Cognitive intelligence carrying case
First Claim
1. A carrying case comprising:
- an outer shell layer;
a plurality of internal layers within said outer shell layer and each defining a corresponding compartment contained within the outer shell for receiving and storing a plurality of different types of items within said compartments;
at least one security system disposed in each of said outer shell layer and said each of the plural internal layers, each of said at least one security systems in said plural internal layers being adapted to destroy a specific one of the different types of items that is storable in the corresponding compartment, and wherein said at least one security system in said outer shell layer is operable to detect attempts to open and thereby access the case and to authenticate a user'"'"'s authority to access the case;
a plurality of communication systems disposed in at least one of said plural internal layers, said communication systems being adapted to communicate with an authority having rights of determination over the carrying case; and
processing means connected to each of said security and communication systems for controlling said systems and thereby controlling access to the case.
1 Assignment
0 Petitions
Accused Products
Abstract
A cognitive intelligent carrying case includes an outer shell layer and a plurality of internal layers defining corresponding interior compartments for storing a variety of specific types of items. The outer shell layer includes access type security systems for authenticating the identity of an individual attempting to access the contents of the case. Each of the internal layers includes one or more security systems operable to destroy the specific items contained in the corresponding compartment. In addition, the case includes communication systems that enable communication with authorized users and/or an owner of the case and which enable the locating of the case when such location information is required. When unauthorized access attempts to the case are detected, the location of the case is determined through an onboard GPS system and the owner of the case is contacted. In the event that the owner cannot be contacted or is contacted and provides the requisite instructions, the security systems are activated to destroy the stored contents of the case.
-
Citations
13 Claims
-
1. A carrying case comprising:
-
an outer shell layer;
a plurality of internal layers within said outer shell layer and each defining a corresponding compartment contained within the outer shell for receiving and storing a plurality of different types of items within said compartments;
at least one security system disposed in each of said outer shell layer and said each of the plural internal layers, each of said at least one security systems in said plural internal layers being adapted to destroy a specific one of the different types of items that is storable in the corresponding compartment, and wherein said at least one security system in said outer shell layer is operable to detect attempts to open and thereby access the case and to authenticate a user'"'"'s authority to access the case;
a plurality of communication systems disposed in at least one of said plural internal layers, said communication systems being adapted to communicate with an authority having rights of determination over the carrying case; and
processing means connected to each of said security and communication systems for controlling said systems and thereby controlling access to the case. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for implementing security functions of a security carrying case comprising the steps of:
-
registering an authorized user for the security carrying case by requiring the authorized user to input at least one of a plurality of pieces of identification;
detecting an attempt to access the security carrying case by an individual;
determining whether the individual attempting to access the case is an authorized user by requiring an identification input from the individual;
determining a current location of the security carrying case during an attempted access to the case using an on-board geographic positioning system;
monitoring the environment surrounding the determined location using the security carrying case during an attempted access to the case to determine whether the surrounding environment is safe to grant access to an authorized user;
granting access to the security carrying case when the user attempting to access is determined to be an authorized user and the monitored environment is determined to be safe; and
initiating operation of security systems and access-preventing procedures of the security carrying case when at least one of a predetermined unauthorized access attempt is made and the monitored environment is determined to be unsafe.
-
Specification