CA3052185A1 - Universal method for secure food delivery - Google Patents

Universal method for secure food delivery Download PDF

Info

Publication number
CA3052185A1
CA3052185A1 CA3052185A CA3052185A CA3052185A1 CA 3052185 A1 CA3052185 A1 CA 3052185A1 CA 3052185 A CA3052185 A CA 3052185A CA 3052185 A CA3052185 A CA 3052185A CA 3052185 A1 CA3052185 A1 CA 3052185A1
Authority
CA
Canada
Prior art keywords
food
customer
tamper proof
proof seal
delivery
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA3052185A
Other languages
French (fr)
Inventor
Marcus Kuettner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA3052185A priority Critical patent/CA3052185A1/en
Priority to US16/676,345 priority patent/US20200160263A1/en
Publication of CA3052185A1 publication Critical patent/CA3052185A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0832Special goods or special handling procedures, e.g. handling of hazardous or fragile goods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants

Abstract

A universal method for secure food delivery from a food source that sells food to a customer, the method of delivering food from a food source to the customer comprising the food source following the steps of: receiving a food order from the customer; preparing the food order and depositing it into a food container at the food source; applying a tamper proof seal label to the food container at the food source whereby the food container cannot be opened without a visible indication that the container has been opened, wherein each tamper proof seal label has a unique identifier marked thereon; logging said unique identifier into a database; making the unique identifier that is associated with the customer's food order available to the customer; and giving the food container with the tamper proof seal label applied thereto, to a person for delivery of the food container to the customer.

Description

UNIVERSAL METHOD FOR SECURE FOOD DELIVERY
Field of the Invention [0001] The present application relates to a universal method for secure food delivery. More particularly, the method helps consumers who order food deliveries to be confidant that their food items have not been tampered with while being delivered to them by providing secure food packaging and third-party validation.
Background of the Invention
[0002] In many places it is not uncommon for consumers to order food deliveries from grocery stores and restaurants. Traditionally, deliveries were made by employees of the business selling the goods. If it was a pizza restaurant the restaurant had staff that delivered the pizzas. If it was a grocery store, some grocery stores had delivery trucks. In these scenarios, consumers develop a sense of trust because the delivery people are employed by the business. A business values its reputation so it has an interest in making sure that its delivery people are trustworthy and that their customers get what they paid for without any tampering. Such purchases are usually made from a local business and consumers can even develop a familiarity with the delivery person. Consumers have come to expect a minimum duty of care from businesses to guard against tampering.
[0003] These days, consumers have become accustomed to ordering products on-line and having them delivered. This business model is now being applied to food delivery. Internet-based retailers have purchased traditional grocery stores and have announced that they wish to deliver groceries to their customers.
Many companies, such as Uber EatsTM, Skip the DishesTM and Just EatTM are businesses that offer food delivery services from restaurants. Such services are becoming more popular since they offer the consumer variety, convenience and time saving advantages. Many restaurants who did not previously offer delivery services can now access a broader market and serve more meals per evening than their dining rooms can accommodate. This can make restaurants more profitable without expanding the capacity of their dining rooms, which reduces overhead costs per customer served. While there are many advantages and benefits associated with this new model for home delivery, many of the conditions that were present in the past that helped to provide security and instill trust in the customers, are missing with the new model.
100041 With the growth of third-party food delivery services, the risk of food being tampered with has increased. However, there is no universal way for securing food deliveries from tampering. Food delivery services often hire casual workers who operate more like independent contractors than employees.
Incidents are starting to occur where consumers who have had their food delivered, suspect that the food has been tampered with. There have been instances reported where food appears to be missing or partly eaten but it can be hard for the consumer to prove it and even harder to prove who did it. With a third-party delivery service, the person making the delivery could be a different person each time, so there is not the same level of trust. If the delivery person is making more than one delivery and the food is carried in a single thermally insulated carrier, and if the food containers accidentally open, the food could get contaminated or mixed with other food in the carrier. The delivery person might also use the carrier to carry other things, not just other food being delivered, but also the delivery person's own personal items, that could contaminate the food.
Some delivery services use people who ride bicycles, and this could result in more jostling of the food items inside a carrier mounted on the bicycle or carried on the back of the delivery person. If the delivery person is delivering more than just food, and if the food containers can be opened by the delivery person, he or she could hide or bundle things together and forget to separate the bundled items.
Bundled items could contaminate each other. This can be especially dangerous if a consumer has food allergies and food is contaminated by something that the consumer is allergic to. In addition, there is always the danger that the delivery person could intentionally contaminate the food because of a feud or dislike of the consumer by the delivery person. Perhaps the consumer is a bad tipper or someone that the delivery person knows and dislikes for any number of reasons.

Some consumers might wonder if the delivery person spat into the food or otherwise contaminated it. Perhaps the delivery person is just unreliable, irresponsible and/or dishonest. In other cases, the delivery person might unknowingly (or knowingly) have an infectious disease, and the consumer is better protected by preventing any contact between the delivery person and the food being delivered. For food deliveries from grocery stores, a customer could order two kilograms of apples, but customers seldom weigh their groceries when they receive them, so a customer might not notice that an apple is missing.
100051 The concept of protecting food deliveries against tampering is not by itself novel. However, solutions to date have limitations and have drawbacks that inhibit them from being adopted universally. For example, there have been numerous attempts to improve the packaging for pizza to make the it hard to tamper with the food. Even before the introduction of independent food delivery services, many pizza restaurants offered delivery services. Even with deliveries made by employees, there was a need to improve the packaging for pizza to make them more resistant to tampering. For example, US Patent Application Publication No. 2017/0362008A1 discloses tamper resistant food container that has an adhesive strip that securely seals the box lid in a closed position.
The box is opened by ripping a tear-away strip to lift the lid. This ensures that the pizza box cannot be opened by the delivery person without the customer seeing that the box has been opened. US Patent Application Publication Nos. 2016/0304234A1 and 2016/0304235A1 show a similar concept with a plastic cord or string that is pulled to tear the food container open along a perforated line. These patent applications illustrate this feature for pizza boxes as well as other food containers, such as clam shell designs, cartons, and paper bags. US Patent Application Publication No. 2015/0183558A1, shows a pizza box that includes an integrated locking system. The box has what appear to be straps that are attached to the bottom portion of the box and that can be sealed to the lid or upper portion of the box, to prevent the box from being opened without breaking the seal or straps. While these approaches reduce the likelihood of the contents of the food container being tampered with, a disadvantage of all these solutions is that they all require a special container. Conventional pizza boxes would need to be replaced with new pizza boxes that have the tamper proof features. If a restaurant currently uses Styrofoam food containers, aluminum food containers, or plastic food containers, it would also need to change the type of food containers that it uses. Containers with the tamper proof features might not be available in the area where a business is located. Tamper proof containers might be more expensive than conventional food containers. Using tamper proof food containers might also require a business to change to a different supplier, and this could be a problem if a business has a long-term supply agreement with its existing supplier. Some of the patented tamper proof food containers might not be available for purchase or license if the patent owner wishes to use it for itself exclusively, to differentiate itself from competitors. For these solutions that use a sealed package, without any third-party verification, there is no guarantee that the delivery person has not tampered with the food and then re-sealed it with a new seal, or re-packaged it in a new sealed package.

100061 US Patent Application Publication No. 2018/0162603A1 discloses a sealable plastic bag assembly. This allows food to be delivered in conventional containers, and then the bag is sealed so that if it is opened before it is delivered to the customer, the customer will be able to see that the sealed bag has been opened. UK Patent No. GB 2,401849B is an example of a similar approach, where additional packaging receives the food containers with this packaging being heat sealed to prevent access to the food during delivery. While these approaches allow restaurants to continue to use their conventional food containers, it requires the purchase of additional packaging in the form of special bags or other packaging. If the size of food orders varies from customer to customer this might require a business to purchase different sized bags.
Someone trying to circumvent this security measure could have extra bags and re-seal the food in a new bag before delivering it to the customer. If the packaging is heat sealed, then this requires the business to purchase a heat-sealing machine. While such approaches would make it more difficult for the food to be tampered with, there are still disadvantages for businesses and without third party verification to assure customers that there has been no tampering, there are still shortcomings that could cause some customers to remain concerned about the security of their food.
100071 As these examples show, there have been solutions in the past directed at specific packaging, but there has been no method for universally securing food deliveries that are delivered in conventional packaging, and for giving the customer more certainty that the food has not been tampered with. There is a need for a secure and universally implementable food delivery method that enables consumers to order food deliveries and be confident that the delivered food has not been tampered with between the time when it was packaged by the restaurant or grocery store and the time when it is delivered to the consumer.

Even if tampering incidents are infrequent, there are some consumers who will not feel comfortable using a food delivery service so long as there is a risk of tampering, no matter how small the risk may be. For restaurants, grocery stores, and delivery companies, without universally available methods for securing food against tampering, they are exposing themselves to risks, for example, if a consumer gets sick or even dies from eating tampered food. All these businesses could have their reputations damaged and their business could suffer irreparable harm if consumers become victims of food tampering and/or contamination.
With conventional methods, if there is a problem it might not be possible to ever prove with certainty who caused the problem. For example, the food could have been contaminated or prepared incorrectly at the source and not by the delivery person. If a customer gets sick from a food delivery, that customer might never again order food from the same restaurant, but the problem could have been caused by the delivery person, not by the restaurant. In other circumstances a customer that gets sick might stop ordering food delivery from all food sources and this is a loss to both food sources and food delivery services. Even if a food delivery service can later prove that the food was contaminated at the source, or if the restaurant is able to prove that it was the food delivery person who caused the problem, the damage to the innocent business has already been done and it could be difficult to reverse the damage to its reputation. This harm may not relate to just the unhappy customer. With the use of social media today, consumers often give ratings and warnings about restaurants. If a consumer receives tainted food and complains about it on social media and/or consumer review sites like YelpTM or Trip AdvisorTM this could be very harmful to a business and unjustified if the tainting was caused not by the restaurant, but by the delivery person. That is, one bad incident caused by tampering by a delivery person could have broader implications than just the loss on one customer, since many consumers now rely on restaurant reviews and social media when choosing a restaurant for ordering food.
[00081 The need to be addressed is most problematic for food delivered from a food source to a customer by means of a third-party delivery service. However, if customers become accustomed to a more secure method of delivery that is tamper proof or tamper evident, then customers could see value in such delivery methods even when the delivery is not made by a third party. For example, the solution to this problem could also be applied to give customers assurance that the delivered food has not been tampered with or otherwise compromised even when the delivery is made by employees of the food source, such as grocery store delivery people, the people delivering food to hotel or motel guests, or a pizza delivery person that works for the pizza restaurant. Even though some of these delivery people might ordinarily be trusted, in a large operation such as a large hotel, a large restaurant franchise, or a large grocery store chain, a method of securing the food during delivery gives the customer extra assurance that the food that was packaged was not accessed during transit, especially if the security of the food packaging can be verified by a third party validator.
[0009] There is a need for a universally available method for securing food deliveries to consumers, that enables consumers to be confident that the food delivered to them has not been tampered with or contaminated by improper handling while being delivered. Businesses that make the food or that handle the deliveries can also benefit from a system that provides independent verification that the food being delivered has not been tampered with. The assurance of secure delivery of food can be a factor that consumers use in choosing a food source for home delivery. That is, businesses that offer a method of giving consumers verification against tampering by an independent third-party validator can offer this as an added value that differentiates them from their competition.

