EP4118604A1 - Smartphone lock box system - Google Patents
Smartphone lock box systemInfo
- Publication number
- EP4118604A1 EP4118604A1 EP21767936.4A EP21767936A EP4118604A1 EP 4118604 A1 EP4118604 A1 EP 4118604A1 EP 21767936 A EP21767936 A EP 21767936A EP 4118604 A1 EP4118604 A1 EP 4118604A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- computing device
- mobile computing
- container
- lock box
- smartphone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims description 25
- 230000000007 visual effect Effects 0.000 claims description 7
- 238000009825 accumulation Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 4
- 230000001815 facial effect Effects 0.000 claims description 2
- 230000000977 initiatory effect Effects 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 6
- 230000000717 retained effect Effects 0.000 description 5
- 230000001186 cumulative effect Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 239000004744 fabric Substances 0.000 description 3
- FDQGNLOWMMVRQL-UHFFFAOYSA-N Allobarbital Chemical compound C=CCC1(CC=C)C(=O)NC(=O)NC1=O FDQGNLOWMMVRQL-UHFFFAOYSA-N 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 206010012335 Dependence Diseases 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000740 bleeding effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001012 protector Effects 0.000 description 1
- 230000036578 sleeping time Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
- G07C1/12—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity wherein the time is indicated in figures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/04—Supports for telephone transmitters or receivers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- This invention relates to smartphone accessories, and specifically to a container for retaining a smartphone or other mobile computing device within the container, and tracking and logging the amount of time the smartphone is retained in the container, preventing access to the smartphone, eliminating distractions while working, studying or other activities, and tracking and logging the frequency that the user checks or removes the smartphone from the container.
- a container for placing a smartphone in, that tracks and reports the amount of time that the smartphone is secured in the container, the time of day when the smartphone is secured in the container, the frequency with which it is removed, and reports the phone owner’s accessing the device.
- the container does not have to physically lock but merely provide a physical barrier from being a distraction to the owner.
- the disclosed invention relates to smartphone accessories, and specifically to a container for securing a smartphone, where the container tracks and reports the amount of time the smartphone is secured in the container and the frequency that the user checks or removes the phone from the container.
- An embodiment includes a smartphone lock box system comprising: a container with a lid, wherein the container holds a mobile computing device and limits physical tactile engagement to the mobile computing device and the lid is clear to provide visual access to the mobile computing device; and a close proximity communication system comprising a sensing element integrated into the container, wherein the sensing element is sensed by the mobile computing device running a lock box application to determine that the mobile computing device is within the container, wherein a display of the mobile computing device is visible through the clear lid and displays an indication of at least one of: an amount of time the mobile computing device has been within the container; an amount of time elapsed of a predetermined established time the mobile computing device should be in the container; or an accumulation of amounts of time the mobile computing device has been within the container during a designated period of time even if the mobile computing device was removed and replaced within the container during the designated period of time.
- a smartphone lock box system comprising: a container with a clear portion, wherein the container holds a mobile computing device and limits physical tactile engagement to the mobile computing device and the clear portion provides visual access to the mobile computing device; and a close proximity communication system comprising a sensing element integrated into the container, wherein the sensing element is sensed by the mobile computing device running a lock box application to determine that the mobile computing device is within the container, wherein a display of the mobile computing device is visible through the clear portion and displays an indication of at least one of: an amount of time the mobile computing device has been within the container; an amount of time elapsed of a predetermined established time the mobile computing device should be in the container; or an accumulation of amounts of time the mobile computing device has been within the container during a designated period of time even if the mobile computing device was removed and replaced within the container during the designated period of time.
- a smartphone lock box system comprising: a mobile computing device operating a lock box application; a container, wherein the container holds the mobile computing device and limits physical tactile engagement to the mobile computing device; and a sensing device of the mobile computing device, wherein the sensing device determines that the mobile computing device is within the container during operation of the lock box application.
