Secure smart container assembly, systems, and methods

ABSTRACT

A bin assembly, bin identification system and method are disclosed. A container bin assembly includes a bin body, a latching mechanism, and controller. A method includes receiving, via a communication interface, an authenticated request to access the smart container, actuating an electromechanical latch to disengage a fastening hook, thereby initiating a mechanical movement of an access component to make an internal compartment accessible, outputting, via an audiovisual element, an alert to identify the container, confirming that the electromechanical latch has re-engaged with the fastening hook, thereby securing the internal compartment, determining a change in a local inventory, and updating the local inventory in a non-volatile data store according to the change.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/914,190, entitled “SECURE SMART CONTAINER ASSEMBLY, SYSTEMS, ANDMETHODS,” filed on Jun. 26, 2020, which claims the benefit of priorityas a nonprovisional of U.S. Application Ser. No. 62/867,841, entitled“SECURE AND EFFICIENTLY DEPLOYABLE MEDICATION DISPENSING,” filed on Jun.27, 2019, and claims the benefit of priority as a nonprovisional of U.S.Application Ser. No. 62/953,091, entitled “SMART CONTAINER,” filed onDec. 23, 2019, and claims the benefit of priority as a nonprovisional ofU.S. Application Ser. No. 62/986,508, entitled “SECURE BIN ARRAYASSEMBLY,” filed on Mar. 6, 2020, the entirety of each of which isincorporated herein by reference.

TECHNICAL FIELD

The present disclosure generally relates to access control devices, andmore specifically to methods and systems for secure medication storage.

BACKGROUND

To organize and dispense items in both acute and non-acute medicalsettings, the items are often stored in dispensing mechanisms or variousbins. While bins may be readily procured and desirable in manysituations, they lack smart functionality and management features. Thisposes several drawbacks of heightened concern for care facilities, suchas doctor's offices, pharmacy clinics, outpatient clinics, institutionalinfirmaries (e.g., school nurse offices), hospitals, retail clinics,ambulatory clinics, or the like.

For example, without smart functionality and management features,inventory management must be carried out manually, which is prone tohuman error. It may also be difficult to maintain efficient levels ofmedications and other medical inventory, which results in proceduraldelays from understock and waste or spoilage from overstock. Further, itcan be difficult to identify the location of a particular item or binfor restocking or dispensing, especially in a large care setting withmany different items to track. Yet further, it may be difficult tosafely transport sensitive items and verify whether a bin is intact,posing a security issue for controlled medications, high valuemedications, and other items susceptible to diversion. Accordingly,there is a need for improved systems and methods of item storage,particularly for medicine and other healthcare items used in carefacilities.

SUMMARY

According to various aspects of the subject technology, a method forproviding efficient space utilization, secure transport and storage,inventory management, tamper resistance, and other smart functionalityfor containers is provided. The method may include providing a smartcontainer attachable to a stationary mounting frame. The method may alsoinclude receiving, via a communication interface, an authenticatedrequest to access the smart container. The method may also includeactuating an electromechanical latch to disengage a fastening hook,thereby initiating a mechanical movement of an access component to makean internal compartment accessible. The method may also includeoutputting, via an audiovisual element, an alert to identify thecontainer. The method may also include confirming that theelectromechanical latch has re-engaged with the fastening hook, therebysecuring the internal compartment. The method may also includedetermining a change in a local inventory. The method may also includeupdating the local inventory in a non-volatile data store according tothe change. Other aspects include corresponding systems, apparatuses,and computer program products for implementation of thecomputer-implemented method.

Bin assemblies are also described herein. According to various aspectsof the subject technology, a bin assembly includes a bin housing adaptedto receive bins of varying sizes and including a vertical mountingstructure, a bin body, a latching mechanism, and a controller. The binbody defines a bin volume, wherein the bin body is movable relative tothe bin housing to permit access to the bin volume in an open positionand to prevent access to the bin volume in a closed position. Thelatching mechanism includes a latching member wherein the latchingmember engages the latching hook in a locked position to retain the binbody in the closed position and the latching member is spaced apart fromthe latching hook in a released position. The controller is configuredto control movement of the latching member based at least in part on thewireless control signal.

According to various aspects of the subject technology, a bin assemblycomprises a bin housing adapted to receive bins of varying sizes, thebin housing including a vertical mounting structure; a bin bodycomprising a latching hook and the bin body defining a bin volume,wherein the bin body is movable relative to the bin housing to permitaccess to the bin volume in an open position and to prevent access tothe bin volume in a closed position; a latching mechanism coupled to thebin housing, the latching mechanism comprising a latching member,wherein the latching member engages the latching hook in a lockedposition to retain the bin body in the closed position and the latchingmember is spaced apart from the latching hook in a released position;and a controller configured to: receive a wireless control signal; andcontrol movement of the latching member based at least in part on thewireless control signal.

Additionally or in the alternative, a bin array assembly, comprises: aplurality of bin assemblies, wherein each bin assembly of the pluralityof bin assemblies comprises: a bin housing adapted to receive bins ofvarying sizes, the bin housing including a vertical mounting structure;and a bin body comprising a latching hook and the bin body defining abin volume, wherein the bin body is movable relative to the bin housingto permit access to the bin volume in an open position and to preventaccess to the bin volume in a closed position, wherein each of the binassemblies of the plurality of bin assemblies is disposed horizontallyadjacent or vertically adjacent to a neighboring bin assembly of theplurality of bin assemblies; a latching mechanism configured to engagethe latching hook of a respective bin assembly of the plurality of binassemblies in a locked position to retain the bin body of the respectivebin assembly of the plurality of bin assemblies in the closed positionand to disengage the latching hook of the respective bin assembly of theplurality of bin assemblies in a released position; and a controllerconfigured to: receive a wireless control signal; and control movementof the latching member based at least in part on the wireless controlsignal.

According to various aspects of the subject technology, a methodcomprises: providing a bin assembly comprising a bin housing and a binbody movable relative to the bin housing, wherein the bin housing isadapted to receive bins of varying sizes; receiving a wireless controlsignal; latching the bin body to the bin housing in a locked position toretain the bin body in a closed position via a latching mechanism basedat least in part on the wireless control signal; unlatching the bin bodyfrom the bin housing in a released position via the latching mechanismbased at least in part on the wireless control signal; moving the binbody relative to the bin housing to an open position; and providingaccess to a bin volume defined within the bin body. Other aspectsinclude corresponding systems, apparatuses, and computer programproducts for implementation of the method.

Further aspects of the subject technology, features, and advantages, aswell as the structure and operation of various aspects of the subjecttechnology are described in detail below with reference to accompanyingdrawings.

DESCRIPTION OF THE FIGURES

Various objects, features, and advantages of the present disclosure canbe more fully appreciated with reference to the following detaileddescription when considered in connection with the following drawings,in which like reference numerals identify like elements. The followingdrawings are for the purpose of illustration only and are not intendedto be limiting of this disclosure, the scope of which is set forth inthe claims that follow.

FIG. 1A depicts an example system including a smart container to provideefficient space utilization, secure transport and storage, inventorymanagement, tamper resistance, and other smart functionality, accordingto various aspects of the subject technology.

FIG. 1B depicts a perspective view of an example smart container with ahinged lid that is attachable to a stationary mounting frame, accordingto various aspects of the subject technology.

FIG. 1C depicts perspective views of example smart containers attachedto other containers to form stacks or arrays, according to variousaspects of the subject technology.

FIG. 1D depicts perspective and cut-away views of an example hinged lidwith a spring loaded retractable fastening hook, according to variousaspects of the subject technology.

FIG. 1E depicts side views of example smart containers using retractableand non-retractable fastening hooks, according to various aspects of thesubject technology.

FIG. 1F depicts a cross sectional view of an example smart container,according to various aspects of the subject technology.

FIG. 1G depicts a perspective view of an example smart container with asliding drawer, according to various aspects of the subject technology.

FIG. 1H depicts a cut away view of the smart container from FIG. 1G,according to various aspects of the subject technology.

FIG. 1I depicts a perspective view of the smart container from FIG. 1Gwith a sliding drawer at a maximum extension, according to variousaspects of the subject technology.

FIG. 2A depicts an example system including smart containers in anexample network to provide efficient space utilization, secure transportand storage, inventory management, tamper resistance, and other smartfunctionality, according to various aspects of the subject technology.

FIG. 2B depicts an example network topology diagram of the smartcontainers from FIG. 2A, according to various aspects of the subjecttechnology.

FIG. 3 depicts various example user interfaces of a smart container,according to various aspects of the subject technology.

FIG. 4 depicts an example process for using a smart container to provideefficient space utilization, secure transport and storage, inventorymanagement, tamper resistance, and other smart functionality, accordingto various aspects of the subject technology.

FIG. 5 is a conceptual diagram illustrating an example electronic systemfor providing a smart container for efficient space utilization, securetransport and storage, inventory management, tamper resistance, andother smart functionality, according to various aspects of the subjecttechnology.

FIG. 6 is a perspective view of a medication management system, inaccordance with various aspects of the present disclosure.

FIG. 7A is a perspective view of a bin array assembly for use with themedication management system of FIG. 6, in accordance with variousaspects of the present disclosure.

FIG. 7B is a perspective view of a bin array assembly of FIG. 7A with abin in an open position, in accordance with various aspects of thepresent disclosure.

FIG. 8 is a perspective view of a bin for use with the bin arrayassembly of FIG. 7A, in accordance with various aspects of the presentdisclosure.

FIG. 9 is a reverse perspective view of the bin of FIG. 8, in accordancewith various aspects of the present disclosure.

FIG. 10A is a cross-sectional elevation view of the bin of FIG. 8 in aclosed position, in accordance with various aspects of the presentdisclosure.

FIG. 10B is a cross-sectional elevation view of the bin of FIG. 8 in anopen position, in accordance with various aspects of the presentdisclosure.

FIG. 11 is a cross-sectional perspective view of a bin for use with thebin array assembly of FIG. 7A, in accordance with various aspects of thepresent disclosure.

FIG. 12A is a reverse perspective view of a bin for use with the binarray assembly of FIG. 7A, in accordance with various aspects of thepresent disclosure.

FIG. 12B is a reverse perspective view of a bin array assembly for usewith the medication management system of FIG. 1, in accordance withvarious aspects of the present disclosure.

FIG. 13 is a reverse perspective view of a bin array assembly for usewith the medication management system of FIG. 6, in accordance withvarious aspects of the present disclosure.

FIG. 14A is a perspective view of a bin for use with the bin arrayassembly of FIG. 7A in a closed position, in accordance with variousaspects of the present disclosure.

FIG. 14B is a perspective view of the bin of FIG. 14A with the bin in apartially open position, in accordance with various aspects of thepresent disclosure.

FIG. 14C is a perspective view of the bin of FIG. 14A with the bin in anopen position, in accordance with various aspects of the presentdisclosure.

FIG. 15A is a perspective view of a bin for use with the bin arrayassembly of FIG. 7A in a closed position, in accordance with variousaspects of the present disclosure.

FIG. 15B is a perspective view of a bin for use with the bin arrayassembly of FIG. 7A in a closed position, in accordance with variousaspects of the present disclosure.

FIG. 16A is a perspective view of a mounting frame for use with the binarray assembly of FIG. 7A, in accordance with various aspects of thepresent disclosure.

FIG. 16B is a perspective view of a mounting frame for use with the binarray assembly of FIG. 7A, in accordance with various aspects of thepresent disclosure

FIGS. 17A, 17B, and 17C depict various implementations of a smart system100, including a interactive storage device 130 and/or a smart lock,according to some aspects of the subject technology.

FIG. 18 depicts the disclosed interactive storage devices arranged in amulti-level network hierarchy, according to various aspects of thesubject technology.

FIGS. 19A, 19B, and 19C depict a remote smart lock reader moduleconfigured to unlock a securable container, including to cabinet doorsand/or cabinet drawers for controlled security, according to variousaspects of the subject technology.

FIGS. 20A, 20B, and 20C depict an electromechanical latch mounted to aninterior surface of the door or drawer using a bracket 1602, accordingto various aspects of the subject technology.

FIGS. 21A and 21B depict a cut-away view of an example IOT(Internet-of-things) smartlock reader module (SRM), according to variousaspects of the subject technology.

FIG. 22 depicts an example IOT SRM mounted on the exterior surface of arefrigerator, according to various aspects of the subject technology.

FIG. 23 depicts an example smart bin system for dispensing items,according to various aspects of the subject technology.

DESCRIPTION

While aspects of the subject technology are described herein withreference to illustrative examples for particular applications, itshould be understood that the subject technology is not limited to thoseparticular applications. Those skilled in the art with access to theteachings provided herein will recognize additional modifications,applications, and aspects within the scope thereof and additional fieldsin which the subject technology would be of significant utility.

Storage, transport, and dispensing of medicine and other healthcareitems demand robust inventory management to prevent medicine spoilage,reduce overhead, and minimize costly diversion, theft, and other losses.Various systems may exist to address individual aspects of thesedemands. However, combining various disparate systems to address themultiple requirements of medicine transportation may be costly,unwieldy, and difficult or impossible to implement in practice.

The subject technology provides efficient space utilization, securetransport and storage, inventory management, tamper resistance, andother smart functionality via a smart container to address the numerousrequirements of medicine and healthcare item dispensing in carefacilities. A smart container, as described herein, can be provided withvarious different access components that can be secured using anelectromechanical latch, such a hinged swing out lid or a sliding popout drawer. Upon user authentication, the latch may be actuated toprovide access to items for dispensing. Smart containers may attach toother containers to form stacks or arrays for efficient organization andspace utilization. Further, smart containers can be used in both mobileand stationary contexts, enabling secure transport and storage of items.For example, smart containers may be attachable to and removable fromstationary mounting frames, which may be positioned on countertops, onwalls, within cabinets, within refrigerators, or within other locations.Tamper resistant features such as deformable materials, tamper sensors,and breakaway hooks may be provided to leave evidence for verifyingcontainer integrity and deterring theft and diversion.

A user may utilize a remote device such as a tablet, smartphone, desktopor laptop computer to request access to a particular smart container. Insome implementations, the user may provide a credential such as a smartcard or another device. When the request is authenticated, the smartcontainer may identify itself to the user, for example by flashing alight emitting diode (LED) sounding a buzzer, opening spring-loaded lid,or releasing a spring-loaded drawer, or some combination thereof orequivalents thereof. The smart container may proceed to actuate anelectromechanical latch that causes an access component to provideaccess to an internal compartment containing items for dispensing.Access may be provided based on certain criteria, such as the locationof the user (e.g., distance, proximity, etc.) with respect to the smartcontainer and the access permissions granted to the user (e.g., withregard to the contents of the smart container). According to variousimplementations, when access is provided, a hinged lid may swing out toreveal an internal compartment, or a drawer may slide out. Sensors orinterfaces may be provided to enable automatic inventory management.Smart containers may communicate with each other to propagate inventorystatus, container location, environmental and activity event logs, andother sensor data, which can be used for inventory tracking, machinelearning analytics, and proactive loss prevention.

Smart functionality generally refers to processing capabilities and, forthe smart container, environment monitoring and access controlprocessing capabilities. A smart device can have on-board memory orother storage capacity that can be written to and read from. The memorycan contain one or more applications for implementing a particularfunction. The particular smart device may also contain an operatingsystem and/or user interface. Some smart functionality may includewireless communications. For example, a smart device may include atransceiver for communicating through an electric field and/or magneticfield between the device and another entity such as a wireless terminalor information reader, or another smart container.

The smart container may include various interfaces and devices tosupport various smart functionality such as environmental sensing,tamper detection, infrastructure and mesh networking, near-fieldcommunications, positional tracking, and user interfaces withaudiovisual elements for inventory management, alerts, and userguidance. In this manner, the smart container can interface andsynchronize with a centralized back-end server to support inventorytracking, item condition tracking, and data collection for machinelearning, as described in further detail in conjunction with FIGS. 2Aand 2B below.

FIG. 1A depicts an example system 100 including interactive storagedevice 130 to provide efficient space utilization, secure transport andstorage, inventory management, tamper resistance, and other smartfunctionality, according to various aspects of the subject technology.Interactive storage device 130 includes latch 126, access component 131,data bus 132, processor 134, memory 136, communication interface 140,sensors 150, button interface 160, LED interface 162, display interface164, actuator interface 166, actuator 167, identity access management(IAM) interface 168, audio interface 170, power source 180, powerharvester 182, and secure crypto-processor 184. According to variousimplementations, interactive storage device 130 may include or beimplemented as an electronically securable container that includes or isassociated with an access controller for operating an electronicallysecurable container. For example, the access controller may be attachedto the container (e.g., on the front of the container, adjacent a lid131.) In this regard, access controller and the container may bereferred to together as a single interactive storage device 130.According to various aspects, the access controller may be referred toseparately, for example, as a smart bin controller or smart totecontroller or smart card reader.

In some implementations, latch 126, hook 133, and access component 131(or lid) may be included in a container portion 210, while buttons 161,LED interface 162, and display 165 may be implemented in the smartcontroller portion. Latch 126 includes lock state 128. Access component131 includes hook 133. Memory 136 includes non-volatile data store 137.Sensors 150 include load sensor 151, temperature and humidity sensor152, shock and vibration sensor 154, tamper sensor 156, and locationsensor 158. Audio interface 170 includes microphone 172 and speaker 174.Interactive storage device 130 is attachable to and detachable frommounting frame 120. The components included in interactive storagedevice 130 are exemplary and other implementations may include adifferent configuration of components according to use caserequirements, power consumption targets, care facility setting, andprice point constraints.

Interactive storage device 130 may include processor 134, which maycorrespond to any type of general or specialized processor, controller,integrated circuit, application specific integrated circuit (ASIC),field programmable gate array (FPGA), system-on-chip, or similar device,and may include hardcoded circuit elements, firmware, software, or anycombination thereof to implement one or more of the specific smartcontainering features describe herein. Processor 134 may communicatewith other components of interactive storage device 130 via data bus132, which may comprise one or more communication buses, such asparallel or serial buses.

Interactive storage device 130 may include memory 136, which may includevolatile work memory as well as non-volatile data store 137 for longterm data storage. For example, non-volatile data store 137 may compriseflash memory or other memory that retains data after power source 180 isunavailable. Non-volatile data store 137 may include several data logsthat record, for example, user authentication events, periodic sensordata, and local inventory of interactive storage device 130.

Communication interface 140 may include one or more wireless radios tocommunicate with other devices and/or other smart containers. Forexample, communication interface 140 may include one or more radios,scanners, or other devices that are compliant with Bluetooth, BluetoothLow Energy, Near Field Communication (NFC), Wi-Fi, contactlessSmartcards, Radio-Frequency identification, 1-D and 2-D barcodes, andother protocols.

Sensors 150 may include one or more sensors to record, for example,environmental conditions and evidence related to attempts to divert ortamper with the contents of interactive storage device 130. For example,load sensor 151 may comprise a load cell that can measure the mass ofitems contained in interactive storage device 130, which can be used toestimate changes in item quantities. Temperature and humidity sensor 152may record inside and/or outside ambient temperature and humidity. Shockand vibration sensor 154 may help to determine whether an attempt todivert has occurred, or whether the contents of interactive storagedevice 130 were damaged during transport and handling. For example,measurements from the shock and vibration sensor 154 may be monitored inreal time or periodically audited for shock or vibration measurementsthat correspond to a detection threshold. If a measurement or series ofmeasurements correspond to the threshold, the interactive storage device130 (or other monitoring device in communication therewith) may adjustthe interactive storage device 130 or other element in the environment.

Tamper sensor 156 may determine whether case intrusion has occurred, forexample if retaining screws, containers, covers, or other components ofinteractive storage device 130 have been opened, unsealed, drilled,deformed, or otherwise tampered. For example, mechanical switches,anti-tamper films, photodiodes with reflective materials, infraredproximity sensors, and other devices may be used. Location sensor 158may include, for example, a global positioning system (GPS) radio toenable location history tracking. Alternatively or additionally, in someimplementations, triangulation may be used to determine location, forexample by using Wi-Fi or Bluetooth triangulation using known networksand/or hubs and/or beacons. In combination with secure crypto-processor184, sensors 150 may securely record real-time sensor data to complywith National Institutes of Standards and Technology (NIST)requirements. Sensors 150 may include other sensors not shown, such as alight sensor to monitor the status of items sensitive to light exposure.