Businesses involved in the delivery of food will also benefit if secure delivery processes result in more people ordering food deliveries.
Summary of the Invention [0010] A universal method is disclosed for secure food delivery from a food source that sells food to a customer. The method comprises the food source following the steps of: receiving a food order from the customer; preparing the food order and depositing it into a food container at the food source;
applying a tamper proof seal label to the food container at the food source whereby the food container cannot be opened without a visible indication that the container has been opened, wherein each tamper proof seal label has a unique identifier marked thereon; logging said unique identifier into a database; making the unique identifier that is associated with the customer's food order available to the customer; and giving the food container with the tamper proof seal label applied thereto, to a person for delivery of the food container to the customer. The food source can be any business that prepares food that is ordered by a customer for delivery to a location designated by the customer. Examples of food sources, without limitation, include restaurants, coffee shops, cafes, ice cream shops, farms, ranches, organic food stores, marijuana dispensaries, and grocery stores.
[0011] In some embodiments, the food source can receive the food order from the customer through an intermediary business. The intermediary business can be a service provider that arranges food deliveries from pre-selected food sources, which have agreed to apply the tamper proof seal label at the food source. The intermediary business can also coordinate people making the deliveries.

100121 In preferred embodiments, the database is managed by a third-party validator that can give an independent validation to customers that the unique identifier on the seal label that seals the food container received by the customer matches the unique identifier uploaded to the database by the food source. The unique identifier can be made available to the customer in more than one way.
In some embodiments, the customer can access the database to retrieve the unique identifier assigned to the customer's food order to validate that the correct food container is being received, and that the tamper proof seal label is the same one that was applied at the food source, to visibly verify that the food container has not been opened from the time it was packaged until the time of delivery to the customer. In other embodiments, the food source automatically sends the unique identifier to the customer, for example by a text notification, e-mail, phone call or other notification method chosen by the customer. In another embodiment, the third-party validator that manages the database can send the notification to the customer. A computer program can be used to automate the sending of notifications to customers.
100131 That is, in addition to managing the database, the role of a third-party validator includes giving the customer confidence that there is independent oversight to check that a process is being followed by the food source to ensure that the food is packaged and sealed according to a process prescribed by the third-party validator, so that there are safeguards against tampering.
100141 In some embodiments of the method, the third-party validator and the food source enter into an agreement to agree to at least one of: (1) supply of tamper proof seal labels with pre-printed unique identifiers, supplied from the third-party validator to the food source; (2) payment from the food source to the third-party validator to contribute to funding the management of the database;
(3) access to the database, granted to the food source by the third-party validator to input the unique identifiers and for permitting the food source's customers to access the database to retrieve the unique identifier assigned to the customer's food order; and (4) supply of secure packaging that is designed to provide a secure enclosed space that facilitates sealing to deter access to the package contents by preventing access without visible damage to a seal label or the packaging.
[0015] In preferred embodiments the database is cloud-based, meaning that the cloud database is delivered as part of the service provided by the third-party validator to food sources and customers. The third-party validator manages back-end processes associated with the database installation, deployment, data management and resource assignment tasks. The third-party validator makes tools available to food sources, such as a web interface and/or user application for uploading the unique identifier and other data associated with food orders.
The third-party validator can also make tools available to customers such as a customer application for a smart phone or other device to allow them to access the database and retrieve the unique identifier associated with their food orders.
[0016] An important feature of preferred embodiments of the method is the contractual relationship between the third-party validator and the food source, because it can include terms that define the process to be followed by the food source that will give customers confidence that the food delivered from that food source will be secure from tampering during delivery. For example, the contract between the third-party validator and the food source can stipulate that the food source agrees to give the third-party validator the right to inspect the food source's facilities to ensure that the food source is correctly applying the tamper proof seal labels to seal the food containers before they are given to the delivery service. The terms of the contract can further include an agreement that the food source will purchase the tamper proof seal labels with pre-printed unique identifiers from the third-party validator or one of its licensed and authorized distributors or vendors. This ensures that there is quality control and that the labels will have unique identifiers that are given by a third-party validator, without any opportunity for tampering at the food source. This customer confidence can still be maintained if the third-party validator grants a license to a food source to print its own unique identifiers onto tamper proof seal labels that the food source purchases from the third-party validator if the license includes terms that require the food source to follow processes to prevent any duplication of the unique identifiers, so that replacement labels cannot be generated and so that food is kept secure from tampering. If licensed, the food source can be permitted to use its own unique format provided that the chosen format has been pre-approved by the third-party validator. The third-party validator controls the format and the unique identifiers so that they are indeed unique, allowing the third-party validator to be able to confirm that the tamper proof seal label is authentic. Unique in this context means that at a given point in time, a seal label with a unique identifier is the only seal label in use at that time bearing that unique identifier. Since seal labels are destroyed and/or disposed of after the food container is opened, after a predetermined period of time, a third-party validator that is managing the assignment of unique identifiers could choose to re-use a unique identifier without risk of the same unique identifier being borne by more than one food container at the same time. That is, in this context "unique" means that for a given point in time, the unique identifier is not contemporaneously used on any other seal label.
[0017] In some embodiments, the unique identifier is in machine readable form, where by it can be entered into the database by being electronically scanned or photographed. If in machine readable form, it can be in a bar code, QR Code or some other coded form. The ink or toner that is used to print the code can be magnetic, for example, by containing iron oxide. In some embodiments the code can be translated into an alpha-numeric format so that the code can be texted to the customer. A magnetic ink character recognition (MICR) code is an example of a code standard that uses magnetic ink and because these codes are normally numeric, they can be easily read by people and put into a text message. In other embodiments, an application can be installed on the customer's smart phone so that the phone's camera can scan the code and confirm that it is the same code that is associated with the seal label that was applied at the food source to seal the food container. Other types of codes and technologies can be substituted to function in substantially the same way to achieve substantially the same result. For example, instead of printing with ink the unique identifier can be laser etched. In yet another example the seal labels can further incorporate radio frequency identification RFID technologies that use electromagnetic fields to automatically identify and track food containers.
[0018] The tamper proof seal label can comprise a paper or plastic sheet label with an adhesive backing with tamper proof features, so that once applied to the packaging, the tamper proof seal label cannot be removed without tearing, deforming, or some other evidence of damage to the tamper proof seal label.
With this embodiment, the unique identifier can be imprinted on the tamper proof seal label, which can then be applied to the packaging at a location that prevents the opening of the packaging without damaging the tamper proof seal label. In other embodiments, the tamper proof seal label can comprise a locking mechanism that cannot be opened by anyone other than the customer without evidence of damage. The unique identifier can be printed on the locking mechanism itself or on a tag or tab that is a display panel integrated with the locking mechanism. By way of example, the locking mechanism can comprise a self-locking loop with a flexible stem section that engages with a receiving head that comprises ratcheting features whereby when the stem section is inserted into the receiving head the stem section cannot be pulled out of the receiving head without evidence of damage. The self-locking loop can be made, for example, from nylon, and can be non-recycled or recycled plastic. For packaging that employs a double separating zippered closure, which has two opposed zipper sliders, such as a thermally insulated bag, the stem of the self-locking loop can be looped through the pull tabs for the opposing zipper sliders to seal the bag so that it cannot be opened without cutting the stem. In other embodiments, packaging can employ other closure arrangements that can be used to seal the packaging with a locking mechanism. In other embodiments, the locking mechanism can comprise a re-usable padlock with an electronic code or numeric combination that is transmitted to the customer, so that only the customer can open the padlock. In yet another embodiment the tamper proof seal label can consist of a cord that is looped through the packaging closure arrangement. The cord can be made, for example, from string or twisted paper, and can seal the packaging by locking the two ends of the cord between an adhesive-backed label that displays the unique identifier. In still another embodiment, the locking mechanism can comprise a clamp that can be applied to seal the open side of a bag. In all embodiments, the tamper proof seal label displays a unique identifier that gives assurance to the customer that he or she can verify that the tamper proof seal label is the same one that was applied by the food source, and the tamper proof seal label is made in a form such that once applied to the packaging, the packaging cannot be opened without evidence of damage to the packaging or the tamper proof seal label.
101001 The method can further comprise the third-party validator tracking the location of the food container when it is being delivered from the food source to the customer. For example, in a preferred embodiment, the third-party validator tracks the food container after the tamper proof seal label has been applied by having each person who handled the food container input the unique identified into a device with GPS location tracking enabled and trackable by the third-party validator. The delivery chain could include just one delivery person or a plurality of delivery people if the food container is handed off in the delivery process, and according to the method, whenever a person in this delivery chain takes possession of the food container that person inputs the unique identifier as part of the process for taking possession of the food container. This way the location of the food container can be determined by the third-party validator by tracking the location of the device that was used to input the unique identifier.
Brief Description of the Drawings [0035] Figure 1 is a diagram that illustrates a first embodiment of the universal method for secure food delivery.
[0036] Figure 2 is a diagram that illustrates a second embodiment of the universal method for secure food delivery.
[0037] Figure 3 is a diagram that illustrates a third embodiment of the universal method for secure food delivery.
[0038] Figure 4 is a diagram that illustrates a fourth embodiment of the universal method for secure food delivery.
[0039] Figure 5 is a flow chart that illustrates the steps in the process for the universal method for secure food delivery.
[0040] Figure 6 is an illustration of a food container to which a tamper proof seal label has been applied.