- a smartphone lock box system for clocking in for work comprising: a single mobile computing device of an employee, the single mobile computing device operating a lock box application; a container with a clear front portion, wherein the container holds only the single mobile computing device and limits physical tactile engagement with the mobile computing device; and a close proximity communication system comprising a passive close proximity sensing element integrated into or coupled to the container and a sensing device of the mobile computing device, wherein the sensing device determines that the mobile computing device is within the container during operation of the lock box application in response to the mobile computing device being placed in close proximity to the passive close proximity sensing element only when within the container, wherein a display screen of the mobile computing device is visible through the clear front portion and displays an indication of clocking in and an accumulation of amounts of time the mobile computing device has been within the container during a designated period of time less the time the mobile computing device is removed until replaced within the container and senses the passive sensing element again during the designated period of time, and wherein the lock box is located at a business office or
- FIG. 1 A is a perspective view of a smartphone lock box system according to an embodiment
- FIG. IB is a perspective view of a smartphone lock box system on a student desk according to an embodiment
- FIG. 1C is a perspective view of a smartphone lock box system for use in an employment environment according to an embodiment
- FIG. ID is a perspective view of a smartphone lock box system on a workplace desk according to an embodiment
- FIG. 2 shows a block diagram of the smartphone lock box system of FIG. 1 according to an embodiment
- FIG. 3 is a perspective view of a smartphone lock box system with the lid open and holding a mobile computing device according to an embodiment
- FIG. 4 is a perspective view of a smartphone lock box system according to an embodiment
- FIG. 5 is a perspective view of a sleeve of a smartphone lock box system with a mobile computing device being slid into it according to an embodiment
- FIG. 6 is a perspective view of a sleeve of a smartphone lock box system with a mobile computing device retained within it according to an embodiment
- FIG. 7A is a perspective view of a sleeve of a smartphone lock box system in a work environment with a mobile computing device being slid into it according to an embodiment
- FIG. 7B is a perspective view of a sleeve of a smartphone lock box system in a work environment with a mobile computing device retained within it according to an embodiment
- FIG. 7C is a perspective view of a sleeve of a smartphone lock box system in a work environment with a mobile computing device being slid out of it according to an embodiment
- FIG. 8 is a perspective view of a smartphone lock box system coupled to a backpack according to an embodiment
- FIG. 9 is a perspective view of a smartphone lock box system coupled to a table according to an embodiment
- FIG. 10 is a perspective view of a smartphone lock box system coupled to a scooter according to an embodiment.
- FIG. 11 is a perspective view of a smartphone lock box system coupled to a car according to an embodiment.
- embodiments of the present invention relate to mobile computing device accessories, and specifically to a container for retaining a mobile computing device within the container and tracking the amount of time the mobile computing device is retained within the container.
- the smartphone lock box system includes a box or container for locking a mobile computing device such as a smartphone or tablet into, so that the mobile computing device cannot be physically utilized while in the box.
- the smartphone lock box system can be used by employers and employees to have the employees check in their smartphones to limit distractions while working.
- the smartphone lock box system when used in a workplace environment, records and reports the amount of time the mobile computing device is locked or secured in a retaining unit and the frequency and duration of any times an employee removes the phone from the retaining unit.
- Each employer and work group can establish acceptable limits of access and set the system to only alert or report when overuse is recognized. Also, the system can provide a report of cumulative smartphone-free time worked, start time, end time and frequency of distractions for a certain worker at their station.
- the smartphone lock box system can be used by parents and children to get the children to leave their smartphones alone while doing homework or housework, or to just spend time without using the smartphone.
- the smartphone lock box system records and reports the amount of time and time of day the mobile computing device is locked or secured in the box.
- Parents can use the smartphone lock box system to incentivize a child to not use their mobile computing device for certain amounts of time or at certain times of the day.
- the smartphone lock box system helps young adults get away from their smartphones, and helps parents monitor and track the mobile computing device usage of their children. Parents use the smartphone lock box system to encourage and reward their children for paying attention to schoolwork and become less reliant on technology.
- FIGs. 1-4 depict embodiments of a smartphone lock box system 110.
- Smartphone lock box system 110 is used to lock a smartphone or other mobile computing device into a box so that the smartphone cannot be accessed for a certain period of time.
- the smartphone lock box system can be used by parents who want to encourage and reward their children for paying attention to schoolwork, housework, family, or to just become less reliant on their smartphones.
- Smartphone lock box system 110 includes a box or container 112 with a lid 114.
- Box or container 112 is configured to contain a mobile computing device 116.
- Lid 114 is coupled to box or container 112 so that mobile computing device 116 cannot be accessed while it is retained in box or container 112.