Location information generated by the location sensor 158 may bemonitored in real time or periodically audited to identify deviationsfrom expected location or route for the interactive storage device 130.If a measurement or series of measurements differ from the expectedlocation(s), the interactive storage device 130 (or other monitoringdevice in communication therewith) may adjust the interactive storagedevice 130 or other element in the environment. Adjustments may includeadjusting a power state of the controller or lock 126, transmitting acontrol message to the actuator interface 166 to adjust the lock state128, activating an interface of the controller to provide a perceivableindicator of the detected state, or the like.

In some implementations, one or more of the sensors 150 may be used toidentify when a user is near interactive storage device 130. Forexample, an infrared proximity sensor may be directed away from thecontainer to detect an area in front of interactive storage device 130.When a user is detected within the area, interactive storage device 130may adjust one or more functions such as entering a different powermode, activating wireless communications or a display, or enabling oneor more of the button interfaces. In this way, interactive storagedevice 130 can preserve resources such as battery, memory, or networkbandwidth. The detection may be based on a duration of time. Byincluding time, the device may avoid waking or adjusting state for aclinician simply passing by who may only be within the area for a shortperiod of time. Presence in the area for a duration of time longer thanthe threshold may indicate intent to interact with interactive storagedevice 130. In such instances, the presence within the area for at leastthe threshold period of time may cause the activation, power modechange, activation of a communication interface (e.g., wirelesstransceiver, Bluetooth radio), or other adjustment of interactivestorage device 130. Further, in some implementations, proximity of anauthorized user may automatically trigger a request to unlock and open asmart container.

Button interface 160 may enable user input and selections on a userinterface. For example, display interface 164 may show a user interfacedirecting the user to push specific buttons to update inventory, forexample. In some implementations, the buttons may be labelled with theirfunction, for example T or a minus sign for taking an item from thesmart container, and R or a plus sign for receiving an item into thesmart container. Alternatively or additionally, display interface 164may provide a touchscreen panel to accept user input. In someimplementations, user input may be received from a remote device, suchas a tablet or smartphone, via communication interface 140.

Light emitting diode (LED) interface 162 may drive one or moremulti-color LEDs, addressable RGB (ARGB) LEDs, or organic LEDs (OLEDs)for providing a quickly identifiable status indication. For example,LEDs may be driven at varied brightness, blinking patterns, and colorsto indicate various states of interactive storage device 130. In oneconfiguration, solid red LEDs may indicate that sensors 150 haverecorded potentially unsafe environmental conditions for the contents ofinteractive storage device 130, such as temperature outside of a safetyrange for medicines, whereas solid green LEDs may indicate that sensors150 have recorded environmental conditions within safe parameters.Blinking green LEDs may indicate that an authorized user has submittedvalid credentials for unlocking latch 126 to access the contents ofinteractive storage device 130. Blinking red LEDs may indicate thattamper sensor 156 and/or shock and vibration sensor 154 have recorded anintrusion attempt, for example if a detected deformation, vibration orshock value exceeds a predetermined threshold. Blinking yellow LEDs mayindicate that power source 180 has crossed a low battery threshold andneeds replacement. Blinking white LEDs may visually identify interactivestorage device 130 to the user, allowing the user to readily identifyinteractive storage device 130 associated with a requested item in apharmacy, stock room, or other facility. In some embodiments, unique LEDcolors may be assigned on a per-user basis to enable multiple users toconcurrently identify smart containers. Further, in someimplementations, the LED colors and blinking patterns may be detected bya handheld scanner or another device to assist in inventory tracking andmanagement.

Display interface 164 may drive a display to show various userinterfaces enabling a user to query the inventory of interactive storagedevice 130, to update the local inventory of interactive storage device130 by adding or removing items, to query the condition of the items, todisplay remaining battery life, and to perform other management andstatus query operations. The user interfaces may utilize text andgraphics such as icons, animations, and other elements. In someimplementations, these user interfaces may additionally or alternativelybe presented on a remote device, such as a tablet or smartphone. Displayinterface 164 may drive an electronic ink (e-ink) display, a touchscreenliquid crystal display (LCD), an OLED, or another display type. Theinformation may be presented on the display interface 164 in humanreadable form (e.g., letters, numbers, or images) or machine-readableform (e.g., barcode, quick read code, standardized scan code form, orcustom scan code form).

Actuator interface 166 may trigger actuator 167 to actuate latch 126,thereby changing lock state 128 from open to closed and vice versa. Forexample, latch 126 may correspond to an electromechanical lock or anelectromechanical latch. Actuator interface 166 may also query latch 126to determine lock state 128. Triggering actuator 167 may also cause amovement of access component 131 to provide access to an internalcompartment. For example, unlocking latch 126 may decouple hook 133,which in turn allows a spring to cause a movement of access component131, as described further below in conjunction with FIG. 1F, FIG. 1H,and FIG. 1G. Hook 133 may correspond to a fixed or retractable hook thatcan couple to or decouple from latch 126. In some implementations, amanual lock may be provided to manually lock and unlock latch 126without using actuator interface 166. In this case, any manual lockingor unlocking action may be recorded within an access log in non-volatiledata store 137. A manual lock may be useful to provide access to thecontents of interactive storage device 130 during a malfunction or whenpower source 180 is exhausted and no replacement is readily available.

Identity access management (IAM) interface 168 may include one or moredevices to enable a user to provide credentials for user authentication.For example, IAM interface 168 may include one or more biometricscanners, such as a fingerprint sensor, an iris scanner, anelectrocardiogram (ECG) reader such as a smartwatch, and a depth camerafor facial recognition. IAM interface 168 may also include smartcardreaders or other devices to read a contactless smartcard or other uniqueidentifier or token. In some implementations, IAM interface 168 may usecommunication interface 140 to utilize biometric scanners or readerspresent on a remote device, such as a tablet or smartphone. Accordingly,IAM interface 168 may receive user credentials which can be validated inconjunction with secure crypto-processor 184.

When multiple authentication methods are available in IAM interface 168,then a particular authentication method may be automatically selectedfor authentication. For example, the authentication methods may besorted according to security strength, and the methods with the highestsecurity strength may be preferred for use. In some implementations, theuser may select the preferred method of authentication. Further, a superuser or a user with elevated privileges may manually authenticate auser, for example if the user misplaces his credentials.

Audio interface 170 may include one or more audio devices, such asmicrophone 172 and speaker 174. Microphone 172 may enable voice commandsto be used instead of button interface 160 or display interface 164.Speaker 174 may enable audio prompts, feedback, and alerts to beemitted. Speaker 174 may comprise a piezoelectric speaker, a dynamicspeaker, or another type of speaker. For example, different tones may beemitted from the piezoelectric speaker to indicate different states oruser prompts.

Power source 180 provides electrical power for the components ofinteractive storage device 130. Power source 180 may comprise anon-rechargeable battery, a rechargeable battery, a capacitor orsuper-capacitor, or another energy storage device. Power source 180 maybe user accessible and replaceable. To supplement or recharge powersource 180, power harvester 182 may be used to receive power fromexternal sources. For example, power harvester 182 may receive wirelesspower through inductive coils or RF sources. Power harvester 182 mayalso receive power through mechanical action, such as via piezotransducers interfaced to buttons connected to button interface 160, orvia electromagnetic induction induced by actuation movement of latch126. Power harvester 182 may also receive power through direct wiredconnection, such as via universal serial bus (USB) charging cables,AC-DC chargers, or DC-DC chargers, which may be plugged into an externalbattery pack or wall mains voltage supply. In some implementations,power harvester 182 may receive power through mounting frame 120, whichmay function as a power docking station. In the event that power source180 is depleted, lock state 128 may be maintained in its current state,whether closed or open, until power source 180 is replaced or a manuallock is engaged, when made available.

To extend the operating time of power source 180, various powermanagement strategies may be utilized. For example, interactive storagedevice 130 may be placed in a low power or sleep state when no activityis anticipated. When activity such as user interactions, periodicnetwork updates, or sensor logging is necessary, interactive storagedevice 130 may wake up to a normal operating mode, and return to the lowpower or sleep state once the activity is completed. The estimation oflow activity may be based on network activity, user preferences, workingschedules, or other factors. Interactive storage device 130 may alsowake up in response to an activation word or phrase via microphone 172,a button press on button interface 160, or a touch input from displayinterface 164. In some implementations, sensors 150 may includeoccupancy sensors which may be used to determine estimated activitylevels. In some implementations, microphone 172 may be used as anoccupancy sensor. In some implementations, power management may be basedon machine learning algorithms, as described in further detail below inFIG. 2A.

In some implementations, the power management strategies may includeutilizing machine learning to generate a power profile. For example,each smart tote controller may log usage data in non-volatile data store137, which can then be collected by a remote server and processed by oneor more machine learning algorithms to determine a power managementprofile for optimized power consumption. For example, the powermanagement profile may define daily time periods when user interactionsare infrequent, and processor 134 may use this profile to transitionprocessor 134 and other components to a low power idle or sleep modeduring these daily time periods.

Secure crypto-processor 184 may correspond to a trusted platform module(TPM) chip that stores public and private encryption keys for encryptingand decrypting data. For example, the public keys may include publickeys of key pairs generated by authorized users, allowing each user tosubmit credentials encrypted by a respective private key for decryptingby secure crypto-processor 184. Similarly, private keys specific tointeractive storage device 130 can be used to encrypt data beforetransmitting, storing, and exposing the data (e.g., to the outsideworld). In this manner, data travelling through data bus 132 and storedin memory 136, including non-volatile data store 137, can be securelyencrypted to protect against third party eavesdropping and modification.Encrypted data can also be more safely transmitted to the outside world,including over potentially insecure and untrusted networks.

In some implementations, the components of interactive storage device130 and mounting frame 120 may be hardened against extreme temperatures.For example, the components of interactive storage device 130 andmounting frame 120 may be configured to be operable within arefrigerated environment. In this manner, interactive storage device 130and mounting frame 120 may be stored in refrigerators, freezers, orother cold storage.

In some implementations, a remote device such as a tablet, smartphone,laptop, or other device may be used to interface with interactivestorage device 130. For example, the remote device may include anoptical scanner that can read 1D or 2D barcodes and/or LED flashingpatterns to receive data from interactive storage device 130. Thescanner may be used, for example, to identify interactive storage device130 for loading medications into interactive storage device 130. Forexample, interactive storage device 130 may include an embedded uniqueidentifier or serial number that can be transmitted using barcodes orLEDs. The remote device may contact a remote server, e.g. a pharmacyserver, to determine, for example, a type and quantity of medications tobe added to interactive storage device 130. Pharmacy and localinventories may also be automatically updated according to the expectedchange in contents of interactive storage device 130. In someimplementations, the container may already be loaded with medications,and the user only needs to identify the correct container. For example,as discussed above, LED lights may blink on a specific smart containerfor identifying to the user. A similar process may be used fordispensing medications from interactive storage device 130.

The remote device may execute a local application downloaded from anapplication store, a corporate network, a website, or anotherdistribution method. Alternatively, the remote device may execute aremote cloud-based application or a Software as a Service (SaaS)application. The application may allow communication with smartcontainers such as interactive storage device 130. For example, theapplication may utilize radios that support various protocols such asBluetooth, Bluetooth Low Energy, Near Field Communication (NFC), Wi-Fi,contactless smartcards, Radio-Frequency identification, and others.

When the remote device is connected to a network, such as via a Wi-Fi orcellular connection, interactive storage device 130 may utilize thenetwork to communicate and synchronize with a remote server, asdescribed in further detail below in conjunction with FIG. 2A and FIG.2B. Alternatively, when such a connection is not present, interactivestorage device 130 may utilize mobile mesh networking to use other smartcontainers as nodes to connect to the remote server. Further,interactive storage device 130 may function as a wireless repeater toprovide a network connection to other smart devices inside and outsideof interactive storage device 130. In some implementations, a cellularmodem may be included within interactive storage device 130 to provide adirect cellular connection to the remote server. However, to reduceimplementation complexity and data network costs, it may be preferableto omit a cellular modem.

With a block diagram overview of system 100 now in place, it may behelpful to observe various perspective views of the components of system100. FIG. 1B depicts a perspective view of interactive storage device130 with a hinged lid, or access component 131A, according to variousaspects of the subject technology. Interactive storage device 130 isattachable to mounting frame 120A. Interactive storage device 130includes latch 126, access component 131A, hook 133A, buttons 161, LEDs163, and display 165.

Referring to FIG. 1A, various interfaces may drive or control thecomponents of interactive storage device 130. For example, buttoninterface 160 may receive user inputs from buttons 161. LED interface162 may drive LEDs 163 to indicate various states and alerts. Displayinterface 164 may drive display 165, which may display status messagesand various user interfaces for managing interactive storage device 130and the contents of interactive storage device 130. Actuator interface166 may instruct actuator 167 to actuate latch 126, causing hook 133A todecouple from latch 126. For example, when hook 133A is decoupled fromlatch 126, access component 131A may automatically swing outward due tospring tension in a hinge causing a rotation along the hinge. A stopperfeature such as a plastic stopper may be utilized to limit the angle ofthe outward movement. The specific elements shown in interactive storagedevice 130 are exemplary and any configuration of elements may beutilized according to use case requirements.

Interactive storage device 130 may attach to mounting frame 120A, whichmay be placed on any surface such as a countertop, cabinet, desk orshelf. In some implementations, mounting frame 120A may be permanentlyattached to a surface, for example by screws or other fasteners.Interactive storage device 130 may also be detachable from mountingframe 120A to allow organization and transport of interactive storagedevice 130. In some implementations, interactive storage device 130 canbe locked to mounting frame 120A to prevent unauthorized removal. Forexample, a locking latch may be located near the rear of mounting frame120A that couples to a matching feature on interactive storage device130. The locking latch may be controlled in a similar manner as latch126, or may be manually controlled using a key or other access control.

FIG. 1C depicts perspective views of smart containers attached to othercontainers to form stacks or arrays, according to various aspects of thesubject technology. For example, as shown in FIG. 1C, interactivestorage device 130B may stack on top of interactive storage device 130A,and may lock together using similar features as described above inconjunction with mounting frame 120A. Smart containers may also beconfigured to stack with existing off-the-shelf containers without smartfunctionality. For example, interactive storage device 130C may stack ontop of bin 129. In some implementations, multiple smart containers mayinterlock into an array, such as smart container array 192. Smartcontainer array 192 may further attach to mounting frame 120B to providesecure and space efficient item dispensing. For example, mounting frame120B may be mounted to a wall or inside a cabinet. In someimplementations, mounting frame 120B may swing out on a hinge or rail toprovide facilitated access to the backside of smart container array 192.Mounting frame 120B may function as a docking station to provide power,network connectivity, and other resources for each smart containerwithin smart container array 192. In this manner, the battery and othercomponents within each smart container can be conserved for use duringtransportation and power outages.

While the smart containers shown in FIG. 1C may be shown asapproximately uniform in size, other implementations may allow for smartcontainers of various sizes to be arranged in stacks and arrays in asimilar fashion. For example, smart containers may scale to larger sizesthat are multiples in width and height of a standard smart container,and these larger smart containers may interlock with different sizedcontainers. For example, a double width container may support stackingof two standard width containers on top.

FIG. 1D depicts perspective and cut-away views of a hinged lid, oraccess component 131A, with a spring loaded retractable fastening hook,or hook 133B, according to various aspects of the subject technology.Access component 131A includes a recess 138, allowing hook 133B toretract into recess 138 via spring 135 when hook 133B is disengaged fromlatch 126 (not shown in FIG. 1D), corresponding to lock state 128A in anunlocked state. The user may close a smart container by pushing ontohook 133B to engage with latch 126, corresponding to lock state 128B ina locked state. Spring 135 may therefore transition from an uncompressedstate to a compressed state. Providing a retractable fastening hookadvantageously allows the bottom or inner surface of access component131A to be substantially flat without protrusions. Thus, users can moreeasily add or remove items without the risk of items or hands snaggingonto hook 133B.

While access component 131A is shown to be opaque, some implementationsmay include a window portion that is translucent or transparent to allowa user to recognize the contents of a smart container at a glance. Thewindow may be translucent to protect sensitive data, such as medicationlabels, from being casually read by an unauthorized user. In someimplementations, display 165 may continuously display a textual orgraphical depiction of the contents, as well as an estimated quantity,to further assist in user recognition of contents at a glance. In someimplementations, the window may be include a variable transparencywindow such as a transparent light emitting diode (LED) window. Thetransparency may be controlled by a processor included in theinteractive storage device 130B or communicatively coupled to theinteractive storage device 130B. The transparency may be adjusted basedon time of day (e.g., during hours when the room is being used, thewindow permits viewing but outside those hours, the window reducestransparency), detection of a condition near the interactive storagedevice 130B (e.g., a clinician authorized to put or take item from theinteractive storage device 130B is detected within a threshold distanceof the interactive storage device 130B; ambient light level to adjustglare or visibility into the interactive storage device 130B; or accessstate for another container near the interactive storage device 130Bsince a workflow including accessing one container may typically befollowed by accessing the related container), or to communicate a statusor location of the interactive storage device 130B (e.g., blink to guidea clinician to the container; change color or other graphic presentationto indicate need for servicing (e.g., latch malfunction, networkfailure, cleaning needed, inventory low), adjust graphic presentation toindicate other operational status of the smart container (e.g., batterylow, network connection status, latch released, latch engaged, etc.).Such a window may be used to present or display other information orgraphical interfaces such as those described in this application.

FIG. 1E depicts side views of interactive storage device 130A using anon-retractable fastening hook, or hook 133A, and interactive storagedevice 130B using a retractable fastening hook, or hook 133B, accordingto various aspects of the subject technology. As shown in FIG. 1E,interactive storage device 130B provides unobstructed access to theinternal compartment of interactive storage device 130B by retractinghook 133B into recess 138. On the other hand, interactive storage device130A utilizes fewer parts, thereby reducing manufacturing andmaintenance costs. Further, closing operations may be simplified as theuser may push anywhere on access component 131A rather than specificallypushing hook 133B into latch 126. Accordingly, retractable ornon-retractable fastening hooks may be utilized depending on specificuse case requirements.

FIG. 1F depicts a cross sectional view of interactive storage device130A, according to various aspects of the subject technology. The crosssectional view of interactive storage device 130A may be taken from aplane intersecting the center of interactive storage device 130A,wherein the plane may be parallel to the sides of the interactivestorage device 130A. Interactive storage device 130 includes latch 126,access component 131A, load sensor 151, power source 180, and ramp 186.Access component 131A includes hook 133A. In some implementations, powersource 180 may be accessible from outside, such as via a battery doorcompartment, to allow easy replacement of power source 180. In someimplementations, a supplemental power source may be provided, such as acoin cell battery or super capacitor, for example to continuously powera real-time clock or other elements of interactive storage device 130Awhile power source 180 is exhausted or being replaced.

As shown in FIG. 1F, a load sensor 151 may be provided to measure themass of items stored within the internal compartment of interactivestorage device 130A. This can be used, for example, to estimate aquantity of items stored in interactive storage device 130A. Further, asloped ramp, or ramp 186, may be provided for ease of item retrieval andstorage. As described above, access component 131A may automaticallyswing out via a spring loaded hinge after hook 133A disengages fromlatch 126. To close interactive storage device 130A, the user may pushdown on access component 131A, as indicated by the arrow, such that hook133A engages with latch 126. Portions of hook 133A may be configured tobreak away or dislodge into latch 126 when a user attempts to forciblydecouple hook 133A from latch 126. This provides evidence of anattempted diversion and further renders latch 126 inoperable. Theintrusion attempt may also be recorded and transmitted to a backendserver, allowing institutions to proactively monitor and preventdiversion.

FIG. 1G depicts a perspective view of interactive storage device 130Dwith a sliding drawer, or access component 131B, according to variousaspects of the subject technology. Interactive storage device 130Dincludes housing 190 and access component 131B. Access component 131Bincludes hook 133A, drawer guide 191, window 193, and handle 194.

In FIG. 1G, hook 133A may be decoupled from a corresponding latch,thereby providing access to the internal compartment of access component131B. For example, the user may hold onto handle 194 to pull out accesscomponent 131B from housing 190. Drawer guide 191 may be placed on oneor more sides of access component 131B to guide the movement of accesscomponent 131B within housing 190. Matching rails may be positionedwithin the interior of housing 190. Alternatively or additionally, railsmay be included within drawer guide 191. Window 193 may be transparentor translucent to provide a view of the contents inside.