[0041] Figure 7 is an illustration of a second type of food container to which a tamper proof seal label has been applied.
[0042] Figure 8 is an illustration of example of a third type of container to which a tamper proof seal label has been applied.
[0043] Figure 9 illustrates an example of a zippered food container that can be sealed with a tamper proof seal label.
[0044] Figure 9a illustrates an example of a tamper proof seal label that comprises a self-locking loop locking mechanism.
[0045] Figure 10 illustrates the food container of Figure 9, sealed with a tamper proof seal label.
[0046] Figure 11 illustrates a food container with a zippered closure that is sealed with a tamper proof seal label that is in the form of a padlock.
[0047] Figure 12 illustrates a food container with a hasp latch that is sealed with a tamper proof seal label in the form of a padlock.
[0048] Figure 13 is a perspective view of a food container with overlapping lid sections sealed with a tamper proof seal label.
[0049] Figure 14 is a perspective view of a food container that is sealed with a tamper proof seal label in the form of a clamp.
[0050] Figure 15 is an illustration of a clamp such as the one shown in Figure 13, shown in a side view and in an open position.
[0051] Figure 16 is an illustration of an alternative embodiment of a tamper proof seal label in the form of a clamp, shown in a side view and in an open position.

[0052] Figure 17 is an illustration of a tamper proof seal label that employs a cord and an adhesive-backed label.
[0053] Figure 18 is a cross section view of the cord and label of Figure 16.
Detailed Description of Illustrative Embodiment(s) [0054] The following detailed description represents embodiments that are intended to provide an overview or framework for understanding the nature and character of the claims. The accompanying drawings are included to provide further understanding of the claims and constitute part of the specification.
Accordingly, the detailed descriptions and drawings are non-limiting to the scope of what is claimed and are intended to illustrate and explain the principles and operations of these embodiments, as claimed. For example, the types of food containers that are illustrated in Figures 6 through 14 are non-limiting examples.
That is, these examples show that the tamper proof seal label can take many forms and can be applied to many types of food delivery containers and packaging which can be closed and sealed so that the food inside cannot be accessed without breaking the seal or damaging the container or packaging. The method is made universal by enabling restaurants and grocery stores to adapt the application of the tamper proof seal label to suit most conventional food containers or packaging before it is handed to the delivery person. In most cases, this allows businesses to continue to use the same containers and/or packaging that they are currently using, while protecting the delivered food from being tampered with from the point where the food is packaged, to point where it is delivered to the customer. In some embodiments conventional food containers can be placed inside cooler bags or other packaging that is sealable with a tamper proof seal label.