- Box or container 112 has a sensing element 118 integrated into box or container 112. Sensing element 118 is sensed by the mobile computing device 116 when a lock box software application 126 is running on mobile computing device 116.
- Lock box application 126 runs on mobile computing device 116 to sense the sensing element 118 of the box or container 112 to determine that the mobile computing device 116 is within a close proximity of the sensing element 118 and therefore within the box or container 112.
- the lock box software application 126 also operates to control the smartphone lock box system 110.
- the lid 114 may be clear or the lid 114 and the box or container 112 may both be clear, allowing the mobile computing device 116 to be viewed from outside of the box or container 112 while it is within the box or container 112 and the lid 114 is in a closed position.
- Mobile computing device 116 can be any type of mobile device with computing capability, such as a smartphone, a cellular telephone, a mobile computer, a computing tablet or pad, or any other device that can be mobile and has computing capabilities.
- Mobile computing device 116 is a smartphone in the embodiment shown in the figures, but this is not meant to be limiting.
- the box or container 112 may be any type of retaining unit, such as a basket, a container, a multi-slot shelving system, a locker or set of lockers, and the like.
- Mobile computing device 116 has a lock box application 126 loaded onto mobile computing device 116 in this embodiment. Lock box application 126 controls smartphone lock box system 110 and records and reports when mobile computing device 116 is secured in box or container 112, and for how long. Lock box application 126 is a software application in this embodiment, but this is not meant to be limiting.
- communication link 120 between the sensing element 118 and the mobile computing device 116 operating the software application may be any type of close-proximity communication link.
- the communication link 120 may be a Near Field Communication (“NFC”) link.
- NFC is related to radio-frequency identification (RFID) with the exception that NFC is designed for use by devices within close proximity to each other.
- RFID radio-frequency identification
- Devices using NFC may be active or passive.
- a passive device has information that is readable by other devices; however, the passive device cannot read information of another device. Active devices can read and send information.
- An example of an active device is a smartphone.
- each device In active NFC, each device is active and, when a device sends data, it generates an RF field, and when waiting, the device does not generate an RF field. In other words, the RF field is alternately generated by each device. In passive NFC, the RF field is only generated by one device. NFC devices may also provide secure communication by using a secure channel and encryption when sending sensitive information.
- NFC- A In general, there are three current signaling technologies for NFC devices to talk to each other. These signaling technologies are referred to as NFC- A, NFC-B and NFC-F. When devices first communicate, they communicate the signal type and then transmit data in compliance with the specified protocol.
- NFC-A corresponds with RFID Type A communication.
- Miller encoding is used with amplitude modulation at 100 percent.
- a signal sent between devices must change from 0 to 100 percent to register the difference between sending a “1” and a “0.”
- Data is transmitted at 106 Kbps when using Type A communication.
- NFC-B corresponds with RFID Type B communication.
- Type B uses Manchester encoding. Amplitude modulation is at 10 percent, wherein a 10-percent change from 90%, for low, to 100%, for high, is used. A change from low to high represents a “0” while high to low represents a “1.”
- NFC-F refers to a faster form of RFID transmission known as FeliCa. FeliCa is a technology similar to NFC but faster and currently more popular. It is used for a variety of services such as subway tickets, credit card payments, and identification at office buildings and other locations with limited access.
- the system 10 may utilize various types of NFC communication, including active or passive NFC, as well as using various types of signals.
- the NFC provides close-proximity communication between the mobile computing device 116 and the sensing element 118 of the lock box or container 112 only when the mobile computing device 116 is placed within the lock box or container 112 while operating the lock box software application 126.
- Box or container 112 is designed to hold mobile computing device 116.
- Box or container 112 has a lid 114 that is moveable between an open and a closed position, wherein, in the open position, the mobile computing device 116 may be placed within or removed from the box or container 112.
- the closed position and the mobile computing device is within box or container 112, it retains the mobile computing device 116 within the box or container 112 and prevents direct physical tactile engagement to the mobile computing device 112 while still providing visual access to the mobile computing device 116.
- Box or container 112 can be made in different sizes for different mobile computing device sizes. In some embodiments, box or container 112 can be made large enough to hold multiple mobile computing devices 116.
- Smartphone lock box system 110 may be used by churches or schools to contain a number of mobile computing devices 116. In some embodiments, box or container 112 will be able to contain and communicate with a plurality of mobile computing devices 116.