FIG. 1H depicts a cut away view of interactive storage device 130D fromFIG. 1G, according to various aspects of the subject technology.Interactive storage device 130D includes latch 126, hook 133A, spring135, LED 163, and power source 180.

In FIG. 1H, hook 133A may be coupled to latch 126, thereby securing theinternal compartment of access component 131B. Spring 135 may beprovided to enable access component 131B to slide out automatically whenhook 133A is decoupled from latch 126. In some embodiments, a motor orother device may be used to finely control the movement of accesscomponent 131B. For example, access component 131B can be moved toexpose a specific depth of the internal compartment. This enables theinternal compartment to be divided into multiple regions storingdifferent types of items. LED 163 may provide status or identificationto the user, and may be coupled to a light pipe or other device to allowLED 163 to be visible from window 193.

FIG. 1I depicts a perspective view of interactive storage device 130Dfrom FIG. 1G with access component 131B at a maximum extension,according to various aspects of the subject technology. Housing 190 mayinclude an internal stopper feature to stop access component 131B at amaximum extension, thereby preventing unintentional detachment of accesscomponent 131B from housing 190. The stopper may be configured to allowaccess component 131B to tilt downwards when at maximum extension,allowing the user to more easily view the entirety of the internalcompartment.

With an overview of the smart container now in place, it may be helpfulto observe the operation of multiple smart containers in an examplenetworked environment. FIG. 2A depicts system 200 using smart containers230A through 230G in networks 218 and 219 to provide automatic inventorymanagement of items with inventory tracking 215, item condition tracking216, and machine learning 217, according to various aspects of thesubject technology. FIG. 2A includes care facility 210, server 214,network 218, and mobile mesh network 219. Care facility 210 includespatient room 211, supply room 212, smart container 230C, and smartcontainer 230D. Patient room 211 includes smart container 230A, smartcontainer 230B, and hub 290A. Supply room 212 includes smart container230E, smart container 230F, smart container 230G, and hub 290B. Server214 includes inventory tracking 215, item condition tracking 216, andmachine learning 217. With respect to FIGS. 2A and 2B, each smartcontainer 230A-230G may correspond to interactive storage device 130 or130A-130D from FIG. 1A-1H.

Server 214 may use inventory tracking 215 to track an inventory of eachuniquely identifiable smart container. Server 214 may connect to smartcontainers 230A-230G via network 218 and hubs 290A and 290B. Hubs 290Aand 290B may be connected to an infrastructure network of care facility210 having access to a public network, such as network 218, which maycomprise the Internet. In some implementations, a cellular router, hub,gateway, modem, or another network device may be provided at hubs 290Aand 290B or in each individual smart container 230A-230G to provide aconnection to network 218. In this manner, the smart containers can beimmediately deployed without requiring potentially costly and timeconsuming integration into existing information technology (IT)infrastructure at care facility 210.

A user may use a remote device, such as a tablet or smartphone, torequest identification of a container storing a particular item, such asmedication or medical supplies. The smart container may then identifyitself to the user by outputting to an audiovisual element, such as by ablinking LED, emitting a sound, or a combination. The type of output maychange depending on detected proximity to the remote device, for exampleby using beeps when the remote device/user is far away, and blinkingLEDs when the remote device/user is nearby. For example, the user mightuse the remote device to request identification of alcohol wipes. Theremote device may contact server 214, which in turn may query inventorytracking 215 to find a container containing alcohol wipes that isclosest to the user. For example, the position of the user may bedetected using GPS, or triangulated based on the proximity of hub 290Bto the remote device. Inventory tracking 215 may identify alcohol wipesas being within smart containers 230D and 230G, and may thereforeidentify smart container 230G as being associated with the closestcontainer to the user. As a result, server 214 may instruct smartcontainer 230G to enter into an alert or identification mode, wherein aLED flashes white to guide the user to the container that containsalcohol wipes. In some implementations, the LED color may be specific tothe user, as described above, to allow easy identification of multipleconcurrent identifications.

As shown in system 200, each smart container 230A-230G may connect tonetwork 218 using one of hub 290A or 290B, which may have aninfrastructure or cellular connection to network 218. Since smartcontainers 230A-230G may be movable from one room to another, smartcontainers 230A-230G may potentially lose connection to hubs 290A and290B. For example, smart containers 230C and 230D may be located too faraway to connect to hub 290A or 290B. In this case, smart containers230A-230G may provide mobile mesh network 219, wherein each smartcontainer 230A-230G may function as a mesh node hop to facilitate aconnection to hub 290A and 290B. When a route to server 214 is notimmediately available, then a smart container may operate in an offlinemode wherein inventory management is handled locally until asynchronization can occur with server 214 when a connection route isavailable.

In some implementations, each smart container may also track thelocation and inventory of other nodes in a local cache. In this manner,smart containers 230A-230G may query mobile mesh network 219 for thelocation of an item, instead of relying on server 214. Thus, each nodein mobile mesh network 219 may periodically broadcast and propagatetheir own position and inventory to all other nodes, allowing a localcache of node locations and inventory to be stored by each node. In thismanner, each node can quickly determine, from the local cache, theclosest node where the requested item is possibly present. Since thelocal cache may be potentially out of date, a node may verify whetherthe requested item is actually still present by using mobile meshnetwork 219 to send a query to the closest node. The node may respond tothe query with an indication of whether the item is present in the localinventory, and a location of the node. Once the closest node isdetermined, then a location of the closest node may be displayed on amap, e.g. on display 165 or on a display of a remote device. If therequested item is not present, then the node may respond by providingthe last authorized user and access time, if available.

In this manner, devices connected to mobile mesh network 219 maycooperatively determine that the requested item is contained within aparticular smart container. Thus, in some implementations,identification requests may propagate through mobile mesh network 219 toreach the correct node without the assistance of server 214, andinformation requests may similarly propagate to the correct node andforward a response to the original requesting node. In otherimplementations, server 214 may instruct the identified smart containerto enter into an alert or identification mode, wherein a LED flasheswhite or a user-specific color to guide the user to the smart container.The remote device may also display a map to guide the user to the smartcontainer. Further, any smart devices between the user and thedestination may be directed to illuminate a path.

At server 214, inventory tracking 215, item condition tracking 216, andmachine learning 217 may be queried and updated according to statusinformation provided by each smart container. For example, inventorytracking 215, item condition tracking 216, and machine learning 217 maytrack the location, quantity, and condition of various medicines andhealthcare items inside smart containers 230A-230G. Inventory tracking215 may be updated to reflect items added or removed from containers.Item condition tracking 216 may be updated according to changingenvironmental conditions experienced by each smart container. Machinelearning 217 may record device interactions and usage data for eachsmart container 230A-230G. Referring to FIG. 1A, the information storedin server 214 may be synchronized from data logs retrieved fromnon-volatile data store 137.

At least a portion of the smart container usage data may be processed byone or more machine learning algorithms to determine a power managementprofile that can be pushed back to smart containers 230A-230G foroptimized power consumption. For example, the power management profilemay define daily time periods when user interactions are infrequent.Smart containers 230A-230G may use this profile to transition theprocessor and other components to a low power idle or sleep mode duringthese daily time periods.

Each smart container may also support real-time status reporting when anetwork connection route is available. For example, a client may queryserver 214 for the status of a specific smart container. Assuming thatserver 214 can establish a network route to communicate with therequested smart container, the smart container may be queried for therequested status, such as environmental condition, location history, orlocal inventory status, and the smart container may respond by sendingan encrypted message containing the requested status.

After arrival at a destination such as patient room 211, the smartcontainers 230A and 230B may be organized onto shelves, e.g. byattaching to a matching mounting frame as described above, and remainlargely stationary until a restock is necessary. Since the smartcontainers 230A and 230B have a built in display 165 as shown in FIG.1B, the display may continuously show both an item description and aquantity of items contained in an associated container. Referring toFIG. 1A, by using a low power display technology such as e-ink fordisplay interface 164, battery life of power source 180 may be extended.Accordingly, a user can quickly identify the contents of each containerat a glance without actually opening the container and looking closelyat the contents. Additionally or alternatively, transparent ortranslucent windows may allow quick identification of items andremaining quantity. Thus, the stock level and battery level of each binmay be readily perceived and blinking LEDs or other audiovisual alertsmay further bring attention to low stock, low battery levels, or itemcondition deterioration, allowing remedial action to be carried outearly before problems arise. Accordingly, items can be kept well stockedand functional for smooth operation of care facility 210.

When multiple bins are stacked or arranged together or behind eachother, then the multiple bins may be leveraged to help identify a targetcontainer. For example, as discussed above, the user may request thelocation of a particular item to be identified. Once a target containerhaving the particular item is identified, multiple smart containers maybe used to provide a visible path to the target container with therequested item. For example, containers in the same stack, the samearray, or along a path to the target container may use a different lightblinking pattern or color to distinguish themselves from the targetcontainer.

FIG. 2B depicts an example network topology diagram of smart containers290A-290G from FIG. 2A, according to various aspects of the subjecttechnology. Network 218 may correspond to a public network such as theInternet, and server 214 may be connected to hub 290A and 290B. Mobilemesh network 219 may correspond to an ad-hoc mobile mesh network,wherein each individual node, or smart containers 230A-230G mayphysically move and disconnect and reconnect with each other accordingto radio reception to form a mesh network. Smart containers 230A-230Bmay connect directly to hub 290A, whereas smart container 230C mayconnect to hub 290A using smart container 230B as an intermediary node.Similarly, smart containers 230E-230G may connect directly to hub 290B,whereas smart container 230D may connect to hub 290B using smartcontainer 230E as an intermediary node. Thus, nodes can act as masternodes (e.g. server 214), slave nodes (e.g. smart containers 230A, 230C,230D, 230F, and 230G), or hybrid master/slave nodes (e.g. smartcontainers 230B, 230E and hub 290A, 290B).

FIG. 3 depicts various example user interfaces of a smart container,according to various aspects of the subject technology. With respect toFIG. 3, display 365A, display 365B, and display 365C may correspond todisplay 165 from FIGS. 1A and 1B. In some implementations, display365A-365C may be shown on a remote device, such as a tablet, smartphone,laptop, or desktop computer.

Display 365A shows a status screen, which may be shown by default whenno user interaction is taking place. As shown in display 365A, thestatus screen may include several informational fields, such as adescription of item contents, a quantity, a battery level, a networkstatus, and user interface instructions for using buttons 161 of FIG.1B. Referring to FIG. 1A, the description and quantity may be updatedaccording to a local inventory stored in non-volatile data store 137.The battery level may be updated according to estimated charge detectedfor power source 180. Network status may be updated according to theavailability of connectable networks via communication interface 140.The user interface instructions may change depending on the userinterface context. While display 365A-365C illustrate textrepresentations, it should be understood that graphical representationssuch as icons, bars, charts, animations, and other elements may beshown.

As discussed above, in some implementations the smart container may behardened to withstand refrigerated or freezing temperatures. In thiscase, as shown in display 365B, a temperature reading may also beprovided. When the temperature reading exceeds a safe temperature rangefor the contents, a warning message or alert may be provided.

In some embodiments, a load cell or other sensor may be used toautomatically estimate the quantity of items contained in each smartcontainer. In this case, user interface elements to adjust itemquantities, such as buttons 161, may be simplified or omitted.Accordingly, the status screen may also be correspondingly simplified toshow essential information in large font, such as item description andquantity, as shown in display 365C. In this manner, contents withinsmart containers may be readily discerned from a distance and at aglance.

FIG. 4 depicts an example process 400 for using a smart container toprovide efficient space utilization, secure transport and storage,inventory management, tamper resistance, and other smart functionality,according to various aspects of the subject technology. For explanatorypurposes, the various blocks of example process 400 are described hereinwith reference to FIGS. 1A-3, and the components and/or processesdescribed herein. The one or more of the blocks of process 400 may beimplemented, for example, by a computing device, including a processorand other components utilized by the device. In some implementations,one or more of the blocks may be implemented apart from other blocks,and by one or more different processors or devices. Further forexplanatory purposes, the blocks of example process 400 are described asoccurring in serial, or linearly. However, multiple blocks of exampleprocess 400 may occur in parallel. In addition, the blocks of exampleprocess 400 need not be performed in the order shown and/or one or moreof the blocks of example process 400 need not be performed.

In the depicted example flow diagram, a smart container is provided thatis attachable to a mounting frame, the smart container including acompartment having a plurality of walls and an access component (411).Referring to FIG. 1B, this may correspond to providing interactivestorage device 130 that is attachable to mounting frame 120A, whereininteractive storage device 130 includes a compartment having a pluralityof walls (e.g. on six sides) and access component 131A. As discussedabove, interactive storage device 130 may also be attachable to othercontainers of various sizes to form stacks and arrays, such as smartcontainer array 192 attachable to mounting frame 120B.

Process 400 may continue with receiving, via a communication interface,an authenticated request to access the compartment of the smartcontainer (412). Referring to FIG. 1A and FIG. 2A, this may correspondto processor 134 receiving, via communication interface 140, anauthenticated request for accessing interactive storage device 130. Asdiscussed above, IAM interface 168 may utilize communication interface140 to receive and authenticate a user credential, such as a uniqueidentifier, a biometric identifier, or some other token, which may bereceived from a remote device, a smartcard, or some other device.

Processor 134 may validate or authenticate the user credential. Forexample, referring to FIG. 1A, processor 134 may utilize securecrypto-processor 184 to verify that the user credential is valid againstan encrypted authorized user database. Alternatively, referring to FIG.2A, processor 134 may utilize communication interface 140 to verify theuser credential against server 214. In some implementations, thevalidation may further depend on temperature status or other logged datafrom sensors 150. For example, if the temperature exceeds a safethreshold range, then user access may be restricted to users with higherprivilege levels. In this manner, potentially unsafe or spoiledmedications may be kept safely locked until appropriate personnel canreview the contents of the container.

In response to receiving the authenticated request, processor 134 maycontinue to actuate an electromechanical latch to disengage a fasteninghook, thereby initiating a mechanical movement of an access component tomake the compartment accessible (413). For example, referring to FIG. 1Aand FIG. 1F, processor 134 may utilize actuator interface 166 to triggeractuator 167 to open latch 126. Once lock state 128 is set to open, thenlatch 126 may disengage from hook 133A, thereby causing access component131A to swing outwards by rotating along the hinge. Access to thecompartment of interactive storage device 130A is thereby provided.Similarly, referring to FIG. 1A, FIG. 1G and FIG. 1H, once lock state128 is set to open, then latch 126 may disengage from hook 133A, therebycausing access component 131B to move outwards from housing 190 due tothe stored energy in spring 135. Alternatively, a motor may be used tomove access component 131B. Access to the compartment of accesscomponent 131B is thereby provided.

Upon actuation of the electromechanical latch, processor 134 maycontinue to output, via an audiovisual element, an alert to identify thecontainer (414). For example, referring to FIG. 1A and FIG. 1B,processor 134 may use LED interface 162 and/or audio interface 170 tooutput flashing lights via LEDs 163 or audible tones via a piezoelectricor dynamic speaker. As discussed above, the colors, intensity, andflashing patterns of LEDs 163 may be adjusted according to the userassociated with the access request.

Processor 134 may continue to confirm that the electromechanical latchhas re-engaged with the fastening hook, thereby securing the compartment(415). For example, referring to FIG. 1F, the user may push down onaccess component 131A until hook 133A re-engages with latch 126.Similarly, referring to FIG. 1G and FIG. 1H, the user may push in accesscomponent 131B until hook 133A re-engages with latch 126. Referring toFIG. 1A, processor 134 may use actuator interface 166 to query actuator167 and verify that lock state 128 of latch 126 now corresponds to alocked state.

After confirming, processor 134 may continue to determine a change in alocal inventory (416). For example, referring to FIG. 1B, a user mayutilize buttons 161 to adjust the quantity of items in the localinventory. In some implementations, items may include RFID tags, whichmay be detected using sensors 150. In some implementations, processor134 may be communicatively coupled with a sensor that provides ameasurement for use in determining the change in local inventory. Forexample, load sensor 151 may be provided. Based on the expectedinventory, a theoretical weight may be generated and compared with theactual measured weight. If the theoretical weight after the expectedinventory change corresponds to the actual weight, then thedetermination may be confirmed. If the determination is not confirmed,processor 134 may generate an alert message. The alert message may bedisplayed via display 165 or transmitted for presentation via anotherdevice.

Further, after determining the change in the local inventory, processor134 may send, via communication interface 140, a stock notification toserver 214 when a quantity of the local inventory is below apredetermined threshold level. For example, the predetermined thresholdlevel may be set to 30% or 50% of a fully stocked container. In thismanner, preparations for restocking may be made well in advance of stockdepletion.

Processor 134 may continue to update the local inventory in anon-volatile data store according to the change (417). For example,based on the determined change, the local inventory stored innon-volatile data store 137 may be updated with correspondinglyincreased or decreased quantities.

In some implementations, processor 134 may continue to synchronize thelocal inventory with a remote server via a communication interface. Forexample, referring to FIG. 1A and FIG. 2A, processor 134 may synchronizethe local inventory stored in non-volatile data store 137 with inventorytracking 215 stored on server 214 via communication interface 140. Asdiscussed above, the local inventory may be received from smart deviceswithin interactive storage device 130 that connect to a wirelessrepeater network provided by communication interface 140. In some cases,this synchronization may be deferred until a stable network route toserver 214 is available. As discussed above, the smart container mayform mobile mesh network 219 with other smart containers to improvenetwork availability. The current location of the smart container mayalso be conveyed to server 214 based on triangulation using hubs orother location tracking methods.

In this manner, inventory tracking 215 can be automatically updated withthe current location and inventory for each smart container, enablingdetailed insight for medical supply restocking, loss prevention, andother management tasks. Similarly, item condition tracking 216 may beupdated to track environmental conditions (e.g. whether safe temperatureranges are maintained) and item quality, and machine learning 217 may beupdated with smart container usage statistics to provide training datafor power management profile generation.

Many aspects of the above-described example process 400, and relatedfeatures and applications, may also be implemented as software processesthat are specified as a set of instructions recorded on a computerreadable storage medium (also referred to as computer readable medium),and may be executed automatically (e.g., without user intervention).When these instructions are executed by one or more processing unit(s)(e.g., one or more processors, cores of processors, or other processingunits), they cause the processing unit(s) to perform the actionsindicated in the instructions. Examples of computer readable mediainclude, but are not limited to, CD-ROMs, flash drives, RAM chips, harddrives, EPROMs, etc. The computer readable media does not includecarrier waves and electronic signals passing wirelessly or over wiredconnections.

The term “software” is meant to include, where appropriate, firmwareresiding in read-only memory or applications stored in magnetic storage,which can be read into memory for processing by a processor. Also, insome implementations, multiple software aspects of the subjectdisclosure can be implemented as sub-parts of a larger program whileremaining distinct software aspects of the subject disclosure. In someimplementations, multiple software aspects can also be implemented asseparate programs. Finally, any combination of separate programs thattogether implement a software aspect described here is within the scopeof the subject disclosure. In some implementations, the softwareprograms, when installed to operate on one or more electronic systems,define one or more specific machine implementations that execute andperform the operations of the software programs.

A computer program (also known as a program, software, softwareapplication, script, or code) can be written in any form of programminglanguage, including compiled or interpreted languages, declarative orprocedural languages, and it can be deployed in any form, including as astand-alone program or as a module, component, subroutine, object, orother unit suitable for use in a computing environment. A computerprogram may, but need not, correspond to a file in a file system. Aprogram can be stored in a portion of a file that holds other programsor data (e.g., one or more scripts stored in a markup languagedocument), in a single file dedicated to the program in question, or inmultiple coordinated files (e.g., files that store one or more modules,sub programs, or portions of code). A computer program can be deployedto be executed on one computer or on multiple computers that are locatedat one site or distributed across multiple sites and interconnected by acommunication network.

