GB2581170A - Smart container - Google Patents

Smart container Download PDF

Info

Publication number
GB2581170A
GB2581170A GB1901630.2A GB201901630A GB2581170A GB 2581170 A GB2581170 A GB 2581170A GB 201901630 A GB201901630 A GB 201901630A GB 2581170 A GB2581170 A GB 2581170A
Authority
GB
United Kingdom
Prior art keywords
smart container
message
user
container
smart
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1901630.2A
Other versions
GB201901630D0 (en
Inventor
Roberts Gimson Rachel
Anthony Roberts John
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1901630.2A priority Critical patent/GB2581170A/en
Publication of GB201901630D0 publication Critical patent/GB201901630D0/en
Priority to PCT/GB2020/050275 priority patent/WO2020161497A1/en
Publication of GB2581170A publication Critical patent/GB2581170A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06314Calendaring for a resource
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B43/00Time locks
    • E05B43/005Timer devices controlling electrically operated locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1632External expansion units, e.g. docking stations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network
    • H04L12/2827Reporting to a device within the home network; wherein the reception of the information reported automatically triggers the execution of a home appliance functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Signal Processing (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Automation & Control Theory (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Telephone Function (AREA)

Abstract

A method of alerting a user to an incoming communication on a mobile communication device. The method includes setting the mobile communications device to a state in which alerts about incoming messages are not provided to user of the device, receiving a message at the device, determining if the message is high priority and then generating an alert to the presence of the message with high priority. The step of setting the mobile device to the state may include placing the device into a smart container 2 which may contain a sensor for detecting the presence of the device. The sensor may be a weight sensor. Apparatus suitable for performing the method are also provided. Other aspects include monitoring selected content on a device, managing multiple devices and managing containment of contents of a smart container. The invention seeks to more effectively manage the time spent using mobile communications devices.