- Sensing element 118 is integrated into box or container 112 to provide box or container 112 with specific communication ability. Sensing element 118 as stated previously may be sensed by the mobile computing device 116 operating the lock box software app 126 using communication link 120. This communicates to the mobile computing device 116 that the mobile computing device is within the box or container 112 and the system 110 can identify that the mobile computing device 116 is within the box or container 112 for data gathering and reporting purposes.
- sensing element 118 may be NFC communication, Bluetooth communication, may be a scannable code by a camera of the mobile computing device 116 when it is placed within the box or container 112 or any type of close-proximity communication.
- mobile computing device 116 can be charged while in box or container 112 using a power connection 138 between box or container 112 and mobile computing device 116, or from an external power supply into the box or container 112 with connection 128.
- the box or container 112 may be a form of a mobile charging device.
- the smartphone lock box system 110 may include lock boxes 112 being used in by a business, workplace, team manager, supervisor or employer-employee environment. Additionally, this may operate in at a home or home office allowing an employee access to the system 10 from home when working from home. The use of smartphones in the workplace or when working from home is a drain of the productivity of the workforce.
- the insertion of a smartphone within a lock box or container 112 may operate as a “clock in” and “clock out” function for the employee. As depicted in FIGs.
- the lock box or container 112 may be located at a workstation in an office or a workstation in a home of the employee and may be connected to a computer at the workstation either in the office at the business location or at the home of the employee.
- the employee or the like may place his or her smartphone or other mobile computing device 116 within the lock box or container 112.
- the sensing element 118 and the mobile computing device 116 operating the lock box software application engage to determine the mobile computing device 116 is within the container 112. This may be by the mobile computing device 116 sensing the sensing element 118, such as by any type of close-proximity communication link.
- the mobile computing device 116 within the lock box or container 112 may then communicate with the system 110 through the network connection of the mobile computing device 116.
- lock box data including the information of the employee using the lock box or container 112 and the time that the smartphone 116 is within each lock box or container 112 may be reported to a server through the network connection of the mobile computing device 116.
- lock box data including the information of the employee using the lock box or container 112 and the time that the smartphone 116 is within each lock box or container 112 may be reported to a server through the wireless network of the mobile computing device 116 by operation of the lock box application.
- the server may automatically produce and deliver to a supervisor, or the like, a report that depicts the usage of the smartphone lock boxes by the employees.
- This lock box data can be utilized to determine effectiveness of employees and the effects of smartphone accessibility on productivity of the employees.
- This system is operable from the home of the employee as discussed above. This allows the employee to work even in instances where there may be illness, weather or other reasons that would inhibit an employee from being able to travel to the work. Further, this is useful for employees that have flexibility to work from multiple locations or who even travel.
- the lock box 12 may be portable and can travel with the employee to clock-in regardless of the employee’s location.
- the system may require the employee to utilize biometric scans in order to initiate operation of the mobile application before it can operate the clock-in feature or the clock out feature of the application.
- the biometric scans may be a facial scan, fingerprint scan or the like from biometric recognition software of the mobile computing device 116.
- the server may be programmed to create and to send one or more verification messages to the mobile computing device 116 requiring a biometric scan to verify the employee is still nearby the mobile computing device while it is in the lock box 12.
- the one or more verification messages may be sent at random times or intervals.
- the use of biometric scans may operate as a deterrent to employees from clocking in at home and then leaving or having someone else clock in for them on a different mobile device by simply entering a user name and password on another mobile computing device.
- the lock box or container 112 When operating within the work environment, the lock box or container 112, in some instances, may not be utilized as a clocking in feature but may operate to track smartphone usage by the employee when the employee should be working.
- the system 110 may determine whether the employee had his or her smartphone 116 within the lock box or container 112 at times when the employee is clocked in and in a status of at work. Further, the system 110 may be configured to account for breaks by the employee, such as 15 -minute breaks, lunch breaks and the like during the day, wherein the employee removes his or her smartphone 116 from the lock box or container 112 during the break. This will lead to employees that still have the ability to utilize the phone during breaks and reduce distraction from the smartphone during times when the employee is working.
- Employers may also have the ability to vary the settings to allow employees to access their phones a certain number of times in a workday, for a certain amount of time in a workday, or a combination of certain number of times and amount of time in a workday.
