Security technologies for electrically-powered trash compactors and receptacles

ABSTRACT

Systems, methods, and computer-readable storage media for securing electrically-powered trash compactors and receptacles. A system can monitor, under a security condition, a storage receptacle having a security plate being positioned over a door on the storage receptacle, the door including an insertion point for storing contents on the storage receptacle, and the security plate being configured to block an opening of the door to prevent insertion of additional contents in the storage receptacle. Next, the system can receive a signal indicating a security breach at the storage receptacle, the security breach including at least one of a first attempt to open the door and a second attempt to remove the security plate. In response to the signal, the system can then generate a notification of the security breach.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of priority to U.S. ProvisionalPatent Application No. 61/937,930, filed on Feb. 10, 2014, entitled“SECURITY TECHNOLOGIES FOR ELECTRICALLY-POWERED TRASH COMPACTORS ANDRECEPTACLES,” and U.S. Provisional Application No. 61/937,961, filed onFeb. 10, 2014, entitled “DYNAMICALLY ADJUSTABLE SENSORS FOR TRASHCOMPACTORS AND RECEPTACLES”, and all of which are expressly incorporatedby reference herein in their entirety.

BACKGROUND

1. Technical Field

The present disclosure relates to trash receptacles and morespecifically to security and monitoring technologies forelectrically-powered trash compactors and receptacles.

2. Introduction

Collection of solid waste is an expensive and polluting procedure. Everyday, heavy trucks are deployed to collect large amounts of trash andrecyclable materials. Such trash and recyclable materials are typicallycollected from numerous trash receptacles throughout an area. Mostcommunities provide trash receptacles in dedicated areas of thecommunity to allow nearby individuals to properly dispose of theirunwanted materials in a quick and convenient manner. To this end, trashreceptacles are abundant in most places throughout the country. Notsurprisingly, trash receptacles are often essential to protecting theenvironment and maintaining a clean community.

Unfortunately, the capabilities of trash receptacles to hold wastematerial, and the widespread availability of such trash receptacles,also make trash receptacles vulnerable to security breaches.Unscrupulous individuals can easily utilize any of the trash receptaclesavailable in a community to hide and store dangerous materials, such asbombs or hazardous chemicals, in an effort to harm a community and itsresidents. Terrorists or criminals generally have access to numeroustrash receptacles, where they can easily place dangerous materials andquickly turn such trash receptacles into weapons ready to exert harm toanyone around them. Given the large number of trash receptaclestypically available in any given area, it is extremely difficult tomonitor and secure each trash receptacle to prevent or detect suchatrocities. Accordingly, the current solutions, including today's trashreceptacles, do not provide adequate security features and protectionsto foil—or even detect—a plot to harm a community and its residents.Individuals who are intent on harming others in a community can quicklyspread the harm and danger throughout the community using various trashreceptacles in the area to hold explosive and otherwise harmfulmaterials setup to spread harm to those around it.

SUMMARY

Additional features and advantages of the disclosure will be set forthin the description which follows, and in part will be understood fromthe description, or can be learned by practice of the herein disclosedprinciples. The features and advantages of the disclosure can berealized and obtained by means of the instruments and combinationsparticularly pointed out in the appended claims. These and otherfeatures of the disclosure will become more fully apparent from thefollowing description and appended claims, or can be learned by thepractice of the principles set forth herein.

The approaches set forth herein can be used to effectively monitor andsecure trash receptacles during a security condition, to prevent asecurity breach of the trash receptacle. The trash receptacles can beconstructed to allow any of its insertion points to be closed, locked,and protected in order to prevent individuals from inserting contentsinto the storage receptacle during a security condition, or otherwiseaccessing the contents of the storage receptacle. The storagereceptacles can be also configured to monitor and detect any securitybreaches to the storage receptacle; attempts (complete or incomplete) toplace dangerous materials, such as bombs, weapons, or drugs, in thestorage receptacle; attempts (complete or incomplete) to harm thestorage receptacle or use the storage receptacle in a conspiracy to harmothers, etc. Here, the storage receptacle can be configured tocommunicate such security breaches and events to remote users anddevices, such as a monitoring server or a government official. Forexample, a receptacle can monitor, in a security condition, for attemptsto breach a door of the receptacle or in some other way to reach aninterior of the receptacle. Once a security breach is detected, thereceptacle can transmit a warning signal over a network to a server atwhich point an automated or manual system can notify authorities. Thisway, the storage receptacles can quickly provide alerts andnotifications to the proper authorities and personnel, to preventunauthorized access to the storage receptacle and allow a quick andproper response to any attempts thereof.

The storage receptacle can also be configured to detect dangeroussubstances that come in contact with one or more components of thestorage receptacle. For example, the storage receptacle can beconfigured to detect if explosive materials are inserted into thestorage receptacle. In some cases, the storage receptacle can beconfigured with a sensor or scanner capable of detecting if a personthat has touched a portion of the storage receptacle, such as thehandle, has left any traces of an explosive substance, such as gunpowder, on the touched portion of the storage receptacle. For example,if an individual with traces of gun powder or bomb making materials onhis or her hand grabs the handle of the storage receptacle to open thedoor, the storage receptacle can detect the traces of gun powder or bombmaking materials, and generate a signal or alarm. The storage receptaclecan then transmit the signal to a remote server or another entity, suchas a police department, to alert others of the detected traces ofexplosive materials. In some embodiments, the storage receptacle can usea sensor or detection component to detect the dangerous or securitycondition, and trigger an automatic security system to lock the storagereceptacle. For example, the storage receptacle can detect a securitycondition, such as a breach or an explosive material, and initiate anautomatic locking of any doors or access points in the storagereceptacle by transmitting a signal from a processor to a lockingmechanism. Here, the locking mechanism can include, for example, a gearsystem, a spool device, a pin and lock system, a pulley, a linearactuator, a plate, or any other locking system.