FIG. 5 is a conceptual diagram illustrating an example electronic system500 for providing a smart container for efficient space utilization,secure transport and storage, inventory management, tamper resistance,and other smart functionality, according to various aspects of thesubject technology. Electronic system 500 may be a computing device forexecution of software associated with one or more portions or steps ofprocess 400, or components and processes provided by FIGS. 1A-4.Electronic system 500 may be representative, in combination with thedisclosure regarding FIGS. 1A-4, of the interactive storage device 130described above. In this regard, electronic system 500 may be amicrocomputer, personal computer or a mobile device such as asmartphone, tablet computer, laptop, PDA, an augmented reality device, awearable such as a watch or band or glasses, or combination thereof, orother touch screen or television with one or more processors embeddedtherein or coupled thereto, or any other sort of computer-relatedelectronic device having network connectivity.

Electronic system 500 may include various types of computer readablemedia and interfaces for various other types of computer readable media.In the depicted example, electronic system 500 includes a bus 508,processing unit(s) 512, a system memory 504, a read-only memory (ROM)510, a permanent storage device 502, an input device interface 514, anoutput device interface 506, and one or more network interfaces 516. Insome implementations, electronic system 500 may include or be integratedwith other computing devices or circuitry for operation of the variouscomponents and processes previously described.

Bus 508 collectively represents all system, peripheral, and chipsetbuses that communicatively connect the numerous internal devices ofelectronic system 500. For instance, bus 508 communicatively connectsprocessing unit(s) 512 with ROM 510, system memory 504, and permanentstorage device 502.

From these various memory units, processing unit(s) 512 retrievesinstructions to execute and data to process in order to execute theprocesses of the subject disclosure. The processing unit(s) can be asingle processor or a multi-core processor in different implementations.

ROM 510 stores static data and instructions that are needed byprocessing unit(s) 512 and other modules of the electronic system.Permanent storage device 502, on the other hand, is a read-and-writememory device. This device is a non-volatile memory unit that storesinstructions and data even when electronic system 500 is off. Someimplementations of the subject disclosure use a mass-storage device(such as a magnetic or optical disk and its corresponding disk drive) aspermanent storage device 502.

Some implementations use a removable storage device (such as a floppydisk, flash drive, and its corresponding disk drive) as permanentstorage device 502. Like permanent storage device 502, system memory 504is a read-and-write memory device. However, unlike storage device 502,system memory 504 is a volatile read-and-write memory, such a randomaccess memory. System memory 504 stores some of the instructions anddata that the processor needs at runtime. In some implementations, theprocesses of the subject disclosure are stored in system memory 504,permanent storage device 502, and/or ROM 510. From these various memoryunits, processing unit(s) 512 retrieves instructions to execute and datato process in order to execute the processes of some implementations.

Bus 508 also connects to input and output device interfaces 514 and 506.Input device interface 514 enables the user to communicate informationand select commands to the electronic system. Input devices used withinput device interface 514 include, e.g., alphanumeric keyboards andpointing devices (also called “cursor control devices”). Output deviceinterfaces 506 enables, e.g., the display of images generated by theelectronic system 500. Output devices used with output device interface506 include, e.g., printers and display devices, such as cathode raytubes (CRT) or liquid crystal displays (LCD). Some implementationsinclude devices such as a touchscreen that functions as both input andoutput devices.

Also, bus 508 also couples electronic system 500 to a network (notshown) through network interfaces 516. Network interfaces 516 mayinclude, e.g., a wireless access point (e.g., Bluetooth or WiFi) orradio circuitry for connecting to a wireless access point. Networkinterfaces 516 may also include hardware (e.g., Ethernet hardware) forconnecting the computer to a part of a network of computers such as alocal area network (“LAN”), a wide area network (“WAN”), wireless LAN,or an Intranet, or a network of networks, such as the Internet. Any orall components of electronic system 500 can be used in conjunction withthe subject disclosure.

These functions described above can be implemented in computer software,firmware or hardware. The techniques can be implemented using one ormore computer program products. Programmable processors and computerscan be included in or packaged as mobile devices. The processes andlogic flows can be performed by one or more programmable processors andby one or more programmable logic circuitry. General and special purposecomputing devices and storage devices can be interconnected throughcommunication networks.

Some implementations include electronic components, such asmicroprocessors, storage and memory that store computer programinstructions in a machine-readable or computer-readable medium(alternatively referred to as computer-readable storage media,machine-readable media, or machine-readable storage media). Someexamples of such computer-readable media include RAM, ROM, read-onlycompact discs (CD-ROM), recordable compact discs (CD-R), rewritablecompact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM,dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g.,DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SDcards, micro-SD cards, etc.), magnetic and/or solid state hard drives,read-only and recordable Blu-Ray® discs, ultra density optical discs,any other optical or magnetic media, and floppy disks. Thecomputer-readable media can store a computer program that is executableby at least one processing unit and includes sets of instructions forperforming various operations. Examples of computer programs or computercode include machine code, such as is produced by a compiler, and filesincluding higher-level code that are executed by a computer, anelectronic component, or a microprocessor using an interpreter.

While the above discussion primarily refers to microprocessor ormulti-core processors that execute software, some implementations areperformed by one or more integrated circuits, such as applicationspecific integrated circuits (ASICs) or field programmable gate arrays(FPGAs). In some implementations, such integrated circuits executeinstructions that are stored on the circuit itself.

As used in this specification and any claims of this application, theterms “computer,” “server,” “processor,” and “memory” all refer toelectronic or other technological devices. These terms exclude people orgroups of people. For the purposes of the specification, the termsdisplay or displaying means displaying on an electronic device. As usedin this specification and any claims of this application, the terms“computer readable medium” and “computer readable media” are entirelyrestricted to tangible, physical objects that store information in aform that is readable by a computer. These terms exclude any wirelesssignals, wired download signals, and any other ephemeral signals.

To provide for interaction with a user, implementations of the subjectmatter described in this specification can be implemented on a computerhaving a display device, e.g., a CRT (cathode ray tube) or LCD (liquidcrystal display) monitor, for displaying information to the user and akeyboard and a pointing device, e.g., a mouse or a trackball, by whichthe user can provide input to the computer. Other kinds of devices canbe used to provide for interaction with a user as well; e.g., feedbackprovided to the user can be any form of sensory feedback, e.g., visualfeedback, auditory feedback, or tactile feedback; and input from theuser can be received in any form, including acoustic, speech, or tactileinput. In addition, a computer can interact with a user by sendingdocuments to and receiving documents from a device that is used by theuser; e.g., by sending web pages to a web browser on a user's clientdevice in response to requests received from the web browser.

Implementations of the subject matter described in this specificationcan be implemented in a computing system that includes a back endcomponent, e.g., as a data server, or that includes a middlewarecomponent, e.g., an application server, or that includes a front endcomponent, e.g., a client computer having a graphical user interface ora Web browser through which a user can interact with an implementationof the subject matter described in this specification, or anycombination of one or more such back end, middleware, or front endcomponents. The components of the system can be interconnected by anyform or medium of digital data communication, e.g., a communicationnetwork. Examples of communication networks include a local area network(“LAN”) and a wide area network (“WAN”), an inter-network (e.g., theInternet), and peer-to-peer networks (e.g., ad hoc peer-to-peernetworks).

The computing system can include clients and servers. A client andserver are generally remote from each other and may interact through acommunication network. The relationship of client and server arises byvirtue of computer programs running on the respective computers andhaving a client-server relationship to each other. In someimplementations, a server transmits data (e.g., an HTML page) to aclient device (e.g., for purposes of displaying data to and receivinguser input from a user interacting with the client device). Datagenerated at the client device (e.g., a result of the user interaction)can be received from the client device at the server.

As will be described further, the disclosed system 100, may include abin assembly which incorporates a latching mechanism that can lock andunlock bins for secure storage. The latching member can engage anddisengage a latching hook of the bin body to control access to the binvolume. An access controller can control when a bin is locked orunlocked based on one or more of user authentication, detectedenvironmental condition, or control message from another device. Bycontrolling access to the bin volume, inventory, such as medication, canbe stored securely. The description of bin assembly, below, isunderstood as only an example of usage and does not limit the scope ofthe claims. Various aspects of the disclosed bin assemblies may be usedin any application where it is desirable to securely store inventory.

Therefore, in accordance with the present disclosure, it is advantageousto provide a medication storage device as described herein that allowsfor space efficient and secure storage of regulated products, such asmedication. The disclosed medication storage device provides a pluralityof bins that permits configurable and secure storage of regulatedproducts.

Secure Modular Bin Array

Another aspect of the disclosure relates to a slimline smart bin arraysystem enables safe and secured medication management solution with afocus on optimizing the existing user space and resources (“slimlinebin” or “slimline”). According to various implementations, the disclosedsystem includes configurable smart bins (different sizes), wirelessconnectivity, and an enclosure to hold the array of bins securely on awall. The system and method may also include a plurality of userinterfaces, along with actuator that unlocks the slimline bin with asecured authorization from a server. The system and method may furtherimplement a machine learning (ML) inference and data analytics tooptimize power consumption on the slimline bin based on its awareness ofspatial context.

FIG. 6 is a perspective view of a medication management system 10, inaccordance with various aspects of the present disclosure. Withreference to FIG. 6, the medication management system 10 provides secureitem storage and retrieval. As illustrated, the medication managementsystem 10 includes a bin array assembly 200 with a plurality ofconnected bins 210 (e.g., bin 120 of FIG. 1A). As described herein, thebin array assembly 200 can include multiple bins 210 of different sizes.

In the depicted example, the bins 210 can secure store items such asmedication or other regulated products. The bins 210 can be locked toprevent access. In some embodiments, selected bins 210 can be unlockedor otherwise released upon authentication of a user.

Optionally, the bins 210 can include a display, such as an e-inkdisplay. The display can display information about the contents of arespective bin 210. In some embodiments, the bin 210 can present, viathe display or other output device associated with the bin 210, abarcode to provide information to a clinician or other personnel.Information can include the medication name, dosage, and/or expirationdate. In some embodiments, the display can illustrate the trackingstatus of an associated medication, displaying information such as“loading dock” or “in transit.” The display for a bin or for an array ofbins may be controlled by a microcontroller included in housing. Thedisplay may be controlled by a bin-specific microcontroller. In someimplementations, the control may be achieved using a control messagefrom a remote server such as an inventory management server.

In some embodiments, the bin array assembly 200 can include a statusindicator 106. The status indicator 106 can display a plurality ofcolors at various intensities and flash patterns to provide a status ofthe medication management system 10. As can be appreciated, the statusindicator 106 can provide different visual indicators based on anidentified user and workflow. For example, (i) during a medicationloading workflow, the status indicator 106 can provide guidance to theuser, (ii) if medication within a bin 210 is expired, the statusindicator 106 can flash red, (iii) during a medication audit, the statusindicator 106 can provide identifying information, and (iv) if thebattery level of the medication management system 10 is low, the statusindicator 106 can provide a low battery signal. In some embodiments, thestatus indicator 106 includes one or more LED's driven by a FET baseddrive circuitry.

Optionally the medication management system 10 can include microphoneinterface circuitry to allow a user to interface with the medicationmanagement system 10 with “wakeup” words or voice prompts. In someembodiments, the medication management system 10 includes a piezoelectric buzzer to provide audio feedback to the user.

In some embodiments, the components of the medication management system10 can communicate with other components of the medication managementsystem 10 or other systems. For example, the bins 210 can communicatewith each other and the bin array assembly 200 can communicate withother bin array assemblies 200 to share inventory information, etc. Inthe depicted example, the bin array assembly 200 can wirelesslycommunicate with a control panel 12. The control panel 12 can be used toselect or identify medication within the medication management system10. The control panel 12 can identify a bin 210 containing a desiredmedication, as well as information regarding the medication. Optionally,the control panel 12 can be used for authentication purposes.

As illustrated, the bin array assembly 200 can be mounted to a wallsurface to save space. In the depicted example, the bins 210 areinterconnected and mounted to the wall via mounting frame 202. Themounting frame 202 can be vertically affixed to the wall and can receivethe interconnected bins 210 forming the bin array assembly 200. The binarray assembly 200 can be locked or latched to the mounting frame 202with a mounting mechanism 204. The mounting mechanism 204 can be amechanical or electro-mechanical latch to engage with a portion of thebin array assembly 200. For example, the mounting mechanism 204 canincludes one or more latching members or bars (not shown) that extendfrom the mounting frame 202 to releasably engage against the bin arrayassembly 200. In some embodiments, the mounting mechanism 104 includesone or more latching members or bars (not shown) that extend from thebin array assembly 200 to releasably engage against the mounting frame202. By removing the bin array assembly 200, a user can have access tothe rear of the bin array assembly 200. Optionally, a user can manuallyrelease bins 210 using a manual release mechanism disposed at the rearof the bin array assembly 200.

In some embodiments, the bin array assembly 200 can be mounted forcounter top applications As can be appreciated, the medicationmanagement system 10 can be located in any suitable environment such asa medication room, a caregiver station, and/or a patient's bedside. Insome embodiments, the medication management system 10 can withstand, andcan be used in a refrigerated environment.

FIG. 7A is a perspective view of a bin array assembly 200 for use withthe medication management system 10 of FIG. 6, in accordance withvarious aspects of the present disclosure. FIG. 7B is a perspective viewof a bin array assembly 200 of FIG. 7A with a bin 210 c in an openposition, in accordance with various aspects of the present disclosure.With reference to FIGS. 7A and 7B, the bin array assembly 200 is amodular assembly of bins 210 a, 210 b, and 210 c that allow configurablestorage of medication and other items. As shown in FIG. 7B, a selectedbin body 214 c can be opened to expose the volume of the bin body 214 cand access or replace items therein.

In the depicted example, the bins 210 a, 210 b, and 210 c can beconnected to each other in a modular manner to form the bin arrayassembly 200. The arrangement of bins 210 a, 210 b, 210 c can form agenerally rectangular shape or any other shape or pattern. In someembodiments, the respective bin housings 212 a, 212 b, 212 c of the bins210 a, 210 b, 210 c have features or fasteners extending therethroughthat allow the interconnection of the bins 210 a, 210 b, and 210 c.Optionally, the bin housings 212 a, 212 b, 212 c can have connectionfeatures on each of the sides, top and bottom, of the bins 210 a, 210 b,210 c.

In some embodiments, as described herein, the connection features of thebin housings 212 a, 212 b, 212 c can be disposed towards the rear of thebin housings 212 a, 212 b, 212 c. Further, hardware to control theoperation (locking and unlocking) of the bins 210 a, 210 b, 210 c can bedisposed toward the rear of the bins 210 a, 210 b, 210 c.

In the depicted example, an authentication device, such as a smartcardreader 208 can be used to direct and control access to the bins 210 a,210 b, 210 c by locking or unlocking an appropriate bin. In someembodiments, bins 210 a, 210 b, 210 c of the bin array assembly 200 canbe accessed using a personal computer, a tablet computer, a smartphone,a barcode reader, and/or a biometric reader.

During operation, the authentication device can provide a plurality ofuser authentication methods (biometric, smartcard, password, barcode,ECG based wearable device, mobile phone, etc.), allowing the user toselect one or more of the authentication methods. The selection may be auser specific configuration, site specific configuration (e.g., allusers at a given site will be authenticated according to the selectedmethod(s)), or system-wide configuration (e.g., all users of the systemwill be authenticated according to the selected method(s)). Theauthentication device can utilize any suitable personal area network(PAN) protocols, such as 802.15.4, Bluetooth Low Energy, or othershort-range compatible wireless communication protocol, to communicatewith remote devices. In some embodiments, the use of PAN protocols canavoid integration with existing networks, simplifying installation.

Optionally, remote authentication methods can be implemented to allow asuper user to grant remote authorization (e.g. if a user loses theirbadge or smart phone). In any embodiment, data generated or detected canbe forwarded to a “remote” device or location, where “remote,” means alocation or device other than the location or device at which theprogram is executed. For example, a remote location could be anotherlocation (e.g., office, lab, etc.) in the same city, another location ina different city, another location in a different state, anotherlocation in a different country, etc. As such, when one item isindicated as being “remote” from another, what is meant is that the twoitems can be in the same room but separated, or at least in differentrooms or different buildings, and can be at least one mile, ten miles,or at least one hundred miles apart. “Communicating” informationreferences transmitting the data representing that information aselectrical signals over a suitable communication channel (e.g., aprivate or public network). “Forwarding” an item refers to any means ofgetting that item from one location to the next, whether by physicallytransporting that item or otherwise (where that is possible) andincludes, at least in the case of data, physically transporting a mediumcarrying the data or communicating the data. Examples of communicatingmedia include radio or infra-red transmission channels as well as anetwork connection to another computing or networked device, and theinternet or including email transmissions and information recorded onwebsites and the like.

The user's authenticated identity can be transmitted to a server torequest authorization to access a particular medication or item storedin a respective bin 210 a, 210 b, 210 c. Upon receiving authentication,the bin 210 a, 210 b, 210 c can be identified and/or unlocked foraccess. In some embodiments, authentication can proceed in an offlinemode, allowing the user to proceed without network connectivity. In someembodiments, the authentication device can provide an audible signal(for example from a piezo beeper) to indicate registration of useractions.

Optionally, sensors can be utilized within the bins 210 a, 210 b, 210 cto identify the quantity of the contents within each bin 210 a, 210 b,210 c. In some embodiments, beacons can be used for real time and/oroffline asset tracking. Further sensors can be utilized for tamperdetection of the bin array assembly 200.

Sensors included in a bin may include one or more sensors to record, forexample, environmental conditions and evidence related to attempts todivert or tamper with the contents of the bin. For example, a loadsensor may comprise a load cell that can measure the mass of itemscontained in the bin, which can be used to estimate changes in itemquantities. A temperature and humidity sensor may record inside and/oroutside ambient temperature and humidity. A shock and vibration sensormay help to identify unauthorized access attempts to the bin usingforce. A tamper sensor may determine whether intrusion has occurred orif the bin has been removed from a fixture, for example if retainingscrews, containers, covers, or other components of bin have been opened,unsealed, drilled, deformed, or otherwise tampered. For example,mechanical switches, anti-tamper films, photodiodes with reflectivematerials, infrared proximity sensors, and other devices may be used. Alocation sensor may include, for example, a global positioning system(GPS) radio to enable location history tracking. Alternatively oradditionally, in some implementations, triangulation may be used todetermine location, for example by using Wi-Fi or Bluetoothtriangulation using known networks and/or hubs.

FIG. 8 is a perspective view of a bin 210 a for use with the bin arrayassembly 200 of FIG. 2A, in accordance with various aspects of thepresent disclosure. As can be appreciated, the bin 210 a is an exampleof a representative bin that can be used with the bin array assembly200. As can be appreciated, the bin array assembly 200 can utilizesimilar bins that are of single width (FIG. 14), double width (FIG.15A), and/or triple width (FIG. 15B). The housing 212 a can includemounting features along the outer surface of the housing 212 a thatengage with or otherwise interface with similar or mating features onneighboring bins 210 a.

In the depicted example, the bin body 214 a is movable relative to thehousing 212 a. During operation, the bin body 214 a can be moved betweena closed position (FIG. 10A) and an open position (FIG. 10B). In theclosed position, access to the volume defined by the bin body 214 a isprevented by the housing 212. In the open position, the bin body 214 ais moved away from the housing 212 a permitting access to the volumedefined by the bin body 214 a.

As illustrated, the bin body 214 a can pivot or tilt relative to thehousing 212 a to allow the user to access to medication. In someembodiments, the bin body 214 is connected to the housing 212 a by apivot pin 216 a extending from the bin body 214 a. The pivot pin 216 acan extend through a through hole 213 a formed through the housing 212a. In some embodiments, the pivot pin 216 a and the through hole 213 acan be disposed near the front portion of the bin 210 a, allowing thebin body 214 a to pivot or rotate forward to allow access within the binbody 214 a.

Optionally, the bin body 214 a can be biased toward an open position ora closed position by a biasing member or spring 218 a. In someembodiments, the spring 218 a can bias the bin body 214 a forwardrelative to the housing 212 a to the open position. The spring 218 a canbe a rotational spring that is disposed around the pivot pin 216 a. Asdescribed herein, upon unlatching or unlocking the bin 210 a, the spring218 a can rotate the bin body 214 a to an open position to visuallyindicate the bin 210 a to be accessed. The bin 210 a can further includea rotational stop to prevent the bin body 214 a from over rotating.

