SECURITY TECHNOLOGIES FOR ELECTRICALLY-POWERED TRASH COMPACTORS AND RECEPTACLES

Systems, methods, and computer-readable storage media for securing electrically-powered trash compactors and receptacles. A system can monitor, under a security condition, a storage receptacle having a security plate being positioned over a door on the storage receptacle, the door including an insertion point for storing contents on the storage receptacle, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the storage receptacle. Next, the system can receive a signal indicating a security breach at the storage receptacle, the security breach including at least one of a first attempt to open the door and a second attempt to remove the security plate. In response to the signal, the system can then generate a notification of the security breach.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History
Description
CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of priority to U.S. Provisional Patent Application No. 61/937,930, filed on Feb. 10, 2014, entitled “SECURITY TECHNOLOGIES FOR ELECTRICALLY-POWERED TRASH COMPACTORS AND RECEPTACLES,” and U.S. Provisional Application No. 61/937,961, filed on Feb. 10, 2014, entitled “DYNAMICALLY ADJUSTABLE SENSORS FOR TRASH COMPACTORS AND RECEPTACLES”, and all of which are expressly incorporated by reference herein in their entirety.

BACKGROUND

1. Technical Field

The present disclosure relates to trash receptacles and more specifically to security and monitoring technologies for electrically-powered trash compactors and receptacles.

2. Introduction

Collection of solid waste is an expensive and polluting procedure. Every day, heavy trucks are deployed to collect large amounts of trash and recyclable materials. Such trash and recyclable materials are typically collected from numerous trash receptacles throughout an area. Most communities provide trash receptacles in dedicated areas of the community to allow nearby individuals to properly dispose of their unwanted materials in a quick and convenient manner. To this end, trash receptacles are abundant in most places throughout the country. Not surprisingly, trash receptacles are often essential to protecting the environment and maintaining a clean community.

Unfortunately, the capabilities of trash receptacles to hold waste material, and the widespread availability of such trash receptacles, also make trash receptacles vulnerable to security breaches. Unscrupulous individuals can easily utilize any of the trash receptacles available in a community to hide and store dangerous materials, such as bombs or hazardous chemicals, in an effort to harm a community and its residents. Terrorists or criminals generally have access to numerous trash receptacles, where they can easily place dangerous materials and quickly turn such trash receptacles into weapons ready to exert harm to anyone around them. Given the large number of trash receptacles typically available in any given area, it is extremely difficult to monitor and secure each trash receptacle to prevent or detect such atrocities. Accordingly, the current solutions, including today's trash receptacles, do not provide adequate security features and protections to foil—or even detect—a plot to harm a community and its residents. Individuals who are intent on harming others in a community can quickly spread the harm and danger throughout the community using various trash receptacles in the area to hold explosive and otherwise harmful materials setup to spread harm to those around it.

SUMMARY

Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be understood from the description, or can be learned by practice of the herein disclosed principles. The features and advantages of the disclosure can be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the disclosure will become more fully apparent from the following description and appended claims, or can be learned by the practice of the principles set forth herein.

The approaches set forth herein can be used to effectively monitor and secure trash receptacles during a security condition, to prevent a security breach of the trash receptacle. The trash receptacles can be constructed to allow any of its insertion points to be closed, locked, and protected in order to prevent individuals from inserting contents into the storage receptacle during a security condition, or otherwise accessing the contents of the storage receptacle. The storage receptacles can be also configured to monitor and detect any security breaches to the storage receptacle; attempts (complete or incomplete) to place dangerous materials, such as bombs, weapons, or drugs, in the storage receptacle; attempts (complete or incomplete) to harm the storage receptacle or use the storage receptacle in a conspiracy to harm others, etc. Here, the storage receptacle can be configured to communicate such security breaches and events to remote users and devices, such as a monitoring server or a government official. For example, a receptacle can monitor, in a security condition, for attempts to breach a door of the receptacle or in some other way to reach an interior of the receptacle. Once a security breach is detected, the receptacle can transmit a warning signal over a network to a server at which point an automated or manual system can notify authorities. This way, the storage receptacles can quickly provide alerts and notifications to the proper authorities and personnel, to prevent unauthorized access to the storage receptacle and allow a quick and proper response to any attempts thereof.

The storage receptacle can also be configured to detect dangerous substances that come in contact with one or more components of the storage receptacle. For example, the storage receptacle can be configured to detect if explosive materials are inserted into the storage receptacle. In some cases, the storage receptacle can be configured with a sensor or scanner capable of detecting if a person that has touched a portion of the storage receptacle, such as the handle, has left any traces of an explosive substance, such as gun powder, on the touched portion of the storage receptacle. For example, if an individual with traces of gun powder or bomb making materials on his or her hand grabs the handle of the storage receptacle to open the door, the storage receptacle can detect the traces of gun powder or bomb making materials, and generate a signal or alarm. The storage receptacle can then transmit the signal to a remote server or another entity, such as a police department, to alert others of the detected traces of explosive materials. In some embodiments, the storage receptacle can use a sensor or detection component to detect the dangerous or security condition, and trigger an automatic security system to lock the storage receptacle. For example, the storage receptacle can detect a security condition, such as a breach or an explosive material, and initiate an automatic locking of any doors or access points in the storage receptacle by transmitting a signal from a processor to a locking mechanism. Here, the locking mechanism can include, for example, a gear system, a spool device, a pin and lock system, a pulley, a linear actuator, a plate, or any other locking system.

In some cases, the storage receptacles can be configured to generate a visual or audible alarm when it detects any breach attempts or explosive materials. This can scare a potential criminal from continuing to try and break into the receptacle or dispose unlawful materials into the receptacle. Moreover, the storage receptacles can maintain a data connection with one or more remote devices to facilitate the monitoring of conditions around the storage receptacle and collect relevant data and statistics. If a problem or disconnection of the data connection is detected, a remote device or personnel can be quickly notified of the disconnected state and quickly respond by sending support personnel or, if necessary, security officials. The storage receptacle can also be configured to operate in various alert modes based on specific security conditions or levels. Once a security condition is contained or otherwise remedied, the storage receptacles can be restored to once again allow user access to its insertion points and further resume normal operation.

Disclosed security and monitoring technologies for electrically-powered trash compactors and receptacles. A system can monitor, under a security condition, a storage receptacle having a security plate being positioned over a door on the storage receptacle, the door including an insertion point for storing contents on the storage receptacle, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the storage receptacle. The system can monitor the storage receptacle using sensors, data connections, algorithms, user feedback, news information, usage and performance data, device statistics, and so forth. For example, the system can monitor a data connection of the storage receptacle, as well as sensed data collected by sensors at the storage receptacle and transmitted to the system via the data connection. Through the data connection, the system can also receive, from the storage receptacle, a current status of the storage receptacle, a current usage, information about running services at the storage receptacle, errors at the storage receptacle, logged information, etc.

Next, the system can receive a signal indicating a security breach at the storage receptacle, the security breach including at least one of a first attempt to open the door and a second attempt to remove the security plate. The system can receive the signal from a transmitter at the storage receptacle, for example. Moreover, the storage receptacle can generate the signal based on sensed data, performance logs, errors, current usage information, etc., as previously described.

In response to the signal, the system can then generate a notification of the security breach. The notification can be an alert, a report, an alarm, a message, another signal, etc. The system can also send the notification to another user or device, such as a remote server or a device associated with a security official. In some aspects, the system can also store the notification in a database or storage to maintain statistics, evidence, logs, and data relating to the security breach and any other previous security breach. The system can also analyze the signal or notification and generate a recommendation, such as a recommended or suggested response.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:

FIG. 1 illustrates an example system embodiment;

FIG. 2 illustrates an example architecture for remotely controlling electrically-powered compactors;

FIG. 3 illustrates an example storage receptacle;

FIGS. 4A and 4B illustrate a front view of exemplary unsecured and secured storage receptacles;

FIGS. 5A-B illustrate rear views of an exemplary storage receptacle;

FIGS. 5C-D illustrate open views of an exemplary storage receptacle;

FIG. 6 illustrates an exemplary backside view of a security plate for a receptacle;

FIG. 7 illustrates an exemplary inside locking mechanism for a receptacle;

FIG. 8 illustrates a first example method embodiment; and

FIG. 9 illustrates a second example method embodiment.

DETAILED DESCRIPTION

Various embodiments of the disclosure are described in detail below. While specific implementations are described, it should be understood that this is done for illustration purposes only. Other components and configurations may be used without parting from the spirit and scope of the disclosure.

The present disclosure provides a way to monitor and secure electrically-powered trash compactors and receptacles. A system, method and computer-readable media are disclosed which provide monitoring and security to electrically-powered trash compactors and receptacles. A brief introductory description of a basic general purpose system or computing device in FIG. 1, which can be employed to practice the concepts, is disclosed herein. A more detailed description and variations of electrically-powered receptacles, as well as receptacle monitoring and security systems will then follow. These variations shall be described herein as the various embodiments are set forth. The disclosure now turns to FIG. 1.