Description

Intellectual Property Office Application No. GII1901630.2 RTM Date:15 Jule 2019 The following terms are registered trade marks and should be read as such wherever they occur in this document: WiFi Bluetooth Google Amazon Intellectual Property Office is an operating name of the Patent Office www.gov.uk/ipo Smart container This invention relates to a smart container into which one or more electronic devices can be placed and to which access is selectively determined by an authorised controller.
Our world is becoming ever more connected, by way of the internet and the devices which can utilise the internet to provide users with increased functionality, connectivity, entertainment, and ease of access to data and information.
It's now been over 10 years since the widespread use of Smartphones, Tablets and the like and the subsequent general adoption of these and other mobile technology devices into users' lives along with the related and ongoing surge in social media offerings which are now part of mainstream day to day life and which have indeed provided benefits.
It is also widely and increasingly recognised that said innovations have also presented new challenges for human beings in day to day life, including those related to increased expectations and pressures, alongside tangible, measurable changes in human behaviour and interaction -many people now struggle with managing their time and overall quality of life as it relates to their screen-time habits, behaviour and choices related to individual screen time, use of mobile devices and level of digital distractions in their life.
This increase in connection has affected numerous aspects of our lives and the rapid increase in technological innovation provided by that increased connectivity, particularly in the areas of mobile technology and devices, social media, gaming, and online gambling impacts on many areas of day to day life and consequently upon how we spend arguably the most precious commodity we have as human beings -our time.
Human beings are generally recognised as being 'creatures of habit' -our habits and behaviours are complex, driven by biological processes and functions of the brain, some of which is innate, other of which is directly influenced by the environment around us and the inputs and stimuli to which we are subjected and/or subject ourselves to.
This is particularly true of children for whom the use of mobile devices is something which is part of day to day life and is considered to be entirely normal. However, these devices can lead to significantly lower levels of human interaction, either with siblings, friends or parents/guardians, and/or reduced time spent carrying out activities such as reading which are intrinsic to the child's development. Frequent use of mobile devices is also shown to have a negative impact on a child's sleep and other areas such as the development of a child's language skills and emotional intelligence. There are marked increases in digital addictions and related issues among both children and adults.
There are already various options for trying to address this issue including software applications which track time spent on devices and/or set time limits by individual device, rudimentary storage solutions, e.g. a drawer or a box, or even systems which can turn off WIFI access at certain time. These are all aimed at reducing, or making it more difficult, for a user to interact with the mobile device.
Software applications (often called "Apps", especially when used on a mobile device) which track and or limit screen time / time spent on line provide information to a user which may or may not ultimately lead to a change in user habits -providing information about usage does not in isolation cause the user to physically and or visually separate themselves from their mobile device. Also, an App can in itself can become 'another thing to do' in terms of 'management' or 'monitoring' for the user.
Placing mobile devices belonging to different users in a drawer, box or rudimentary technology storage solution or recharging dock at the same time, be they unlocked or lockable, or even turning off WIFI is frequently not a positive experience for users, particularly in home and shared environments.
It is widely recognised that a user (particularly a savvy child or teenager under the care and direction of a parent or guardian) who does not want to be 'offline' when a parent or guardian says so can routinely find ways of 'working around' practical obstacles and /or screen-time rules. For example, it is possible to switch the device over to a mobile network when WIF I is switched off. Children can also frequently 'work out' the security pin codes for their parent's mobile devices, thereby allowing them access to a connected device or even the ability to alter the access permissions being granted. Sneaking devices into bedrooms from a "safe" stored location is also well known.
Instead of solving problems associated with digital distractions the aforementioned approaches can actually give rise to disruption and also conflict among users, particularly in a shared living space or environment. Also, unless all users of devices in a living space or environment are under the same rules, these approaches do not provide an individualised solution that empowers and gives control back to users of electronic devices. Furthermore, these approaches do not offer the potential for multiple users to have a shared, customisable and controllable time and positive experience away from digital distractions or mobile devices.
Accordingly, the present invention aims to address this and other related problems The present invention provides a smart container comprising a main housing having at least one opening to provide access to the interior of the housing, at least one closure for selectively opening and closing the opening; and a lock for selectively preventing or allowing the closure to be opened to provide access to the interior of the body.
The smart container may further comprise one or more slidable trays in the housing. The smart container may comprise a movable rack into which multiple devices can be placed. The rack may be slidable substantially vertically out of the top of the container. The main housing may include a faraday cage.
The smart container may comprise a messaging device for sending and receiving messages. The smart container may comprise a wireless network communication device. The smart container may comprise one or more charging devices for charging devices placed in the housing. The smart container may further comprise a camera for providing one or more images from the interior of the housing.
The smart container may comprise doors. The door may be one or more of seamless flush fit, gullwing, butterfly, scissor, sliding, suicide, swan, canopy, clamshell or folding doors. The movement of one or more of the doors may activate a drive mechanism which moves a tray or rack out of the housing.
The smart container may be formed within an item of furniture, in a vehicle or within the structure of a building.
Thus, the smart container provides a simple solution to securely store or put away mobile electronic devices such as smartphones, tablets, remote controls and games consoles. This then reduces and removes the distractions of those mobile devices to afford people valuable time free from digital distractions actively managed in a way they choose that best works for them whilst also helping to actively manage social and cultural sensitivities associated with potential expectations of those who seek to make contact with a person whilst they are choosing to take time offline. In particular, whist an adult is able to makes their own personal decisions about usage level of mobile devices, and can select when to use or not use them, the smart container permits a parent or guardian to set, in advance, time periods which are to be "device free", and have those devices securely stored, so that access is not permitted by a user.
In this specification, we use the term "user" to indicate a person who would interact with the entertainment device whose access is being controlled or monitored. For example a child. The term "gatekeeper" or "verified user" refers to the person or persons who have control of the smart container and have the ability to alter the controls, settings and functionality of that device, for example a parent or guardian.
We use the term "messages" to include SMS text messages, email messages and any other form of message sent electronically via social media platforms, within games or other software applications or across the internet in any form.
The smart container is preferably linked with a software application ("App"), which could be run/hosted on any suitable computer device. The App recognises that simply removing a device from a user in such a way that it cannot be seen or interacted with, especially in relation to incoming message alerts can also have significant downsides.
Given the high levels of connectivity discussed previously, people assume (correctly or incorrectly) that a person who has a mobile communication device is contactable at anytime and will, at the very least, see that there is an incoming message, phone call, email or the like, even if the recipient chooses not to respond instantly. Thus, a user may choose to ignore a certain incoming message if it arrived at an inconvenient time, preferring to deal with it when more convenient. However, a message which was urgent, and which superseded the urgency of the user's current activity, could be recognised as such and acted upon. For example, a message from a user's partner asking what time the user would be home could be ignored, whereas a message from an elderly relative indicating a health concern could be acted upon.
Placing a user's device in a smart container such that alerts cannot be seen or otherwise received by the user, which is of course the intention of the smart container, does lead to further problems in that urgent matters could be missed.
The present invention also provides a method of alerting a user to an incoming communication on a mobile communication device, the method comprising the steps of: setting a mobile communication device capable of receiving data messages to a state in which alerts about incoming messages are not provided to a user of the device; receiving a message at the mobile communication device; determining if the message is high priority; and, if the message is high priority, generating an alert to the presence of a message with high priority.
The determination of "high priority" may include the identification of an authorisation code or other feature of the message itself. Alternatively and/or additionally, the sender of the message may be recognised as a high priority contact, for example by reference to a suitable flag or marker associated with the sender and which may be stored in a contact list on the device or smart container, such that the message is noted as high priority.
According to the method, an authorisation code may be sent together with or separately from the message. The message sender may receive an indication that the sent message requires an authorisation code for the user to be notified of delivery. An authorisation code may be provided to the message sender. The message sender may send the authorisation code to the mobile communication device.