- each employer and work group can establish acceptable limits of access and set the system to only alert or report when over use is recognized.
- the system 110 can provide a report of cumulative distraction free time worked, start time and end time and frequency of distractions for a certain worker at their station.
- the system 110 in a workplace environment may include a clear lid 114 or a clear lid 114 and clear box or container 112 (as described below with regard to FIGs. 1 A-1B), wherein the mobile computing device 116 is visually accessible and/or audibly accessible for alerting an employee of certain types of messages or calls that come through the smartphone 116 that may be an emergency or otherwise urgent. This still allows the employee to avoid distractions without the concern of missing an urgent call from sources, like a child, a child’s school, emergency alerts, government alerts, Amber alerts, weather alerts, and the like.
- the sleeve 140 may include a front clear portion 142, wherein the mobile computing device 116 is slidable within the sleeve and the clear portion 142 of the sleeve 140 provides visual access to the mobile computing device 116.
- the sleeve 140 may include a sensing device 118 and operates as previously described above to determine that the mobile computing device 116 is inserted within the sleeve 140. As shown in FIG.
- the mobile computing device 116 may operate a work box app (with is the same as the lock-box application 126) that may be customized for a particular company’s usage.
- the work box app may operate by displaying on display 124 an indication that the app is running but not located within the sleeve or pouch 140 and thereby direct the user to slide the mobile computing device 116 into the container 140 in order to clock-in.
- the mobile computing device 116 running the lock box software application is activated and senses the sensing element 118 and determines that the mobile computing device 116 is within the sleeve or pouch 140 and display 124 reflects this determination and begins displaying information related to the amount of time the mobile computing device is within the sleeve or pouch 140.
- This information displayed may include current time, clock-in time, time intervals that the mobile computing device was removed from the container, cumulative clocked-in time and the like. For example, FIG.
- FIG. 7B depicts the current time, a start of day clock-in time, interruption times for each instance the phone was removed from the container 140, and cumulative time worked
- the interruption times may be instances of breaks, pulling a phone out for personal use, a lunch break and/or the like. This information is viewable through the clear portion 142 of the sleeve or pouch 140.
- the user may slide the mobile computing device 116 from the sleeve and the work box app operating on the mobile computing device may display on display 124 an indication of the clock-out time and the total time worked in that particular day. All of this data may be reported to a server and be retrieved by the employer, supervisor and the like
- lid 114 of box or container 112 may be clear to allow a display 124 of the mobile computing device 112 to be viewed when box or container 112 is closed.
- Display 124 displays information related to mobile computing device 116 and smartphone lock box system 110.
- display 124 can show the amount of time that mobile computing device 116 has been in box or container 112.
- display 124 can display the amount of time that mobile computing device 116 still needs to be in box or container 112, for example.
- Parents can set up reward systems for their children to encourage them to leave their mobile computing device 116 in box or container 112 for a certain amount of time, for example, or during certain times of the day.
- Display 124 can provide feedback on when mobile computing device 116 should be in box or container 112 and when and how long mobile computing device 116 has been in box or container 112.
- Display 124 can display information from mobile computing device 116 viewable through the clear lid 114 and/or clear box or container 112.
- mobile computing device 116 and lock box app 126 can be programmed to send messages from certain individuals or entities to display 124, or other important or emergency information.
- Smartphone lock box system 110 is used to track and report the times that mobile computing device 116 is locked or secured in box or container 112 and limits access by the owner to the mobile computing device 116 and further reports the frequency of which the phone is removed from the box or container 112.
- the system 110 operates to limit access, but still gives the ability to access the phone if needed. Children, teens, and adults are often distracted by their smart phones and have difficulty getting tasks done and getting disconnected from technology.
- Smartphone lock box system 110 helps individuals disconnect from their technology and provides a way to track the amount of disconnect.
- Box or container 112 uses sensing element 118 that communicated with the mobile computing device 116 operating a mobile application, wherein operation of the mobile application includes a close proximity communication system.
- the phone operating the mobile application As the phone operating the mobile application is placed within the box or container 112, it is located proximate the sensing element 118 and the mobile computing device 116 determines by sensing the sensing element 118 that the mobile computing device 116 is within the box or container 112.
- the system 110 tracks and reports the times and periods that mobile computing device 116 is in box or container 112.