With reference to FIG. 1, an exemplary system and/or computing device 100 includes a processing unit (CPU or processor) 120 and a system bus 110 that couples various system components including the system memory 130 such as read only memory (ROM) 140 and random access memory (RAM) 150 to the processor 120. The system 100 can include a cache 122 of high-speed memory connected directly with, in close proximity to, or integrated as part of the processor 120. The system 100 copies data from the memory 130 and/or the storage device 160 to the cache 122 for quick access by the processor 120. In this way, the cache provides a performance boost that avoids processor 120 delays while waiting for data. These and other modules can control or be configured to control the processor 120 to perform various operations or actions. Other system memory 130 may be available for use as well. The memory 130 can include multiple different types of memory with different performance characteristics. It can be appreciated that the disclosure may operate on a computing device 100 with more than one processor 120 or on a group or cluster of computing devices networked together to provide greater processing capability. The processor 120 can include any general purpose processor and a hardware module or software module, such as module 1 162, module 2 164, and module 3 166 stored in storage device 160, configured to control the processor 120 as well as a special-purpose processor where software instructions are incorporated into the processor. The processor 120 may be a self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric. The processor 120 can include multiple processors, such as a system having multiple, physically separate processors in different sockets, or a system having multiple processor cores on a single physical chip. Similarly, the processor 120 can include multiple distributed processors located in multiple separate computing devices, but working together such as via a communications network. Multiple processors or processor cores can share resources such as memory 130 or the cache 122, or can operate using independent resources. The processor 120 can include one or more of a state machine, an application specific integrated circuit (ASIC), or a programmable gate array (PGA) including a field PGA.

The system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 140 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 100, such as during start-up. The computing device 100 further includes storage devices 160 or computer-readable storage media such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive, solid-state drive, RAM drive, removable storage devices, a redundant array of inexpensive disks (RAID), hybrid storage device, or the like. The storage device 160 can include software modules 162, 164, 166 for controlling the processor 120. The system 100 can include other hardware or software modules. The storage device 160 is connected to the system bus 110 by a drive interface. The drives and the associated computer-readable storage devices provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computing device 100. In one aspect, a hardware module that performs a particular function includes the software component stored in a tangible computer-readable storage device in connection with the necessary hardware components, such as the processor 120, bus 110, display 170, and so forth, to carry out a particular function. In another aspect, the system can use a processor and computer-readable storage device to store instructions which, when executed by the processor, cause the processor to perform operations, a method or other specific actions. The basic components and appropriate variations can be modified depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server. When the processor 120 executes instructions to perform “operations”, the processor 120 can perform the operations directly and/or facilitate, direct, or cooperate with another device or component to perform the operations.

Although the exemplary embodiment(s) described herein employs the hard disk 160, other types of computer-readable storage devices which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks (DVDs), cartridges, random access memories (RAMs) 150, read only memory (ROM) 140, a cable containing a bit stream and the like, may also be used in the exemplary operating environment. Tangible computer-readable storage media, computer-readable storage devices, or computer-readable memory devices, expressly exclude media such as transitory waves, energy, carrier signals, electromagnetic waves, and signals per se.

To enable user interaction with the computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100. The communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic hardware depicted may easily be substituted for improved hardware or firmware arrangements as they are developed.

For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 120. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 120, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in FIG. 1 may be provided by a single shared processor or multiple processors. (Use of the term “processor” should not be construed to refer exclusively to hardware capable of executing software.) Illustrative embodiments may include microprocessor and/or digital signal processor (DSP) hardware, read-only memory (ROM) 140 for storing software performing the operations described below, and random access memory (RAM) 150 for storing results. Very large scale integration (VLSI) hardware embodiments, as well as custom VLSI circuitry in combination with a general purpose DSP circuit, may also be provided.

The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 100 shown in FIG. 1 can practice all or part of the recited methods, can be a part of the recited systems, and/or can operate according to instructions in the recited tangible computer-readable storage devices. Such logical operations can be implemented as modules configured to control the processor 120 to perform particular functions according to the programming of the module. For example, FIG. 1 illustrates three modules Mod1 162, Mod2 164 and Mod3 166 which are modules configured to control the processor 120. These modules may be stored on the storage device 160 and loaded into RAM 150 or memory 130 at runtime or may be stored in other computer-readable memory locations.

One or more parts of the example computing device 100, up to and including the entire computing device 100, can be virtualized. For example, a virtual processor can be a software object that executes according to a particular instruction set, even when a physical processor of the same type as the virtual processor is unavailable. A virtualization layer or a virtual “host” can enable virtualized components of one or more different computing devices or device types by translating virtualized operations to actual operations. Ultimately however, virtualized hardware of every type is implemented or executed by some underlying physical hardware. Thus, a virtualization compute layer can operate on top of a physical compute layer. The virtualization compute layer can include one or more of a virtual machine, an overlay network, a hypervisor, virtual switching, and any other virtualization application.

The processor 120 can include all types of processors disclosed herein, including a virtual processor. However, when referring to a virtual processor, the processor 120 includes the software components associated with executing the virtual processor in a virtualization layer and underlying hardware necessary to execute the virtualization layer. The system 100 can include a physical or virtual processor 120 that receive instructions stored in a computer-readable storage device, which cause the processor 120 to perform certain operations. When referring to a virtual processor 120, the system also includes the underlying physical hardware executing the virtual processor 120.

Having disclosed some components of a computing system, the disclosure now turns to FIG. 2, which illustrates an exemplary architecture for controlling electrically-powered compactors both locally and remotely via a network. Receptacle 204 can be an electrically-powered receptacle for collecting waste, such as trash and recyclables, for example. Receptacle 204 can be, for example, a solar or battery-powered receptacle and/or compactor. Moreover, receptacle 204 can include a motor 226 for performing various operations, such as compaction operations. Further, receptacle 204 can be remotely controlled using a remote control device (RCD) 244 via a network 202 or an air interface. To this end, receptacle 204 can include transmitter 206 and receiver 208 for communicating with RCD 244. In particular, transmitter 206 and receiver 208 can communicate with transmitter 240 and receiver 242 on RCD 244, and vice versa. Here, transmitters 206 and 240 can transmit information, and receivers 208 and 242 can receive information. This way, receptacle 204 and RCD 244 can be connected to transmit and receive information, such as instructions, commands, statistics, alerts, notifications, files, software, data, and so forth. Receptacle 204 can also communicate with other devices, such as a server and/or a collection vehicle, via transmitter 206 and receiver 208. Similarly, RCD 244 can communicate with other devices, such as a server and/or a user device 246, 252, via transmitter 240 and receiver 242. A protocol, such as Bluetooth, can be used in which no network other than the air interface is between the receptacle 204 and RCD 244. Thus, a user with a portable device 244 can simply get within a range for a Bluetooth communication and send a command to turn off an alarm as the user views that no-one is trying to breach into the receptacle 204.

Moreover, receptacle 204 and RCD 244 can communicate with each other and/or other devices via network 202. The network 202 can include a public network, such as the Internet, but can also include a private or quasi-private network, such as an intranet, a home network, a virtual private network (VPN), a shared collaboration network between separate entities, etc. Indeed, the network 202 can include many types of networks, such as local area networks (LANs), virtual LANs (VLANs), corporate networks, wide area networks, a cell phone transmitter and receiver, a WiFi network, a Bluetooth network, and virtually any other form of network.

Transmitter 206 and receiver 208 can be connected to printed circuit board (PCB) 210, which controls various functions on receptacle 204. In some embodiments, the RCD 244 can be incorporated within the PCB 210. In FIG. 2, the RCD 244 is electrically connected to the PCB 210 via transmitters 206, 240 and receivers 208, 242. The RCD 244 can be connected to transmitter 240 and receiver 242 via a two-way communication port, which includes transmitter 240 and receiver 242. The PCB 210 can control electrical functions performed by the receptacle 204. Electrical functions can include, for example, running compactions by actuating a motor 226; sensing waste or recyclables volume inside the receptacle 204 using a sensor at regular or programmable intervals, such as a sonar-based sensor 222A, a proximity sensor, and/or photoeye sensors 222B-C; changing status lamps 230 at regular and/or programmable thresholds to/from a color indicating that the receptacle 204 is not full (e.g., green), to/from a color indicating that the receptacle 204 is almost full (e.g., yellow), to/from a color indicating that the receptacle 204 is full (e.g., red); etc.