In some embodiments, the bin body 214 a can include a window 220 a. Thewindow 220 a can allow a user to identify the contents of the bin body214 a prior to accessing the bin volume. In some embodiments, the window220 a can be clear. Optionally, the window 220 a can be translucent,allowing a user to identify that the bin body 214 a contains items, butobscuring details of the items.

In some embodiments, the bin 210 a can include tracking or identifyingfeatures such as bar codes. The bin 210 a can further include tamperevident features.

In some implementations, FIG. 9 is a reverse perspective view of the bin210 a of FIG. 8, in accordance with various aspects of the presentdisclosure. FIG. 10A is a cross-sectional elevation view of the bin 210a of FIG. 8 in a closed position, in accordance with various aspects ofthe present disclosure. FIG. 10B is a cross-sectional elevation view ofthe bin 210 a of FIG. 8 in an open position, in accordance with variousaspects of the present disclosure. With reference to FIGS. 9, 10A, and10B, the bin 210 a includes a latching mechanism to control access tothe bin 210 a.

In the depicted example, an electromechanical (EM) latch 228 a can latchor unlatch the bin body 214 a, locking or unlocking the bin 210 a foraccess. The EM latch 228 a can be mounted to the housing 212 a. Asillustrated, the EM latch 228 a can be mounted to a rear portion of thehousing 212 a. In some embodiments, the EM latch 228 a can engage with aportion of the bin body 214 a to prevent movement of the bin body 214 a(locking the bin 210 a, as shown in FIG. 10A) and protecting thecontents within the bin body 214 a.

In some embodiments, the bin body 214 a includes a latch hook 226 aextending from the bin body 214 a. The latch hook 226 a can be receivedinto the EM latch 228 a. Optionally, the latch hook 226 a can be engagedby a latching member within the EM latch 228 a to lock the bin 210 a.

With reference to FIG. 10B, to release or unlock the bin 210 a, the EMlatch 228 a can release the engaged portion of the bin body 214 a toallow the bin body 214 a to move (unlocking the bin 210 a). Optionally,the latch hook 226 a can be disengaged from the latching member withinthe EM latch 228 a. In some embodiments, the operation of the EM latch228 a, including the movement of the latching member can beelectromechanically actuated.

Upon releasing or unlocking the bin 210 a, the bin body 214 a can berotated or tipped outward to allow retrieval of the contents within thebin 210 a. The opening of the bin body 214 a at the maximum openingangle allows the user unobstructed access to the contents. Optionally,the bin body 214 a can be biased toward an open position upon release ofthe EM latch 228 a. After accessing the contents of the bin 210 a, thebin body 214 a can be rotated or pivoted back toward a closed position.As the bin body 214 a is moved back to a closed position, a portion ofthe bin body 214 a, such as the latch hook 226 a can interface andengage with the EM latch 228 a, relocking the bin 210 a.

In the depicted example, the operation of the EM latch 228 a iscontrolled by a controller 222 a. During operation, the controller 222 acan drive the actuators within the EM latch 228 a and determine thecurrent state of the EM latch 228 a and the bin 210 a. In someembodiments, the controller 222 a can have on-board memory to digitallystore information regarding the bin 210 a contents and/or locationinformation.

Optionally, the controller 222 a can be operatively coupled with sensorsto determine the status of the bin 210 a and/or contents within the bin210 a. For example, the bin 210 a can include a sensor to determine theopen/closed state of the bin body 214 a. In some embodiments, the bin210 a can include tamper detection sensors that utilize optical orelectromagnetic sensors. Optionally, the status or quantity of thecontents within the bin 210 a can be determined with load cells,photodiodes, acoustical sensors, and/or RF sensors.

In some embodiments, the EM latch 228 a and/or the controller 222 a canbe battery 224 a operated or otherwise powered by a power source. Powersources can include distributed power sources, such as rechargeablebatteries, super capacitors, or wireless power transmitters/receivers,or centralized power sources, such as centralized high capacitybatteries, an external power supply, power over Ethernet, and/orwireless power transmitters/receivers. As can be appreciated,centralized power sources can be interfaced to the bin array assembly200 with a docking type or wired physical connector to redistributepower to the bins 210 a. Wireless power transfer can include near field(such as NFC, Qi, Resonant and inductive) or far field (such as WiFi,UHF). Wireless charging schemes can be multiplexed as only one bin 210 ais accessed at a given time within the assembly 200. In someembodiments, guided lights or mechanical features are used to dock thebins 210 a for wireless charging.

Optionally, power conservation methods can be used, such as placingdevices in low power states and waking up periodically to enable radiocommunications and check in with a gateway or hub for updates ortransactions. Environmental sensors, key word activation, and/or useractions, along with usage factors can be used to wake a device up formsleep mode. Further, devices can utilize energy harvesting. Energyharvesting can include harvesting from actuator action and/or wirelessenergy from RF sources.

In some embodiments, the electronics of the bin 210 a are modular andassociated with each bin. In some embodiments, the electronics of thebin 210 a are centralized.

Optionally, the bin 210 a can include tamper resistant features orinterlocks. For example, the bin 210 a can have overlapping featuresthat prevent an unauthorized user from accessing the contents of anadjacent bin after gaining access to one bin. Portions of the bin 210 amay deform to indicate evidence of tampering. For example, the latchhook 226 a may be configured to break inside the EM latch 228 a ifexcessive force is applied, rendering the bin 210 a unusable.

FIG. 11 is a cross-sectional perspective view of a bin 310 a for usewith the bin array assembly 200 of FIG. 7A, in accordance with variousaspects of the present disclosure. In the depicted example, the bin 310a includes features that are similar to the features of bin 210 a.Therefore similar features are referred to with similar referencenumerals.

As illustrated, the bin 310 a includes a handle 321 a. The handle 321 acan be formed as a recessed area in the bin body 214 a. As can beappreciated, the bin 310 a can be used without a biasing spring becausethe user can use the handle 321 a to rotate or pivot the bin body 214 aaway from the housing 212 a.

Optionally, the bin 310 a can include one or more visual indicators toindicate the bin 310 a to the user. The visual indicator can be an LEDto visually indicate the location of the contents and the bin 310 a.

FIG. 12A is a reverse perspective view of a bin 410 a for use with thebin array assembly of FIG. 7A, in accordance with various aspects of thepresent disclosure. FIG. 12B is a reverse perspective view of a binarray assembly 400 for use with the medication management system 10 ofFIG. 1A and FIG. 6, in accordance with various aspects of the presentdisclosure. In the depicted example, the bin array assembly 400 includesfeatures that are similar to the features of the bin array assembly 200and the bin 410 a includes features that are similar to the features ofbin 210 a. Therefore similar features are referred to with similarreference numerals.

In the depicted example, the bin array assembly 400 can utilize commonlatching mechanisms 428 and 429 to latch or unlatch a plurality of bins410, while allowing individual locking or unlocking of each bin 410. Insome embodiments, the common latching mechanisms 428, 429 are mounted toa common portion of the bin array assembly 400.

As illustrated, each bin 410 is redundantly locked by a vertical commonlatching mechanism 428 and a horizontal common latching mechanism 429.As described herein, a bin 410 can be retained or locked in a closedposition, when one or both of the vertical common latching mechanism 428and the horizontal common latching mechanism 429 are engaged with therespective bin body 414.

To unlock a selected bin 410, the corresponding vertical common latchingmechanism 428 and the corresponding horizontal common latching mechanism429 must be disengaged to allow the bin 410 to be unlocked and/or openedby the user. As can be appreciated, other bins 410 that are horizontallyaligned with the bin 410 to be opened are still locked by other verticalcommon latching mechanism 428 while other bins 410 that are verticallyaligned with the bin 410 to be opened are still locked by otherhorizontal common latching mechanisms 429.

With reference to FIG. 12A, for example, the bin body 414 a can includea vertical latch hook 426 a and a horizontal latch hook 427 a bothextending from the bin body 414 a. The vertical latch hook 426 a canengage with a mating latching portion of the vertical common latchingmechanism 428 to lock the bin 410 a. Similarly, the horizontal latchhook 427 a can engage with a mating latching portion of the horizontalcommon latching mechanism 429 to lock the bin 410 a. As can beappreciated, the locking action provided by the common latchingmechanisms 428 and 429 is redundant, meaning that bin 410 a remainslocked if at least one of the common latching mechanisms 428 or 429 isengaged or locked with the bin body 414 a.

To release or unlock the bin 410 a, the common latching mechanisms 428and 429 can be disengaged from the bin body 414 a to allow the bin body414 a to move (unlocking the bin 410 a). In the depicted example, thevertical common latching mechanism 428 can be rotated to disengage fromthe vertical latch hook 426 a. Further, the horizontal common latchingmechanism 429 can be rotated to disengage the horizontal latch hook 427a. As can be appreciated, both common latching mechanism 428 and 429must be disengaged from the vertical latch hook 426 a and the horizontallatch hook 427 a to unlock the bin 410 a. After the bin body 414 a ismoved back to a closed position, at least one of the common latchingmechanisms 428, 429 can be rotated to engage with a respective verticallatch hook 426 a and/or the horizontal latch hook 427 a.

Advantageously, the use of the common latching mechanisms 428 and 429allows for independent locking or unlocking of the bins 410 with reducedcomponents.

FIG. 13 is a reverse perspective view of a bin array assembly 200, 310 afor use with the medication management system 10 of FIG. 6, inaccordance with various aspects of the present disclosure. In thedepicted example, bin array assembly may include one or more latches728. The individual latches 528 of each respective bin 510 are commonlycontrolled by a central or common latch controller module 725.

The latch controller module 725 can connect to the individual latches728 via connector ports. The latch controller module 725 cancooperatively control the latching or unlatching of each bin 210 toallow for centralized control of the bins 210 (e.g., only allowing theopening of one bin 210 at a time).

In implementations according to FIG. 13, one or more of the followingfeatures may be included: (1) The bin frame 200 contains the storage binlocking mechanism. (2) The bin subassembly frame 200 does not contain alatch. (3) The bin frame includes a latch controller module. The latchcontroller module has a connector ports to accommodate up to ninelatches 126. The latch control module contains electronic hardware tooperate up to nine latches independently. (4) Each latch 126 ispositioned and mounted to the frame as needed to control its mating bin.(5) Each storage bin has at least one hook that interfaces with acorresponding latch. (6) Each latch is connected to the latch controlmodule.

Additionally or in the alternative, bin assembly 200 may include apassive near field communication (NFC) antennae 528 for each bin 210within assembly 200. Likewise, each bin may be configured with a passiveNFC tag on a side or rear of the bin that, when the bin is loaded withinthe bin housing 212 of assembly 200, comes into communicable contactwith a respective antennae 728. Control module 725 may be operablyconnected to a bus the within the bin housing via cabling or by wirelessmeans, and the bus may be operably connected to each latch 126 and/oreach NFC antennae. While control module 725 is depicted as a separatedevice from bin assembly 200, it is understood that control module 725may be part or integral with bin assembly 200, or may be part of orintegral with a smart device 130 associated with or linked to assembly200. It is also understood that depicted diagram for antennae 728 mayalso be representative of a respective latch 126 or latch actuator.

Each bin may be associated with a unique identifier, which is stored byits respective NFC tag. The identifiers may be mapped to a particularbin specification (e.g., volume, height, etc.) and particular contentscurrently stored within the bin. For example, server 114 may keep trackof the contents of each bin in a database. When a bin 210 is opened,control module 725, receiving the indication from the NFC tag viaantennae 728, may send a signal to server 114 indicating that the modulewas opened, and may send a close signal with the status of the binchanges from open to closed.

Control module 725 may also send the bin location within the assemblytogether with the identifier of the bin. This way, if a clinicianreconfigures the bins, server 114 will update the new configuration inmemory. The stored configuration can then be used to provide an alert tothe clinician should the clinician move a bin to an undesirablelocation, or rearrange the bin assembly in a manner not consistent witha healthcare organization's policy or predetermined rules. When anaccess controller is associated or integrated with control module 725,the bins may be remotely managed using a single interface. If theclinician using an IOT inventory tracker or other smart remote device toopen a bin corresponding to a medicine, the server 114 may perform acheck to determine which bin holds the requested medicine (e.g., byquerying the control module 725), before opening the bin. If theclinician attempts to open the wrong bin, or attempts to place a bin inthe wrong assembly location, the control module (via the assembly orsmart device 130) may provide an audible and/or visual alert. Controlmodule 725 may also lock a bin from being opened or being inserted intoa bin location.

According to some implementations, control module 725 may provide powerto the various components of an associated bin assembly 200, includingto each bin 210 with the assembly. Power may be daisy chained fromcontrol module 725 to one bin location to another, and so on. Controlmodule 725 also includes a central processing system or processor, suchas that described with respect to FIG. 5. With reference to FIG. 12,control module 725 may act as a master hub, and operate all bins asslaves in a master/slave configuration. Such configuration may be by wayof wired cables or by wireless connection (e.g., BLUETOOTH) between thecontrol module and each bin.

FIG. 14A is a perspective view of a bin 610 a for use with the bin arrayassembly 200 of FIG. 7A in a closed position, in accordance with variousaspects of the present disclosure. In the depicted example, the bin 610a includes features that are similar to the features of bin 210 a.Therefore similar features are referred to with similar referencenumerals. In the depicted example, the bin 610 a can include a handleportion 620 a to allow a user to open or close the bin body 614 a.

FIG. 14B is a perspective view of the bin 610 a of FIG. 14A with the bin610 a in a partially open position, in accordance with various aspectsof the present disclosure. As illustrated, the bin body 614 a can slideor translate relative (e.g. similar to a drawer) to the bin housing 612a for access into the bin volume to allow the user to access medication.The bin body 614 a can slide until reaching a travel or slide stopfeature.

Optionally, the bin body 614 a can be spring loaded, such that the binbody 614 a moves outward upon unlocking or latch release, indicating thelocation of a desired item. In some embodiments, the bin 610 a caninclude a visual indicator, such as an LED to indicate the desired itemslocation.

FIG. 14C is a perspective view of the bin 610 of FIG. 14A with the bin610 a in an open position, in accordance with various aspects of thepresent disclosure. In the depicted example, the bin body 614 a canpivot downwards after extending away from the bin housing 612 a. In someembodiments, the rear portion of the bin body 614 includes a pivot pinthat allows the bin body 614 a to slide outward, and then rotatedownward at the end its travel. Advantageously, by rotating or pivotingthe bin body 614 a downward, access to the items within the bin volumecan be improved. In some embodiments, the bin body 614 a can be removedfrom the bin housing 612 a to allow for items to be loaded or removedfrom the bin body 614 a or for items within the bin body 614 a to becounted.

Optionally, if a bin body 614 a is removed from the bin housing 612 aand not returned within a predetermined period of time, an alarm maytrigger indicating a potential tamper/theft event.

FIG. 15A is a perspective view of a bin 210 b for use with the bin arrayassembly 200 of FIG. 7A in a closed position, in accordance with variousaspects of the present disclosure. FIG. 15B is a perspective view of abin 210 c for use with the bin array assembly 200 of FIG. 7A in a closedposition, in accordance with various aspects of the present disclosure.In the depicted example, the bin 210 b and bin 210 c each includefeatures that are similar to the features of bin 210 a. Thereforesimilar features are referred to with similar reference numerals. Asdescribed herein, the bins 210 b and 210 c include similar features butmay be of varying widths. In some embodiments, the bin 210 b and bin 210c can be wider than the width of the bin 210 a. The bin 210 b can beapproximately twice the width of bin 210 a. The bin 210 c can beapproximately three times with width of the bin 210 a.

FIG. 16A is a perspective view of a mounting frame 750 for use with thebin array assembly 200 of FIG. 7A, in accordance with various aspects ofthe present disclosure. In the depicted example, the bin array assembly200 can be mounted to a wall or other flat surface with a mounting frame750. The mounting frame 750 can be securely mounted to a wall or otherflat surface. The mounting frame 750 can receive the bin array assembly200 therein. In some embodiments, the bin array assembly 200 can belatched to the mounting frame 750 by a locking or latching mechanism752. The latching mechanism 752 can be an electromechanical latch. Thebin array assembly 200 may be attached and removed from the mountingframe 750 as needed.

FIG. 16B is a perspective view of a mounting frame 850 for use with thebin array assembly of FIG. 7A, in accordance with various aspects of thepresent disclosure. In the depicted example, a counter top medicationsystem 800 can utilize a bin array assembly 200′ that is mounted to acounter top or similar surface with a mounting frame 850. The mountingframe 850 can be securely mounted to a counter top or other fixture. Themounting frame 850 can receive the bin array assembly 200′ therein.

As can be appreciated, the smartcard reader 208′ can be arranged at thetop of the bin array assembly 200′ to facilitate countertop mounting.

In healthcare settings, there is a need for space & cost optimizedenterprise secured medication storage and dispensing solutions. Somesolutions use an automated dispensing cabinet (ADC) to controlmedications. ADC are expensive and take up a significant space. Existinguser space such as drawers, cabinets and carts may be used to store anddispense medications. However, drawbacks include a lack of security,poor traceability of the medications, and a very manual process whichutilizes more nurses or care giver resources. The disclosed solutionincludes a slimline with smart bin array transforms the underutilized orunutilized user wall space into a highly optimized enterprise medicationmanagement space.

Systems and methods for highly optimized medication storage anddispensing in healthcare settings are disclosed. The systems and methodsmay include a wall mounted slimline smart bin array system withconfigurable wirelessly connected smart bins (e.g., in different sizes),a plurality of user interfaces, a server authorized actuator lock, andmay include location tracking, and may enable an enterprise solution forinventory tracking.

The disclosed system may include a processor, memory, input/outputdevice, environmental sensor, tamper detection and wireless interface.

Other features may include one or more of the following: E-ink display,microphone, buzzer and multicolor LED for user interface; identityauthentication module (IAM) interface that enables plurality of userauthentication methods such as smart card reader or biometric; FET baseddrive circuitry to drive the multicolor LED that supports plurality ofcolors, intensity and flash pattern to indicate glanceable status of thesystem; drive circuitry for E-ink user interface with plurality of viewseach configured to present the current state of the workflow; drivecircuitry for piezo electric buzzer to provide audio feedback to theuser; microphone interface circuitry for the user to provide wakeupwords and or voice prompts; actuator latch drive circuitry and latchstate read back methods; memory interface to store state and statisticsof slimline bin status; sensor interface to monitor tamper,environmental condition & content sensing; and crypto and secure elementinterface to safely store public/private keys.

The disclosed system architecture may optimize an existing user spacewith a wall mounted slimline enclosure and configurable smart bins withwireless connectivity. In some implementations, a slimline enclosure andbin may be placed on a countertop.

In some implementations, the disclosed system architecture may include alatch and electronics to drive the latch as part of the bin. In someimplementations, both the latch and electronics may be part of slimlineenclosure.

In some implementations, the disclosed system architecture may include abin that tilts open giving user access to medication and in otherimplementation bin pops open as a drawer.

In some implementations, the disclosed system architecture mayautomatically determine a plurality of user authorization methods. Theuser may then select one of the determined authorization methods tounlock the slimline bin.

An authentication method that securely transmits the user identity tothe server and gets authorization to unlock the slimline bin is alsodisclosed. In some implementations, the system may include, and theauthentication method may use, contactless smart card and in otherimplementations it could use barcode, biometric identification, ECGbased wearable device or a mobile phone. In some implementations, theauthentication method may include remote authentication. For example, ifthe user loses their badge or smart phone, a super user can provideremote authentication.

In some implementations, the systems and/or methods may utilize a sensorinterface to automatically identify the quantity of contents in theslimline bin and tamper detection of slimline bin or enclosure. Forexample, the method may include monitoring for tamper detection onslimline enclosure attached to wall (e.g., using one or more sensors),and the slimline bin attached to enclosure, in real time using optics orelectromagnetic sensing. In some implementations, the system and/ormethod includes a sensor interface such as load cell, optics with a led& photodiode, acoustics or RF to sense the quantity of content insidethe bin.

A method by which an audible sound indicates user actions such aspresenting badge to the slimline or when an actuator command is beenexecuted is also disclosed. In some implementations, the system mayinclude, and the method may use, a piezo beeper with different tones toindicate different actions.

According to various implementations, the system may includecommunication architecture (CA), which may use plurality of PANprotocols such as (802.15.4/BLE) to talk to the remote device.Accordingly, the disclosed system and/or method may use the CA toachieve one or more of the following features: beacon for assettracking; real time and offline mode support.