[0055] With reference to the diagram in Figure 1, in one embodiment of the method, a plurality of customers 100 are represented by customers 100A through 100E, who would like to order food delivered to a house, office, or other location that is convenient for them to receive the ordered food. While only five customers are shown, they are representative of a whole group of potential customers 100. They can choose from any one of many food sources, represented by 110A through 110D. While only four food sources are shown, they represent all food sources 110 that customers 100 can order food from.
The food sources can be, by way of example without limitation, restaurants, grocery stores, food producers, farms, ranches, or marijuana dispensaries. Generally, food sources 110 include any business that packages its own food products, usually by hand and on a small scale, and that offers food for sale to customers 100 who want it delivered to them by delivery service 120. The traditional packaging used by food sources 110 has not been sealed or otherwise made resistant to tampering or unauthorized access by the person making the delivery.
People acquainted with this market will understand that food products packaged on a large scale or products that are already packaged in sealed containers as part of the production process, do not have the same problems and risks of food tampering that exist for food sources that package products on a small scale where each order may be different and customized by each customer, and where food products are not packaged in sealed containers and food orders are usually hand packed.
[0056] With reference still to Figure 1, in this example, third-party validator 130 is associated with certain food sources 110A and 110B, which is indicated by the dashed bubble that encircles these food sources and third-party validator 130.
Food sources 110A and 110B have entered a contractual relationship with third-party validator 130 as part of the disclosed method. This contractual relationship is an advantage that can be promoted to the customers as a means, for ensuring that food delivered from them is secure from tampering, because of the processes and procedures that they have agreed to with third-party validator 130. As part of the disclosed method, third-party validator 130 can give independent validation of the processes and measures taken by food sources 110A, 110B to give the customer comfort that the food delivered from these food sources has not been tampered with. This may influence some customers to choose to order food from food sources 110A and 110B rather than food sources 110C and 110D.
In the embodiment of the method illustrated in Figure 1, line 102 indicates customer 100B making a food order with food source 110B.
[0057] An aspect that gives customers confidence in the method comes from knowing that food sources 110A and 110B will be using tamper proof seal labels to prevent food containers from being opened by the person or people that are tasked with delivering the food from the food source to the customer. These people who are so tasked can be employees or contractors hired or managed by delivery service 120, employees of the food source, or someone who is hired by the food source or the customer to deliver the food, such as a taxi driver.
Line 112 indicates the customer-ordered food being handed from food source 110B to delivery service 120, and line 122 indicates the food being handed from the delivery person to the customer. Customers will know that these tamper proof seal labels are supplied from third-party validator 130, as represented in Figure 1 by reference numeral 132 that indicates lines that represent the supply of the tamper proof seal labels by third-party validator 130. For extra assurance the third-party validator may also put its brand or the name of the third-party validator on the label. Third-party validator ensures that the tamper proof seal labels are of a type and quality that will prevent any opening of the food containers from being undetected. Third-party validator 130 will know the type of food containers used by each food source that it has contracted with and will have tested the tamper proof seal labels on containers of the same type to be certain that the tamper proof seal labels cannot be removed or otherwise circumvented by someone without the access or attempted access to the food being visibly apparent. Third-party validator will also ensure that the tamper proof seal labels will be of a type, size and shape that will work with the food containers used by each food source. The third-party validator can also provide instructions to the food source on how to apply the seal labels properly and consistently so that they will be effective in discouraging tampering. If the tamper proof seal label is of a type that employs a locking mechanism the third-party validator ensures that it can be used with the food containers and if needed, the third-party validator can supply delivery bags that have a means of closing that is compatible with the locking mechanism. The third-party validator can also provide training to the food source personnel who will be responsible for applying the tamper proof seal labels. The ability of the disclosed method to be adapted to the food containers already used by a food source that makes this method universal, and the support given by the third-party validator to the food source helps to ensure that food is kept secure.
[0058] Customers 100 will also know that each tamper proof seal label has a unique identifier that allows third-party validator 130 to track each food container, and that allows the customer to check that the unique identifier matches the unique identifier that is on the tamper proof seal label on the food container that has been delivered. This is important because it prevents anyone from opening the container and then putting another seal label on to re-seal the food container. Once the tamper proof seal label is applied to the food container, the food container cannot be opened without tearing or deforming the tamper proof seal label, or tearing or damaging the food container in some way that is visually apparent to the customer. Tamper proof label technology exists in many forms today that will perform to give the desired result. When a unique identifier is combined with a tamper proof seal label, customers have an extra level of protection since it is part of the disclosed method for validating to the customer that the food being delivered has not been tampered with. If the unique identifier on the seal label that seals the delivered food container does not match the unique identifier that was assigned when the food was packaged, then the customer will know that the food container being delivered is the wrong food container, or that it has been opened, with someone replacing the original tamper proof seal label with another tamper proof seal label, possibly a counterfeit label, even if there is no visible damage to the replacement tamper proof seal label. The customer will also know that as part of the process agreed to by food sources 110A and 110B, the tamper proof seal labels will be applied to the food containers before the food containers are handed over to the one delivering the food container for delivery service 120. The customer knows that it is in the best interests of food sources 110A, 110B to follow the security procedures prescribed by third-party validator 130, because these food sources know that preventing tampering or anything that compromises the quality of the delivered food while being delivered helps to protect the reputation of the food source. If a food source does not follow the third-party validator's procedures correctly, it could be in breach of its agreement with the third-party validator and there could be penalties for breach, which could include termination of the agreement. The third-party validator has an interest in auditing its customers or otherwise checking to make sure that the food source is following the procedures properly, because if it does not, this could harm the reputation of the third-party validator, and consumers could lose confidence in the integrity of the system. Some customers may lose confidence in a food source if it was at one time using the third-party validator's process, and then stopped using it because the agreement was terminated. That is, customers 100 might be especially concerned and suspicious about the security against tampering for a food source that has had its contract terminated with third-party validator 130, and this is another reason why it is in the food sources best interests to follow the processes and procedures correctly.
[0059] Since it is known that restaurants can be very busy, especially at times during the day when people traditionally have their meals, the basic steps of the process followed by a food source are made intentionally simple and easy to follow, which facilitates compliance with the process. According to one embodiment of the method, once a food source signs an agreement with third-party validator 130, it will receive pre-printed tamper proof seal labels of a type, size and shape that are suitable to seal the types of food containers and/or packaging used by the food source. Each tamper proof seal label will have a unique identifier. With reference to Figure 5, which illustrates the steps of the process, in step 500 a food source receives an order, and in step 510 it prepares or picks the food items ordered by the customer and puts it into one or more food containers. Once the food items are packaged, in step 520 someone employed by the food source who is trained in the process applies one or more tamper proof seal labels. Only one tamper proof seal label may be necessary, for example if only one food item is ordered, and it is packaged in one food container, or if a plurality of food containers are packaged inside a larger container such as a box or bag. In other cases, because of the way the food items are packaged, it may be necessary to apply more than one tamper proof seal label, for example if there are drinks packaged in a separate food container from food items, or if it is a large food order and the items cannot fit into one food container. The trained employee understands the principles behind the process and knows where to apply the tamper proof seal label so that all the food items will be secure from access by anyone other than the customer, without breaking the seal label or other visible signs of access. In step 530 the unique identifiers on the tamper proof seal label(s) applied to the food container(s) are uploaded to a third-party validator's database as indicated by line 114, for example in Figure 1. That is, line 114 indicates that in preferred embodiments the third-party validator receives the unique identifiers from the food source in real time, when each tamper proof seal label with its associated unique identifier is applied to the food container(s) and/or food packaging. Certain information associated with the order that will help with tracking can also be uploaded at the same time, such as the customer's name and address, the food source, and the items ordered. Some of the information that is uploaded can be customized to include only those that are relevant to the type of food source. To facilitate this step, the unique identifier can be machine readable, for example by a scanner or a camera. The unique identifier can be, for example, without limitation, a bar code, or a QR code.
It is important that step 530 is done before step 540, which is when someone at the food source hands the food container(s) over to the person who will make the delivery. This is because this means that the food is sealed and inaccessible to the food delivery person without visibly damaging the seal label or the food container. Normally one delivery person picks up the food container from the food source and delivers it to the customer, but this method will also work when more than one person handles the food container(s) before delivering the food to the customer. In some instances, the delivery person could pick up more than one food container and make deliveries to more than one customer. In this instance, having the food containers sealed and identified on the tamper proof seal label help to keep the food containers from being mixed up. This is also helpful when the food delivery person is picking up food orders from more than one food source. In still other cases, a food source may have several food orders ready for pick up, and each one is picked up by a different delivery person.
This is another situation where having each order in a sealed container with a unique identifier helps to keep the orders or parts of orders from being mixed up.
That is, as part of step 540, the food source employee who is responsible for handing over food orders to the delivery person(s) checks to confirm which order each delivery person is picking up, and the unique identifiers on the tamper proof seal labels can help to make sure the correct food container(s) are handed over.
The process steps done by the food source are indicated by being inside dashed-lined box 570. When the food container(s) are handed to the delivery person this completes the process steps in the method that are done by the food source.
The method also includes step 550 in which the delivery person delivers the food container(s) to the customer. Once the customer receives the food container(s), in method step 560, the customer can inspect the tamper proof seal label to ensure that it is intact and not damaged. In this step, in preferred embodiments, because the unique identifier was uploaded by the food source in real time, the customer can access the third-party validator's database, as indicated by line 108, for example in Figure 1, to check that the unique identifier matches what is in the database. Alternatively, the customer can contact the food source to confirm that the unique identifier on the received food, container matches the unique identifier assigned by the food source. This confirms that the correct food containers have been delivered and that the tamper proof seal label was not replaced with a different one. In an alternative embodiment, in step 550 when the. food source uploads the data to the third-party validatorõ a notification can also be sent to the customer with the unique identifier so that the customer does not need to access the third-party validator database or contact the food source to retrieve it.
In one embodiment, this notification can come from the food source. In another embodiment, if the information associated with the order that is uploaded to the third-party validator includes contact information for the customer, the third party validator could have a computer that is programmed to give an automated Date Recue/Date Received 2020-10-10 notification to the customer. In some embodiments, this can include the time when the food order was packaged and sealed, and an estimated delivery time.
[0060] Variations can be made to the embodiment of the method described in relation to Figure 1 without departing from the spirit of the disclosed method concept. By way of example, without limitation, Figures 2 through 4 are illustrations of different embodiments of the universal method for secure food delivery. Common to all embodiments are the process steps followed by the food source and the delivery of food that has been sealed in container(s) from one of food sources 110 to one of customers 100. In the description of these alternative embodiments, the same reference numbers are used to indicate the same things and like reference numerals are used to indicate things that are alike but with some variation, as will be described in relation to each embodiment. In the description of each embodiment, things that are the same as in other embodiments and already described elsewhere may not be described in detail and the focus of the description is on what is different.
[0061] With reference to Figure 2, this diagram shows how the method can be employed when customer 100A makes a food order through intermediary business 240. For example, intermediary business 240 can be a business that serves as a portal or gateway for customers to order food from a selection of restaurants. Examples of businesses such as this are "Just EatTm", "Skip the DishesTm", and "Uber EatsTm", and they have become a popular way for customers to order from restaurants that did not previously offer delivery services. Intermediary businesses create websites and mobile applications that consumers can use to browse food choices and to place orders. It makes it easier for consumers to try new restaurants, and to get food from popular food sources without needing to make a reservation or wait in line. These intermediary businesses can charge a fee from the customer or the food source, but either way the fees are ultimately passed on to the consumer. Even if ordering through intermediary business 240 is more expensive than the customer ordering the food directly from the food source, it can be more convenient and less time consuming for customers, compared to the customer going to the restaurant and picking up the food themselves, and the customers do not have to deal with traffic, parking and/or transportation costs. Since restaurants can benefit from the extra business, some restaurants may offer discounts on take-out food orders, which lessens the effect to the overall cost. The popularity of such intermediary businesses is a sign that consumers have embraced the value offered, and the number of businesses using this model has increased in recent years. Nevertheless, this business model could be jeopardized if consumers lose confidence in the security of the food being delivered. With consumers being able to share bad experiences to a wide audience over the internet, a viral video that shows a delivery person handling food in a non-hygienic manner, tampering with the food, and/or eating some of the food, could cause lasting damage to consumer confidence.
Investigative reporting by conventional news outlets could also expose problems with security for food deliveries.
[0062] In the embodiment illustrated in Figure 2, the disclosed universal method for secure food delivery can protect customers 100, food sources 110, intermediary business 240, and delivery service 120 by giving confidence to customers 100 that the food that they order will be securely delivered without being tampered with. Like line 102 in Figure 1 indicates a food order from customer 100B to food source 110B, in the embodiment of the method shown in Figure 2, line 202 indicates a food order from customer 100A to intermediary business 240. Intermediary business 240 then relays the food order to food source 110A, as indicated by line 242. Food source 110A receives the order as described in process step 500. Then food source 110A fulfills the order and packages it in food container(s) as described in process step 510. Food source 110A then seals the packaged food with a tamper proof seal label in accordance with process step 520. The tamper proof seal label has a unique identifier that the food source uploads to third-party validator 130 along with predetermined information associated with the order, as set out in process step 530. In this version of the method, line 208 represents a notification from third-party validator 130 to customer 100A by a preferred notification mode selected by the customer. This notification tells the customer the unique identifier, and could also be used to confirm the time when the order was fulfilled and an estimated delivery time. This notification could be by text message, telephone call, e-mail, or via a notification through the third-party validator's mobile application that the customer downloads to a smart phone, tablet or other device.
10063] Like in the method embodiment of Figure 1, lines 132 indicate a supply channel for third-party validator 130 to supply the tamper proof seal labels to the food sources that have contracted with third-party validator 130 to use the universal method for secure food delivery. The method of delivery is also essentially the same as it is in the embodiment of Figure 1. After the food container(s) have been sealed with the tamper proof seal label in process step and the food source uploads the data to the database as set out in process step 530 , in accordance with process step 540, food source 110A hands the sealed food container(s) to a delivery person sent by food delivery service 120, who picks up the food container(s) as indicated by line 112 and makes the delivery to customer 100A as indicated by line 122.
[0064] Figure 3 is another embodiment of the method that is applied to the scenario when the delivery service and the intermediary business are combined in single value-added intermediary business 340. Like in Figure 2, food orders are submitted directly to intermediary business 340, as indicated by line 302, and these food orders are relayed by intermediary business 340 to food source 110B