The RCD 244 can enable remote control and/or alteration of the functions performed or operated by the PCB 210. The RCD 244 can also provide access to, and control over, the various components 206, 208, 210, 212, 214A-B, 216, 218, 220, 222A-G, 224, 226, 228, 230, 232, 234, 236, 238 of the receptacle 204. Users can use a networked device, such as smartphone 246 and/or remote device 252, to communicate with the RCD 244 in order to manage and/or control the receptacle 204. For example, a user can communicate with the RCD 244 via the remote device 252 to change a threshold value on the PCB 210, which can control, for example, a collection timing; the compaction motor 226; the use of energy on a lighted advertising display, such as display 232; the status lamps 230; the sensors 222A-H; the camera 224; etc. The remote device 252 can include virtually any device with networking capabilities, such as a laptop, a portable media player, a tablet computer, a gaming system, a smartphone, a global positioning system (GPS), a smart television, a desktop, etc. In some embodiments, the remote device 252 can also be in other forms, such as a watch, imaging eyeglasses, an earpiece, etc.

The remote device 252 and RCD 204 can be configured to automatically modify the PCB's 210 operating parameters. However, users can also manually modify the PCB's 210 operating parameters via the remote device 252 and RCD 204. The operating parameters can be modified in response to, for example, evolving industry benchmarks; user inputs; historical data, such as the data gathered from a separate database 250A-B; forecasted data, such as upcoming weather characteristics; traffic conditions; a collection schedule; a collection route; a proximity of a collection vehicle; a time and/or date; a location; a capacity, such as a capacity of the receptacle 204 and/or a capacity of a collection vehicle; a fullness state of the receptacle 204; lapsed time between collections; lapsed time between compactions; usage conditions of the receptacle 204; energy usage; battery conditions; statistics; a policy; regulations; a detected movement of an object, such as an object inside or outside of the receptacle 204; collection trends; industry and/or geographical standards; zoning policies and characteristics; real-time information; user preferences; and other data. The data from the remote device 252 can be relayed to the RCD 244, and the data from the RCD 244 can be relayed, via the network 202, to the receptacle 204 and/or the remote device 252 for presentation to the user.

The user can control the RCD 244 and/or access and modify information on the RCD 244 via a user interface, such as a web page, an application 254, a monitor 256, and/or via voice messages and commands, text messages, etc. The remote device 252 can include a user interface, which can display, for example, graphs of collection statistics and trends (e.g., collection frequency, usage, temperature, etc.), collection reports, device settings, collection schedules, collection configurations, historical data, status information, collection policies, configuration options, device information, collection routes and information, alerts, etc. This way, users can access information to make educated decisions about how to set and/or reset operating parameters on the PCB 210; to control, for example, which sensors are used to gather data, which thresholds to set; to control outputs from the status lamps 230 and other components; etc. User can change settings on the receptacle 204, such as optimal collection timing, timing of sensor actuation; and/or modify parameters, such as desired capacity and fullness thresholds; using a scroll down menu, click-and-slide tools, interactive maps displayed on the remote device 252, touch screens, forms, icons, text entries, audio inputs, text inputs, etc. In response, the RCD 244 can automatically reconfigure the PCB 210 settings, recalibrate sensors and displays, change operating parameters, etc.

The RCD 244 can include a two-way communication port that includes transmitter 240 and receiver 242, which can wirelessly communicate with the PCB 210 of the receptacle 204, via the transmitter 206 and receiver 208 on the receptacle 204, which are connected electrically to the PCB 210. On scheduled and/or programmable intervals, the PCB's 210 transmitter 206 can send data to a central server, such as data server 248, via the network 202. Moreover, the RCD's 244 receiver 242 can be configured to query the data server 248, which can also be connected to the remote device 252, for incoming data. The data server 248 can communicate data from databases 250A-B. If there is no data to be received by the receiver 208, the PCB 210 can be configured to promptly return to a low-power mode, where the transmitter 206 and receiver 208 circuits are turned off, until another scheduled, received, initiated, and/or programmed communication event. If there is data to be received by the receiver 208, such as a command to turn the receptacle 204 off and then back on, a command to change the thresholds upon which compactions are operated, a command to change the thresholds for providing status updates and/or determining fullness states, etc., then the RCD receiver 242 can download the new data from the data server 248, via the RCD 244, to the PCB 210, altering its operating configuration. The RCD receiver 242 can also be configured to send data to the data server 248 to acknowledge the receipt of data from the PCB 210, and to send selected data to the remote device 252, the smartphone 246, and/or any other device, for presentation to a user.

The data server 248 can also display the data to a user on remote device 252, smartphone 246, or any other device. The data can be a password-protected web page, a display on the smartphone 246, a display on the monitor 256, etc. Remote control using the RCD 244 to reconfigure operating thresholds, sensor use, sensor hierarchy, energy usage, etc., can enable the receptacle 204 to alter characteristics that control its energy generation, energy consumption, and/or the collection and management logistics, further enabling sound operation of the receptacle 204.

The RCD 244 can be configured to communicate over a wireless network with the PCB 210, and transmit data to the data server 248, so the data can be stored for viewing and manipulation by a user via any web-connected computer, phone, or device. The RCD 244 can also be configured to receive data from the data server 248, and transmit the data back to the PCB 210. The PCB 210 can be electrically connected to a variety of sensors, such as sensors 222A-H, within the receptacle 204. Through the RCD 244, the PCB 210 can also be wirelessly connected to the databases 250A-B, and/or other external databases, such as a weather database, which may, for example, reside on a National Oceanographic and Atmospheric (NOAA) server, a database of trucks and locations and schedules, which may reside on a waste hauler's server, a database of traffic conditions, etc. A user can also change which of the sensors 222A-H are used in setting thresholds, among other things, in response to, for example, user commands and/or changes in outside data, such as weather data or truck location data.

The PCB 210 can also communicate with a temperature sensor 222G to gather temperature information, which can be transmitted to the RCD 244 via the PCB transmitter 206. The temperature information can be used, among other things, to fine tune operational functions and energy consumption of the receptacle 204. For example, the PCB 210 can be reconfigured to run less compaction per day, such as four to eight compactions, in cold weather, since batteries are less powerful in cold weather. Coinciding with cold weather, the winter days are shorter, thus solar energy and battery power is limited. In order to conserve power on low-sunlight days, the RCD 244 can adjust the PCB's 210 normal fullness sensitivity levels, so that collections are prompted to be made earlier. For example, if the PCB 210 typically runs 20 compactions before changing status lamps from green to yellow, a signal that suggests optimal collection time, the RCD 244 can adjust the thresholds of the PCB 210 to run 10 compactions before changing from a green state to a yellow state, thus changing the total energy consumption of the compactor between collections. In a busy location, the PCB 210 can be configured to sense receptacle fullness every minute, whereas in a less busy location, the PCB 210 can be configured to sense fullness once a day.

In some embodiments, the RCD 244 can also alter the timing of events using algorithms based on the results of historical events. For example, the RCD 244 can be initially configured to sense fullness once per minute, but based on resulting readings, it can then alter the timing of future readings. Thus, if three consecutive readings taken at one-minute intervals yield a result of no trash accumulation, the RCD 244 can increase the timing between readings to two minutes, then three minutes, etc., based on the various readings. The RCD 244 can also be configured to adjust sensing intervals based on the level of fullness of the receptacle 204, so it would sense more frequently as the receptacle 204 fills, in order to reduce the margin of error at a critical time, before the receptacle 204 overflows. This “learning feature” can save energy by ultimately synchronizing the sensor readings with actual need to sense. The RCD 244 can also alter thresholds of status lamps 230 based on collection history, the need for capacity as determined by the frequency of red or yellow lights on the receptacle 204, temperatures, expected weather and light conditions, expected usage conditions, etc. The status lamps 230 can be LED lights, for example.

In FIG. 2, the RCD 244 can be enabled, via the PCB 210, to read, for example, a temperature sensor 222G; an encoder sensor 222D, which can measure movement of a compaction ram by utilizing an “encoder wheel” which is mounted on a motor shaft; one or more photoeye sensors 222B-C; door sensors; a sensor which measures current from the solar panel and a sensor which can measure current from the battery 236 to the motor 226; a hall effect sensor 222F, which can detect movement of, for example, a door; an infrared (IR) sensor 222E, a camera 224, etc. In addition, the thresholds set by the RCD 244 can be based on historical and real-time information, user preferences, industry norms, weather patterns and forecasts, and other information. The RCD 244 can reset the PCB's 210 normal thresholds hourly, daily, weekly, monthly, yearly, or at adjustable intervals, based on a variety of information and user decisions.

The RCD 244 can also alter the PCB's 210 normal hierarchy of sensor usage. For example, if the PCB 210 is configured to run a compaction cycle when one or more of the photoeyes 222B-C located inside the receptacle 204 are blocked, the RCD 244 can reconfigure the sensor hierarchy by reconfiguring the PCB 210 to run compaction cycles after a certain amount of time has passed, by reading the position of the encoder sensor 222D at the end of a cycle, by reading one or more photoeye sensors 222B-C, by calculating a sensor hierarchy based on historical filling rates, by a change in user preferences, etc. Using an aggregate of data from other receptacles located worldwide in a variety of settings, the RCD's 244 configurations can depend on constantly evolving parameters for optimizing energy utilization, capacity optimization, and operational behavior, among other things. The RCD 244 innovation and growing database of benchmarks, best practices and solutions to inefficiency, enables the receptacle 204 to adapt and evolve.