According to the method, setting the mobile communication device to a state in which alerts about incoming messages are not provided to a user of the device may include placing the mobile communication device in a smart container.
The method may further comprise the step of sending an alert to a second device A system may be provided for carrying out the method of alerting a user to an incoming communication on a mobile communication device, the system comprising a smart container having a messaging device for sending and receiving messages. The system may further comprise a sensor for detecting the presence of a mobile communication device in the housing. The sensor may be a weight sensor. The setting of the mobile communication device to the no alert state may triggered by the detection of the mobile communication device by the sensor.
Thus, this aspect of the invention provides a method by which a message from a preselected sender(s) can bypass the fact that the device is out of sight and ensure that the message recipient still receives an alert about an urgent matter. The message recipient also gains the peace of mind that no urgent matters will be missed as they engage in their current activity.
Furthermore, the placing of one or more devices in the smart container does not necessarily preclude a child from using some other form of screen device, such as a television. Once, a television was common only in the main living room of a dwelling and access to it could be easily controlled, but now they are commonplace in multiple rooms in a dwelling including bedrooms. When an adult believes that screen time should be limited, it is generally meant that all screen time should be limited.
The invention also provides a method for managing multiple devices comprising the steps of: inserting a first entertainment device into a smart container, the smart container being configured to detect the insertion of the first device; and in response to detecting the first device, transmitting a message to a second device to switch off.
According to the method, the smart container may comprise one or more sensors for detecting the presence of the first device. The one or more sensors may detect the weight of the first device. The one or more sensors may use image analysis to determine whether one or more devices have been inserted into or removed from the smart container. The sensor(s) may use near field communication, such as bluetooth, or even a wireless signal. The detection may also detect a specific device, rather than just the presence of a device. The sensor(s) may be configured to require a certain number of one or more different device types.
Thus, this aspect of the invention allows a more widespread implementation of the "screen time ban" by linking the device storage in the smart container with the ability to turn off other devices which might also cause an unwanted distraction.
By entertainment device, we mean any form of mobile communications device, games console, remote control for a television or other media player or other visual screen-based device. Devices may include those used for entertainment and also for work, for example laptops.
Furthermore, given the amount of interaction that everyone now has with messaging software, or even electronic games in which messaging with online friends is permitted, it is difficult for parents/guardians to be aware of everything which their children or wards are experiencing across a device. The rise of cyber bullying, whereby someone receives unpleasant messages either from an individual or within a group messaging system, is increasing. It is also possible for users of games in which messaging is possible, or of chatrooms or any other online forum where messages can be exchanged to become "friends" with people who they do not actually know, and who may be hiding behind an alias.
The invention also provides a method of monitoring selected content on a mobile communications device, the method comprising the steps of: placing the mobile communications device in a smart container; forming a data connection between the system and the mobile communications device; carrying out analysis of the content of one or more messaging libraries on the mobile communications device; and reporting the results to an authorised person.
According to the method, analysis may include scanning for one or more key words or phrases. The analysis may identify bullying or threatening words or messages. The analysis may identify potential unsolicited messages. The analysis may be carried out by software stored in the smart container. The analysis may be carried out in a separate device which connects to the smart container or the monitored device by a wireless communication protocol. The analysis may be carried out only when the device to be monitored is in the smart container.
The method may further comprise the step of, after detecting a message containing one or more unwanted key words or phrases, sending a reply to the sender of the message. The method may comprise the step of, after detecting a message containing one or more unwanted key words or phrases, preventing the message from being seen by a user of the device.
There may be provided a system for carrying out the method of monitoring selected content on a mobile communications device, the system comprising computer readable code for analysing the content of one or more messaging libraries on the mobile communications device, the code being stored on either on a smart container, in a communications device of an authorised person, or in the cloud.
As such, this aspect of the invention allows a parent or guardian to get an indication if any messages or the like on a device contain potentially worrying or bullying material, depending of course on the keywords or phrase selected. The privacy of the actual message content may be maintained, but alerts can be provided where the message content is not suitable.
The present invention also provides a method for managing containment of contents of a smart container, the method being carried out by the smart container and comprising the steps of: receiving an input from a user of a time from which access by the user to the contents of the container will be prevented and a duration for which access will be prevented; generating one or more alerts that the input time is approaching; stopping alerts when one or more devices have been inserted into and detected by the container; after insertion of the one or more devices, preventing access by the user to the contents of the smart container for the duration; and, at the end of the duration, allowing user access to the contents of the smart container.
The method may further comprise the step of generating one or more alerts that the end of the duration is approaching. The input time and duration may be received by an external device. The alerts may be generated by an external device Alternatively, the present invention provides a method for managing containment of contents of a smart container, the method being carried out by the smart container and comprising the steps of: receiving an input from a user of a time from which access by the user to the contents of the container will be allowed and a duration for which access will be allowed; generating one or more alerts that the end of the duration is approaching; stopping alerts when one or more devices have been inserted into and detected by the container, after insertion of the one or more devices, preventing access by the user to the contents of the smart container until the start of the duration; and at the start of the duration, allowing user access to the contents of the smart container.
The time period when devices should be in the smart container may be defined in any suitable manner including the provision of a start and end time, provision of a start time and a duration from that start time, or may even by set by a time period of set duration preceding an event, for example a child's bedtime, such that the child's device must be in the smart container 1 hour before bedtime. All such possibilities are covered by this aspect of the invention.
The aspect of the invention allows the gatekeeper/verified user to set in advance times when devices are available and times when they are not, leading to consistency for the user who knows when and for how long the device can/cannot be use. This also helps to avoid the "can I have another 5 minutes?' type questioning.
Thus, the various aspects of the present invention make a positive difference to the quality of human life experience and the use of precious time in a hectic, technology-oriented world, whilst ensuring that issues associated with prevention of access to a device is minim ised.
The smart container and/or the associated App can provide the catalyst for individuals, families and loved ones to change their habits and make the best choices for them relative to their day to day use of technology and the things that are important to them, whatever each person chooses those to be. The invention can provide a trigger for humans to evaluate the balance that is right for them, creating a space for greater and higher quality human interaction and technology 'downtime'.
The preferred features of one or more aspects of the invention and functionality above may be included in any combination with any of the aspects of the invention described.
Other preferred features which may be included in any combination with any of the aspects of the invention include: The smart container can accommodate multiple mobile devices.
The gatekeeper(s) of the smart container determine who has access to the smart container via a user interface, such as a biometric sensor.
The smart container's interface can be programmed to be used by a single individual or multiple gatekeepers who determine the access to the smart container and its related functionality.
The smart container acts to physically and visually remove digital distraction from mobile devices by ensuring the devices cannot be touched or seen.
A software application ("App") is preferably provided and which delivers enhanced functionality and user benefits when used in conjunction with the smart container and WIFI (loT) capability. It may be optionally activatable by the user and/or a gatekeeper. The smart container may be WIFI enabled which delivers enhanced functionality and user benefits when used in conjunction with the App. It may be optionally activatable by the user and/or a gatekeeper.
When the smart container is WIFI enabled, it may interface with other loT devices such as smart speakers, TVs, personal electronic assistants such as Amazon Echo or Google Home.
The smart container may include one or more sensors that can detect the presence of a device with the smart container. The sensor(s) may detect weight, or may use near field communication, such as bluetooth, or even a wireless signal. The detection may also detect a specific device, rather than just the presence of a device. The sensor(s) may be configured to require a certain number of one or more different device types.