- Parents can use smartphone lock box system 110 to monitor and understand their children’s use of mobile computing device 116, wherein the parent may utilize his or her external mobile computing device to monitor the status of the smartphone in the box 12. Children and students can earn rewards for having their mobile computing device 116 be in box or container 112 at certain times or for certain lengths of time. Parents can apply more valuable rewards for having mobile computing device 116 be in box or container 112 at certain times.
- Smartphone lock box system 110 can be used by parents to control how long children use their mobile computing device 116, and make the child choose when they won’t be using mobile computing device 116.
- Smartphone lock box system 110 can be used by parents, teachers, students, employers, or any other individual or group to track and report when and how long one or more mobile computing device 116 is inside box or container 112.
- another embodiment includes a sleeve or pouch 140 that operates as the box 112.
- the sleeve 140 includes a front clear portion 142, wherein the mobile computing device 116 is slidable within the sleeve and the clear portion 142 of the sleeve 140 provides visual access to the mobile computing device 116.
- the sleeve 140 may include a sensing device 118 and operates as previously described above to determine that the mobile computing device 116 is inserted within the sleeve 140. As shown in FIG. 5, as the phone is slid into the sleeve 140, the lockbox software application may be running on the mobile computing device 116 and displaying on display 124 an indication that the app is running but not located within the sleeve or pouch 140. As the phone is completely inserted within the sleeve or pouch 140, as shown in FIG.
- the mobile computing device 116 running the lock box software application is activated and senses the sensing element 118 and determines that the mobile computing device 116 is within the sleeve or pouch 140 and display 124 reflects this determination and begins displaying information 150 related to the amount of time the mobile computing device is or should be within the sleeve or pouch 140. This is viewable through the clear portion 142 of the sleeve or pouch 140. Additionally, the display 124 may display a countdown bar to show the passing of time graphically. It will be understood that other graphical representation of the passage of time the mobile computing device 116 is within the container 140 may be utilized without departing from the scope of the invention.
- embodiments of the present invention include the mobile computing device 116 running the lock box software application that activates a sensor of the phone to determine that the mobile computing device 116 is within the box 112 or sleeve 140.
- the sensor of the phone may be a camera, an accelerometer, an audible sensor, a magnetic connection and the like.
- the camera or light sensor of the camera may operate to determine if the light is dimmed while the app is operating in order to determine it is within a container 112 or use of microphones, touch capabilities and the like to determine that the mobile computing device 116 is within the container 112.
- multiple boxes may be linked together electronically, wherein a study group of students can all have their respective smartphone in a lock box or container 112 and communicate with the other lock boxes 112 to ensure that all members of the study group are providing full attention to the study session or group project being worked on without distraction of a phone.
- special rewards for a group studying in this fashion may be monitored by use of the lock box or container 112.
- Embodiments may be utilized in various ways without departing from the scope of the invention.
- the following include some configurations of the system 110.
- Embodiments of the smartphone lock box system 110 may be utilized in fabric formed items.
- FIG. 8 depicts the use with a backpack 200.
- Other fabric items not shown may include, without limitation, a purse, a Zuca, luggage and the like.
- These types of systems can operate as a smartphone lock box in any location that an individual is, such as at school, in a library, in a dorm room and the like.
- Embodiments of the smartphone lock box system 110 may be utilized in furniture items.
- FIG. 9 depicts the use with a table 210.
- Other furniture items not shown may include, without limitation, a conference room table, desk, nightstand and the like.
- the table 210 can be home dining table, a restaurant table, and end table and the like.
- the system 110 can operate to create an ecosystem where users are utilizing smartphones less and connecting on a more personal level.
- the system 110 operates to display to each user the amount of unplugged time that he our she has engaged in while dining. This can be reported to a server for storage and later for reporting.
- Embodiments of the smartphone lock box system 110 may be utilized in vehicles.
- FIG. 10 depicts the use with an electric scooter 220.
- a scooter 220 such as a bicycle, motorcycle and the like
- Other vehicles not shown may include, without limitation, a cockpit for and airplane or helicopter, a bus, a motorcycle, a truck, a boat, a bike, a moped, and the like. It may be used by drivers or by passengers such as in a back seat for a child.
- FIG. 11 depicts the system 110 may be used in a vehicle like a car 230.