Based on the data from the PCB 210, the sensors, inputs by the users (e.g., the customer or the manufacturer) via the RCD 244, and/or based on other data, such as historical or weather data, the RCD 244 can change the PCB 210 thresholds, operational parameters, and/or configuration, to improve the performance of the receptacle 204 in different geographies or seasons, or based on different user characteristics or changing parameters. Thus, the system and architecture can be self-healing.

The RCD 244 can also be configured to change the PCB's 210 normal operating parameters. For example, the RCD 244 can be configured to cause the PCB 210 to run multiple compaction cycles in a row, to run energy through a resistor 220 to apply a strong load upon the battery 236, which can supply the energy. The RCD 244 can measure battery voltage at predetermined or programmable intervals, to measure the “rebound” of the battery 236. A strong battery will gain voltage quickly (e.g., the battery will almost fully recover within 15 minutes or so). A weak battery will drop significantly in voltage (e.g., 3-5 volts), will recover slowly, or will not recover to a substantial portion of its original voltage. By changing the normal parameters of the PCB 210, the battery 236 can be subjected to a heavy load during a test period, which will determine the battery's strength without jeopardizing operations. The RCD 244 can then be configured to relay a message to the user that a battery is needed, or to use the battery differently, for example, by spacing out compactions in time, reducing the degree of voltage decline within a certain time period, etc. Based on the message and any additional information from the RCD 244, the user can then order a new battery by simply clicking on a button on a web page, for example. The RCD 244 can also alter the PCB 210 to do more compactions or other energy-using functions (like downloading software) during the daytime, when solar energy is available to replenish the battery 236 as it uses energy.

Since the RCD 244 can be connected to databases, and can be informed by the PCB 210 on each receptacle of conditions or status information at the respective receptacle, the RCD 244 can also be used to relay data collected from the databases or PCB 210 for other types of servicing events. In other words, the RCD 244 can obtain, collect, maintain, or analyze status, operating, or conditions information received from the PCB 210 of one or more receptacles and/or one or more databases storing such information, and relay such data to a separate or remote device, such as a remote server or control center. For example, the RCD 244 can be configured to relay a message to a waste hauler to collect the receptacle 204 if two or more parameters are met simultaneously. To illustrate, the RCD 244 can relay a message to a waste hauler to collect the receptacle 204 if the receptacle 204 is over 70% full and a collection truck is within 1 mile of the receptacle 204. The RCD 244 can then send a message to the remote device 252 to alert a user that a collection had been made, and the cost of the collection will be billed to the user's account.

In addition, the RCD 244 can change the circuitry between the solar panel 234 and the battery 236, so that solar strength can be measured and an optimal charging configuration can be selected. The charging circuitry 214A-B is illustrated as two circuitries; however, one of ordinary skill in the art will readily recognize that some embodiments can include more or less circuitries. Charging circuits 214A-B can be designed to be optimized for low light or bright light, and can be switched by the RCD 244 based on programmable or pre-determined thresholds. Also, while solar information can be readily available (e.g., Farmers' Almanac), solar energy at a particular location can vary widely based on the characteristics of the site. For example, light will be weaker if reflected off a black building, and if the building is tall, blocking refracted light. For this reason, it can be useful to measure solar energy on site, as it can be an accurate determinant of actual energy availability at a particular location. To do this, the battery 236 and solar panel 234 can be decoupled using one or more charging relays 212. In other aspects, a very high load can be placed on the battery 236 to diminish its voltage, so that all available current from the solar panel 234 flows through a measureable point. This can be done, for example, by causing the receptacle 204 to run compaction cycles, or by routing electricity through a resistor, or both.

There are a variety of other methods which can be used to create a load. However, putting a load on the battery 236 can cause permanent damage. Thus, the RCD 244 can also be configured to disconnect the battery 236 from the solar panel 234, instead routing electricity through a resistor 220. This can allow for an accurate measurement of solar intensity at a particular location, without depleting the battery 236, which can help assess the potential for running compactions, communicating, powering illuminated advertisements, and powering other operations. In some embodiments, the PCB 210 can be reconfigured by the RCD 244 to run continuous compaction cycles for a period of time, measure solar panel charging current, relay the data, and then resume normal operations. Different configurations or combinations of circuits can be used to test solar intensity, battery state or lifecycle, and/or predict solar or battery conditions in the future.

The RCD 244 can also track voltage or light conditions for a period of days, and alter the state of load and charging based on constantly changing input data. For example, the RCD 244 can configure the timer 218 of the PCB 210 to turn on the display 232 for advertising for a number of days in a row, starting at a specific time and ending at another specific time. However, if the battery voltage declines over this period of time, the RCD 244 can then reduce the time of the load (the display 232) to every other day, and/or may shorten the time period of the load each day. Further, the RCD 244 can collect information on usage and weather patterns and reconfigure the PCB's 210 normal operating regimen to increase or reduce the load (for example, the advertisement on the display 232) placed on the battery 236, based on the information collected. For example, if it is a Saturday, and expected to be a busy shopping day, the RCD 244 can allow a declining state of the battery 236, and can schedule a period on the near future where a smaller load will be placed on the battery 236, by, for example, not running the advertisement on the coming Monday. In doing so, the RCD 244 can optimize the advertising value and energy availability to use energy when it is most valuable, and recharge (use less energy) when it is less valuable. In order to maximize solar energy gained from a variety of locations, the RCD 244 can cause the PCB 210 to select between one of several charging circuits. For example, if it is anticipated that cloudy conditions are imminent, the RCD 244 can change the circuit that is used for battery charging, in order to make the charger more sensitive to lower light conditions. In a sunny environment, the charger circuit used can be one with poor low-light sensitivity, which would yield more wattage in direct sunlight.

The architecture 200 can also be used for monitoring functions, which can enable users to access information about the receptacle 204 and collection process. With this information, users can make judgments that facilitate their decision-making, helping them remotely adjust settings on the receptacle 204 to improve performance and communication. For example, the RCD 244 can be configured to enable users to easily adjust callback time, which is the normal time interval for communication that is configured in the PCB 210. The RCD 244 can enable the user to alter this time setting, so that the receptacle 204 communicates at shorter or longer intervals. Once the PCB 210 initiates communication, other parameters can be reconfigured, such as awake time, which is the amount of time the receiver is in receiving mode. This enables users to make “on the fly” changes. In some cases, the PCB 210 can shut down after sending a message and listening for messages to be received. In these cases, it can be difficult to send instructions, wait for a response, send more instructions and wait for response, because the time lapse between normal communications can be a full day. However, by remotely adjusting the setting through the RCD 244, the user can make continuous adjustments while testing out the downloaded parameters in real time, and/or close to real time. This can enhance the ability of the user to remotely control the receptacle 204.

Further, the RCD 244 can alter the current of the photoeyes 222B-C, in a test to determine whether there is dirt or grime covering the lens. Here, the RCD 244 can reconfigure the normal operating current of the photoeyes 222B-C. If the lens is dirty, the signal emitter photoeye will send and the signal receiver will receive a signal on high power, but not on low power. In this way, a service call can be avoided or delayed by changing the normal operating current to the photoeyes 222B-C. This can be a useful diagnostic tool.

In some embodiments, regular maintenance intervals can be scheduled, but can also be altered via information from the RCD 244. The RCD 244 can be configured to run a cycle while testing motor current. If motor current deviates from a normal range (i.e., 2 amps or so), then a maintenance technician can be scheduled earlier than normal. The RCD 244 can send a message to the user by posting an alert on the users web page associated with the receptacle 204.

Other settings can be embodied in the receptacle 204 as well. For example, the PCB 210 can sense that the receptacle 204 is full. The RCD 244 can then configure the PCB 210 to have a web page, or another display, present a full signal. The RCD 244 can alter when the full signal should be presented to the user. For example, after accessing a database with historical collection intervals, the RCD 244 can reconfigure the PCB 210 to wait for a period of time, e.g., one hour, before displaying a full signal at the web page. This can be helpful because, in some cases, a “false positive” full signal can be signaled by the PCB 210, but this can be avoided based on historical information that indicates that a collection only a few minutes after the last collection would be highly aberrational. The RCD 244 can thus be configured to override data from the PCB 210. Instead of sending a full signal to the user, the RCD 244 reconfigures the PCB 210 to ignore the full signal temporarily, and delay the display of a full-signal on the users' web page or smart phone, in order for time to go by and additional information to be gathered about the receptacle's actual fullness status. For example, when a collection is made and ten minutes later, the fullness sensor detects the receptacle 204 is full, the fullness display message on the web page can be prevented from displaying a full status. In some cases, the bag can be full of air, causing the proximity sensor in the receptacle 204 to detect a full bin. Within a certain time period, e.g., twenty minutes in a busy location, a few hours in a less busy location, as determined based on the historical waste generation rate at the site, the bag can lose its air, and the proximity sensor can sense that the bin is less full than it was twenty minutes prior, which would not be the case if the bin was full with trash instead of air. Thus, “false positive” information can be filtered out.