In some implementations, the disclosed slimline bin (e.g., using CA) maybypass hospital IT, thereby reducing implementation time (e.g.,implementing a drop ship model based on PAN protocol support).

The system and/or method implementing communication architecture (CA)may support an offline mode. When a network connection to the field hubor gateway is lost the disclosed slimline bin(s) may still allow theuser to continue with their action, and the system may store and forwardthe actions when the network is restored.

In some implementations, the slimline bin(s) have the ability tobroadcast beacons to a remote host, with the medication information forasset tracking. In some implementations, users can also read the beaconsusing a mobile device such as a phone or tablet.

In some implementations, the disclosed system and/or methods may includepower architecture that utilizes disposable batteries or, in otherimplementations, the power architecture may implement rechargeablebattery or a supercapacitor as an energy source for each bin. In someimplementations, the power architecture (PA) may require one highcapacity energy source to power the entire slimline bin array. Fordifferent implementations of high capacity energy source (PoE, battery,external power supply) and its interface using wired or dockingconnector see attached slides and docs.

In some implementations, a slimline bin array may be connected to anexternal power supply, the external power supply may directly power theslimline bin, or may charge the battery on the bin or enclosure. In someimplementations, the disclosed system and method may include powerarchitecture that uses wireless power transfer to access the slimlinesmart bin.

A method for charging the system using a plurality of wireless energysources is also disclosed. In some implementations, a near field (suchas NFC, Qi, Resonant and inductive) or far field (such as WiFi, UHF)wireless power transfer are used as energy source to access the slimlinebin.

In some implementations, a multiplexed wireless charging scheme may beused to charge the secure storage solution. In some implementations,only one storage location may be accessed at a given time inside aslimline.

In some implementations, guided lights or mechanical features are usedto dock the secured storage space for wireless charging.

A method for conserving power in battery operated devices based onsystem factors and user preference is disclosed. In someimplementations, the method may include placing devices in low powerstates (ranging from system off state to various levels of sleep state)and waking up the devices periodically (wake up period) to enable radiocommunications, and checking in with a gateway/hub for updates or toperform transactions.

The low power state and wake up period may be configured by thegateway/hub for devices based on system usage factors and userpreferences.

In some implementations, the system may include, and the method mayinclude using, environmental sensors such as occupancy sensors. In someimplementations, the system and/or method may use microphone with keyword activation, user action by pushing a button or system usage factorssuch as user presence, office schedule to wake up the device from deepsleep mode.

A method for energy harvesting using plurality of sources to increaseslimline smart bin operation life is also disclosed.

In some implementations, electromagnetic induction from lock actuatoraction or wireless energy from RF sources may be used to harvest energy.

In some implementations, the e-ink of the user interface of the devicemay display medication name, dosage and expire date. In otherimplementations, icons such as loading dock or in transit may bedisplayed to show the current status of associated medication that isbeen tracked.

In some implementations, the multicolor LED user interface may act as aglanceable status indicator. For example, the LED color, flash patternand intensity may indicate different status based on user accessing thesecure storage location and workflow.

Example 1: During medication loading workflow the led lighting can guidethe user to the medication at a glance.

Example 2: If the medication in the slimline bin expired the LED canflash red.

Example 3: During medication audit the system may guide by lighting theLED's so the user can identify the med easily.

Example 4: If the battery level lower than threshold led can flash.

FIGS. 17A, 17B, and 17C depict various implementations of a smart system100, including a interactive storage device 130 and/or a smart lock,according to some aspects of the subject technology. In these examples,the system includes plurality of user interfaces, a server authorizedactuator lock, lock and door sensors, identity authentication module,and other components that enable an enterprise solution for securingmedication and guided loading of medication.

The E-ink user interface of the device may, in some implementations,display status of the smart lock system using icons such as batterylevel, network connectivity, status of the latch and door.

The E-ink user interface of the device may, in some implementations, insome implementations may display alerts such as expired medication,medication below par, tamper detection and etc.

The E-ink user interface of the device may, in some implementations,display information collected from the environmental sensor. Examples ofsuch information collected include temperature of medication, monitortamper evidence sensor signal, humidity, shock, and vibration over time.

The E-ink user interface of the device may, in some implementations,dynamically display information based on configuration associated withthe user as to the contents of the display.

In some implementations, the multicolor LED user interface may act as aglanceable status indicator. The LED color, flash pattern, or intensitymay be adjusted by the device (or in response to a control signal from acentral control server) to indicate different status. The status may bebased on user accessing the secure storage location, workflow, inventorylevel, or other detectable characteristic of the device or contentsthereof.

Example 1: During medication loading workflow the LED lighting can guidethe user to the medication at a glance.

Example 2: If the medications being secured by the smart lock hasexpired the LED can flash red.

Example 3: During medication audit the system may guide by lighting theLED's so the user can identify the med easily.

Example 4: If the battery level lower than threshold LED can flash inlow intensity.

Example 5: LED color and flash pattern to indicate authorized userunlocked the latch.

Also provided is a computer implemented method by which a handhelddevice can scan the LED color, intensity and flash pattern and identifyits status during manufacturing or in field. The computer-implementedmethod may be performed under control of one or more processing devices(e.g., CPUs or computer systems and/or devices).

The method may be implemented, in whole or in part, using an inspectionequipment, a mobile application, and an optical reading device to readthe multicolor visual indicator and analyze the reading to determine thefailure modes and conditions on smart lock. Reading the indicator mayinclude capturing an image of the LED. Reading the indicator may includecapturing a series of images of the LED. The series may be captured fora period of time or number of frames identified using a configurationvalue. The series may be captured based on information encoded by theLEDs. For example, a preamble pattern or color may identify the start orend of a status sequence. When the device reads this pattern for asecond time, the device may terminate reading and being the analysis ofthe captured image(s).

The authentication system may automatically determine a plurality ofuser authorization methods. The user may select one of the determinedauthorization methods to unlock the smart lock.

Features are also described for securely transmitting a user identity toa server and transmitting an authorization to unlock the smart lock. Theauthentication may, in some implementations, include reading data from acontactless smart card. In other implementations, it may use barcode,biometric identification, ECG based wearable device, a mobile phone, ora combination of the authorizations to request unlocking of a smartlock.

The authentication may include remote authentication. For example, userscan enter credentials at tablet or PC or use a standalone authenticationmodule to gain access to the smart lock or if the user loses their badgeor smart phone a super user can provide remote authentication.

The sensor interface in an environment associated with a smart lock maymonitor NIST traceable environmental sensor or tamper detection data inreal time (e.g., within a threshold period of time from actualoccurrence of the sensed environment condition or tamper event).

The systems or methods may generate an audible sound acknowledging useractions such as presenting badge to the smart lock or when an actuatorcommand is been executed.

For example, in some implementation, a piezo beeper may be configured toemit different tones whereby each tone indicates a different action.

The communication architecture (CA) for the systems and methods, mayinclude one or more of a plurality of personal area network (PAN)protocols such as (802.15.4/BLE) to communicate with the remote device.

The CA may be configured to detect beacon signals for asset tracking,provide environmental sensor and tamper detection monitoring, generatereal time and offline mode support, or identify tote contents and trackinventory. Because some health care supplies are temperature sensitive,if an environmental sensor determines that the temperature or humidityto which an item was exposed is outside an expected range, the systemmay dynamically adjust to alert or prevent dispensing of exposed items.Similarly, a sensitive item may have been tampered with. The system maydirect storage or prevent distribution of such items until the integrityis confirmed. The confirmation may include an authorized user verifyingthe item before being eligible for dispensing and use in the healthcarefacility.

According to various implementations, the smart lock CA can bypass setup and attachment to hospital IT resources. This can reduceimplementation time and make it a drop ship model because of PANprotocol support.

A smart lock device may be configured to act as a companion device fordevices placed inside the enclosure to bridge communications. Connecteddevices placed inside enclosures, such as refrigerators and metalcabinets, may have their radio signals attenuated and have difficultycommunicating to hubs located further away. In these cases, anotherdevice such as the Smart lock is used as companion device to enablereliable communication to the hub/gateway. Smart lock when acting as acompanion device can fill two roles: (i) a slave role communicating tothe hub; (ii) a master role communicating to the devices behind theenclosure.

FIG. 18 depicts the disclosed interactive storage devices 130 arrangedin a multi-level network hierarchy, according to various aspects of thesubject technology. In the depicted example, interactive storage devices130 may be configured to communicate back to a hub either directly orthrough another device.

The power architecture of the smart lock device and/or system mayinclude disposable batteries and in other implementations it may includerechargeable batteries. To improve efficiency of the devices byconserving power in battery operated devices, the power managementmodule may operate based on system factors and user preference. Thepower management module may be implemented within a specific device toconserve resources of the device in which it is implemented. The powermanagement module may be a central device configured to manage power fora group of devices in data communication therewith.

Devices may be placed in various low power states and may be configuredto wake up periodically. The power management module may transmit acontrol signal to the devices in various low power states to wake upthem up periodically (wake up period) and enable radio communicationsand check in with a gateway/hub for updates or to perform transactions.

The power saving states may be used to adjust device responsivenessversus power savings. The low power states and wake up period may bedynamically configured by the gateway/hub for devices based on systemusage factors and user preferences.

Power states may be adjusted based on user presence. For example, if asensor detects that users are present, the devices may be controlled tooperate in more responsive states in anticipation of the system beingused. If a sensor detects that users are not present or have left anarea including one or more devices, the power management module mayadjust devices within the area to operate in less responsive states, tomaximize power savings.

User presence can detected in different ways including users logginginto the system or by occupancy sensors such as motion, radar, andproximity sensors. Occupancy sensors are envisaged to be powered deviceslocated in the health care service area (e.g., examination room,procedure room) and interface to the gateway/hub.

In some instances, users may provide an office schedule into the systemand power states are adjusted based on this schedule (e.g., when anappointment is included for a time period on the schedule). The officeschedule may indicate times when clinicians are working in the healthcare facility. Similar power adjustments may be controlled based onshifts when clinicians are active as indicated by the schedule.

Some instances may include microphones coupled with a speech detectionsystem. The speech detection system may identify a key word to activateone or more device (e.g., adjust power state to an active/ready mode).In some implementations, a user action such as pushing a button orsystem usage factors such as user presence, may be used to wake up thedevice from a sleep mode.

In some instances power states may be adjusted by ML algorithms runningon the hub/gateway and/or cloud. For example, historic patterns of usagemay be analyzed to develop a model of power state activity that may beused to control one or more devices.

Features may also be included for harvesting energy using plurality ofsources to increase smart lock operation life. In some instances usespiezo transducers interfaced to buttons or electromagnetic inductionfrom lock actuator or drawer/door open and close action or wirelessenergy from RF sources to harvest energy.

The latch and door sensors included the system may include sensors toread the status of both the latch and door/drawer at all times. Thiscapability enables workflow execution and also is used to detect tamperdetection.

FIGS. 19A, 19B, and 19C depict a remote smart lock reader moduleconfigured to unlock a securable container, according to various aspectsof the subject technology. FIG. 19C depicts the remote smart lock readermodule added to cabinet doors and/or cabinet drawers for controlledsecurity. In the depicted example, a smart lock reader module may beimplemented as a mobile device that contains a PCBA, NFC reader, MultiColored LEDs, Common Batteries, mounting features, e-ink display,biometric reader, audio buzzer, LED light pipe, barcode, snap-on coverin order to access the batteries.

FIGS. 20A, 20B, and 20C depict an electromechanical latch 126 mounted toan interior surface of the door or drawer using a bracket 1602,according to various aspects of the subject technology. Theelectromechanical latch is operably connected to the smart lock readermodule 208′, which may electronically control the latch. The shape ofthe housing allows the user to grip the smart lock and use it has a dooror drawer handle.

The screws that mount the bracket pass through the door or drawer andthread into the outer housing. When the batteries expire, the latchremains in the locked position and the batteries are replaced tocontinue operation. The LEDs indicate location. Audio indicator canalert an open door or drawer. A sensor is used to determine if thedoor(s) are in the closed or open position. A sensor is used todetermine if the latch is locked or unlocked.

The smart lock can communicate wirelessly to other devices. The smartlock units can have overlapping features, interlocks and to preventdiversion and indicate tamper evidence.

FIGS. 21A and 21B depict a cut-away view of an example IOT(Internet-of-things) smartlock reader module (SRM), according to variousaspects of the subject technology. According to some implementations,the disclosed IOT SRM includes a device that may be attached to arefrigerator. In this regard, the IOT SRM may incorporate anelectro-mechanical lock 126 for secured access to the refrigerator. TheIOT SRM may include an (e.g. e-ink) display 164, LED indicator,Temperature readout, and common batteries for ease of replacement. TheIOT SRM may be configured to communicate wirelessly with other devices.The IOT SRM may include a manual release key 104 to release lock 126 bymechanical means (e.g., when power has been removed from the lock).

FIG. 22 depicts an example IOT SRM mounted on the exterior surface of arefrigerator, according to various aspects of the subject technology.The refrigerator may include an off-the-shelf “dorm” style refrigeratorfor controlled security. The IOT SRM may include a repeater to aid inthe communication of IOT devices within the refrigerator. The IOT SRMmay include overlapping features, interlocks and materials to indicatetamper evidence. The IOT SRM may include a key lock for manual release.

Modular Dispensing Bin

Another aspect of the disclosure relates to a smart bin or tote system,device, and/or corresponding methods which provide secure access andtransport of items including medications and supplies (the “smart bin”).The disclosed smart bin may be configured for controlled,non-controlled, refrigerated and non-refrigerated items in both acuteand non-acute health care settings. The disclosed smart bin may beconfigurable to allow the different authentication requirements of bothregulatory bodies and hospitals.

FIG. 23 depicts an example smart bin system for dispensing items,according to various aspects of the subject technology. In variousimplementations, the smart bin system and/or device(s) may be configuredas a singular, stackable and secure modular bin, for item storage andretrieval. A smart bin may communicate wirelessly with other devices,and may be configured to record user access.

The smart bin system and/or device(s) may be configured to withstand arefrigerated environment, and may include material and components thatmay be used at cold temperatures. The smart bin system and/or device(s)may be placed in a refrigerator and may support optional sensors fortemperature and humidity. The smart bin system and/or device(s) may beconfigured with overlapping features and interlocks to preventdiversion. The smart bin system and/or device(s) may be designed toindicate an user's attempt to divert. The smart bin system and/ordevice(s) may be formed of or include material that may be deformedshowing taper evidence. Additionally or in the alternative, the smartbin system and/or device(s) may include a hook configured to break andleave a piece in the latch making it unusable thereby indicating abreak-in.

The disclosed smart bin may provided in multiple sizes to accommodatedifferent items and is stackable to optimize storage locations. Thedisclosed smart bin may be a wireless connected device connected to agateway and connects to an enterprise level application. According tovarious implementations, users may authenticate using remoteauthentication methods (such as a tablet or standalone authenticationmodules) and a secure and traceable access is provided to the smart bin.The disclosed smart bin may include one or more user interfaces thatinclude multi-color LEDs, E-Ink display, buttons and audible buzzers. Insome implementations, smart bin may include a machine learning (ML)inference and data analytics to optimize power consumption on smart binbased on its awareness of usage context. In some implementations, thedisclosed system, device, and/or method includes a handheld device ormobile application that can scan multicolor led and identify systemstatus during manufacturing or field.

The disclosed smart bin and related systems and method may includeimplementation of an enterprise level solution that providestraceability and inventory tracking of item in a multitude of use cases.

Secured storage for controlled medications involve off the shelf keyedor combination lock bins that are placed on countertops or insidecabinets and drawers. Users may use the same key or combination numbersto access medication. However, these solutions are not traceable as towho accessed the medication. Additionally, tracking of inventory innon-acute care settings is performed manually and is not accurate. Thesmart bin described herein provide secure traceable access to thesemedications. The smart bin may also provide a display screen to indicatequantity and buttons for users to increment or decrement quantities, andmay be connected to an enterprise level medication management softwarewhich enables end to end inventory management.

According to some implementations, the disclosed smart bin is configuredto be placed inside refrigerators to provide secure access and inventorymanagement to refrigerated medications. In some implementations, thesmart bin may be configured as a mobile device which may be used forsecure transport of medication. A secure bin may be used on its own orplaced inside the previously described smart tote for secure transport.The smart bin may be configured to beacon its unique ID over thewireless interface and is used for location tracking of the bins.

In some implementations, the smart bin is a stationary device located inmedication rooms, at a bedside of the patient, or at other carelocations. In some implementations, the disclosed smart bin is locatedinside refrigerators. The disclosed smart bin may be configured to behardened to withstand refrigerated environments. In someimplementations, the disclosed smart bin is a mobile device used forsecure transport of items. The disclosed smart bin may include aplurality of user interfaces which enables an enterprise solution forsecuring one or more items and guide the loading of the item(s).

With further reference to FIGS. 1 and 17A, 17B, and 17C, the disclosedsystem and/or device may include an E-ink user interface. In someimplementations, the user interface may display status of the disclosedsmart bin using icons such as battery level, network connectivity,and/or status of the latch and door. In some implementations, the userinterface may display alerts such as expired medication, below par,tamper detection etc. In some implementations, the user interface maydisplay information collected from an environmental sensor. For example,the user interface may display information such as temperature ofmedication, monitor tamper evidence sensor signal, humidity, shock andvibration over time. In some implementations, the user interface maydisplay item name and item quantity. In some implementations, thecontents of the display is configurable by the user.

In some implementations, the user interface may include one or morebuttons that are used to decrement and increment quantity of the item.In some implementations, the user interface may function as a glanceablestatus indicator. For example, LED color, flash pattern and intensitymay indicate different status based on user accessing the secure storagelocation and workflow.

Example 1: During medication loading workflow the led lighting may guidethe user to the medication at a glance.

Example 2: If the medications being secured by the Smart bin has expiredthe LED can flash red.

Example 3: During medication audit the system may guide by lighting theLED's so the user can identify the med easily.

Example 4: If the battery level lower than threshold led can flash inlow intensity

Example 5: Led color and flash pattern to indicate authorized userunlocked the latch.

In some implementations, the disclosed smart bin system may include orembody a handheld device that may scan the led color, intensity andflash pattern, and identify its status during manufacturing or in field.In some implementations, the Smart bin system may include inspectionequipment or a mobile application, and/or an optical reading device toread the multicolor visual indicator and to obtain the failure modes andconditions on smart bin.

Access to disclosed smart bin may be authenticated via remoteauthentication. For example, users can enter credentials at tablet or PCor use a standalone authentication module to gain access to thedisclosed smart bin. If a user loses their badge or smart phone thesuper user may provide remote authentication.

In some implementations, the disclosed smart bin may be configured toproduce an audible sound that indicates user actions such as when anactuator command is been executed. In some implementations, thedisclosed smart bin includes a piezo beeper is used with different tonesto indicate different actions.

In some implementations, the disclosed smart bin may include anenvironmental sensor interface system. In some implementations theenvironmental sensor interface system may be capable of monitoring NISTtraceable temperature sensors used for cold storage of vaccines. In someimplementations the environmental sensor interface system may be capableof monitoring plurality of sensors including: temperature, humidity,vibration, orientation and acceleration of the smart bin.

In some implementations, the disclosed smart bin may include a tamperdetection system. The tamper detection system may be configured todetect tamper via the foregoing environmental sensors and/or additionalsensors (e.g. optical and electromagnetic sensors) located on the latch,drawer and lid which detect unauthorized access to contents of smartbin.

In some implementations, the disclosed smart bin may include a contentdetection subsystem. The content detection subsystem may utilize thesensor interface to automatically identify the quantity of contentsinside smart bin. In some implementations, the disclosed smart bin maysupport a sensor interface such as load cell, optics with a led &photodiode, acoustics or RF to sense the quantity of content inside thebin. In some implementations, the disclosed smart bin may support acoarse level of identification used for auto-detection PAR levels.

In some implementations, the disclosed smart bin may include a powersubsystem. The power subsystem may be configured to support adistributed architecture where each bin has its own wirelesscommunication interface and power source. In some implementations, thepower subsystem may include a central architecture where multiple binsare wired to a single controller. The controller may provide wirelesscommunications and power source for multiple bins. Accordingly, thenumber of wireless communication interfaces, electronics and powersources may be reduced, which may be desirable in cases where many binsare co-located (i.e. multiple bins stacked inside one cabinet).