The smart container may require one or more devices to be placed within the housing at a specified time, or within a specified time period of an alert being generated. In the event that the required devices are not placed in the housing at or by the correct time, depending on set up, one or more alerts could be sent to a gatekeeper. Further reminders could be provided to a user. The gatekeeper may be notified by way of a simple message or email or by way of a related software application. Failure to place the required devices in the smart container may result in other smart devices such as TVs or game consoles being automatically switched off.
The smart container acts as a 'Habit nudge' in relation to encouraging time away from digital distraction and provides a solution which, once set up, requires less solution management overhead on an ongoing basis.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 shows a smart container in a network.
Figure 2 shows an exploded view of a smart container including a mechanism for operating a drawer of the smart container.
Figure 3 shows a smart container comprising doors and drawers.
Figure 4 shows a smart container comprising a racking system.
Figure 5 shows a method for managing multiple devices.
Figure 6 shows a method for managing containment of contents of a smart container.
Figure 7 shows a method of alerting a user to an incoming communication on a mobile communication device.
Figure 8 shows a method of monitoring selected content on a mobile communications device.
DETAILED DESCRIPTION OF THE DRAWINGS
Figure 1 shows a smart container 1 comprising a main housing 2 and a drawer 3. The drawer contains a lock mechanism (not shown) for selectively preventing or allowing the drawer to be opened. The smart container may comprise another lock mechanism for selectively preventing or allowing access to the smart container. The main housing may be formed from recyclable plastic, metal, wood, leather or other suitable materials. The main housing may comprise a coating. The coating may be customisable for example to show promotional or advertising material. The coating may have a functional benefit. The coating may be anti-bacterial or anti-ferric. The coating may include a Faraday cage. The main housing 2 may comprise lighting on the exterior of the smart container. The main housing 2 may comprising lighting on the interior of the smart container for illuminating the contents of the smart container.
The smart container 1 may comprise one or more drawers 3.
Figure 2 shows an exploded view of a smart container 1 comprising a drawer 3. The view shown displays individual components but does not depict the functional positions of each component. The smart container comprises main housing 2 formed of two parts 2a and 2b. The main housing features curved edges to achieve a minimalistic design. The drawer 3 may be enclosed by housing parts 2a and 2b and may slidably protrude from between those parts. In this example, drawer 3 ejects horizontally from the main housing of the smart container. In other examples, the drawer may eject vertically or in any other direction from the main housing. The drawer 3 may hold contents of the smart container. In the example shown in Figure 2, the drawer 3 comprises a tray with raised sides 3a and a handle 3b. The drawer may be configured to secure the position of a device in the smart container. Smart container 1 further comprises a chassis 14. The chassis is positioned between housing parts 2a and 2b and below drawer 3. The chassis mechanically supports the drawer 3. Movement of the drawer 3 is controlled by a drawer mechanism 13. The drawer mechanism may comprise worm gear. The drawer may be controlled to allow for soft opening and closing of the drawer. The speed of the drawer opening may be controlled. The speed of the drawer opening may be set so as to offer out the contents of the smart container gently to the user. The speed of the drawer closing may be controlled.
Figure 3 shows an example of a smart container. The main housing 2 of the smart container features curved edges to achieve a min imal istic design. The smart container comprises two doors 11 and two drawers 3. Doors 11 are seamless flush fit style doors. Doors 11 also comprise curved edges and, when closed (not shown), conform seamlessly to the shape of the main housing. Each drawer is configured to hold devices, as shown in Figure 3. In this example, drawers are configured to hold mobile devices but in other examples, drawers may be configured to hold other types of electronic devices, for example tablets or game consoles. Each drawer 3 ejects horizontally from the main housing when the doors to the container are open. The smart container may comprise one or more doors and one or more drawers. The doors may further comprise gullwing, butterfly, scissor, sliding, suicide, swan, canopy, clamshell or folding doors.
The smart container may comprise shelves (not shown). The shelves may be self-supporting shelves. The smart container may comprise several sub compartments (also not shown). The sub compartments may be configured to hold devices of different sizes. The sub compartments may be configured to protect devices from damage.
The smart container may comprise a racking system 12, an example of which is shown in Figure 4. The main housing 2 of the smart container shown in Figure 4 comprises a base container 2a and a lid 2b. The racking system may be accommodated by the base container 2a. As shown in Figure 4, the racking system 12 is removable from the base container 2a. The smart container is closed by placing the lid on top of the base container enclosing the racking system 12. As shown in Figure 4, the racking system 12 may be configured to accommodate devices of different sizes. The racking system in Figure 4 comprises central vertical slots 12a for holding devices such as laptops. The racking system further comprises a handle 12b. The handle may be used to remove the racking system from the smart container. Storage units on either side of the central vertical slots comprise horizonal shelves 12c for holding smaller devices such as mobile phones. The storage units further comprise hoppers 12d to hold other devices such as remote controls and games console controllers. The racking system 12 may be configured to optimise space within the smart container. The racking system may be configured to optimise the number of devices to be held in the smart container. The racking system of Figure 4, or indeed any of the drawers, trays or other structures holding one or more devices in the housing, may be configured to allow the user access to a device held in the smart container without disturbing the position of any other devices held in the smart container. The racking system of Figure 4, or indeed any of the drawers, trays or other structures holding one or more devices in the housing, may comprise movable parts and may be adjustable. There may exist several possible configurations of the racking system of a smart container. The racking system may eject from the main housing of the smart container.
The racking system shown in Figure 4 ejects vertically from the main housing of the smart container. In other examples, the racking system may eject horizontally, either forwards, sideways or to the rear, from the main housing of the smart container. The ejection of the racking system from the main housing of the smart container may require manual effort from the user. For example, in Figure 4 the user may remove the racking system from the main housing using the handle 12b. Alternatively, the ejection of the racking system from the main housing of the smart container may be powered.
The smart container shown in Figure 1 further comprises a connection to a mains power supply 4 and a battery 5. The smart container may connect to an external power supply. The external power supply may be the mains electricity supply. The smart container may connect to a renewable energy supply. The smart container may comprise solar panels. The smart container may comprise one or more batteries. The batteries may be rechargeable. The batteries may be configured to be charged by the external power supply. The smart container may comprise an indicator for displaying the amount of charge stored in the rechargeable batteries. The indicator may comprise one or more lights. The one or more lights may change colour as the amount of charge stored in the rechargeable batteries change.
The smart container may be further configured to operate under a low power or standby mode when the container is not in active use.
The smart container may be locked or unlocked upon verification of the user. Verification of the user may be carried out by a biometric sensor, pin code, password, contactless card, smart key or by voice or face recognition. Verification of the user may further be carried out by methods utilising virtual reality and/or artificial intelligence.
Also shown in Figure 1 are display 6 and biometric sensor 7. The display may comprise a screen. The display may comprise an LED screen. The display may show a user interface. The user may interact with the user interface using one or more biometric sensors 7. The user may navigate the user interface using one or more biometric sensors. The biometric sensor may be sensitive to touch quantity. The biometric sensor may be sensitive to touch duration. The display may comprise a touch screen. The user may interact with the user interface using the touch screen. The smart container may be configured to emit sounds. The smart container may comprise one or more speakers.
The biometric sensor 7 may be configured to verify the user of the smart container. The biometric sensor may be configured to allow the user to interact with the display of the smart container. The smart container may comprise one or more batteries 5. The one or more batteries may supply energy to the biometric sensor. The one or more batteries may be configured to supply power to the biometric sensor when external power source 4 is removed.
The smart container may be configured to charge one or more devices. The smart container may comprise one or more charging ports for charging one or more devices in the smart container. The main housing of the smart container may be configured to charge one or more devices, for example by placing a device on or next to the smart container. The smart container may comprise an indicator for displaying the amount of charge stored in the one or more devices in the smart container. The indicator may comprise one or more lights. The one or more lights may change colour as the amount of charge stored in the one or more devices changes.
The smart container may be configured to determine whether one or more devices have been inserted into or removed from the smart container. The smart container may comprise one or more sensors (not shown) for detecting the presence of contents of the smart container. The one or more sensors may detect the weight of the contents. The one or more sensors may comprise image capture equipment. The one or more sensors may use image analysis to determine whether one or more devices have been inserted into or removed from the smart container.
The smart container may be connectable to a wireless communication protocol. The smart container may form part of a network. Other devices may also form part of the network. Devices in the network may include mobile phones, tablets, virtual assistants, smart speakers, smart TVs, virtual reality headsets and any other devices connectable to a wireless communication protocol. Speakers of the smart container may be configured to emit sounds originating from connected devices. Devices in the network may include other smart containers. Devices forming part of the network of the smart container such as virtual reality headsets may be used to interact with the smart container. The smart container may even comprise a computer-generated smart container simulation. Virtual reality devices such as a virtual reality headset may be used to interact with a smart container simulation.