Likewise, tests and checks can be performed so that false negative information is avoided as well. For example, if a bin regularly fills up daily, and there is no message that it is full after two or three days, an alert can appear on the users' web page indicating an aberration. Thresholds for normal operating parameters and adjustments to normal can be set or reset using the RCD 244, or they can be programmed to evolve through pattern recognition. Although many operating parameter adjustments can be made through the web portal, adjustments can also be made automatically. This can be controlled by a software program that aggregates data and uses patterns in an aggregate of enclosures to alter PCB 210 settings on a single enclosure. For example, if the collection data from 1,000 enclosures indicates that collection personnel collect from bins too early 50% of the time when compaction threshold setting is set to “high”, compared to 10% of the time when compaction settings are set at “medium,” then the RCD 244 can reprogram the compaction thresholds to the medium setting automatically, so that collection personnel can be managed better, limiting the amount of enclosures that are collected prematurely. Automatic reprogramming, governed by software programs, can be applied to other aspects, such as user response to dynamic elements of the receptacle 204, such as lighted or interactive advertising media displayed on the receptacle 204. For example, if users respond to an LCD-displayed advertisement shown on the receptacle 204 for “discounted local coffee” 80% of the time, the RCD 244 can configure all receptacles within a certain distance, from participating coffee shops, to display the message: “discounted local coffee.”

In some embodiments, the RCD 244 can include a data receiving portal for the user with information displays about an aggregate of receptacles. Here, the user can access real-time and historical information of, for example, receptacles on a route, and/or receptacles in a given geography. The data can be displayed for the user on a password-protected web page associated with the aggregate of receptacles within a user group. The receptacle 204 can also display, for example, bin fullness, collections made, the time of collections, battery voltage, motor current, number and time of compaction cycles run, graphs and charts, lists and maps, etc. This data can be viewed in different segments of time and geography in order to assess receptacle and/or fleet status, usage, and/or trends. The users' web page can show, for example, a pie chart showing percentage of bins collected when their LED was blinking yellow, red and green, or a histogram showing these percentages as a function of time. These statistics can be categorized using pull down menus and single-click features. A single click map feature, for example, is where summary data for a particular receptacle is displayed after the user clicks on a dot displayed on a map which represents that receptacle. This can allow the user to easily view and interact with a visual map in an external application.

The RCD 244 can be configured to display calculated data, such as “collection efficiency,” which is a comparison of collections made to collections required, as measured by the utilized capacity of the receptacle 204 divided by the total capacity of the receptacle 204 (Collection Efficiency=utilized capacity/total capacity). The user can use this information to increase or decrease collections, increase or decrease the aggregate capacity across an area, etc. Typically, the users' goal is to collect the receptacle 204 when it is full—not before or after. The user can click buttons on their web page to show historical trends, such as collection efficiency over time, vehicle costs, a comparison of vehicle usage in one time period versus vehicle usage in another time period, diversion rates, a comparison of material quantity deposited in a recycling bin versus the quantity of material deposited into a trash bin. Other statistics can be automatically generated and can include carbon dioxide emissions from trucks, which can be highly correlated to vehicle usage. Labor hours can also be highly correlated with vehicle usage, so the web page can display a labor cost statistic automatically using information generated from the vehicle usage monitor. As the user clicks on buttons or otherwise makes commands in their web portal, the RCD 244 can change the PCB's 210 operating parameters, usage of sensors, etc., and/or measurement thresholds in response. The RCD 244 can also be configured to automatically display suggested alterations to the fleet, such as suggestions to move receptacles to a new position, to increase or decrease the quantity of receptacles in a given area, to recommend a new size receptacle based on its programmed thresholds, resulting in an improvement in costs to service the fleet of receptacles.

Heat mapping can also be used to provide a graphical representation of data for a user. Heat mapping can show the user the level of capacity in each part of an area, for example a city block, or it can be used to show collection frequency in an area. In each case, the heat map can be generated by associating different colors with different values of data in a cross sectional, comparative data set, including data from a plurality of enclosures. The heat map can be a graphical representation of comparative data sets. In some embodiments, red can be associated with a high number of a given characteristic, and “cooler” colors, like orange, yellow and blue, can be used to depict areas with less of a given characteristic. For example, a heat map showing collection frequency or compaction frequency across 500 receptacles can be useful to determine areas where capacity is lacking in the aggregate of enclosures—a relative measure of capacity. In this case, the highest frequency receptacle can assigned a value of red. Each number can be assigned progressively cooler colors. In other embodiments, the red value can be associated with a deviation from the average or median, for example, a darker red for each standard deviation. The heat maps can be shown as a visual aid on the user's web page, and can color-code regions where “bottlenecks” restrict vehicle and labor efficiency. A small red region can show graphically, for example, that if the user were to replace only ten receptacles with higher-capacity compactors, the collection frequency to a larger area could be reduced, saving travel time. Heat maps can be a helpful visual tool for showing data including, but not limited to, data showing “most collections” in a given time period, “most green collections,” which can visually demonstrate the number of bins collected too early (before they are actually full), “most compactions,” which can show on a more granular level the usage level of the bin, “most uses,” which can represent how many times the insertion door of the bin is opened or utilized, “most alerts,” which can show visually the number of “door open alerts,” which can show when doors were not closed properly, “voltage alerts,” which can show visually which receptacles are of low power, etc. While specific measurements are described herein to demonstrate the usefulness of heat mapping, there are other sets of data that can be represented by the heat maps, which are within the scope and spirit of this invention.

The heat map can also be used to present a population density in one or more areas, as well as a representation of any other activity or characteristic of the area, such as current traffic or congestion, for example. This information can also be shared with other businesses or devices. For example, the RCD 244 can analyze the heat map and share population statistics or activity with nearby businesses or municipalities. The RCD 244 can, for example, determine a high population density in Area A on Saturday mornings and transmit that information to a nearby locale to help the nearby locale prepare for the additional activity. As another example, if the receptacle is placed in a park, the RCD 244 can determine population and activity levels at specific times and alert park officials of the expected high levels of activity so the park officials and/or those managing the receptacle can plan accordingly.

The RCD 244 can also be used for dynamic vehicle routing and compaction and/or receptacle management. Because the RCD 244 can be a two-way communicator, it can both send and receive information between various receptacles and databases. This can allow the user to cross-correlate data between the fleet of receptacles and the fleet of collection vehicles. The RCD 244 can receive data from the user and/or the user's vehicle. For example, the RCD 244 can receive GPS data or availability data, and use it to change parameters on a given receptacle or aggregate of receptacles. The RCD 244 can receive this data from the users' GPS-enabled smartphone, for example. Similarly, the RCD 244 can send data to the user, a user device, a smartphone, etc., about the status of the receptacle 204. With this two-way data stream, collection optimization can be calculated in real time or close to real time. For example, a collection truck is traveling to the east side of a city and has 30 minutes of spare time. The RCD 244 can receive information about the truck's whereabouts, availability and direction, and query a database for receptacle real time and historical fullness information and determine that the truck can accommodate collections of twenty receptacle locations. The RCD 244 can then display a list of twenty receptacle locations that the truck can accommodate. The user can view a map of the twenty recommended locations, see a list of driving directions, etc. The map of driving directions can be optimized by adding other input data, such as traffic lights, traffic conditions, average speed along each route, etc. At the same time, as the truck heads to the east side of the city, the RCD 244 can reconfigure receptacles on the west side to change compaction thresholds, so that capacity is temporarily increased, freeing up additional time for the truck to spend in the east section. Alternatively, the RCD 244 can reconfigure a receptacle to temporarily display a “full” message to pedestrians, helping them find a nearby receptacle with capacity remaining. The RCD 244 can, in the case where the receptacle requires payment, increase pricing to the almost-full receptacle, reducing demand by pedestrians or other users. This same logic can be effective in situations where trucks are not used, for example, indoors at a mall or airport. The demand for waste capacity can vary, so having remote control over the receptacle 204 can allow users to change settings, parameters, and/or prices to make the collection of waste dynamic and efficient.

The location of the receptacle 204 and other receptacles can be determined via triangulation and/or GPS, for example, and placed on a map in the interactive mapping features. Moreover, the location of an indoor receptacle can be obtained from indoor WiFi hot spots, and the indoor receptacle can be placed on a map in the interactive mapping features. As a staff member accomplishes tasks (i.e., cleaning a bathroom) and moves inside a facility, the staff member's location can be tracked, and the fullness and location of nearby receptacles can be plotted on a map or given to the staff member by other means, as instructions to add a collection activity to the list of tasks. Whether by GPS, Wifi, Bluetooth, etc., triangulation between communication nodes can serve to locate a receptacle on a map, and measurements of fullness of receptacles can be used to create work instructions for staff members or truck drivers, so that efficient routes and schedules can be created to save time.