The disclosed system, device, and/or method may include a communicationarchitecture (CA). In some implementations, the CA may be configuredwith a plurality of PAN protocols such as (802.15.4/BLE) to talk to aremote device. A method that utilizes the CA may include one or more ofthe following features: beacon for asset tracking; real time and offlinemode support; environmental sensor and tamper detection monitoring;content identification and inventory tracking. In some implementations,the smart bin (e.g., using CA) may bypass hospital IT, thereby reducingimplementation time (e.g., implementing a drop ship model based on PANprotocol support).

According to various implementations, the disclosed smart bin may beconfigured to act as a companion device for devices placed inside theenclosure to bridge communications. Connected devices placed insideenclosures, such as refrigerators and metal cabinets, may have theirradio signals attenuated and have difficulty communicating to hubslocated further away. Accordingly, the smart bin may be used ascompanion device to enable reliable communication to a hub/gateway. Thesmart bin when acting as a companion device may play two roles: (1) Aslave role communicating to the hub; and (2) A master role communicatingto the devices behind the enclosure. As discussed previously with regardto FIG. 12, the foregoing creates a multi-level network hierarchy in thenetwork of devices all communicating back to the hub either directly orthrough another device.

In some implementations, the disclosed smart bin system and/or devicemay include a power architecture (PA). In some implementations, the PAmay be configured to use disposable batteries or, in someimplementations, rechargeable batteries.

In some implementations, the disclosed smart bin system, device, and/orcorresponding method may be configured for energy harvesting using aplurality of sources to increase smart bin operation life. In someimplementations, the smart bin may be configured with piezo transducersinterfaced to buttons or electromagnetic induction from lock actuator ordrawer/door open and close action or wireless energy from RF sources toharvest energy. In some implementations, the disclosed smart bin systemand/or device may include a power management subsystem that conservespower in battery operated devices based on system factors and userpreference. In this regard, a method for conserving power may includeplacing devices in various low power states to wake up periodically(wake up period) and enable radio communications and check in with agateway/hub for updates or to perform transactions. Power saving statesmay adjust device responsiveness vs power savings. The low power statesand wake up period may be configured by the gateway/hub for devicesbased on system usage factors and user preferences.

In some implementations, power states may be adjusted based on userpresence, if users are present the devices are placed in more responsivestates in anticipation of the system being used. If users are notpresent the devices may be put in less responsive states, to maximizepower savings

In some implementations, the smart bin may detect user presence. Forexample, smart bin may detect users logging into the system, byoccupancy sensors such as motion, radar, and proximity sensors.Occupancy sensors may be configured to be powered devices located in themed room area and interface to the gateway/hub.

In some implementations, the disclosed system may receive user input ofoffice schedule into, and power states may be adjusted based on thisschedule. In some implementations, the disclosed system may usemicrophones with key word activation to wake up the device from deepsleep mode. In some implementations, power states may be adjusted by MLalgorithms running on the hub/gateway and/or cloud.

In some implementations, the disclosed smart bin system and/or devicemay include a monitoring subsystem. The monitoring subsystem may includeor interface with sensors which monitor health of the device includingthe environmental sensors, and/or additional sensors monitoring theoperation of the device such as currents on motors, voltages,temperatures of critical components, etc.

In some implementations, the monitoring subsystem may be configured totransmit collected data to the hub/gateway/cloud for analytics. In someimplementations, the disclosed smart bin system and/or device mayinclude a secure transport subsystem. The secure transport subsystem maybe configured to facilitate use of the smart bin for secure transport ofitem.

In some implementations, the smart bin may be used as a standalonetransport or may be placed inside a tote (e.g., the disclosed smarttote). In some implementations, the smart bin may be configured to playa beacon role, advertising its unique ID, so it may be identified andlocated for asset tracking by hubs or mobile devices. Unique ID andconfiguration information, including contents of the smart bin, may bestored locally on the device in a non-volatile memory. This informationmay also be made available to an online database (e.g., for retrievalview an online network).

In some implementations, the secure transport smart bin may beconfigured to be tracked by hubs which are in areas of interest. As thedevice moves. hubs located in the area may be able to read the beaconand identify the device. For example, hubs may be placed in areas ofinterest such as shipping and receiving, staging areas, hallways etc. Insome implementations, the beacons may be read by mobile devices. In someimplementations, the secure transport smart bin may be queried directlyby hubs or mobile devices for additional information such as contents ofsmart bin, destination, battery level, environmental sensors etc.Alternatively, the mobile device and/or hubs may be network connectedand may be configured to retrieve information about the smart bin from anetwork database using the beacons unique ID.

In some implementations, the secure transport smart bin may be configureto implement wireless signal characteristics, which may be used tolocate and guide a user to the smart bin modules. This may be desirablewhere a specific device needs to be located and a user may be guided tothe unit they are looking for.

Illustration of Subject Technology as Clauses

Various examples of aspects of the disclosure are described as numberedclauses (1, 2, 3, etc.) for convenience. These are provided as examples,and do not limit the subject technology. Identifications of the figuresand reference numbers are provided below merely as examples and forillustrative purposes, and the clauses are not limited by thoseidentifications.

Clause 1. A bin assembly, comprising: a bin housing adapted to receivebins of varying sizes, the bin housing including a vertical mountingstructure; a bin body comprising a latching hook and the bin bodydefining a bin volume, wherein the bin body is movable relative to thebin housing to permit access to the bin volume in an open position andto prevent access to the bin volume in a closed position; a latchingmechanism coupled to the bin housing, the latching mechanism comprisinga latching member, wherein the latching member engages the latching hookin a locked position to retain the bin body in the closed position andthe latching member is spaced apart from the latching hook in a releasedposition; and a controller configured to: receive a wireless controlsignal; and control movement of the latching member based at least inpart on the wireless control signal.

Clause 2. The bin assembly of Clause 1, further comprising a batteryoperatively coupled to at least one of the latching member and thecontroller.

Clause 3. The bin assembly of Clause 1, wherein the bin body comprises awindow.

Clause 4. The bin assembly of Clause 1, wherein the bin body pivotsrelative to the bin housing.

Clause 5. The bin assembly of Clause 4, further comprising a biasingmember to urge the bin body toward the open position or the closedposition.

Clause 6. The bin assembly of Clause 4, wherein the bin body comprises apivot pin extending into the bin housing.

Clause 7. The bin assembly of Clause 6, wherein the pivot pin extendsfrom a front portion of the bin body.

Clause 8. The bin assembly of Clause 6, wherein the pivot pin extendsfrom a rear portion of the bin body.

Clause 9. The bin assembly of Clause 1, wherein the bin body comprises ahandle.

Clause 10. A bin array assembly, comprising: a plurality of binassemblies, wherein each bin assembly of the plurality of bin assembliescomprises: a bin housing adapted to receive bins of varying sizes, thebin housing including a vertical mounting structure; and a bin bodycomprising a latching hook and the bin body defining a bin volume,wherein the bin body is movable relative to the bin housing to permitaccess to the bin volume in an open position and to prevent access tothe bin volume in a closed position, wherein each of the bin assembliesof the plurality of bin assemblies is disposed horizontally adjacent orvertically adjacent to a neighboring bin assembly of the plurality ofbin assemblies; a latching mechanism configured to engage the latchinghook of a respective bin assembly of the plurality of bin assemblies ina locked position to retain the bin body of the respective bin assemblyof the plurality of bin assemblies in the closed position and todisengage the latching hook of the respective bin assembly of theplurality of bin assemblies in a released position; and a controllerconfigured to: receive a wireless control signal; and control movementof the latching member based at least in part on the wireless controlsignal.

Clause 11. The bin array assembly of Clause 10, wherein the latchingmechanism is configured to engage or disengage the respective latchinghooks of a plurality of horizontally adjacent bin assemblies of theplurality of bin assemblies.

Clause 12. The bin array assembly of Clause 10, wherein the latchingmechanism is configured to engage or disengage the respective latchinghooks of a plurality of vertically adjacent bin assemblies of theplurality of bin assemblies.

Clause 13. The bin array assembly of Clause 10, wherein the latchingmechanism is configured to engage or disengage the respective latchinghooks of the plurality of bin assemblies.

Clause 14. The bin array assembly of Clause 10, further comprising abattery operatively coupled to at least one of the latching mechanismand the controller.

Clause 15. The bin array of Clause 10, wherein the plurality of binassemblies includes bin assemblies of different sizes.

Clause 16. The bin array of Clause 10, further comprising anauthentication device operatively coupled to the latching mechanism,wherein the authentication device permits the latching mechanism to moveto the released position.

Clause 17. The bin array of Clause 10, further comprising a statusindicator operatively coupled to the controller.

Clause 18. The bin array of Clause 10, further comprising a mountingmechanism to releasably secure the plurality of bins to a fixed surface.

Clause 19. A method comprising: providing a bin assembly comprising abin housing and a bin body movable relative to the bin housing, whereinthe bin housing is adapted to receive bins of varying sizes; receiving awireless control signal; latching the bin body to the bin housing in alocked position to retain the bin body in a closed position via alatching mechanism based at least in part on the wireless controlsignal; unlatching the bin body from the bin housing in a releasedposition via the latching mechanism based at least in part on thewireless control signal; moving the bin body relative to the bin housingto an open position; and providing access to a bin volume defined withinthe bin body.

Clause 20. The method of Clause 19, further comprising: authenticating auser via an authentication device; and unlatching the bin body from thebin housing via the latching mechanism in response to authenticating theuser via the authentication device.

Clause 21. A system and methods associated to highly optimizedmedication storage and dispensing solutions in healthcare settingsincluding a wall mounted vertically mounted bin array with configurablewirelessly connected smart bins (different sizes), plurality of userinterface, server authorized actuator lock, location tracking, andenables enterprise solution for inventory tracking, a system comprises aprocessor, memory, input/output device, environmental sensor, tamperdetection and wireless interface, an E-ink display, microphone, buzzerand multicolor LED for user interface, an identity authentication module(IAM) interface that enables plurality of user authentication methodssuch as smart card reader or biometric, a FET based drive circuitry todrive the multicolor LED that supports plurality of colors, intensityand flash pattern to indicate glanceable status of the system, a drivecircuitry for E-ink user interface with plurality of views eachconfigured to present the current state of the workflow, a drivecircuitry for piezo electric buzzer to provide audio feedback to theuser, a microphone interface circuitry for the user to provide wakeupwords and or voice prompts, an actuator latch drive circuitry and latchstate read back methods, a memory interface to store state andstatistics of vertically mounted bin array status, a sensor interface tomonitor tamper, environmental condition & content sensing, a crypto andsecure element interface to safely store public/private keys.

Clause 22. The system architecture in Clause 21, optimizes the existinguser space with a wall mounted vertically mounted bin array enclosureand configurable smart bins with wireless connectivity. In otherimplementation the vertically mounted bin array enclosure with bin canbe placed on countertop.

Clause 23. The system architecture in Clause 21, in one implementationhas latch and electronics to drive the latch as part of the bin and inother implementation both the latch and electronics are part ofvertically mounted bin array enclosure.

Clause 24. The system architecture in Clause 21, the bin tilts opengiving user access to medication and in other implementation bin popsopen as a drawer.

Clause 25. The authentication system in Clause 21, automaticallydetermines a plurality of user authorization methods and the user thenselects one of the determined authorization methods to unlock thevertically mounted bin array.

Clause 26. A method that securely transmits the user identity to theserver and gets authorization to unlock the vertically mounted binarray.

Clause 27. The authentication method in Clause 26, in someimplementation use contactless smart card and in other implementationsit could use barcode, biometric identification, ECG based wearabledevice or a mobile phone.

Clause 28. The authentication method in Clause 26, in someimplementation could be remote authentication. For example, if the userloses their badge or smart phone the super user can provide remoteauthentication.

Clause 29. The method that utilizes the sensor interface toautomatically identify the quantity of contents in the verticallymounted bin array and tamper detection of vertically mounted bin arrayor enclosure.

Clause 30. The method in Clause 29, monitors for tamper detection onvertically mounted bin array enclosure attached to wall and thevertically mounted bin array attached to enclosure in real time usingoptics or electromagnetic sensing.

Clause 31. The method in Clause 29, supports sensor interface such asload cell, optics with a light emitter (e.g., light emitting diode) andphotodiode, acoustics or RF to sense the quantity of content inside thebin.

Clause 32. A method by which an audible sound indicates user actionssuch as presenting badge to the vertically mounted bin array or when anactuator command is been executed.

Clause 33. A method according to Clause 32, in some implementation usesa piezo beeper with different tones to indicate different actions.

Clause 34. The communication architecture (CA) for the system in Clause1, can use plurality of PAN protocols such as (802.15.4/BLE) to talk tothe remote device.

Clause 35. A method that utilizes the CA to achieve a beacon for assettracking or real time and offline mode support

Clause 36. The method in Clause 35, where in the implementation ofvertically mounted bin array can bypass hospital IT thereby reduceinstallation time and make it a drop ship model because of PAN protocolsupport.

Clause 37. The method in Clause 35, supports offline mode. When networkconnection to the field hub or gateway is lost the vertically mountedbin array will still allow the user to continue with their action andwill store and forward the actions when network is restored.

Clause 38. The method in Clause 35, where in ability of the verticallymounted bin array to broadcast beacons to remote host with themedication information for asset tracking. Optionally, users can alsoread the beacons using a mobile device such as a phone or tablet.

Clause 39. The power architecture for the system in Clause 21, in someimplementation use disposable batteries or a rechargeable battery or asupercapacitor as an energy source for each bin.

Clause 40. The PA for the system in Clause 21, in some implementationsmay require one high capacity energy source to power the entirevertically mounted bin array array. For different implementations ofhigh capacity energy source (PoE, battery, external power supply) andits interface using wired or docking connector see attached slides anddocs.

Clause 41. The PA for the system in Clause 21, in some implementationwhen a vertically mounted bin array is connected to an external powersupply, the external power supply may directly power the verticallymounted bin array, or may charge the battery on the bin or enclosure.

Clause 42. The PA for the system in Clause 21, in some implementationmay use wireless power transfer to access the vertically mounted binarray smart bin.

Clause 43. Method for charging the system include plurality of wirelessenergy source.

Clause 44. A method in Clause 43, where in some instance near field(such as NFC, Qi, Resonant and inductive) or far field (such as WiFi,UHF) wireless power transfer are used as energy source to access thevertically mounted bin array.

Clause 45. A method in Clause 43, where in some instance multiplexedwireless charging scheme is used to charge the secure storage solutionas only one storage location can be accessed at a given time inside avertically mounted bin array.

Clause 46. A method in Clause 43, where in some instances use guidedlights or mechanical features to dock the secured storage space forwireless charging.

Clause 47. A method for conserving power in battery operated devicesbased on system factors and user preference, comprising: placing devicesin low power states (ranging from system off state to various levels ofsleep state) and waking up periodically (wake up period) to enable radiocommunications and check in with a gateway/hub for updates or to performtransactions, the low power state and wake up period is configured bythe gateway/hub for devices based on system usage factors and userpreferences.

Clause 48. The method in Clause 47, in some instances uses environmentalsensors such as occupancy sensors and in other instances optionally itcould use microphone with key word activation, user action by pushing abutton or system usage factors such as user presence, office schedule towake up the device from deep sleep mode.

Clause 49. A method for energy harvesting using plurality of sources toincrease vertically mounted bin array smart bin operation life.

Clause 50. A method in Clause 49, where in some instances useselectromagnetic induction from lock actuator action or wireless energyfrom RF sources to harvest energy.

Clause 51. The E-ink user interface in Clause 21, in some implementationthe e-ink will display medication name, dosage and expire date and inother implementations can display icons such as loading dock or intransit to show the current status of associated medication that is beentracked.

Clause 52. The multicolor LED user interface in Clause 21, in someimplementation will act as a glanceable status indicator. The LED color,flash pattern and intensity will indicate different status based on useraccessing the secure storage location and workflow, wherein duringmedication loading workflow the led lighting can guide the user to themedication at a glance, if the medication in the vertically mounted binarray expired the LED can flash red, during medication audit the systemwill guide by lighting the LED's so the user can identify the medeasily, and if the battery level lower than threshold led can flash.

Clause 53. A smart container comprising: a compartment having aplurality of walls and an access component; a memory including anon-volatile data store containing a local cache storing a localinventory of the compartment; an electromechanical latch engaged to afastening hook of the access component; a communication interfacedisposed within the smart container; an audiovisual element disposedwithin the smart container; and a processor disposed within the smartcontainer and configured to: receive, via the communication interface,an authenticated request to access the compartment; in response toreceiving the authenticated request, actuate the electromechanical latchto disengage the fastening hook, thereby initiating a mechanicalmovement of the access component to make the compartment accessible;output, upon actuation of the electromechanical latch, an alert via theaudiovisual element to identify the smart container; confirm that theelectromechanical latch has re-engaged with the fastening hook, therebysecuring the compartment; determine a change in the local inventoryafter the confirming; and update the local inventory in the non-volatiledata store according to the change.

Clause 54. The smart container of Clause 53, wherein the accesscomponent comprises a hinged lid, and wherein the mechanical movementcomprises a rotation of the hinged lid.

Clause 55. The smart container of Clause 53, wherein the fastening hookis configured to retract into a recess when the fastening hook isdisengaged.

Clause 56. The smart container of Clause 53, further comprising astopper configured to limit the access component to a maximum extendedposition.

Clause 57. The smart container of Clause 53, wherein the accesscomponent comprises a drawer, and wherein the mechanical movementcomprises a sliding of the drawer.

Clause 58. The smart container of Clause 53, wherein the mechanicalmovement is initiated using a force from a spring or a motor.

Clause 59. The smart container of Clause 53, wherein a portion of thefastening hook is configured to dislodge into the electromechanicallatch when the fastening hook is forcibly disengaged.

Clause 60. The smart container of Clause 53, wherein the audiovisualelement includes a display, and wherein the processor is furtherconfigured to output the local inventory, including an item descriptionand a quantity, to the display.

Clause 61. The smart container of Clause 53, wherein the smart containeris attachable to a stationary mounting frame with other containers orsmart containers to form a stack or an array.

Clause 62. The smart container of Clause 53, further comprising one ormore sensors including at least one of a load cell, an optical sensor,an electromagnetic sensor, an acoustic sensor, a temperature sensor, aradio frequency (RF) scanner, a shock sensor, a vibration sensor, atamper sensor, and a location sensor.

Clause 63. The smart container of claim Clause 62, wherein the processoris configured to determine the change in the local inventory using theone or more sensors.

Clause 64. The smart container of claim Clause 62, wherein the processoris further configured to: record periodic sensor data from the one ormore sensors in a condition log within the non-volatile data store; anddetermine whether an attempt to tamper the smart container occurredbased on the condition log.

Clause 65. The smart container of Clause 53, wherein the processor isfurther configured to send, via the communication device, a stocknotification to a remote server when a quantity of the local inventoryis below a predetermined threshold level.

Clause 66. The smart container of Clause 53, wherein the smart containeris configured to operate in a refrigerated environment.

Clause 67. The smart container of Clause 53, wherein the processor isfurther configured to: synchronize the local inventory with one or moreremote smart containers via the communication interface; and receive,from the one or more remote smart containers via the communicationinterface, periodic updates for the local cache comprising locations andinventories of the one or more remote smart containers.

Clause 68. The smart container of Clause 53, wherein audiovisual elementincludes at least one of an e-ink display, a light emitting diode (LED),and a speaker.

Clause 69. The smart container of Clause 53, wherein the processor isfurther configured to: adjust a power state of the processor based ontraining a machine learning algorithm on usage data collected from aplurality of smart containers.

Clause 70. The smart container of Clause 53, wherein the processor isconfigured to receive the authenticated request in response to detectinga proximity to an authenticated user.

Clause 71. The smart container of Clause 53, wherein prior to receivingthe authenticated request, the processor is configured to: receive, viathe communication interface, a query for an item; determine that theitem is stored in the local inventory; and send, via the communicationinterface, a response to the query including an indication that the itemis stored in the local inventory, and a location of the smart container.