A remote control (not shown) may be used to interact with the smart container. The remote control may comprise a biometric sensor. Verification of the user may be carried out using the remote control. The remote control may be used to interact with multiple devices in the network.
The smart container may be configured so that other devices in the network may determine the location of the smart container. The smart container may comprise a GPS tracking unit (not shown).
The smart container shown in Figure 1 is connected to a wireless communication protocol and forms part of a network also containing devices 8, 9 and 10. Devices 8 and 9 are mobile phones. Device 10 is a smart speaker.
The user of the smart container shown in Figure 1 may interact with the smart container via the biometric sensor 7. The biometric sensor 7 may be used to verify the identity of the user and provide the user with control of the smart container. The user may navigate a user interface using the biometric sensor 7 and display 6.
The smart containers shown in Figures 1-4 are free-standing containers. Alternatively (not shown), the smart container may be formed within a piece of hardware. The smart container may be integrated into a piece of hardware. The smart container may be accommodated by a cavity in the piece of hardware. The main housing of the container may comprise the cavity walls of the piece of hardware. Pieces of hardware may include a drawer or cupboard. Drawers or cupboards may for example be incorporated into a kitchen unit or table. Pieces of hardware may further include a sofa arm. Pieces of hardware may further include vehicle components for example a vehicle console, seat, boot or glove compartment.
A free-standing smart container such as those shown in Figures 1-4 may be configured to stack on top of another smart container. The smart container may be connected to another or other smart containers using one or more connections. The smart container may be configured to form a compound smart container comprising a number of smart containers.
An app may be in operation on device 9 of Figure 1 The app may be a software application and could be run on any suitable electronic device. An app may be provided for enabling a verified user to interact with the smart container. The app may enable the verified user to interact with devices in the network. The app may be installed on one or more devices in the network.
The smart container provides a simple solution to securely store or put away devices such as smartphones, tablets and games consoles. There is a provided a method for limiting use of such devices. The smart container is configured to be selectively locked and unlocked by a verified user or gatekeeper. Verification of the user may be carried out by a biometric sensor, pin code, password, contactless card, smart key, by voice or face recognition, using virtual reality, artificial intelligence or by another method. The verified user is likely to be a parent or guardian. The smart container further enables a verified user to set preferences for example time periods which are to be "device free", wherein the smart container containing devices is locked. During such periods, devices are securely stored in the smart container, so that access is not permitted by a user, likely to be a child.
The smart container may further implement a reward system, to encourage user compliance with any preferences set by the verified user(s). Rewards may include aural or visual praise generated by the smart container or any other type of reward.
Figure 5 shows a method for managing multiple devices. The method may be performed to manage a period of absolute screen-free time. The method may be performed by the smart container. Alternatively, the method may be performed by the smart container and the app installed on a device in the network. According to the method of Figure 5, at 5A a first device is inserted into the smart container. The first device and smart container are connected to a wireless communication protocol. The first device and smart container form part of a network. The network further contains a second device. The app may be installed on the second device. In the method shown in Figure 5, the second device is a smart TV, but the second device may be any device which is connectable to a wireless communication protocol. At 5B, one or more sensors in the smart container detect the insertion of the first device into the smart container. The one or more sensors may detect the weight of the first device. The one or more sensors may comprise image capture equipment. The one or more sensors may use image analysis to determine whether one or more devices have been inserted into or removed from the smart container. The sensor(s) may use near field communication, such as bluetooth, or even a wireless signal. The detection may also detect a specific device, rather than just the presence of a device. The sensor(s) may be configured to require a certain number of one or more different device types.
At 5C, the detection of the insertion of the first device prompts a signal to be sent to the second device. The signal sent to the second device contains instructions for the second device to switch off At 5D, the second device switches off.
The signal may alternatively contain instructions for the second device to perform another function, for example, to turn down the volume of the device. The method may be carried out in a network containing multiple devices. A signal may be sent to multiple devices in the network with instructions to perform specific functions.
Alternatively, in a different example, the smart container may send a signal to a second device to perform a function in the absence of a device being inserted into the smart container.
Figure 6 shows a method for managing containment of contents of a smart container. The smart container in this example is connected to a wireless communications protocol and forms part of a network with other devices, for example one or more mobile devices and smart speakers. Following the verification of a user using a biometric sensor or other method of verification, time periods during which access to the smart container is to be restricted may be scheduled by the verified user.
In step 6A of the method shown in Figure 6, the verified user inputs a start and end time of a period during which access to the smart container is to be restricted. Scheduling periods of restricted access may be performed using the display and biometric sensor on the smart container. Scheduling periods of restricted access may be performed via the app installed on a device in the network, for example a mobile phone. Scheduling periods of restricted access may be performed using a device in the network, for example a smart speaker or virtual reality headset. The time period when devices should be in the smart container may be defined in any suitable manner including the provision of a start and end time, provision of a start time and a duration from that start time, or may even by set by a time period of set duration preceding an event, for example a child's bedtime, such that the child's device must be in the smart container 1 hour before bedtime.
At 6B of the method shown in Figure 6, a verified user sets up alerts. In this example, the verified user instructs the smart container to generate alerts to remind other users that a period of restricted access is approaching. Also in this example, the verified user instructs the smart container to generate alerts to remind other users that a period of restricted access is soon to end. Other users are likely to be family members, preferably children. Setting up alerts may be performed using the display and biometric sensor on the smart container. Setting up alerts may be performed via the application installed on a device in the network. Verified users may customise other settings via the app installed on a device in the network or using the biometric sensor and display on the smart container. Verified users may set preferences for example, whether alerts are generated by the smart container or by other devices in the network, for example smart speakers or a virtual reality headset.
At 6C, the verified user uses the app installed on a device in the network, or the biometric sensor and display on the smart container, to input information about expected devices. Expected devices are those expected to be inserted into the smart container and to which access is to be restricted. In the example shown, wherein the smart container contains one or more weight sensors, at 6D, the smart container or the app use the information about expected devices to calculate an expected weight. In another example, wherein the one or more sensors in the smart container comprise image capture equipment, the smart container or app may use the information about expected devices to formulate an expected appearance of the inside of the smart container.
At 6E of the method, the smart container generates one or more alerts to notify users that the period of restricted access is approaching. The one or more alerts signal to users that expected devices should be inserted into the smart container before the start of the period. Alerts may be set up to be generated at regular intervals, for example, 10 mins, 5 mins, 2 mins and 1 min before the period of restricted access is scheduled to begin. Alerts may be generated by another device in the network, for example a smart speaker. Alerts may be generated by multiple devices in the network, for example to notify users in multiple areas. Alerts may comprise sounds. Alerts may be visually perceivable, for example on the display of the smart container or as illumination of lights on the smart container.
The smart container in this example comprises one or more sensors able to detect the insertion of one or more devices into the smart container. The one or more sensors in this example are able to detect the weight of the one or more devices inserted into the smart container. In other examples, the one or more sensors may comprise image capture equipment. The sensor(s) may use near field communication, such as bluetooth, or even a wireless signal. The detection may also detect a specific device, rather than just the presence of a device.
At 6F, if the expected weight is detected at a time within a pre-set time interval of the scheduled start time of the period of restricted access, at that time no further alerts reminding fellow users that a period of restricted access is approaching are generated. If the expected weight is detected at a time within a pre-set time interval of the scheduled start time of the period of restricted access, at that time the smart container is locked. Locking the smart container may require confirmation by a verified user.
Access to the smart container is restricted until the scheduled end time of the period of restricted access.