To better manage the collection process, user groups can be separated between trash and recycling personnel. In many cities, there are separate trucks used to collect separate streams of waste, such as trash and recyclables. For this reason, it can be helpful to configure the user's web page to display data based on a waste stream. The data can also be divided in this fashion and displayed differently on a smartphone, hand-held computer, and/or other user device. In addition, data can be displayed differently to different users. For example, the manager of an operation can have “administrative privileges,” and thus can change the location of a particular receptacle in the system, view collection efficiency of a particular waste collector, view login history, and/or view industry or subgroup benchmarks, while a waste collector with lower privileges can only view receptacle fullness, for example. The RCD 244 or another device can also be configured to print a list of receptacles to collect next, a list of full or partially full bins, etc. For example, the remote device 252 can be configured to print a list of receptacles to collect in the remaining portion of a route.

FIG. 3 illustrates an example storage receptacle 300. The storage receptacle 300 includes a bin 302 for storing content items, and a door 306 for opening the storage receptacle 300 to throw items in the bin 302. The storage receptacle 300 can have one or more sensors 304A-B, such as photoeye sensors, placed above the bin 302 for detecting the fullness state of the bin 302. The storage receptacle 300 can also include a sonar sensor 308 to detect objects in the receptacle 300 and calculate the fullness state of the receptacle 300. As one of ordinary skill in the art will readily recognize, the sonar sensor 308 and sensors 304A-B can also be placed in other locations based on the size and/or capacity of the receptacle 300, storage requirements, storage conditions, etc. The storage receptacle 300 can also include other types of sensors, such as an infrared sensor, a temperature sensor, a hall effect sensor, an encoder sensor, a motion sensor, a proximity sensor, etc. The sonar sensor 308 and sensors 304A-B can sense fullness at regular intervals, and/or based on manual inputs and/or a pre-programmed schedule, for example. Moreover, the sonar sensor 308 and sensors 304A-B are electrically connected to the printed circuit board (PCB) 316. Further, the sonar sensor 308 and sensors 304A-B can be actuated by the PCB 316, which can be configured to control the various operations of the storage receptacle 300.

The PCB 316 can control electrical functions performed by the storage receptacle 300. The electrical functions controlled by the PCB 316 can include, for example, running compactions by actuating a motor; sensing waste or recyclables volume inside the receptacle 300 using a sensor at regular or programmable intervals, such as sensors 304A-B; changing status lamps 318 at regular and/or programmable thresholds to/from a color indicating that the receptacle 300 is not full (e.g., green), to/from a color indicating that the receptacle 300 is almost full (e.g., yellow), to/from a color indicating that the receptacle 300 is full (e.g., red); collecting data and transmitting the data to another device; receiving data from another device; managing a power mode; measuring and managing a current; performing diagnostics tests; managing a power source; etc. The motor controller 310 can enable voltage to be applied across a load in either direction. The PCB 316 can use the motor controller 310 to enable a DC motor in the receptacle 300 to run forwards and backwards, to speed or slow, to “brake” the motor, etc.

The storage receptacle 300 includes a transmitter 312 and a receiver 314 for sending and receiving data to and from other devices, such as a server or a remote control device. Accordingly, the storage receptacle 300 can transmit and receive information such as instructions, commands, statistics, alerts, notifications, files, software, data, and so forth. The transmitter 312 and receiver 314 can be electrically connected to the PCB 316. This way, the transmitter 312 can transmit data from the PCB 316 to other devices, and the receiver 314 can receive data from other devices and pass the data for use by the PCB 316. In this regard, a user who is checking the status of the receptacle could drive down the street near the device (say within a wireless range, such as Bluetooth or WIFI, for example), not even get out of their vehicle, but receive a signal indicating that all is well, that the trash needs to be emptied, or that a repair or cleaning is needed.

Status lamps 318 can provide an indication of the status of the storage receptacle 300. For example, the status lamps 318 can indicate the fullness state of the storage receptacle 300. To this end, the status lamps 318 can be configured to display a respective color or pattern when the storage receptacle 300 is full, almost full, not full, etc. For example, the status lamps 318 can be configured to flash red when the storage receptacle 300 is full, yellow when the storage receptacle 300 is almost full, and green when the storage receptacle 300 is not full. Moreover, the status lamps 318 can be LED lights, for example.

The status lamps 318 can also be configured to flash in various patterns to indicate various other conditions. For example, the status lamps 318 can be configured to flash at the same time and in combination to show that the receptacle 300 is full. The status lamps 318 can also be configured to flash in different patterns or times or colors to show troubleshooting status information for example. In some cases, the status lamps 318 can be configured to flash in a predetermined manner to show that a door of the receptacle is open, a component is damaged, an obstacle is stuck, an operation is currently active, etc.

As one of ordinary skill in the art will readily recognize, the receptacle 300 can include other components, such as motors, sensors, batteries, solar panels, displays, relays, chargers, GPS devices, timers, fuses, resistors, remote control devices, cameras, etc. However, for the sake of clarity, the receptacle 300 is illustrated without some of these components.

Referring now to FIGS. 4A and 4B, unsecured receptacle 400A illustrates a storage receptacle, such as receptacle 300 in FIG. 3, operating under normal security conditions. The door 402 is shown in which a user can open the door and put in trash. The larger door 406 houses the door 402. A hinge 408 can be positioned along a right side edge of the door 406 and enable the door 406 to be opened exposing the interior of the receptacle and the security plate 404 to be installed. On the other hand, secured receptacle 400B illustrates the receptacle operating under a security condition with the security plate 404 installed on the door 406 to prevent the door 402 from being opened. The security condition can include a circumstance where there is a potential for a security breach, a terrorist attack or attempt, a conspiracy, a legal order, a crime condition, a heightened state of security, a lock-down state, a crime scene, a vandalism, a conspiracy, an unauthorized access, etc. Under the security condition, the system in the receptacle 400B is engaged and monitoring of the receptacle occurs so as to sense whether a security breach is being attempted.

Receptacles 400A-B can include a door 402, which can serve as an insertion point to allow users to dispose materials for storage in the bin on the receptacles 400A-B. When operating under a security condition, the receptacle can be fitted with a security plate 404 to block or limit movement of the door 402 to prevent users from opening the door 402 to insert or dispose materials into the receptacle. In some aspects, the security plate 404 can cover at least a portion of the door 402 and at least partially immobilize the door to prevent opening or forced entry. The security plate 404 can prevent movement of the door in either direction: either forward movement, backward movement, or both. This way, a user cannot open the door 402 by pushing inward or pulling outward.

The security plate 404 can also serve as a notice to nearby users that the receptacle 400B is locked, “out-of-order,” or otherwise operating under a security condition. For example, when a user walks to receptacle 400B to dispose of a waste item, she can quickly determine that the secure receptacle 400B is currently not in use when she sees the security plate 404 over the door 402. In some cases, the security plate 404 can also display a message to the users, such as an “out-of-order” message.

In some embodiments, the security plate 404 can be installed upon a notification or alert of a security condition at the unsecured receptacle 400A or a surrounding area. For example, the unsecured receptacle 400A can send an alert to a remote device, such as a server, indicating that the unsecured receptacle 400A is operating in a normal mode. The unsecured receptacle 400A can also send a signal indicating a detected security condition to the remote device. Upon receipt of the alert(s) or signal(s) from the unsecured receptacle 400A, a user can be dispatched to the unsecured receptacle 400A to install the security plate 404, according to secured receptacle 400B for example, and any other necessary security features. Once the security condition is over, the secured receptacle 400B can again send a signal indicating that the security condition is over or that the security plate 404 should be removed.

In some embodiments, the secured receptacle 404B can also include a security pin (not shown) fitted or attached inside the secured receptacle 404B to further prevent the door 402 from being opened by a user. The security pin can limit movement of the door and block the door from being opened. The security pin can provide a second layer of security when combined with the security plate 404 by further securing or locking the door 402 to prevent insertion of content items into the secured receptacle 400B. In some aspects, the security pin can be coupled to a hinge mechanism of the door 402 to prevent opening of the door 402.

The security plate 404 can be attached, secured, or installed in a top edge of the secured receptacle 400B. However, in some embodiments, the security plate 404 can be attached, secured, or installed in a different position or location on the secured receptacle 400B. For example, the security plate 404 can be installed on an opening side of the door 402, the inside of the secured receptacle 400B, etc. Moreover, while FIG. 4B illustrates one security plate, one of ordinary skill in the art will readily recognize that additional security plates can also be installed in some cases. For example, a security plate can be installed in the front of the secured receptacle 400B and a second security plate can be installed in the inside of the secured receptacle 400B.

Further, while FIG. 4B illustrates a use of a security plate for securing or locking the receptacle, one of ordinary skill in the art will recognize the other means can be used in addition to, or in lieu of, the security plate 404. For example, the secured receptacle 400B can be secured or locked down using the security pin previously described with or without the security plate. As another example, the secured receptacle 400B can be locked down using a lock or any other locking mechanism or hardware, such as a deadbolt or a lock set. Such security mechanisms can be implemented under a security condition, which can be detected and/or monitored by the receptacle as previously described.