as indicated by line 342. However, unlike the embodiment of Figure 2, intermediary business 340 also handles the delivery of the food to the customers as indicated by lines 312 when a delivery person picks up the food container(s) from a food source, and 322 when the delivery person gives the food container(s) to the customer. Because the intermediary business handles both the order taking and the food delivery, an advantage of this disclosed method is that third-party validator 130 is still part of the overall method, and it may still guide some customers in their food source choices. That is, the customer still has reason to feel confident in the security of the delivered food because third-party validator 130 still gives independent oversight to make sure the procedures for securing food delivery are being followed. Again Figure 3 shows that only some food sources are in a contractual relationship with third-party validator 130. As with the other embodiments, these food sources are supplied with tamper proof seal labels from third-party validator 130, and these food sources upload the order data, including the unique identifier to third-party validator 130. Like in the other embodiments third-party validator 130 could send a notification to the customer so that the customer is given the unique identifier so that when the food container(s) are delivered the customer can see that the correct food container is delivered and that it has not been tampered with. Alternatively, as indicated by communication line 308 shown in Figure 3, the notification can be sent to the customer directly from the food source. Third-party validator 130 can provide food sources 110 with software, or the portal that the food sources use to upload the data, can be configured to automatically send the notifications to the customers, facilitating the use of the method by the food sources. Like in other embodiments, food source 110B is in a contractual relationship with third-party validator 130 and as required by the contract therebetween, food source 110B
follows process steps 500 through 540 to give assurance to customers that the delivered food has not been tampered with. That is, a feature of the method is that once the food source staff are trained in how to follow the procedures, the extra effort that is needed is minimal, which helps with the successful adoption to the method and ongoing compliance with the procedures.
[0065] Figure 4 is yet another embodiment of the universal method for secure food delivery. In this embodiment third-party validator 430 is also the business that takes the orders from the customers. Line 402 indicates customer 100C
submitting a food order to third-party validator 430. In some respects, this embodiment is like the method of Figure 2 with the third-party validator combined with the intermediary business. Line 442 represents the food order being relayed from third-party validator 430 to food source 110B. Food source 110B follows the procedures prescribed by third-party validator 430 as shown in process steps 500 through 540 in Figure 5, to provide afood container with a tamper proof seal label, to delivery service 120. Even though third-party validator 430 also provides the services of an intermediary business for taking food orders from customers and relaying them to food sources, consumers still have reason to feel confident in the security around the delivered food because of the procedures agreed to and followed by the food sources, and because third-party validator 430 is still independent from food delivery service 120.
[0066] That said, within the spirit of the disclosed method, it is possible that third-party validator 430 could also operate, control or coordinate the delivery service. Once the procedures used by the food sources who adopt and agree to this method become known, and the public has confidence that the food source is following the procedures diligently, if customers are notified of the unique identifier so that they can see that the delivered food container has not been tampered with, then customers may still feel confident in the security of food delivered under the control of third-party validator 430, even though it is not independent and separate from the delivery service.
[0067] Figures 6 through 18 illustrate examples of tamper proof seal labels and food containers that have a tamper proof seal label applied. With reference to Figure 6, cardboard box 610 is a food container that can be used to deliver food, such as pizza. Box 610 has a lid that is attached to the bottom of the box and the lid has a creased edge to that it can be lifted to open the box. Tamper proof seal label 620 is preferably applied to the edge of the lid that is opposite to the attached edge so that the lid cannot be lifted without breaking the seal. Like known pizza boxes, for extra security, the three free sides of the box lid have edges that can be folded perpendicular to the large surface of the lid so that before tamper proof seal label 620 is applied at the restaurant, the perpendicular edges of the lid are extended into the box towards the bottom and along the sides to make it difficult for anyone to reach inside the box without noticeably deforming or tearing box 610. Tamper proof seal label 620 bears unique identifier 630 so that the customer can confirm that the correct food container is being delivered. In this example the unique identifier is a numeric code combined with a machine-readable bar code. As with all of the illustrated embodiments, the type of box that can be used as a food container is not limited only to boxes of the style shown by box 610. Box 610 is an illustrative example for the disclosed concept, but boxes used as food containers come in many styles, which can be employed with the disclosed method by using a tamper proof seal label that prevents access to the contents of the food container without visibly damaging the tamper proof seal label or the box. For example, some boxes employ closing features that use tabs that are inserted into corresponding slots when the box is closed. The tabs are shaped to be slightly wider than the slot and/or with barbed-shaped edges so that some force is needed to insert the tabs into the slots and the box cannot be opened without pulling the tab out of the slot or cutting the tabs. The tabs can be shaped with a narrower base, with perforations or other means for providing a weak point that prevents the tabs from being removed from the slots without visible signs of tearing or other damage to the tab base or barbed edge, or to the slot, to prevents unauthorized access to the contents from being undetected. In another embodiment (not illustrated), tamper proof seal labels can be integrated with food container boxes by printing a unique identifier on each food container box. With sealable boxes, such as those described by US Patent Application Publication No.
2017/0362008A1, none of the boxes had unique identifiers and this did not allow third-party verification and no guarantee that the contents had been tampered with and then transferred to a new box and sealed therein. When each food container box has a unique identifier printed on it, the tamper proof seal label is integrated with the food container box, and the food container box can be manufactured with an adhesive strip to seal the box, or it can be sealed with a plain seal that employs a strong adhesive and tamper proof features like cuts, but breaking of the seal or breaking the food container box will be evident to the customer receiving the food, and the food container box cannot be replaced with a new food container box because of the unique identifier.
[0068] Figure 7 depicts a paper or plastic bag 710 into which a plurality of smaller food containers can be deposited. Because the top of the bag is folded over or rolled down, bag 710 cannot be opened without breaking tamper proof seal label 720. In this example, unique identifier 730 is an alphanumeric code that is machine readable. In some embodiments, when the food being delivered is hot, bag 710 is made from a breathable material to allow the release of water vapor, to prevent the food from getting soggy. For example, the bag can be made from paper, cloth, plastic, with or without impermeable coatings (to contain spilled liquids or grease), and can include perforations or mesh sections to allow vapor to escape. In another embodiment, the bag can be made with an adhesive strip that is employed by peeling away a non-stick covering piece for sealing the bag, similar to the self-sealing bags used by some courier companies. This type of bag provides extra security against tampering, and in this embodiment the tamper proof seal label can be integrated with the bag by printing the unique identifier on each bag. In another embodiment (not illustrated), tamper proof seal labels can be integrated with sealable plastic bags. This embodiment is similar to the illustrated embodiment in Figure 7, except that a unique identifier is printed or otherwise marked on each plastic bag and the bags are manufactured with a sealing mechanism, such as a strong adhesive strip that is employed to seal the plastic bag after the food items have been deposited inside. Alternatively, after the food is deposited into the bag a melt seal could be applied to seal the bag.
Sealable tamper evident plastic bags are already known products and are used for example by courier companies for delivering documents and packages. By printing the unique identifier directly onto tamper evident sealable bags, this saves the step of applying a separate tamper proof seal label and the features of a tamper proof seal label are integrated with the bag. By checking that the unique identifier matches what has been communicated to the customer by a third-party validator, the customer can be assured that the contents were not tampered with and then transferred to another bag. Any tampering of the bag will be observed if there are any holes in the bag or if the seal has been broken.
[0069] Figure 8 depicts "clam shell" style food container 810. These types of food containers can be made from various materials, including plastic or expanded polystyrene foam (e.g. StyrofoamTM) or biodegradable substitutes.
Once tamper proof seal label 820 has been applied, this food container cannot be opened without breaking the seal or visibly deforming the container. Like in the other embodiments, tamper proof seal label 820 bears unique identifier 830 that the customer can use to verify that the correct food container is being delivered, and that the same seal that was applied at the food source is still on the food container when delivered. In another embodiment (not illustrated), clam shell food containers can be manufactured with unique identifiers printed or otherwise marked on each container. Like in other described embodiments, this type of packaging can also be manufactured with a strong adhesive strip or another mechanism for sealing the container such that it cannot be opened without evidence of tampering and the unique identifier gives assurance to customers because it can be verified by a third-party validator as the same box that the food sourced used to package the food items.
[0070] In the embodiments shown in Figures 6 through 8, the tamper proof seal label is in the form of a sheet label medium with an adhesive backing.
The material for the sheet label can be paper or plastic, and one or more features or material characteristics can be employed, so that once applied to the food container or packaging, the tamper proof seal label cannot be removed without visual evidence to show that the food container has been opened. For example, a strong adhesive can be used so that the tamper proof seal label cannot be removed without tearing or stretching and deforming the seal label. The tamper proof seal label can also include cuts or perforations that cause the sheet label to be destroyed when removed to open the food container.
[0071] Figures 9, 9a and 10 illustrate an embodiment of the tamper proof seal label that comprises a locking mechanism that prevents food container 910 from being opened without breaking the tamper proof seal label, where seal label tag 920 is integrated with self-locking loop 922. In the illustrated embodiment, food container 910 is a zippered bag, shown partially open in Figure 9. Food container 910 can be a thermally insulated and re-usable bag. By way of example, food container 910 can be made from a multi-layered material with a textile outer layer, and thermally insulating middle layer and a liquid impermeable inner layer. In other embodiments, the food container can be made from a hard plastic, similar to hard shell plastic luggage that is sealed with a zipper, and with some embodiments the hard-plastic shell can be double-walled with an air gap for thermal insulation. Food container 910 could also be made from a composite or from metal. In the example shown in Figure 9, food container 910 has a single zipper slider 912 that provides a means for cooperating with a locking mechanism and fixed loop 916 to seal it.
100721 With reference to Figure 9a, label tag 920 and stem 922, which is insertable into ratcheting receiver 924 to form a self-locking loop are made from a single moulded piece, that can be made from nylon or other plastics with similar physical properties. The material for this form of tamper proof seal label can be a recycled material and/or a biodegradable material. The material can be in different colours and the tags can be in different shapes in order to be distinctive for the third-party validator or for different food sources or food types, or to be collectable as distinctive and/or limited-edition shapes. In this embodiment, ratcheting receiver 924 is integrated with label tag 920.
Ratcheting receiver 924 provides an opening into which the free end of stem 922 is inserted to form a closed loop. The opening in ratcheting receiver 924 is shaped to cooperate with the shape of stem 922 so that there is a ratchet effect that prevents stem 922 from being pulled out of ratcheting receiver 924, so that stem 922 is locked into ratcheting receiver 924 once inserted. Stem 922 can be designed to break before it can be pulled by force out of ratcheting receiver 924, leaving the tamper proof seal label visibly broken if anyone other than the customer tries to open the closed loop. Before the free end of stem 922 is inserted into ratcheting receiver 924, packaged food is deposited into food container 910 and zipper slider 912 is drawn to the end of the zipper near fixed loop 916 to close food container 910. Then the food packager threads the free end of stem 922 through the openings in pull tab 913 of slider 912 and fixed loop 916 and finally into ratcheting receiver 924 so that slider 912 is held next to fixed loop 916 to seal food container 910. As shown in Figure 9a, a unique identifier such as bar code 928 can be printed on label tag 920. For added customer confidence, the name of the third party validator can also be printed on label tag 920, or, as depicted in Figure 9a, a distinctive logo 930, that is preferably a registered trademark of the third party validator can be displayed so that the consumer knows that the contents of the received food container have been packaged according to the processes established by the third party validator, which means that the food container was sealed before it was handed over to the person making the delivery. In some embodiments the [0073] In the embodiment shown in Figure 10, food container 1010 has double separating zipper sliders 912 and 914, and when they are brought together as shown in Figure 10, food container 1010 is closed. By inserting stem 922 through the openings in pulls tabs 913 and 915 of respective zipper sliders and 914, and then into ratcheting receiver 924. Some zipper sliders have integrated rings that are offset to overlap and cooperate with each other when the double separating sliders are brought together, as with some luggage zipper sliders, and these can be employed as a more rugged alternative to using the holes provided in the pull tabs. When sealed food container 1010 is delivered to the customer, the customer can verify that unique identifier 928 matches the unique identifier that was sent from the third-party validator or the food source.
Then the customer can cut stem 922, allowing zipper slides 912 and 914 to separate so that food container 910 can be opened. This type of tamper proof seal label can optionally include pre-moulded tear-line 926 (shown in Figure 9a), which is a feature designed to facilitate tearing label tag 920 from stem 922 to make it easier for the customer to break the locking mechanism to open sealed food container 910 without using a knife or scissors to cut stem 922. Pre-moulded tear-line 926 can be formed, for example, by perforations, slits, or a groove that makes label tag 920 thinner along tear-line 926.
[0074] Figure 11 shows food container 1010 with a different type of tamper proof seal label. In this embodiment, the locking mechanism is in the form of padlock 1124 and the unique identifier is bar code 1128, which is displayed on the body of padlock 1124. Padlock 1124 is opened to insert loop 1122 through holes provided in pull tabs 913 and 915 so that when loop 1122 is locked in the body of padlock 1124 food container 1010 cannot be opened until padlock 1124 is opened by the customer. The customer can open padlock 1124 because instructions for opening padlock 1124 are provided to the customer from the third-party validator or directly from the food source. The padlock can use any type of mechanism for locking and unlocking. For example, the padlock can have an electronic mechanism that is operated by inputting a key code by an electronic signal using RFID, infrared, audio, or biometric inputs.
Alternatively, the padlock can have a mechanical mechanism as depicted in Figure 11, with a means for inputting a numeric combination to open and close the padlock.
According to the method, staff at the food source are trained to seal food container 1010 with padlock 1124 before the food container is picked up by the person making the delivery, so that the food inside food container 1010 cannot be tampered with while being delivered to the customer. In preferred embodiments the code or combination for opening the padlock can be changed each time the padlock is deployed by a staff member at the food source so that the customer is confident that no one in the delivery chain can open the padlock while the food container is in transit. The staff member can upload the combination to the third-party validator, who transmits it to the customer or the staff member can transmit the code or combination directly to the customer along with a hyperlink for accessing the third-party validator and/or tracking information.
[0075] Figure 12 shows that any type of food container than is capable of being sealed can be employed with the disclosed method. Instead of zippers, an arrangement with hasp latch 1212 that is shown in a locked arrangement with padlock 1224, but other types of locking mechanisms such as the tamper proof seal label shown in Figure 9a could be substituted to seal food container 1210.
Compared to zippered food containers, the lid and walls of food container 1210 are preferably more rigid, and if made from a fabric bag, the panels of the bag can incorporate panel inserts made from corrugated cardboard, expanded polystyrene foam, hard plastic or metal, for example, so that the corners of the lid cannot be lifted from the walls when food container 1210 is sealed without causing visible damage to the container or removing padlock 1124. In other embodiments, food container 1210 can be made without using a fabric bag, with the container made from moulded hard plastics, expanded polystyrene foam, cardboard with a liquid repellant coating, or other materials with suitable structural integrity to form a food container than can be closed with a hasp latch and that prevents access to the container interior when closed. In some embodiments, food container 1210 is designed to keep the contents cool or warm with thermal insulation and is re-usable. In some embodiments, the lid can also include overlapping vertical edge 1216 to provide a better seal, to provide more rigidity to the lid, and as an additional feature to prevent access to the contents.
Padlock 1224 depicts an embodiment of a padlock that uses an electronic mechanism, and panel 1240 represents an electronic input receiver, such as a biometric scanner, or a receiver for an electronic signal code that can be transmitted from a smart phone. By way of example, padlock 1224 shows that the unique identifier can take forms other than a bar code, and in this embodiment, unique identifier 1228 is an alpha numeric code that the customer can easily read without the use of a bar code scanner, to facilitate verification that the correct food container is being delivered.
100761 In Figure 13, like food container 1210, food container 1310 uses a hasp latch, but in this arrangement hasp latch 1312 is located where loop 1314 is provided on one lid section that is folded flat first, so that it is the lowest lid section, and then the other three lid sections are folded down next. Each of the other three lid sections has an opening through which loop 1314 can extend so that when all four lid sections are folded down, loop 1314 protrudes from the lid surface to receive the locking mechanism of a tamper proof seal label. In another alternative arrangement (not shown), the overlapping lid arrangement can be used without the hasp latch, and instead a sheet-type tamper proof seal label with adhesive backing can be applied to the overlapping lid sections to prevent access to the container contents.
100771 Food container 1410, shown in Figure 14, can be similar to bag 710 shown in Figure 7, but with a different type of tamper proof seal label. In Figure 14, food container 1410 is sealed with clamping locking mechanism 1422, which can be made from a stiff plastic or a composite or laminated material that has enough stiffness so that it cannot be pried open. In the example shown in Figure 14, locking mechanism 1422 comprises hinged end 1423 opposite to locking end 1424. Figure 15 shows an embodiment of locking mechanism 1422 in an open position, showing that bars 1425 and 1426 can be formed with teeth 1427 for better gripping of the clamped food container bag, and in some embodiments, at least some of the teeth can be designed to pierce the clamped bag so that the bag cannot be pulled from the closed clamp without tearing the bag. In the depicted embodiments, to better illustrate the concept, the teeth are shown as protruding from bars 1425 and 1426, but in preferred embodiments the teeth can be provided in a recessed area within a channel-shaped bar so that the teeth will not cut users or their clothing. In such an embodiment, the teeth are engaged with the food container bag when the clamp is closed and the bag is pushed into the channel by the clamping action. In yet another embodiment, the teeth can be recessed and then pushed out from the clamping face of the bars when the clamp is closed.
Locking end 1424 has closed loops for receiving a lock, such as a padlock or the tamper proof seal label as shown in Figure 14. The illustrated tamper proof seal label is like the one shown in Figure 9, and comprises label tag 1420 integrated with self-locking loop 1428. That is, once the food source employee has placed the ordered food into food container 1410, the open end of the bag is closed.
The bag can be rolled up if the food items do not take up all of the space within food container 1410. Then locking mechanism 1422 is closed over the rolled end of food container 1410 to seal it by clamping it therebetween, and locking mechanism 1422 is then held in the closed position by inserting stem 1428 of a self-locking loop through clamp loops 1429 and then pulled tight through the ratcheting receiver to hold locking mechanism 1422 in the closed position.
Figure 16 shows another embodiment of a clamping locking mechanism that replaces clamp loops 1429 with an integrated self-locking mechanism. To close clamping locking mechanism 1622, stem 1628 is inserted into ratcheting receiver 1624, which has ratcheting features so that when stem 1628 is fully inserted into receiver 1624 it cannot be withdrawn. In this embodiment the unique identifier can be printed onto a visible location on bar 1625, and once the customer verifies that the unique identifier matches what has been sent from the food source or the independent validator, then the customer can open the food container by cutting the stem or tearing open the bag. In this embodiment clamping locking mechanism 1622 is made from a material, such as plastic, that can be formed with integrated hinge 1632 that is a thin and repeatably bendable.