Clause 72. A method for automatic inventory management, the methodcomprising: providing a smart container attachable to a stationarymounting frame, the smart container including a compartment having aplurality of walls and an access component; receiving, via acommunication interface, an authenticated request to access thecompartment; in response to receiving the authenticated request,actuating an electromechanical latch to disengage a fastening hook,thereby initiating a mechanical movement of an access component to makethe compartment accessible; outputting, upon actuation of theelectromechanical latch, an alert via an audiovisual element to identifythe container; confirming that the electromechanical latch hasre-engaged with the fastening hook, thereby securing the compartment;determining a change in a local inventory after the confirming; andupdating the local inventory in a non-volatile data store according tothe change.

Clause 73. The method of Clause 72, wherein the access componentincludes at least one of a hinged lid and a drawer, and wherein themechanical movement includes at least one of a rotation of the hingedlid and a sliding of the drawer.

Clause 74. A non-transitory storage medium comprising instructions that,when read by one or more processors, cause a method comprising:receiving, via a communication interface, an authenticated request toaccess a compartment of a smart container, the compartment having aplurality of walls and an access component; in response to receiving theauthenticated request, actuating an electromechanical latch to disengagea fastening hook, thereby initiating a mechanical movement of an accesscomponent to make the compartment accessible; outputting, upon actuationof the electromechanical latch, an alert via an audiovisual element toidentify the container; confirming that the electromechanical latch hasre-engaged with the fastening hook, thereby securing the compartment;determining a change in a local inventory after the confirming; andupdating the local inventory in a non-volatile data store according tothe change.

Further Consideration

In some embodiments, any of the clauses herein may depend from any oneof the independent clauses or any one of the dependent clauses. In oneaspect, any of the clauses (e.g., dependent or independent clauses) maybe combined with any other one or more clauses (e.g., dependent orindependent clauses). In one aspect, a claim may include some or all ofthe words (e.g., steps, operations, means or components) recited in aclause, a sentence, a phrase or a paragraph. In one aspect, a claim mayinclude some or all of the words recited in one or more clauses,sentences, phrases or paragraphs. In one aspect, some of the words ineach of the clauses, sentences, phrases or paragraphs may be removed. Inone aspect, additional words or elements may be added to a clause, asentence, a phrase or a paragraph. In one aspect, the subject technologymay be implemented without utilizing some of the components, elements,functions or operations described herein. In one aspect, the subjecttechnology may be implemented utilizing additional components, elements,functions or operations.

Those of skill in the art would appreciate that the various illustrativeblocks, modules, elements, components, methods, and algorithms describedherein may be implemented as electronic hardware, computer software, orcombinations of both. To illustrate this interchangeability of hardwareand software, various illustrative blocks, modules, elements,components, methods, and algorithms have been described above generallyin terms of their functionality. Whether such functionality isimplemented as hardware or software depends upon the particularapplication and design constraints imposed on the overall system.Skilled artisans may implement the described functionality in varyingways for each particular application. Various components and blocks maybe arranged differently (e.g., arranged in a different order, orpartitioned in a different way) all without departing from the scope ofthe subject technology.

It is understood that the specific order or hierarchy of steps in theprocesses disclosed is an illustration of example approaches. Based upondesign preferences, it is understood that the specific order orhierarchy of steps in the processes may be rearranged. Some of the stepsmay be performed simultaneously. The accompanying method claims presentelements of the various steps in a sample order, and are not meant to belimited to the specific order or hierarchy presented.

The previous description is provided to enable any person skilled in theart to practice the various aspects described herein. The previousdescription provides various examples of the subject technology, and thesubject technology is not limited to these examples. Variousmodifications to these aspects will be readily apparent to those skilledin the art, and the generic principles defined herein may be applied toother aspects. Thus, the claims are not intended to be limited to theaspects shown herein, but is to be accorded the full scope consistentwith the language claims, wherein reference to an element in thesingular is not intended to mean “one and only one” unless specificallyso stated, but rather “one or more.” Unless specifically statedotherwise, the term “some” refers to one or more. Pronouns in themasculine (e.g., his) include the feminine and neuter gender (e.g., herand its) and vice versa. Headings and subheadings, if any, are used forconvenience only and do not limit this disclosure.

The term website, as used herein, may include any aspect of a website,including one or more web pages, one or more servers used to host orstore web related content, etc. Accordingly, the term website may beused interchangeably with the terms web page and server. The predicatewords “configured to,” “operable to,” and “programmed to” do not implyany particular tangible or intangible modification of a subject, but,rather, are intended to be used interchangeably. For example, aprocessor configured to monitor and control an operation or a componentmay also mean the processor being programmed to monitor and control theoperation or the processor being operable to monitor and control theoperation. Likewise, a processor configured to execute code can beconstrued as a processor programmed to execute code or operable toexecute code.

The term automatic, as used herein, may include performance by acomputer or machine without user intervention; for example, byinstructions responsive to a predicate action by the computer or machineor other initiation mechanism. The word “example” is used herein to mean“serving as an example or illustration.” Any aspect or design describedherein as “example” is not necessarily to be construed as preferred oradvantageous over other aspects or designs.

A phrase such as an “aspect” does not imply that such aspect isessential to the subject technology or that such aspect applies to allconfigurations of the subject technology. A disclosure relating to anaspect may apply to all configurations, or one or more configurations.An aspect may provide one or more examples. A phrase such as an aspectmay refer to one or more aspects and vice versa. A phrase such as an“implementation” does not imply that such implementation is essential tothe subject technology or that such implementation applies to allconfigurations of the subject technology. A disclosure relating to animplementation may apply to all implementations, or one or moreimplementations. An implementation may provide one or more examples. Aphrase such as an “implementation” may refer to one or moreimplementations and vice versa. A phrase such as a “configuration” doesnot imply that such configuration is essential to the subject technologyor that such configuration applies to all configurations of the subjecttechnology. A disclosure relating to a configuration may apply to allconfigurations, or one or more configurations. A configuration mayprovide one or more examples. A phrase such as a “configuration” mayrefer to one or more configurations and vice versa.

As used herein, the terms “determine” or “determining” encompass a widevariety of actions. For example, “determining” may include calculating,computing, processing, deriving, generating, obtaining, looking up(e.g., looking up in a table, a database or another data structure),ascertaining and the like via a hardware element without userintervention. Also, “determining” may include receiving (e.g., receivinginformation), accessing (e.g., accessing data in a memory) and the likevia a hardware element without user intervention. “Determining” mayinclude resolving, selecting, choosing, establishing, and the like via ahardware element without user intervention.

As used herein, the terms “provide” or “providing” encompass a widevariety of actions. For example, “providing” may include storing a valuein a location of a storage device for subsequent retrieval, transmittinga value directly to the recipient via at least one wired or wirelesscommunication medium, transmitting or storing a reference to a value,and the like. “Providing” may also include encoding, decoding,encrypting, decrypting, validating, verifying, and the like via ahardware element.

As used herein, the term “message” encompasses a wide variety of formatsfor communicating (e.g., transmitting or receiving) information. Amessage may include a machine readable aggregation of information suchas an XML document, fixed field message, comma separated message, or thelike. A message may, in some implementations, include a signal utilizedto transmit one or more representations of the information. Whilerecited in the singular, it will be understood that a message may becomposed, transmitted, stored, received, etc. in multiple parts.

As used herein, the term “selectively” or “selective” may encompass awide variety of actions. For example, a “selective” process may includedetermining one option from multiple options. A “selective” process mayinclude one or more of: dynamically determined inputs, preconfiguredinputs, or user-initiated inputs for making the determination. In someimplementations, an n-input switch may be included to provide selectivefunctionality where n is the number of inputs used to make theselection.

As used herein, the terms “correspond” or “corresponding” encompasses astructural, functional, quantitative and/or qualitative correlation orrelationship between two or more objects, data sets, information and/orthe like, preferably where the correspondence or relationship may beused to translate one or more of the two or more objects, data sets,information and/or the like so to appear to be the same or equal.Correspondence may be assessed using one or more of a threshold, a valuerange, fuzzy logic, pattern matching, a machine learning assessmentmodel, or combinations thereof.

Features described may include machine learning. Machine learning mayinclude models, equations, artificial neural networks, recurrent neuralnetworks, convolutional neural networks, decision trees, or othermachine readable artificial intelligence structure. Examples of machinelearning and modeling features which may be included in the embodimentsdiscussed above are described in “A survey of machine learning for bigdata processing” by Qiu et al. in EURASIP Journal on Advances in SignalProcessing (2016) which is hereby incorporated by reference in itsentirety.

In any embodiment, data generated or detected can be forwarded to a“remote” device or location, where “remote,” means a location or deviceother than the location or device at which the program is executed. Forexample, a remote location could be another location (e.g., office, lab,etc.) in the same city, another location in a different city, anotherlocation in a different state, another location in a different country,etc. As such, when one item is indicated as being “remote” from another,what is meant is that the two items can be in the same room butseparated, or at least in different rooms or different buildings, andcan be at least one mile, ten miles, or at least one hundred milesapart. “Communicating” information references transmitting the datarepresenting that information as electrical signals over a suitablecommunication channel (e.g., a private or public network). “Forwarding”an item refers to any means of getting that item from one location tothe next, whether by physically transporting that item or otherwise(where that is possible) and includes, at least in the case of data,physically transporting a medium carrying the data or communicating thedata. Examples of communicating media include radio or infra-redtransmission channels as well as a network connection to anothercomputer or networked device, and the internet or including emailtransmissions and information recorded on websites and the like.

All structural and functional equivalents to the elements of the variousaspects described throughout this disclosure that are known or latercome to be known to those of ordinary skill in the art are expresslyincorporated herein by reference and are intended to be encompassed bythe claims. Moreover, nothing disclosed herein is intended to bededicated to the public regardless of whether such disclosure isexplicitly recited in the claims. No claim element is to be construedunder the provisions of 35 U.S.C. § 112, sixth paragraph, unless theelement is expressly recited using the phrase “means for” or, in thecase of a method claim, the element is recited using the phrase “stepfor.” Furthermore, to the extent that the term “include,” “have,” or thelike is used in the description or the claims, such term is intended tobe inclusive in a manner similar to the term “comprise” as “comprise” isinterpreted when employed as a transitional word in a claim.

What is claimed is:
 1. A bin assembly, comprising: a bin housing adaptedto receive bins of varying sizes, the bin housing including a verticalmounting structure; an audiovisual device; a bin comprising a latchinghook and the bin defining a bin volume, wherein the bin is movablerelative to the bin housing to permit access to the bin volume in anopen position and to prevent access to the bin volume in a closedposition; an electromechanical latching mechanism coupled to the binhousing, the latching mechanism comprising a latching member, whereinthe latching member engages the latching hook in a locked position toretain the bin in the closed position and the latching member is spacedapart from the latching hook in a released position; and a controllerconfigured to: receive a wireless control signal indicating a userrequest to access a respective bin of the bin housing; and controlmovement of the latching member, based at least in part on the wirelesscontrol signal, to permit access to the bin volume; and output, uponmovement of the latching member, an alert via the audiovisual device toidentify the respective bin and the bin housing from other bins andother bin housings and identify that access to the bin volume isprovided.
 2. The bin assembly of claim 1, wherein the controller isfurther configured to: confirm that the electromechanical latchingmechanism has re-engaged with the latching hook, thereby securing thebin volume; determine, after confirming that the electromechanicallatching mechanism has re-engaged with the latching hook, a change in alocal inventory based on a measurement provided by a sensor within thebin housing; and update the local inventory in a non-volatile data storeresponsive to determining the change in the local inventory.
 3. The binassembly of claim 2, further comprising: a load sensor comprising a loadcell configured to measure a mass of items within housing, whereindetermining the change in the local inventory comprises: measuring themass of items within the housing; and estimating a changed in an itemquantity based on measuring the mass of items within the housing toestimate the change in the local inventory.
 4. The bin assembly of claim3, further comprising: a location sensor configured to determine ageographic location of the bin assembly; wherein the controller isfurther configured to: determining an attempt to tamper with or divertcontents within the bin housing occurred based on estimating the changein the item quantity; and responsive to determining that the attempt totamper with or divert the contents occurred: determine, based onmeasurements from the location sensor, a current location and a locationhistory of the bin assembly; and communicate the current location, thelocation history, and a status of the local inventory to a computingdevice remote from the user for display with an alert to a user.
 5. Thebin assembly of claim 2, further comprising: a temperature and humiditysensors, wherein the controller is further configured to, afterconfirming that the electromechanical latching mechanism has re-engagedwith the latching hook: measure temperature and humidity inside the binvolume using the temperature and humidity sensors; determining anattempt to tamper with or divert contents within the bin housingoccurred based on measuring the temperature and humidity inside the binhousing; and communicate the temperature and humidity inside the binvolume and a status of the local inventory to a computing device remotefrom the user for display with an alert to a user.
 6. The bin assemblyof claim 5, further comprising: a location sensor configured todetermine a geographic location of the bin assembly; wherein thecontroller is further configured to, responsive to determining that theattempt to tamper with or divert the contents occurred: determine, basedon measurements from the location sensor, a current location and alocation history of the bin assembly; communicate the current location,the location history, and a status of the local inventory to a computingdevice remote from the user for display with an alert to a user.
 7. Thebin assembly of claim 2, further comprising: one or more shock andvibration sensors; a location sensor configured to determine ageographic location of the bin assembly; wherein the controller isfurther configured to: determine a force applied to the bin assemblyresponsive to receiving a signal from the one or more shock andvibration sensors; determine that force applied to the bin assemblysatisfies a predetermined detection threshold; determine, based on theforce satisfying the predetermined detection threshold, an attempt totamper with or divert contents within the bin housing occurred,determine, based on measurements from the location sensor, a currentlocation and a location history of the bin assembly, and communicate thecurrent location, the location history, and a status of the localinventory to a computing device remote from the user for display with analert to a user.
 8. A bin identification system, comprising: a pluralityof bin assemblies, wherein each bin assembly of the plurality of binassemblies comprises: a bin housing adapted to receive bins of varyingsizes, the bin housing including a vertical mounting structure; anaudiovisual device; a bin comprising a latching hook and the bindefining a bin volume, wherein the bin is movable relative to the binhousing to permit access to the bin volume in an open position and toprevent access to the bin volume in a closed position, wherein each ofthe bin assemblies of the plurality of bin assemblies is disposedhorizontally adjacent or vertically adjacent to a neighboring binassembly of the plurality of bin assemblies; an electromechanicallatching mechanism configured to engage the latching hook of arespective bin assembly of the plurality of bin assemblies in a lockedposition to retain the bin of the respective bin assembly of theplurality of bin assemblies in the closed position and to disengage thelatching hook of the respective bin assembly of the plurality of binassemblies in a released position; and a controller configured to:receive a wireless control signal indicating a user request to access arespective bin of a respective bin assembly; and control engagement ofthe latching hook, based at least in part on the wireless controlsignal, to permit access to the bin volume; output, upon movement of thelatching hook, an alert via the audiovisual device to identify therespective bin and respective bin assembly, from other bins and theother bin assemblies of the plurality of bin assemblies, and to identifythat access to the respective bin is provided.
 9. The bin identificationsystem of claim 8, wherein the controller is further configured to:confirm that the electromechanical latching mechanism has re-engagedwith the latching hook, thereby securing the bin volume; determine,after confirming that the electromechanical latching mechanism hasre-engaged with the latching hook, a change in a local inventory basedon a measurement provided by a sensor within the bin housing; and updatethe local inventory in a non-volatile data store responsive todetermining the change in the local inventory.
 10. The binidentification system of claim 9, further comprising: a load sensorcomprising a load cell configured to measure a mass of items withinhousing, wherein determining the change in the local inventorycomprises: measuring the mass of items within the housing; andestimating a changed in an item quantity based on measuring the mass ofitems within the housing to estimate the change in the local inventory.11. The bin identification system of claim 10, further comprising: alocation sensor configured to determine a geographic location of the binassembly; wherein the controller is further configured to: determine anattempt to tamper with or divert contents within the bin housingoccurred based on estimating the change in the item quantity; andresponsive to determining that the attempt to tamper with or divert thecontents occurred: determine, based on measurements from the locationsensor, a current location and a location history of the bin assembly;and communicate the current location, the location history, and a statusof the local inventory to a computing device remote from the user fordisplay with an alert to a user.
 12. The bin identification system ofclaim 9, further comprising: a temperature and humidity sensors, whereinthe controller is further configured to, after confirming that theelectromechanical latching mechanism has re-engaged with the latchinghook: measure temperature and humidity inside the bin volume using thetemperature and humidity sensors; determine an attempt to tamper with ordivert contents within the bin housing occurred based on measuring thetemperature and humidity inside the bin housing; and communicate thetemperature and humidity inside the bin volume and a status of the localinventory to a computing device remote from the user for display with analert to a user.
 13. The bin identification system of claim 12, furthercomprising: a location sensor configured to determine a geographiclocation of the bin assembly; wherein the controller is furtherconfigured to, responsive to determining that the attempt to tamper withor divert the contents occurred: determine, based on measurements fromthe location sensor, a current location and a location history of thebin assembly; communicate the current location, the location history,and a status of the local inventory to a computing device remote fromthe user for display with an alert to a user.
 14. The bin identificationsystem of claim 9, further comprising: one or more shock and vibrationsensors; a location sensor configured to determine a geographic locationof the bin assembly; wherein the controller is further configured to:determine a force applied to the bin assembly responsive to receiving asignal from the one or more shock and vibration sensors; determine thatforce applied to the bin assembly satisfies a predetermined detectionthreshold; determine, based on the force satisfying the predetermineddetection threshold, an attempt to tamper with or divert contents withinthe bin housing occurred, determine, based on measurements from thelocation sensor, a current location and a location history of the binassembly, and communicate the current location, the location history,and a status of the local inventory to a computing device remote fromthe user for display with an alert to a user.
 15. A method comprising:providing a bin assembly comprising a bin housing and a bin body movablerelative to the bin housing, wherein the bin housing is adapted toreceive bins of varying sizes; receiving a wireless control signalindicating a user request to access a respective bin of a respective binassembly; latching the bin body to the bin housing in a locked positionto retain the bin body in a closed position via a latching mechanismbased at least in part on the wireless control signal; unlatching thebin body from the bin housing in a released position via the latchingmechanism based at least in part on the wireless control signal; movingthe bin body relative to the bin housing to an open position to provideaccess to a bin volume defined within the bin body; outputting, uponunlatching the bin body, an alert via an audiovisual device integratedwith the bin housing to identify the respective bin and respective binassembly, from other bins and the other bin assemblies, and to identifythat access to the respective bin is provided.
 16. The method of claim15, further comprising: confirming that the latching mechanism hasre-engaged to secure the bin body to the bin housing; determining, afterconfirming that the latching mechanism has re-engaged, a change in alocal inventory of the bin assembly based on a measurement provided by asensor within the bin housing; and updating the local inventory in anon-volatile data store responsive to determining the change in thelocal inventory.
 17. The method of claim 16, further comprising:measuring, with a load sensor integrated with the bin housing, a mass ofitems within housing, wherein determining the change in the localinventory comprises: measuring the mass of items within the bin housing;and estimating a changed in an item quantity based on measuring the massof items within the bin housing to estimate the change in the localinventory.
 18. The method of claim 17, further comprising: determiningan attempt to tamper with or divert contents within the bin housingoccurred based on estimating the change in the item quantity; andresponsive to determining that the attempt to tamper with or divert thecontents occurred: determining, based on measurements from a locationsensor integrated with the bin housing, a current location and alocation history of the bin housing; and communicating the currentlocation, the location history, and a status of the local inventory to acomputing device remote from the user for display with an alert to auser.
 19. The method of claim 16, further comprising: after confirmingthat the electromechanical latching mechanism has re-engaged with thelatching hook: measuring, with one or more temperature and humiditysensors integrated with the bin housing, a temperature and humidityinside the bin volume using the temperature and humidity sensors;determining an attempt to tamper with or divert contents within the binhousing occurred based on measuring the temperature and humidity insidethe bin housing; and communicating the temperature and humidity insidethe bin volume and a status of the local inventory to a computing deviceremote from the user for display with an alert to a user.
 20. The methodof claim 12, further comprising: responsive to determining that theattempt to tamper with or divert the contents occurred: determining,based on measurements from a location sensor integrated with the binhousing, a current location and a location history of the bin assembly;communicating the current location, the location history, and a statusof the local inventory to a computing device remote from the user fordisplay with an alert to a user.