comparing the fingerprints of the user detected with the fingerprints of the owner of the bag, wherein the fingerprints of the owner of the bag are pre -registered in the memory.

[0033] Figure 5 is a high-level block diagram of a microprocessor device that may be used to cany out the disclosed technology. The device 300 may or may not be a computing device. The device 300 comprises a microchip (also referred to as "a smart chip") and/or processor 350 that controls the overall operation of a computer by executing the reader's program instructions which define such operation. The device's program instructions may be stored in a storage device 320 (e.g., magnetic disk, database) and loaded into memory 330 when execution of the console's program instructions is desired. Thus, the device's operation will be defined by its program instructions stored in memory 330 and/or storage 320, and the console will be controlled by the processor 350 executing the console's program instructions.

[0034] The device 300 may also include one or a plurality of input network interfaces for communicating with other devices via a network (e.g., the internet). The device 300 further includes an electrical input interface for receiving power and data from a power or wireless data source. The device 300 may also include one or more output network interfaces 3 0 for communicating with other devices. The device 300 may also include input/output 340 representing devices which allow for user interaction with a computer (e.g., display, keyboard, mouse, speakers, buttons, etc.).

[0035] One skilled in the art will recognize that an implementation of an actual device will contain other components as well, and that Figure 5 is a high level representation of some of the components of such a device for illustrative purposes. It should also be understood by one skilled in the art that the devices depicted and described with respect to Figures 1 through 4 may be implemented on a device such as is shown in Figure 5. Thus, the device 300 of Figure 5 may describe the inner workings of the bag 100 and/or any of its components.

[0036] While the disclosed invention has been taught with specific reference to the above embodiments, a person having ordinary skill in the art will recognize that changes can be made in form and detail without departing from the spirit and the scope of the invention. The described embodiments are to be considered in all respects only as illustrative and not restrictive. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope. Combinations of any of the methods, systems, and devices desciibed hereinabove are also contemplated and within the scope of the invention.