At 6G, near the scheduled end time of the period of restricted access, the smart container generates one or more alerts to notify users that the end of the period of restricted access is approaching Alerts may be generated by other devices in the network, for example by smart speakers. At 6H, when the end time of the period of restricted access is reached, the smart container is unlocked and access is resumed. Unlocking the smart container may require confirmation by a verified user.
The smart container may further be configured to demonstrate artificial intelligence. The smart container may be configured to analyse patterns in the scheduling of periods of restricted access by one or more verified users. Analysis of previous smart container use may be used to schedule future periods of restricted access.
Using the display and biometric sensor on the smart container, the app installed on a device in the network, or another device in the network, a verified user may input user information to the smart container about the one or more users of the smart container. Information may include age, occupation, interests and calendars of users. The smart container may be configured to schedule periods of restricted access for a single user using input user information. The smart container may be configured to schedule periods of restricted access common to all users using input user information. For example, a smart container used by a family may schedule for the whole family a period of restricted access to electronic devices in the container between 7pm and 8pm each evening. The smart container may also be configured to use other information, for example public holidays and weather forecasts to determine suitable periods of restricted access.
The smart container may further be configured to recommend activities to users. Recommendations may be based on user information such as age, interests and availability of users taken from calendars.
During a period of restricted access, a user of a device inside the smart container may need to be alerted to an incoming communication on the device. For example, in an emergency situation. Figure 7 shows an example of a method for alerting a user to an incoming communication on a mobile communication device.
At 7A of the method shown in Figure 7, the user selects a contact from a number of contacts stored in a first device. The method shown in Figure 7 relates to a single contact but the method may be carried out in relation to multiple contacts.
In the method of Figure 7, the user assigns the selected contact "emergency" status. In other examples, the user may assign various statuses to multiple contacts or groups of contacts. Statuses may be assigned to one or more contacts for a specified period of time. Statuses assigned to contacts may further include "special", "best friend" or "VIP" At 7B, the selected contact may create an authorisation code using an app installed on a second device. Alternatively, the user may assign an authorisation code to the selected contact using an app installed on the first device. Therefore, the selected contact is not required to have installed the app on a second device for the method to performed.
At 7C, the first device is inserted into a smart container. The smart container is locked and access to the first device by the user is restricted.
At 7D, the first device, locked in the smart container, receives a message from the second device of the selected contact. Upon receipt of the message, at 7E, the first device responds with an indication that for the user to be notified of the sent message, the selected contact is required to send the authorisation code. The authorisation code must be received by the first device in order that the user is notified of the message received from the selected contact.
The selected contact is hence prompted to send the authorisation code if they consider the message to be urgent. If the app is installed on the second device, it may be used to send the authorisation code. Alternatively, the authorisation code may be embedded in a message, for example the authorisation code may be a keyword.
In other examples, when the first device is inserted into the smart container, the first device sends a message to all or selected contacts. The content of the message sent to a particular contact may depend on the status assigned to that contact. For example, to a contact with the status of "special", the message may contain an indication that the user is "offline". In another example, to a contact with the "emergency" status, the message may contain an indication that for the user to be notified of a sent message, the contact is required to send an authorisation code to the first device.
At 7F, the authorisation code is received by the first device. At 7G, the authorisation code is recognised by the app installed on the first device as signalling that the received message has a high level of urgency. The app on the first device signals to the smart container that an urgent message has been received.
At 7H, the smart container generates one or more alerts to signal to the user that an urgent message has been received from a selected contact. Alerts may comprise sounds. Alerts may be visually perceivable, for example on a display of the smart container or as illumination of lights on the smart container. If the smart container involved in the method shown in Figure 7 forms part of a network with other devices, the app on the first device may signal to other devices in the network that an urgent message has been received. Alerts may then be generated by other devices in the network, for example by smart speakers.
In another example, a contact with a certain assigned status e.g. "special" may not be required to send an authorisation code for the user to be alerted to an incoming communication from the contact. The app installed on the first device may recognise that the sender of a message has been assigned a certain status. The app may signal to the smart container that a message from a contact with a certain status has been received. The smart container may then generate one or more alerts to signal to the user that a message from a contact with a certain assigned status has been received.
Figure 8 shows a method of monitoring selected content on a mobile communications device.
The method shown may be performed by the app installed on a device in the network. The method may also be performed by the smart container. The method may be performed by a combination of the app and the smart container.
At 8A, the verified user, likely to be a parent or guardian, configures the settings to be used in the method of monitoring selected content on a mobile communications device, likely to belong to a child. The verified user may configure the settings using the smart container. The verified user may configure the settings using the app installed on a device.
The verified user may select a device on which selected content will be monitored. The device is likely to be a mobile phone or similar device. In the method shown in Figure 8, the verified user selects only one device, but the method may be carried out for multiple selected devices simultaneously.
At 8A, the verified user may select one or more languages in which content on the selected device(s) will be monitored. At 8A, the verified user may select a category of content to monitor. The category may be bullying or abusive content, marketing or advertising content, or any other category of unwanted content. Also at 8A, the verified user may select one or more additional functions.
At 8B the selected device is inserted into the smart container. At 8C, incoming messages on the selected device are monitored for content in the selected category and language(s).
Monitoring of incoming messages on the selected device may be carried out by an app installed on the device. Monitoring of incoming messages on the device may be carried out by the smart container. The smart container may comprise internal image capture equipment configured to capture messages appearing on the display of the device held in the smart container. Preferably, monitoring of incoming messages on the device is carried out by the app and the smart container.
For the selected category, a library of words and phrases may be accessed. Analysis may be performed by comparing words and phrases in the library with content of the incoming messages on the selected device. Analysis may be performed with respect to whole words, part words, combinations of words and phrases. Analysis may further be performed with respect to images and other attachments such as software, markers or digital footprints. Analysis of the content of incoming messages on the selected device may be performed by the app or by the smart container. The device may further be connected to the cloud and analysis may be carried out in the cloud. Analysis of the content of incoming messages may even be carried out for content in a language other than one of the selected languages.
The method of monitoring content shown in Figure 8 may only be performed when the selected device is inserted into the smart container. In other examples, monitoring of content on a selected device may be performed continuously. In further examples, monitoring of content on a selected device may performed at selected times.
At 8D, if any content of the selected category is detected on the selected device, a notification is sent to the verified user. In the notification preferences set up at 8A, the verified user may select the type of notification to be received.
For example, the verified user may be notified by an alert generated by the smart container, by an app installed on a device, or by another device forming part of a network with the smart container, for example a smart speaker.
The notification may be high level notification, alerting the verified user that content in the selected category has been detected. The notification may be a specific notification, alerting the verified user of exactly the word or phrase detected.
If the verified user selects multiple device on which content is to be monitored and the method is performed on multiple devices simultaneously, the notification may alert the verified user that content in the selected category has been detected on one of the selected devices. Alternatively, the notification may alert the verified user that content in the selected category has been detected on a specific selected device.
If at 8A, the function is selected, at 8E a notification is sent to the source of the received message which contains the detected content. For example, a message may be sent as a reply to the received message to notify the message sender that the content of their message has been observed and recorded. The notification sent to the message sender may comprise a request or warning to desist.
Another function may be selected at 8A. If the function selected by the verified user and content in the selected category is detected, at 8F the message containing such content may be held back from being received by the user of the selected device. Delivery of the message to the user may be prevented. Delivery of the message to the user may be delayed. Delivery of the message may be rescheduled, for example to be received by the user (such as a child) at a time when the verified user (such as a parent), is present.
The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.