- the system 110 may include an adapter to plug into the vehicle in order to charge the mobile computing device 116 within the container 112 or 140.
- a navigation system may be utilized by mobile computing device in order to provide navigation services to the vehicle driver.
- the system 110 for use with vehicles provides safety by reducing distractions, such as, but not limited to, texting while driving that smartphones or other mobile computing devices 116 present for drivers.
- the mobile computing device 116 may utilize an accelerometer or GPS device in order to determine the speed of travel of the mobile computing device 116.
- the mobile computing device 116 automatically initiates the system 110 by operating the lock box application 126.
- the lock box application 126 may run in the background in order to initiate operation upon reaching the threshold speed. This disables the functionality of the phone when inserted within the container 112 or 140 to prevent touch access of the phone.
- the system 110 may include the mobile computing device 116 automatically disengaging the system 110 in response to the speed dropping below the threshold level for a predetermined amount of time. The time the mobile computing device 116 is operating to disable features is sent to a server for storage and reporting.
- the system 110 in operation with a vehicle may record the time that it is in the container. This can be utilized by insurance companies in order to determine discounts for safe driving, wherein the discounts are tied to the mobile computing device 116 being inserted within the container when a driver is driving. Additionally, the data may be stored and utilized as evidence of the driver not texting or engaging with a phone while driving. In other embodiments, it can be utilized to track mileage.
- Embodiments of the smartphone lock box system 110 may be utilized in appliances such as, but not limited to a refrigerator, a stove, a microwave, and the like.
- Embodiments of the smartphone lock box system 110 may be utilized in various ways. For example, and without limitation with a plastic bag or accessory that has a bendable display; as a pocket protector unit that can be put in and removed from a pocket of a shirt; as a charging unit for the mobile computing device or external devices such as, without limitation, a sleeve that attaches to laptop and powers phone, a system 110 built into workplace computer or monitor, of phone at call centers, and may be integrated into a battery pack. [0066] Further, it is contemplated that operation of the system 110 may have the ability for a user to control all connected devices.
- all devices that can talk to each other can all be limited in communication ability by the placing of the smartphone within a container of the system 110. Thereby ensuring that the user does not receive communications on any connected device and ensuring removal of distractions.
- each of the types of lock box containers may be utilized in order to record the amount of time that the smartphone is within any container within a single day.
- the system 110 may then allow users to set goals for amount of time away from the screen of the mobile computing device 116. It can track all times the mobile computing device 116 is within any container and store the same in a central repository. Multiple users may then compete for most time away from devices, rewards may be earned by reaching certain levels of non screen time and the like. Permitted group data may also be collected and shared with the user, such as family having all phones in a multiple device container and track and view all dining time away from mobile computing devices in a predetermined amount of time, such as a week.
- the present invention includes a method of using a smartphone lock box system.
- the method includes coupling a plurality smartphone lock boxes to a server, wherein each smartphone lock box is associated with an individual employee; placing a plurality of smartphones of employees within a plurality of smartphone lock boxes, wherein one smartphone is placed within one smartphone lock box; sensing whether the plurality of smartphones are within the plurality of smartphone lock boxes in response to a sensor in each smartphone lock box sensing the presence of a smartphone, wherein each smartphone lock box communicates to the server the time the smartphone is placed within the smartphone lock box and communicates to the server the time the smartphone is removed from within the smartphone lock box; automatically storing all times communicated from the smartphone lock boxes in a memory of the server; and automatically generating a report of times that each smartphone lock box associated with each individual employee contained a smartphone to determine the time that each individual employee’s smartphone is within the smartphone lock box.
- Embodiments may be available on or through the internet, such as through domain names reserved and owned by Applicant that include seniorprotection.com or the like.
- the embodiments and examples set forth herein were presented in order to best explain the present invention and its practical application and to thereby enable those of ordinary skill in the art to make and use the invention.