[0078] Figures 17 and 18 illustrate yet another embodiment the tamper proof seal label that can be used instead of a padlock or self-locking loop. What is shown in Figure 17 is a front view of a tamper proof seal label that comprises adhesive-backed sheet label 1720 folded over cord 1722. Figure 18 shows a section view of cord 1722 sandwiched between folded sheet label 1720. Sheet label 1720 displays the unique identifier and a strong adhesive prevents cord 1722 from slipping from between the two sides of folded sheet label 1720. Cord 1722 can be made from string, twisted paper, wire, or a plastic cord. Some users may prefer a biodegradable material like twisted paper because it is easy to tear so it is easy for the customer to open the food container and to see if the loop has been damaged if anyone has tried to access or tamper with the food inside the container.
[0079] An illustrative example of the disclosed food delivery system and method for secure food delivery from a food source that sells food to a customer, uses a computer application with a plurality of user interfaces. In this illustrative example, the food source is a restaurant. The first user interface, referred to in this example as the "Restaurant App" can be a desktop or mobile application accessible to a person at the food source (the "Restaurant User") by means of a desktop computer or a smart phone. When the Restaurant User receives an order from a customer, the Restaurant User opens the home page of the Restaurant App and clicks or taps on a button for NEW ORDERS, which opens a page where the Restaurant User can enter information such as the customer name, the customer address, the order, the payment method, and the delivery company. Next, the Restaurant User clicks or taps on a button to NOTIFY DRIVERS to notify delivery drivers that there is a new order that needs to be picked up. This order is then given a "pending" status and stored in a list of orders PENDING
ACCEPTANCE. When a driver accepts the order, this means that the driver agrees to pick up the order and deliver it to the customer, and then the order status is changed and automatically removed from the list of orders PENDING
ACCEPTANCE and added to a list of orders ACCEPTED BY DRIVER. When the food order is packaged and ready for pick up, the restaurant staff puts the food into a delivery container and secures it with a tamper proof seal label.
Then the Restaurant User opens the Restaurant App and clicks or taps a button for entering the unique identifier on the tamper proof seal label. The unique identifier can be entered, for example, without limitation, using an optical scanner or camera, to enter a bar code, QR code, alpha numeric code. To ensure that each step of the process is completed for every order, the Restaurant App can include flags or other indicators to show that a process step has not been completed yet, and check marks or other notifications to indicate when each process step is done. In some embodiments the Restaurant App can prevent an order from changing status until all of the required process steps are completed.
When the unique identifier has been entered, and all of the process steps are marked completed, then the status of the order is updated to READY FOR
DELIVERY and the Restaurant App can automatically send a notification to the driver that accepted the order, to give the unique identifier to the driver and to indicate that the order is ready for pick-up and delivery. The order is then moved from the list of orders that are ACCEPTED BY DRIVER to the list of orders that are READY FOR DELIVERY. When the driver comes to pick up the order, when the driver provides identification to the Restaurant User, the Restaurant User can open the Restaurant App and find all of the orders accepted by the driver. The driver has a mobile application, the "Driver App", which is described in more detail below, and the driver uses the Driver App to scan the unique identifier for each food container that is to be delivered. This scan can be used to verify that the driver picked up the correct food containers and allows a third-party validator to track when possession of the food container(s) was transferred from the restaurant to the driver. This scan can also trigger the Driver App to send a notification to the Restaurant App to confirm the pick-up, and allow the status of the order in the Restaurant App to change to OUT FOR
DELIVERY and to be moved to a list of orders that have been handed over to drivers and that are currently being delivered to customers. When the driver delivers the order to a customer, as confirmed by the driver and/or the customer (as described in more detail below), then the order is moved from the list of orders OUT FOR DELIVERY to a list of COMPLETED ORDERS.
[0080] In this example, the second user interface is the Driver App. Drivers can use the Driver App to receive notifications when restaurants have orders with a PENDING ACCEPTANCE status and to manage the delivery process for drivers until food containers are delivered to customers. Drivers can set their preferences to receive notifications from restaurants in a specified area, or specific restaurants by name. Alternatively, in some embodiments the drivers can tap on a button to open a map that shows the driver's real time location and the location of orders PENDING ACCEPTANCE. That is, the Driver App can be set up according to the drivers' preferences for fmding orders PENDING
ACCEPTANCE using a combination of "push" mechanisms such as notifications, or "pull" mechanisms, like displays of a map or list. When the Driver App shows an order PENDING ACCEPTANCE that a driver wishes to accept, then the driver can tap on the notification, or an order pending acceptance on a map, or an order pending acceptance on a list to accept the order. When a driver accepts an order and when the order is confirmed by the restaurant, the Driver App puts the order onto a list of orders PENDING STORE SCAN and at the same time the Restaurant App changes the status of the order to ACCEPTED
BY DRIVER. Once the restaurant changes the status of the order to READY
FOR DELIVERY the Driver App receives a notification from the Restaurant App and the Driver App moves the order to a list of orders READY TO PICK
UP. When the driver picks up the order from the restaurant the driver can use the Driver App to scan the unique identifier on the tamper proof seal label, and then the Driver App will move the order from the list of orders READY TO PICK UP
to a list of orders OUT FOR DELIVERY. At this time the Restaurant App and/or the Driver App can send a notification to the customer to advise that the food order has been picked up. This gives the driver an incentive to make the delivery promptly or at least within a reasonable time, given that customers will understand that drivers can be delivering several food orders at any one time.