As further described herein, the secured receptacle 400B can also detect and monitor events and transmit such data to a remote device, such as a server, to be collected or displayed for future or current analysis. For example, the secured receptacle 400B can monitor and detect any attempts to open the door 402, remove the security plate 404, or tamper with the security receptacle 400B. The secured receptacle 400B can monitor and detect such events using one or more sensors, such as photoeye sensors, cameras, defect detector sensors, water sensors, pressure sensors, noise sensors, chemical or particle sensors, motion sensors, gyroscopes, image sensors, etc. In some cases, the receptacle can be configured to monitor and detect hazardous or illegal materials, such as explosive materials, being deposited into the receptacle. The receptacle can also detect if a portion of the receptacle, such as a door or a handle, comes into contact with specific substances, such as explosives. For example, if a user having gun powder residue in her hands attempts to open the door on the receptacle or otherwise come in contact with the receptacle, the receptacle can be configured to detect the gun powder residue and generate a signal, alarm, or notification.

Once the secured receptacle 400B has detected a breach attempt or a hazardous substance, for example, the secured receptacle 400B can transmit any sensed or monitored data to a remote device. The remote device can then collect the data, present the data via a display or interface, analyze the data, and/or use the data in a remote control and analysis software application, for example. The remote device can also transmit the data to another device, such as a server, or another entity, such as a law enforcement agency.

Referring now to FIGS. 5A-D, receptacle 500 can include a door 502 which can be accessible to nearby users and serve as an insertion point for users to insert materials into the receptacle 500. The door 502 can be pushed or pulled by a user to provide an opening that allows a user to place items inside the receptacle 500. In some aspects, the door 502 can swing backwards when pushed by a user in order to create an opening into the receptacle 500 for storing or disposing materials into the receptacle 500.

When a security condition is detected or otherwise signaled, a user can install security plate 504 to secure and/or protect the receptacle 500 as illustrated in the secured receptacle 500 in FIG. 5B. The receptacle 500 can then monitor or detect any attempts to open the security plate 504 or tamper with the receptacle 500 and/or transmit any sensed data, information, or alerts to a remote device, as previously described in FIGS. 2 and 4.

The receptacle 500 can also include an access door 506 which can be opened from outside of the receptacle 500 to access the inside 508 of the receptacle 500. When opened, the access door 506 also provides access to the door 502 and allows a user to install the security plate 504 over the door 502, as previously described. Once the security plate 504 is installed over the door 502, the access door 506 can be closed and locked to prevent unauthorized access to the inside 508 of the receptacle.

In some embodiments, the security plate 504 can be placed to cover at least a portion of the door 502 by opening the access door 506 and securing the security plate 504 on the outside of the access door 506. In some cases, a user installing the security plate 504 can simply slide or attach the security plate 504 to the outside of the access door 506 and/or the top of the door 502, as illustrated in FIG. 5D. When the access door 506 is closed and/or locked, the security plate 504 can become further constrained or secured on the receptacle 500 to prevent unauthorized removal of the security plate 504. This way, a user is required to open the access door 506 in order to remove the security plate 504. Thus, a user cannot properly remove the security plate 504 without the corresponding means, such as a key or a code, for unlocking and opening the access door 506. In some cases, the security plate 504 can also be configured to include one or more latches or additional locking mechanisms to snap or attach to the receptacle 500 for additional support, locking, and security.

FIG. 6 illustrates a backside view 600 of the security plate 504. The security plate 504 in the backside view 600 is shown removed from the receptacle 500. The security plate 504 can be designed for coupling to a corresponding portion of the receptacle 500 for securing the security plate 504 to the receptacle 500. As shown in FIG. 6, the security plate as a clean surface along a bottom portion of the plate, and a raised flange on a right hand portion of the plate, which, when the plate is installed, will cover the left hand portion of the door 406. The top portion of the plate 502 also includes a first flange 602 that protrudes from at least a portion of the top edge of the plate 504. The first flange 602 has a second flange 602 that protrudes out of a portion of the surface of the first flange 602. The second flange 604 is generally parallel to the plate 504. Screw holes can be placed in the second flange 604 for securing the plate 504 in place on the door 406. The structure of these flanges enable a top portion of the plate 504 to be secured on the door 406 in a secure manner such that a person cannot easily pull the plate off. FIGS. 5C and 5D illustrate the installation of the plate on the door 406.

FIG. 7 illustrates an exemplary inside locking mechanism for a receptacle 700. The receptacle 700 can include a door 706 which can provide an opening or insertion point similar to the door 502 in FIGS. 5A-D. The security pin 702 can be used to lock the door 706 from being opened by a user from the outside. The security pin 702 can be attached through a whole on the receptacle 700 via a card 704 that is attached to the door 706, to prevent the door 706 from being opened. The security pin 702 can thus provide a locking mechanism to secure the door 706 and prevent access to the inside of the receptacle through the insertion point on the door 702. The security pin 702 can be of varying length and size based on the size of the receptacle 700 and/or the door 706, the security requirements, the weight and materials of the receptacle 700 and/or the door 706, or any other factor according to conventional methods.

Having disclosed some basic system components and concepts, the disclosure now turns to the example method embodiments shown in FIGS. 8 and 9. For the sake of clarity, the method in FIG. 8 is described in terms of example system 100, as shown in FIG. 1, configured to practice the methods. Moreover, for the sake of clarity, the method in FIG. 9 is described in terms of example receptacle 300, as shown in FIG. 3, configured to practice the methods. The steps outlined herein are illustrative and can be implemented in any combination thereof, including combinations that exclude, add, or modify certain steps.

Referring first to FIG. 8, the system 100 can monitor, under a security condition, a storage receptacle having a security plate being positioned over a door on the storage receptacle, the door including an insertion point for storing contents on the storage receptacle, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the storage receptacle (800). The system 100 can monitor the storage receptacle using sensors, data connections, algorithms, user feedback, news information, usage and performance data, device statistics, and so forth. For example, the system 100 can monitor a data connection of the storage receptacle, as well as sensed data collected by sensors at the storage receptacle and transmitted to the system via the data connection. Through the data connection, the system 100 can also receive, from the storage receptacle, a current status of the storage receptacle, a current usage, information about running services at the storage receptacle, errors at the storage receptacle, logged information, etc.

The storage receptacle can also be configured to detect dangerous substances that come in contact with one or more components of the storage receptacle. For example, the storage receptacle can be configured to detect if explosive materials are inserted into the storage receptacle. To this end, the storage receptacle can be configured to use one or more sensors for detecting specific types of substances, such as chemical or particle sensors, scanners, chemical testing materials, etc.

In some cases, the storage receptacle can be configured with a sensor or scanner capable of detecting if a person that has touched a portion of the storage receptacle, such as the handle, has left any traces of an explosive substance, such as gun powder, on the touched portion of the storage receptacle. For example, if an individual with traces of gun powder or bomb making materials on his or her hand grabs the handle of the storage receptacle to open the door, the storage receptacle can detect the traces of gun powder or bomb making materials, and generate a signal or alarm. The storage receptacle can then send the signal to a remote server or another entity, such as a police department, to alert others of the detected traces of explosive materials.

Next, the system 100 can receive a signal indicating a security breach at the storage receptacle, the security breach including at least one of an attempt to open the door and an attempt to remove the security plate (802). The system might sense for a series of actions such as first an attempt to open the door (either the smaller door for entering trash, or the larger door for getting to the interior of the receptacle.) and then a second attempt to remove the security plate. The system 100 can receive the signal from a transmitter at the storage receptacle, for example. Moreover, the storage receptacle can generate the signal based on sensed data, performance logs, errors, current usage information, etc., as previously described. Other breaches could be sensed for as well, such as a movement of the entire receptacle, or any attempt to obtain access to the inside such as through the back or the top of the receptacle.

In response to the signal, the system 100 can then generate a notification of the security breach (804). The notification can be an alert, a report, an alarm, a message, another signal, etc. The system 100 can also send the notification to another user or device, such as a remote server or a device associated with a security official. The system may provide a series of notifications such as an event coordinator or security officer as well as police or fire officials. Participants in an event may also be stored in the system such that notifications could go out. In some aspects, the system 100 can also store the notification in a database or storage to maintain statistics, evidence, logs, and data relating to the security breach and any other previous security breach. The system 100 can also analyze the signal or notification and generate a recommendation, such as a recommended or suggested response. Thus, in once example, if a marathon is going on, and a security event or condition occurs at one of the receptacles, one or more of the following people could get a notification or an alert: Marathon officials, police/fire officials, runners in the marathon, spectators, etc. Thus, notification could immediately go out with particular information about the location of the receptacle and instructions.