- those of ordinary skill in the art will recognize that the foregoing description and examples have been presented for the purposes of illustration and example only. The description as set forth is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the teachings above.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Vehicle Step Arrangements And Article Storage (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/813,216 US10937001B1 (en) | 2017-11-17 | 2020-03-09 | Smartphone lock box system |
PCT/US2021/021476 WO2021183491A1 (en) | 2020-03-09 | 2021-03-09 | Smartphone lock box system |
Publications (2)
Publication Number | Publication Date |
---|---|
EP4118604A1 true EP4118604A1 (en) | 2023-01-18 |
EP4118604A4 EP4118604A4 (en) | 2024-04-10 |
Family
ID=77672280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21767936.4A Pending EP4118604A4 (en) | 2020-03-09 | 2021-03-09 | Smartphone lock box system |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4118604A4 (en) |
AU (1) | AU2021235966B2 (en) |
CA (1) | CA3171218C (en) |
WO (1) | WO2021183491A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114732200B (en) * | 2022-03-23 | 2024-06-25 | 周小洋 | Mobile phone timing box unlocking method and device, electronic equipment and mobile phone timing box |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6047573A (en) * | 1998-12-03 | 2000-04-11 | Martinez; David | Telephone lock box |
US6989732B2 (en) * | 2002-06-14 | 2006-01-24 | Sentrilock, Inc. | Electronic lock system and method for its use with card only mode |
US10277730B1 (en) * | 2017-11-17 | 2019-04-30 | Charles Isgar | Smartphone lock box system |
US10630832B1 (en) * | 2017-11-17 | 2020-04-21 | Charles Isgar | Smartphone lock box system |
-
2021
- 2021-03-09 EP EP21767936.4A patent/EP4118604A4/en active Pending
- 2021-03-09 AU AU2021235966A patent/AU2021235966B2/en active Active
- 2021-03-09 CA CA3171218A patent/CA3171218C/en active Active
- 2021-03-09 WO PCT/US2021/021476 patent/WO2021183491A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2021183491A1 (en) | 2021-09-16 |
CA3171218A1 (en) | 2021-09-16 |
AU2021235966A1 (en) | 2022-11-03 |
CA3171218C (en) | 2024-04-30 |
AU2021235966B2 (en) | 2024-08-29 |
EP4118604A4 (en) | 2024-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10937001B1 (en) | Smartphone lock box system | |
US10630832B1 (en) | Smartphone lock box system | |
US10277730B1 (en) | Smartphone lock box system | |
US10771618B1 (en) | Device management system | |
US20190116257A1 (en) | System, device, and method for tracking and monitoring mobile phone usage while operating a vehicle in order to deter and prevent such usage | |
US10878135B2 (en) | Wireless device security system | |
US8810392B1 (en) | Device and method for monitoring the presence of items and issuing an alert if an item is not detected | |
GB2510567A (en) | Reminding a user when an item has been left behind in a vehicle | |
Mare et al. | A study of authentication in daily life | |
US20170017815A1 (en) | Security and identification system and method using data collection and messaging over a dynamic mesh network | |
JP2012507954A (en) | Integrated vehicle key and mobile phone system to prevent mobile phone use while driving | |
AU2021235966B2 (en) | Smartphone lock box system | |
US9448547B2 (en) | Sensor and power coordinator for vehicles and production lines that hosts removable computing and messaging devices | |
CN109008146A (en) | A kind of article memo method and system of Intelligent travel suitcase | |
US10235864B2 (en) | Tracking items in a container | |
CN107392289A (en) | Campus student card system and its control method | |
CN106850708A (en) | Home-school communication system and its method with GPS location following function | |
KR101361110B1 (en) | Method for controlling smart-phone of student | |
CN105212492A (en) | A kind of Intelligent travel suitcase system and control method | |
CN106210288A (en) | Short message display method and device | |
Park et al. | Growing Apart: How Smart Devices Impact the Proximity of Users to Their Smartphones | |
CN211979778U (en) | Intelligent device and system capable of intelligently managing and controlling student mobile phones | |
US20160357235A1 (en) | Differentiated hosting for vehicles interoperating with and through validated, removable and swappable computing and messaging devices | |
KR20150066714A (en) | Method and apparatus for managing daily schedule | |
US20190158652A1 (en) | Distracted driving smartphone lock box system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20221006 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20240311 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 4/80 20180101ALI20240304BHEP Ipc: H04M 1/67 20060101ALI20240304BHEP Ipc: H04M 1/04 20060101ALI20240304BHEP Ipc: G06Q 30/0207 20230101ALI20240304BHEP Ipc: G07C 1/10 20060101ALI20240304BHEP Ipc: G06Q 10/10 20120101AFI20240304BHEP |