The notification to the customer can also identify the driver to the customer and over time and repeated orders the customer can become familiar with the drivers working in the customer's area. The Driver App can also suggest a delivery route that optimizes the delivery taking into account other deliveries that the driver is making, and the time each order was made, the time it was picked up, and whether or not the customer indicated a desired delivery time. When the driver delivers the food container to the customer's address if the customer is not present to receive the food, the driver can use the Driver App to take a picture of the address, or to mark the location using GPS, and notify the restaurant and the customer that the driver is at the address for delivery. This can prompt the customer to come to the door and/or the restaurant to contact the customer to check that the address is correct. According to the terms of service, the driver can be authorized to leave the food container at the doorstep after taking photographs to show that the food container has been delivered intact and unopened. Accordingly, the status of the food order can be changed to completed when the customer accepts the delivery or when the driver uploads evidence to show that the food order was delivered intact and unopened.

[0081] Just like the Restaurant App interfaces seamlessly with the Driver App, there can also be a desktop or mobile application used by customers, that is, this third user interface in this example being a "Customer App", through which the customer experience is managed. The Customer App is not required to place a food order. The customer can always place a food order by telephoning the restaurant, ordering through a restaurant's website where the restaurant might have its own online ordering interface, or by some other means. The customer can always leave a mobile number with the restaurant that can be used to send notifications. However, there are advantages of using the Customer App for customers that value all of the security features of the subject method. The Customer App can have a listing of all of the restaurants that have subscribed to the system, so that the customer is assured that all of the restaurants found using the Customer App will deliver the ordered food with such security features, which include the tamper proof seal labels and third-party validation.
Customers can use the Customer App to search for restaurants by food type, proximity, price range and other parameters, to select food items to order, and then to place the order. The customer can order food to the be delivered as soon as possible or for a specified time later in the day or on a future date and time. The Customer App can also speed up the ordering process, if customized by the customer to already store the customer's information such as name, preferred delivery address, payment details and favourite restaurants. If the customer prefers to keep this information from being stored in the Customer App this information can be entered with each order and the customer can control what information is stored and what information is given each time. The placement of the order sends a notification to the restaurant, prompting the Restaurant User to enter the order into its system using the Restaurant App. For busy restaurants, using the Customer App can be easier for the customer compared to talking with someone on the telephone. Also, there is less chance for errors in the order by the restaurant which could have a hard time hearing the order if the restaurant is noisy. That is, the Restaurant App can be configured to receive the order information without any transcription by the Restaurant User. Once the food order is received and accepted by the restaurant, the order is managed as described above with respect to the description of the Restaurant App. When the driver picks up the food container from the restaurant a notification that the order has been picked up can be sent to the Customer App so that the customer knows when the food order has been picked up. When the driver arrives at the customer's delivery location, upon receiving the food container the customer can visually inspect the food container to confirm that there is no evidence of tampering and the customer can use the Customer App to scan the unique identifier to confirm that the food container is the correct food container.
When scanning the unique identifier, the Restaurant App and the third-party validator are notified that the food container has been delivered, and the status of the order can be changed to COMPLETED ORDER. If the customer sees any damage to the food container or the tamper proof seal label, the customer can take a picture of the damage and upload that to the restaurant and/or third-party validator before scanning the unique identifier so that there is a record of the damage before the food container is opened. Then if there is a problem with the order then the restaurant and the third-party validator will have evidence of the damaged container to help to confirm that the food was compromised during delivery and not by the restaurant. Such incidences can be recorded by the third party validator and/or the restaurant, to assist in identifying drivers who are frequently associated with such incidences, since this could indicate that these people are less careful in the handling of food containers or other otherwise unreliable and rated as a less desirable option for making deliveries versus other delivery people with better records. By knowing that a poor rating can result in fewer delivery jobs, drivers have an incentive to be careful to avoid damage to the food containers in their care. If the food container appears to be tampered with, the restaurant can give the customer the option of being sent a replacement order.
[0082] In the description of these illustrative examples, the delivery people are described as "drivers" but it will be understood that delivery people need not delivery food containers by car or truck. For example, deliveries can be made by delivery people using any type of delivery vehicle, including bicycles, scooters, motorcycles, boat, or even no vehicle at all, if delivery people deliver on foot (in places with high population densities in a concentrated area, in a hotel, or where it can be faster to take transit). That is, the Driver App can be used by any delivery person using any means of transportation.
[0083] The Restaurant App, the Driver App, and the Customer App can be configured to work seamlessly with the system of the third-party validator.
That is, each of these Apps can be designed to notify the third-party validator's system of any changes in the status for each order, and to associate each order with the unique identifier associated with the tamper proof seal label. This way, the third-party validator knows when an order is picked up by the driver and when the driver delivers the food container to the customer. The system can be set up so that the Customer App is branded with the brand of the third-party validator, and this can help to reinforce the customer's confidence that the unique identifier on the food container matches the unique identifier on record with the third-party validator. To ensure the integrity of the unique identifiers, if any tamper proof seal labels are damaged or somehow otherwise accidentally broken before being deployed, the Restaurant User can log the unique identifiers associated with these spoiled tamper proof seal labels into the third party validator's database so that they are accounted for and if anyone tries to use the spoiled tamper proof seal labels this can be detected. More than this, the third-party validator's system is designed to check that each unique identifier that is entered into the system is legitimate, for example, by checking to make sure that the unique identifier matches an identifier that has been released to a food source, that the unique identifier matches those unique identifiers that were released to the food source associated with the scanned unique identifier, that the unique identifier has not been previously used, or indicated as having been spoiled. To accomplish this, the third-party validator's system keeps a record of all of the unique identifiers that have been released, and to whom they were released to, and a database of all of the unique identifiers that have been used.
[0084] In some embodiments, a Restaurant User can choose customizable settings. For example, instead of automatically assigning a food order to any driver that accepts the order, the Restaurant User can require that it first confirms a driver's offer to accept the order. In an area where there is an abundance of available drivers, the Restaurant User can view ratings or other feedback for drivers and choose to confirm a driver with a higher rating versus another driver that has a poor rating. In this was a restaurant can establish a pool of drivers that it considers reliable and that its repeat customers can become familiar with.
[0085] There can also be mechanisms for cancelling orders from the system.
The terms of service for customers can include terms for cancellation of orders.
For example, the terms can stipulate that if a customer cancels an order with sufficient notice, more than a predetermined time before a scheduled delivery time, the restaurant will not charge a cancellation fee, but if cancellation is made within the predetermined time period before delivery then then the customer can be charged for the cost of the food, and if cancellation is made by the customer after the food order has been assigned to a driver, then the cancellation fee can be the total cost for the food and the delivery charge. When a Restaurant User receives an order cancellation, the Restaurant User opens the Restaurant App and changes the status for the order to CANCELLED so that the order is moved from whichever status list that it is currently listed on, and moves the order to a list of cancelled orders. The Restaurant App can be pre-programmed or customized by the Restaurant User to calculate the cancellation fee based upon the status of the order when the cancellation was made and to reverse the charges to the customer and then charge the customer for the cancellation fee if applicable. If the order had already been accepted by a driver, when the order status is changed to CANCELLED the Restaurant App can be programmed to automatically notify the driver of the change in status and if the order is already out for delivery, the driver then knows that the food container no longer needs to be delivered, sparing the driver from the time and fuel costs for completing the delivery, In accordance with the terms of service, the driver can be paid for the delivery or for a reduced amount based on predetermined parameters such as, by way of example, driver location at the time of cancellation or elapsed time, or time remaining between scheduled delivery time and time of cancellation. The Driver App can also include a means for the driver to cancel acceptance of an order. For example, if the driver's car breaks down or there is an accident that blocks the road between the driver and the restaurant, or there are other changed circumstances that prevent the driver from picking up the food order, the driver can open the Driver App and access a list of accepted orders and cancel the ones that can no longer be fulfilled. When the Restaurant App receives a driver cancellation then the order will be moved back to the list of orders PENDING
ACCEPTANCE so that another driver can accept the order. To discourage driver cancellations without good reason, the Restaurant App can keep track to drivers who have cancelled accepted orders so that if a restaurant feels that a driver is unreliable they can refuse to confirm future acceptances of orders from that driver, and in some embodiments the Restaurant App can be customized by the Restaurant User to block unreliable drivers from accepting food orders. The Apps can include an appeal process to remove a poor rating if the driver can provide proof of the reasons for cancelling, for instance if the driver has a medical emergency.
100861 If the driver has already picked up a food order and is delayed in making the delivery because of roads blocked by an accident or construction, the driver can open the Driver App using a voice interface and indicate that the delivery for a food order will be delayed. The Driver App will then communicate this to the Restaurant App and/or to the customer through the Customer App. In some embodiments the driver can also communicate through the Driver App the reason for the delay and an estimated time for delivery so that the customer will know that the food is still on the way, why it has been delayed and when to expect it.
100871 In another illustrative example, similar Apps can be used when food orders are placed by the customer through an intermediary delivery service.
That is, instead of the customer ordering food directly from a restaurant, the customer can order food through a delivery service that manages food orders from a plurality of restaurants, grocery stores and other food sources. In this case, a delivery service uses a Delivery Service App, that receives food orders placed by customers. The Delivery Service App can be accessed by customers to order food from all food sources that sign up with the delivery service, including food sources that use the subject method for securing delivered food and food sources that do not use this method, with the Delivery Service App indicating which food sources include this feature and those that do not. In some embodiments, the customer interface with the Delivery Service App replaces the Customer App, and the Delivery Service App interfaces with the Restaurant App and the Driver App and the third-party validator system. In other embodiments the third-party validator can be integrated with the delivery service so that the Delivery Service App is part of the third-party validator's system that tracks food orders, their status and location. The Delivery Service App can keep track of every unique identifier and the status of each order from the time the order is placed until the order is delivered and the status is recorded as COMPLETED ORDER.
[0088] With all of these examples, a delivery person can only access the food that is being delivered by breaking the seal or damaging the packaging or food container. This deters delivery people from attempting to open the food containers because they know that it will be detected. The delivery person will know that the customer knows that the tamper proof seal label was applied before the food container was picked up by the food delivery person. This means that if the food appears to be tampered with and the packaging or the tamper proof seal label has visible indications of being damaged, the customer can prove that the delivery person was responsible. On the other hand, if a customer gets sick from consuming delivered food, and the packaging and tamper proof seal label did not show any signs of being compromised, then the customer can complain to the food source, knowing that the food could not have been tampered with by the delivery person.
[0089] Any of the above tamper proof seal labels can be integrated with other devices for increased functionality. For example, a GPS tracking unit could be integrated so that the location of the food container can be tracked during delivery, as an additional means of determining if there have been any unusual delays in the course of delivery. When the locking mechanism is a padlock-style mechanism, other technologies that can be combined, such as RFID or electronic code locks as further assurance that only the customer can open the padlock.
[0090] While the illustrated embodiments show particular examples, various modifications and alterations can be made to the examples within the scope of the claims and aspects of the different examples can be combined in different ways to achieve further examples. The term "tamper proof' in the context of this disclosure will be understood to mean that the customer will be able to see visual evidence of tampering if there are any visible indications of damage to the food container or the tamper proof seal label. That is, even with the tamper proof seal label applied to the food container, there is no absolute prevention of tampering and a delivery person could still break open the food container or break the tamper proof seal label, and tamper with the food, but the disclosed method prevents this from happening without visible evidence of unauthorized access to the contents of the food container. While several non-limiting examples of different types of food containers have been described, a food container could also include a cup carrier, such as embodiments described in the applicant's co-pending Canadian patent application entitled "Improved Carrier for Secure Cup Delivery, filed November 7, 2018, or a lockable compartment in a drone or other delivery vehicle. Accordingly, the scope of the claims is to be understood from the entirety of the present disclosure in view of, but not limited to the embodiments illustrated and described herein. That is, with the benefit of the teachings of this disclosure it will be apparent that various modifications and variations can be made without departing from the spirit or scope of the claims.