Referring to FIG. 9, the receptacle 300 can detect a security condition associated with at least one of a storage receptacle and an area around the storage receptacle (900). The security condition can include, for example, criminal activity, a terrorist attempt, a terrorist plot, a lock-down period, a heightened state of security, a conspiracy, a security breach, vandalism, a police situation, an enforcement condition, a crime scene, a security request, etc. Moreover, the receptacle 300 can detect the security condition using one or more sensors as previously described. In some aspects, the receptacle 300 can be configured to monitor events, such as nearby movements, external forces, data events (e.g., network alerts or data connections), surrounding conditions, environment parameters, usage events, news events, etc.

Next, based on the security condition, a security plate is installed over a door on the receptacle 300, the door including an insertion point for storing contents on the receptacle 300, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the receptacle 300 (902). The security plate can be installed by a user in response to the security condition. In some aspects, the receptacle 300 can generate a signal, alarm, message, or notification relating to the security condition or a security request to trigger the installation of the security plate. For example, the receptacle 300 can transmit a security-plate installation request along with a location associated with the receptacle 300, a timestamp, and/or any other information.

In some aspects, the receptacle 300 can also be configured to automatically install the security plate in response to the security condition. For example, the receptacle 300 can be designed to maintain the security plate in an open position, and configure the security plate to automatically shut or close over the door (and/or any other opening in the receptacle 300) in response to the security condition. Here, the receptacle can include a locking or closing mechanism coupled to the security plate which can be triggered by a signal from a processor associated with the receptacle 300. The receptacle 300 can then send a signal to a remote device indicating that the security plate has been installed, locked, or secured, as well as any other additional details regarding the security plate, the receptacle 300, or the security condition.

Then, based on the security condition, the receptacle 300 can lock the door in a closed position using a locking pin located inside the storage receptacle, the locking pin limiting movement of the door on the storage receptacle to further prevent insertion of additional contents in the storage receptacle (904). The locking pin can be automatically placed in a locked position by the receptacle 300 using a locking mechanism configured to respond to a signal from the processor. In other cases, the locking pin can be manually inserted into the receptacle 300 and/or placed in a locked position by a user in response to the security condition or a request from the receptacle 300.

Next, the receptacle 300 can monitor the storage receptacle via a sensor configured to detect a security breach associated with at least one of the door on the storage device and the security plate (906). The sensor can include one or more sensors as previously described. Moreover, the receptacle 300 can transmit any sensed data to a remote device, such as a server, to be stored, collected, forwarded, analyzed, or manipulated by the remote device. In some cases, the receptacle 300 can transmit sensed data to be used on an application at the remote device to control and/or monitor the receptacle 300.

In some cases, the receptacle 300 can also be configured to maintain and/or monitor a data connection to a network or a server. For example, the receptacle 300 can maintain a wireless connection to a server via a network, and detect any loss of data connection. If the data connection is lost, the receptacle 300 can trigger an alarm indicating a security issue. Similarly, the server can trigger an alarm or notification indicating that the receptacle 300 has lost the data connection. In response, the server, or a user receiving the indication from the server, can respond to the loss of connection appropriately. For example, the user can contact the authorities if he or she suspects that the receptacle 300 lost the data connection as a result of a criminal act or event.

In some configurations, the receptacle 300 can also be configured to detect dangerous substances that come in contact with one or more components of the receptacle 300. For example, the receptacle 300 can be configured to detect if explosive materials are inserted into the receptacle 300. In some cases, the receptacle 300 can be configured with a sensor or scanner capable of detecting if a person that has touched a portion of the receptacle 300, such as the handle, has left any traces of an explosive substance, such as gun powder, on the touched portion of the receptacle 300. For example, if an individual with traces of gun powder or bomb making materials on his or her hand grabs the handle of the receptacle 300 to open the door, the receptacle 300 can detect the traces of gun powder or bomb making materials, and generate a signal or alarm. The storage receptacle can then send the signal to a remote server or another entity, such as a police department, to alert others of the detected traces of explosive materials.

Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage devices for carrying or having computer-executable instructions or data structures stored thereon. Such tangible computer-readable storage devices can be any available device that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as described above. By way of example, and not limitation, such tangible computer-readable devices can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other device which can be used to carry or store desired program code in the form of computer-executable instructions, data structures, or processor chip design. When information or instructions are provided via a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable storage devices.

Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.

Other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.

The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Various modifications and changes may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure. Claim language reciting “at least one of” a set indicates that one member of the set or multiple members of the set satisfy the claim.

Claims

1. A method comprising:

monitoring, under a security condition, a storage receptacle having a security plate being positioned over a door on the storage receptacle, the door comprising an insertion point for storing contents on the storage receptacle, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the storage receptacle;
receiving a signal indicating a security breach at the storage receptacle, the security breach comprising at least one of a first attempt to open the door and a second attempt to remove the security plate; and
in response to the signal indicating the security breach, generating, via a processor, a notification of the security breach.

2. The method of claim 1, further comprising transmitting the notification to a remote device.

3. The method of claim 1, wherein the notification comprises information regarding at least one of the security breach and the security condition.

4. The method of claim 1, wherein the security condition comprises a security threat, and wherein the signal comprises sensed data collected from a sensor at the storage receptacle.

5. The method of claim 1, further comprising generating an alarm based on the indication of the security breach, the alarm comprising at least one of a visual alarm and an audio alarm.

6. The method of claim 1, further comprising monitoring a data connection associated with a communications device at the storage receptacle to detect a connection state of the data connection, the communications device comprising at least one of a communications interface, an antenna, a receiver, and a transmitter.

7. A method comprising:

detecting a security condition associated with at least one of a storage receptacle and an area around the storage receptacle;
based on the security condition, installing a security plate over a door on the storage receptacle, the door comprising an insertion point for storing contents on the storage receptacle, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the storage receptacle;
based on the security condition, locking the door in a closed position using a locking pin located inside the storage receptacle, the locking pin limiting movement of the door on the storage receptacle to further prevent insertion of additional contents in the storage receptacle; and
monitoring the storage receptacle via a sensor configured to detect a security breach associated with at least one of the door on the storage device and the security plate.

8. The method of claim 7, wherein the security breach comprises at least one of a first attempt to open the door, a second attempt to remove the security plate, and a detection of a predetermined substance making contact with the storage receptacle.

9. The method of claim 8, further comprising:

detecting the security breach; and
sending, via a transmitter on the storage receptacle, a signal to a remote device indicating that the security breach was detected.

10. The method of claim 9, further comprising establishing a data connection between the remote device and the storage receptacle, wherein the data connection is used to send the signal.

11. The method of claim 10, further comprising monitoring the data connection to detect a connection state of the data connection.

12. The method of claim 11, wherein the storage receptacle is configured to send a security breach signal to the remote device when a disconnection state of the data connection is detected.

13. The method of claim 12, wherein the disconnection state triggers the transmitter on the storage device to send the signal after a threshold period of interruption.

14. The method of claim 7, wherein the security plate is installed over a top edge of the door to block the opening of the door.

15. The method of claim 7, further comprising installing a second security plate over a second opening on the storage receptacle, the second opening comprising a second insertion point for storing contents in the storage receptacle.

16. The method of claim 15, wherein at least one of the security plate and the second security plate are configured to display an indication that the storage receptacle is out of order.

17. A receptacle comprising:

a processor;
a transmitter for transmitting information to a remote device via a network;
a storage for storing content items;
a sensor for detecting a security condition associated with at least one of the receptacle and an area around the receptacle;
a security plate installed over a door on the receptacle, the door comprising an insertion point for storing contents on the storage of the receptacle, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the storage of the receptacle;
a locking pin for locking the door in a closed position, the locking pin limiting movement of the door on the receptacle to further prevent insertion of additional contents in the storage of the receptacle; and
a computer-readable storage medium having stored therein instructions which, when executed by the processor, cause the processor to perform operations comprising: detecting the security condition; and generating a signal indicating that the security condition has been detected.

18. The receptacle of claim 17, the computer-readable storage medium having stored therein instructions which, when executed by the processor, result in an operation further comprising sending the signal to a remote device via the transmitter, wherein an installation of the security plate is triggered by a detection of the security condition.

19. The receptacle of claim 17, wherein the security condition comprises at least one of a first attempt to open the door and a second attempt to remove the security plate.

20. The receptacle of claim 17, further comprising an energy storage for powering operational functions performed by the receptacle and a receiver for receiving information transmitted to the receptacle via the network, the computer-readable storage medium having stored therein instructions which, when executed by the processor, result in operations further comprising:

activating the sensor on the receptacle; and
receiving a measurement from the sensor.
Patent History
Publication number: 20160347540
Type: Application
Filed: Feb 10, 2015
Publication Date: Dec 1, 2016
Inventors: David J Skocypec (Medfield, MA), Jeffrey T. Satwicz (Weston, MA), Douglas J. Furciniti (Groton, MA), Michael E. Feldman (Framingham, MA)
Application Number: 15/117,463
Classifications
International Classification: B65F 1/14 (20060101); G08B 13/08 (20060101);