Claims (35)

  1. CLAIMS1 A method of alerting a user to an incoming communication on a mobile communication device, the method comprising the steps of: setting a mobile communication device capable of receiving data messages to a state in which alerts about incoming messages are not provided to a user of the device; receiving at the mobile communication device a message; determining if the message is high priority; and if the message is high priority, generating an alert to the presence of a message with higher priority.
  2. 2. A method according to claim 1, wherein a high priority message contains an authorisation code to indicate higher priority communication.
  3. 3 A method according to claim 1 or claim 2, further comprising the step of sending an authorisation code to the mobile communication device.
  4. 4 A method according to claim 2 or claim 3, wherein the authorisation code is sent together with the message.
  5. 5. A method according to claim 2 or claim 3, wherein the authorisation code is sent separate to the message.
  6. 6 A method according to any of claims 2 to 5, further comprising the step of receiving, by the message sender, an indication that the sent message requires the authorisation code for the user to be notified of delivery.
  7. 7. A method according to any of claims 2 to 6, further comprising the step of providing an authorisation code to a message sender.
  8. 8. A method according to claim 1, wherein a high priority message is a message sent by a high priority contact.
  9. 9 A method according to claim 8, wherein the message sender may be recognised as a high priority contact by reference to a suitable flag or marker associated with the contact.
  10. 10.A method according to claim 8 or claim 9, wherein the message sender may be recognised as a high priority contact by reference to a contact list of high priority contacts.
  11. 11.A method according to any of claims 1 to 10, wherein the setting step includes placing the mobile communication device in a smart container.
  12. 12.A method according to any of claims 1 to 11, further comprising the step of sending an alert to a second device.
  13. 13.A system for carrying out method of any of claims 1 to 12 comprising a smart container having a messaging device for sending and receiving messages.
  14. 14.A system according to claim 13, further comprising a sensor for detecting the presence of a mobile communication device in the housing.
  15. 15.A system according to claim 14, wherein the sensor is a weight sensor.
  16. 16.A system according to claim 14 or claim 15, wherein the setting of the mobile communication device to the no alert state is triggered by the detection of the mobile communication device by the sensor.
  17. 17.A method of monitoring selected content on a mobile communications device, the method comprising the steps of: placing the mobile communications device in a smart container; forming a data connection between the system and the mobile communications device; carrying out analysis of the content of one or more messaging libraries on the mobile communications device; and reporting the results to an authorised person.
  18. 18.A method according to claim 17, wherein the analysis includes scanning for one or more key words or phrases.
  19. 19.A method according to claim 17 or claim 18, wherein the analysis identifies bullying or threatening words or messages.
  20. 20.A method according to any of claims 17 to 19, wherein the analysis identifies potential unsolicited messages.
  21. 21.A method according to any of claims 17 to 20, wherein the analysis is carried out by software stored in the smart container.
  22. 22.A method according to any of claims 17 to 21, wherein the analysis is carried out in a separate device which connects to the smart container or the monitored device by a wireless communication protocol.
  23. 23.A method according to any of claims 17 to 22, wherein the analysis is carried out only when the device to be monitored is in the smart container.
  24. 24.A method according to any of claims 18 to 23, further comprising the step of, after detecting a message containing one or more unwanted key words or phrases, sending a reply to the sender of the message.
  25. 25.A method according to any of claims 18 to 24, further comprising the step of, after detecting a message containing one or more unwanted key words or phrases, preventing the message from being seen by a user of the device.
  26. 26.A system for carrying out the method of any of claims 17 to 25, comprising computer readable code for analysing the content of one or more messaging libraries on the mobile communications device, the code being stored on either on the smart container, in a communications device of an authorised person, or in the cloud.
  27. 27.A method for managing multiple devices, the method comprising the steps of: inserting a first entertainment device into a smart container, the smart container being configured to detect the insertion of the first device; and in response to detecting the first device, transmitting a message to a second device to switch off.
  28. 28.A method according to claim 27, wherein the smart container comprises one or more sensors for detecting the presence of the first device.
  29. 29.A method according to claim 28, wherein the one or more sensors detect the weight of the first device.
  30. 30.A method for managing containment of contents of a smart container, the method being carried out by the smart container and comprising the steps of: receiving an input from a user of a time from which access by the user to the contents of the container will be prevented and a duration for which access will be prevented; generating one or more alerts that the input time is approaching; stopping alerts when one or more devices have been inserted into and detected by the container; after insertion of the one or more devices, preventing access by the user to the contents of the smart container for the duration; at the end of the duration, allowing user access to the contents of the smart container.
  31. 31. The method of claim 30, further comprising the step of generating one or more alerts that the end of the duration is approaching.
  32. 32.A method for managing containment of contents of a smart container, the method being carried out by the smart container and comprising the steps of: receiving an input from a user of a time from which access by the user to the contents of the container will be enabled and a duration for which access will be enabled; generating one or more alerts that the end of the duration is approaching; stopping alerts when one or more devices have been inserted into and detected by the container; after insertion of the one or more devices, preventing access by the user to the contents of the smart container until the input time; at the start of the duration, allowing user access to the contents of the smart container.
  33. 33. The method of claim 32, further comprising the step of generating one or more alerts that the start of the duration is approaching
  34. 34. The method of claims 30 to 33, wherein the input time and duration are received by an external device.
  35. 35. The method of claims 30 to 34, wherein the alerts are generated by the external device.
GB1901630.2A 2019-02-06 2019-02-06 Smart container Withdrawn GB2581170A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB1901630.2A GB2581170A (en) 2019-02-06 2019-02-06 Smart container
PCT/GB2020/050275 WO2020161497A1 (en) 2019-02-06 2020-02-06 Smart container