Claims (22)

What is claimed is:
1. A universal method for secure food delivery from a food source that sells food to a customer, the method comprising the food source following the steps of:
receiving a food order from the customer;
preparing the food order and depositing it into a food container at the food source;
applying a tamper proof seal label to the food container at the food source whereby the food container cannot be opened without a visible indication that the container has been opened, wherein each tamper proof seal label has a unique identifier marked thereon;
logging said unique identifier into a database;
making the unique identifier that is associated with the customer's food order available to the customer; and giving the food container with the tamper proof seal label applied thereto, to a person for delivery of the food container to the customer.
2. The method of claim 1 wherein the food source receives the food order from the customer through an intermediary business.
3. The method of claim 2 wherein the intermediary business is a service provider that arranges food deliveries from pre-selected food sources, which have agreed to apply the tamper proof seal label at the food source.
4. The method of claim 3 wherein the intermediary business also coordinates people making the deliveries.
5. The method of claim 1 wherein the database is managed by a third-party validator.
6. The method of claim 5 wherein the customer can access the database to retrieve the unique identifier assigned to the customer's food order to validate that the correct food container is being received, and that the tamper proof seal label is the same one that was applied at the food source, to visibly verify that the food container has not been opened from the time it was packaged until the time of delivery to the customer.
7. The method of claim 5 further comprising the third-party validator contracting with the food source for at least one of:
supply of tamper proof seal labels with pre-printed unique identifiers, supplied from the third-party validator to the food source;
payment from the food source to the third-party validator to contribute to funding the management of the database; access to the database, granted to the food source by the third-party validator to input the unique identifiers and for permitting the food source's customers to access the database to retrieve the unique identifier assigned to the customer's food order; and supply of secure packaging that is designed to provide a secure enclosed space that facilitates sealing with the tamper proof seal label to deter access to packaged contents by preventing access without visible damage to the tamper proof seal label or the secure packaging.
8. The method of claim 7 wherein the database is cloud-based.
9. The method of claim 7 wherein under the contract between the third-party validator and the food source the food source agrees to give the third-party validator the right to inspect the food source's facilities to ensure that the food source is correctly applying the tamper proof seal labels to seal the food containers before they are given to the delivery service.
10. The method of claim 7 wherein under the contract between the third-party validator and the food source, the food source agrees that it will purchase the tamper proof seal labels with pre-printed unique identifiers from the third-party validator.
11. The method of claim 7 wherein under the contract between the third-party validator and the food source, the third-party validator agrees to grant a license to the food source to print its own unique identifiers onto the tamper proof seal labels that the food source purchases from the third-party validator.
12. The method of claim 11 wherein the food source agrees to use the unique identifier in a format that is pre-approved by the third-party validator.
13. The method of claim 10 wherein the food source purchases the tamper proof seal labels as blanks from the third-party validator without the unique identifier.
14. The method of claim 1 wherein the database is managed by a third-party validator different from the food source and the person making the delivery and an associated delivery service.
15. The method of claim 1 wherein there are smaller food containers inside the food container that is sealed with the tamper proof seal label.
16. The method of claim 1 wherein the tamper proof seal label is made from a material that will visibly deform or break before the adhesive bond is broken between the tamper proof seal label and the food container.
17. The method of claim 1 wherein the unique identifier is in machine readable form, where by it can be entered into said database by being electronically scanned or photographed.
18. The method of claim 1 wherein the person making the delivery is dispatched by a delivery service that is a company different from the food source.
19. The method of claim 1 wherein said tamper proof seal label comprises a locking mechanism and said unique identifier is displayed on said locking mechanism or on a display panel integrated with said locking mechanism.
20. The method of claim 19 wherein said locking mechanism is in the form of one of a self-locking loop, a padlock, a clamp and a cord sandwiched between an adhesive-backed sheet label.
21. The method of claim 1 further comprising the third-party validator tracking the location of the food container when it is being delivered from the food source to the customer.
22. The method of claim 21 wherein the third-party validator tracks the food container after the tamper proof seal label has been applied by having each person who handles the food container input the unique identifier into a device with GPS location tracking enabled and trackable by the third-party validator, when taking possession of the food container.
CA3052185A 2018-11-06 2019-08-15 Universal method for secure food delivery Abandoned CA3052185A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CA3052185A CA3052185A1 (en) 2019-08-15 2019-08-15 Universal method for secure food delivery
US16/676,345 US20200160263A1 (en) 2018-11-06 2019-11-06 System, Method, And Packaging For Secure Food Delivery

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA3052185A CA3052185A1 (en) 2019-08-15 2019-08-15 Universal method for secure food delivery

Publications (1)

Publication Number Publication Date
CA3052185A1 true CA3052185A1 (en) 2021-02-15

Family

ID=74667790

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3052185A Abandoned CA3052185A1 (en) 2018-11-06 2019-08-15 Universal method for secure food delivery

Country Status (1)

Country Link
CA (1) CA3052185A1 (en)

Similar Documents

Publication Publication Date Title
US20200160263A1 (en) System, Method, And Packaging For Secure Food Delivery
TWI309387B (en) Product management system
JP2011521322A (en) Counterfeit prevention system
US11661242B2 (en) Securable clip
AU2020277262B2 (en) Seal delivery tracking system
JP2015232801A (en) Delivery method of home delivery article using coin locker
CA3052185A1 (en) Universal method for secure food delivery
EP4121919A1 (en) System for delivering an object using a primary parcel identifying the object and displaying of a label corresponding to the identified object on the primary parcel
US20200331675A1 (en) Apparatus, system and method for securing and preventing tampering of food delivery items
CN114365163A (en) System for generating instructions for preparation, processing, packaging, and delivery, and verifying integrity and security
US20210206562A1 (en) Tamper-resistant system for delivering pre-packaged goods, and methods of using same
CA3023307A1 (en) Universal method for secure food delivery
WO2006086759A2 (en) Luggage tag security device
JP5229240B2 (en) Delivery management system and delivery management method
WO2017118870A1 (en) Comprehensive luggage protection and tracking system
DE102013015521B4 (en) Mobile service device and method and system for exchanging status data of a mobile service device
JP2006103812A (en) Carrying-in management system, carrying-in management method, and sheet-like member for managing carrying-in
US20210090093A1 (en) Computer-enabled platform for delivering products tamper-proof
US9449267B1 (en) Methods and systems for preventing tampering of a smart tag
IT202100031532A1 (en) COMPUTER SYSTEM FOR MANAGEMENT OF ORDERS AND ASSOCIATED KIT
JP2001328372A (en) Delivery system and delivery slip
WO2019210970A1 (en) Smart wrapping system for luggage protection and tracking
KR20170001687U (en) Envelope type delivery label for preventing the customer information outflow
JP2006079401A (en) System, method and program for distributing electronic application document
RED et al. International Journal OF Engineering Sciences &Management Research

Legal Events

Date Code Title Description
FZDE Discontinued

Effective date: 20230825