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1901630.2A GB2581170A (en) 2019-02-06 2019-02-06 Smart container

Publications (2)

Publication Number Publication Date
GB201901630D0 GB201901630D0 (en) 2019-03-27
GB2581170A true GB2581170A (en) 2020-08-12

Family

ID=65997092

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1901630.2A Withdrawn GB2581170A (en) 2019-02-06 2019-02-06 Smart container

Country Status (2)

Country Link
GB (1) GB2581170A (en)
WO (1) WO2020161497A1 (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087649A1 (en) * 2000-03-16 2002-07-04 Horvitz Eric J. Bounded-deferral policies for reducing the disruptiveness of notifications
US6535586B1 (en) * 1998-12-30 2003-03-18 At&T Corp. System for the remote notification and retrieval of electronically stored messages
US6571275B1 (en) * 1999-04-27 2003-05-27 International Business Machines Corporation Method and apparatus for filtering messages in a data processing system
EP1326189A2 (en) * 2001-12-12 2003-07-09 Microsoft Corporation Controls and displays for acquiring preferences, inspecting behaviour, and guiding the learning and decision policies of an adaptive communications prioritization and routing systems
US6745230B1 (en) * 1999-11-16 2004-06-01 Lucent Technologies Inc. Electronic mail priority alert service
US20090089417A1 (en) * 2007-09-28 2009-04-02 David Lee Giffin Dialogue analyzer configured to identify predatory behavior
US20100099444A1 (en) * 2008-10-16 2010-04-22 Peter Coulter Alert feature for text messages
US20110047265A1 (en) * 2009-08-23 2011-02-24 Parental Options Computer Implemented Method for Identifying Risk Levels for Minors
US20130256256A1 (en) * 2012-03-30 2013-10-03 Warehouse Innovations, Inc Time lockable container and system
US20140129041A1 (en) * 2012-11-02 2014-05-08 Sony Europe Limited System and method for controlling at least one device
US20140274215A1 (en) * 2013-03-13 2014-09-18 Incipio Technologies, Inc. Mobile device cover with display module
CN105100423A (en) * 2015-06-06 2015-11-25 深圳市美贝壳科技有限公司 Method for automatic volume regulation of set-top box during mobile phone call
US20160164731A1 (en) * 2014-12-04 2016-06-09 Comcast Cable Communications, Llc Configuration Responsive to a Device
US20170323503A1 (en) * 2016-05-09 2017-11-09 Jorge E. Garcia Secure Phone Storage with Selective Transmission Functionality
US20170359460A1 (en) * 2016-06-14 2017-12-14 Jonathan Wayne Jackson Text Prevention Device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9104371B2 (en) * 2012-12-07 2015-08-11 Apple Inc. Integrated visual notification system in an accessory device
US9389641B2 (en) * 2013-05-10 2016-07-12 Blackberry Limited Carrying case with peek functionality
US20160179294A1 (en) * 2013-09-12 2016-06-23 Hewlett-Packard Development Company, L.P. Notification display
EP3539285A4 (en) * 2016-11-08 2020-09-02 Pogotec, Inc. A smart case for electronic wearable device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6535586B1 (en) * 1998-12-30 2003-03-18 At&T Corp. System for the remote notification and retrieval of electronically stored messages
US6571275B1 (en) * 1999-04-27 2003-05-27 International Business Machines Corporation Method and apparatus for filtering messages in a data processing system
US6745230B1 (en) * 1999-11-16 2004-06-01 Lucent Technologies Inc. Electronic mail priority alert service
US20020087649A1 (en) * 2000-03-16 2002-07-04 Horvitz Eric J. Bounded-deferral policies for reducing the disruptiveness of notifications
EP1326189A2 (en) * 2001-12-12 2003-07-09 Microsoft Corporation Controls and displays for acquiring preferences, inspecting behaviour, and guiding the learning and decision policies of an adaptive communications prioritization and routing systems
US20090089417A1 (en) * 2007-09-28 2009-04-02 David Lee Giffin Dialogue analyzer configured to identify predatory behavior
US20100099444A1 (en) * 2008-10-16 2010-04-22 Peter Coulter Alert feature for text messages
US20110047265A1 (en) * 2009-08-23 2011-02-24 Parental Options Computer Implemented Method for Identifying Risk Levels for Minors
US20130256256A1 (en) * 2012-03-30 2013-10-03 Warehouse Innovations, Inc Time lockable container and system
US20140129041A1 (en) * 2012-11-02 2014-05-08 Sony Europe Limited System and method for controlling at least one device
US20140274215A1 (en) * 2013-03-13 2014-09-18 Incipio Technologies, Inc. Mobile device cover with display module
US20160164731A1 (en) * 2014-12-04 2016-06-09 Comcast Cable Communications, Llc Configuration Responsive to a Device
CN105100423A (en) * 2015-06-06 2015-11-25 深圳市美贝壳科技有限公司 Method for automatic volume regulation of set-top box during mobile phone call
US20170323503A1 (en) * 2016-05-09 2017-11-09 Jorge E. Garcia Secure Phone Storage with Selective Transmission Functionality
US20170359460A1 (en) * 2016-06-14 2017-12-14 Jonathan Wayne Jackson Text Prevention Device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Andrew O'Hara, AppleInsider.com, "The best of ShowStoppers at CES 2019", published January 2019, available at: https://appleinsider.com/articles/19/01/10/the-best-of-showstoppers-at-ces-2019 [accessed 25 June 2020] *
TechDen, Kickstarter.com, published 2018, available at: https://www.kickstarter.com/projects/819032045/techdentm-helping-your-kids-develop-healthier-scre [accessed 25 June 2020] *

Also Published As

Publication number Publication date
WO2020161497A1 (en) 2020-08-13
GB201901630D0 (en) 2019-03-27

Similar Documents

Publication Publication Date Title
Ghorayeb et al. Older adults' perspectives of smart home technology: Are we developing the technology that older people want?
US11281971B2 (en) Devices, systems, and methods that observe and classify real-world activity relating to an observed object, and track and disseminate state relating the observed object
Cha et al. Hello there! is now a good time to talk? Opportune moments for proactive interactions with smart speakers
Cartmill et al. Orangutans modify their gestural signaling according to their audience's comprehension
CN105359128B (en) A kind of method and system for delivery notification
US8006182B2 (en) Method and computer program product for implementing automatic avatar status indicators
WO2017218425A2 (en) Healthcare management services
Mokhtari et al. New trends to support independence in persons with mild dementia–a mini-review
CN110313153A (en) Intelligent digital assistance system
US10721349B2 (en) Smart phone platform for kids
CN109345799A (en) Intelligent household's hazard detector of context special characteristic and/or early warning configuration is provided
WO2010033450A2 (en) Remotely configurable assisted-living notification system with gradient proximity sensitivity
CN106415509A (en) Hub-to-hub peripheral discovery
Sun et al. Child safety in the smart home: parents' perceptions, needs, and mitigation strategies
Kukka et al. Utilizing audio cues to raise awareness and entice interaction on public displays
GB2581170A (en) Smart container
JP2023502468A (en) A platform for hygiene behavior monitoring and modification
Chidozie INCLUSIVE DESIGN BY CONSIDERING DIFFERENT DIMENSIONS OF PRIVACY IN THE DESIGN OF SMART HOME SYSTEMS FOR OLDER ADULT CARE.
US20230360507A1 (en) In-home event intercom and notifications
US20210201608A1 (en) System for deterrence of unhealthy behavior
Böhm Privacy Framework for Social Robots in the Context of User-centered Design
McNaull et al. A Context and Situational aware Multi-Agent system for Ambient Assisted Living assistance and support
KR20210033667A (en) A portable terminal for providing asymmetric dialogue interfaces
Choi Design Approach to Support Prospective Memory for Independent Living among Aging People
KR20210033650A (en) A portable terminal for providing asymmetric dialogue interfaces

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)