In some cases, the storage receptacles can be configured to generate avisual or audible alarm when it detects any breach attempts or explosivematerials. This can scare a potential criminal from continuing to tryand break into the receptacle or dispose unlawful materials into thereceptacle. Moreover, the storage receptacles can maintain a dataconnection with one or more remote devices to facilitate the monitoringof conditions around the storage receptacle and collect relevant dataand statistics. If a problem or disconnection of the data connection isdetected, a remote device or personnel can be quickly notified of thedisconnected state and quickly respond by sending support personnel or,if necessary, security officials. The storage receptacle can also beconfigured to operate in various alert modes based on specific securityconditions or levels. Once a security condition is contained orotherwise remedied, the storage receptacles can be restored to onceagain allow user access to its insertion points and further resumenormal operation.

Disclosed security and monitoring technologies for electrically-poweredtrash compactors and receptacles. A system can monitor, under a securitycondition, a storage receptacle having a security plate being positionedover a door on the storage receptacle, the door including an insertionpoint for storing contents on the storage receptacle, and the securityplate being configured to block an opening of the door to preventinsertion of additional contents in the storage receptacle. The systemcan monitor the storage receptacle using sensors, data connections,algorithms, user feedback, news information, usage and performance data,device statistics, and so forth. For example, the system can monitor adata connection of the storage receptacle, as well as sensed datacollected by sensors at the storage receptacle and transmitted to thesystem via the data connection. Through the data connection, the systemcan also receive, from the storage receptacle, a current status of thestorage receptacle, a current usage, information about running servicesat the storage receptacle, errors at the storage receptacle, loggedinformation, etc.

Next, the system can receive a signal indicating a security breach atthe storage receptacle, the security breach including at least one of afirst attempt to open the door and a second attempt to remove thesecurity plate. The system can receive the signal from a transmitter atthe storage receptacle, for example. Moreover, the storage receptaclecan generate the signal based on sensed data, performance logs, errors,current usage information, etc., as previously described.

In response to the signal, the system can then generate a notificationof the security breach. The notification can be an alert, a report, analarm, a message, another signal, etc. The system can also send thenotification to another user or device, such as a remote server or adevice associated with a security official. In some aspects, the systemcan also store the notification in a database or storage to maintainstatistics, evidence, logs, and data relating to the security breach andany other previous security breach. The system can also analyze thesignal or notification and generate a recommendation, such as arecommended or suggested response.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and otheradvantages and features of the disclosure can be obtained, a moreparticular description of the principles briefly described above will berendered by reference to specific embodiments thereof which areillustrated in the appended drawings. Understanding that these drawingsdepict only exemplary embodiments of the disclosure and are nottherefore to be considered to be limiting of its scope, the principlesherein are described and explained with additional specificity anddetail through the use of the accompanying drawings in which:

FIG. 1 illustrates an example system embodiment;

FIG. 2 illustrates an example architecture for remotely controllingelectrically-powered compactors;

FIG. 3 illustrates an example storage receptacle;

FIGS. 4A and 4B illustrate a front view of exemplary unsecured andsecured storage receptacles;

FIGS. 5A-B illustrate rear views of an exemplary storage receptacle;

FIGS. 5C-D illustrate open views of an exemplary storage receptacle;

FIG. 6 illustrates an exemplary backside view of a security plate for areceptacle;

FIG. 7 illustrates an exemplary inside locking mechanism for areceptacle;

FIG. 8 illustrates a first example method embodiment; and

FIG. 9 illustrates a second example method embodiment.

DETAILED DESCRIPTION

Various embodiments of the disclosure are described in detail below.While specific implementations are described, it should be understoodthat this is done for illustration purposes only. Other components andconfigurations may be used without parting from the spirit and scope ofthe disclosure.

The present disclosure provides a way to monitor and secureelectrically-powered trash compactors and receptacles. A system, methodand computer-readable media are disclosed which provide monitoring andsecurity to electrically-powered trash compactors and receptacles. Abrief introductory description of a basic general purpose system orcomputing device in FIG. 1, which can be employed to practice theconcepts, is disclosed herein. A more detailed description andvariations of electrically-powered receptacles, as well as receptaclemonitoring and security systems will then follow. These variations shallbe described herein as the various embodiments are set forth. Thedisclosure now turns to FIG. 1.

With reference to FIG. 1, an exemplary system and/or computing device100 includes a processing unit (CPU or processor) 120 and a system bus110 that couples various system components including the system memory130 such as read only memory (ROM) 140 and random access memory (RAM)150 to the processor 120. The system 100 can include a cache 122 ofhigh-speed memory connected directly with, in close proximity to, orintegrated as part of the processor 120. The system 100 copies data fromthe memory 130 and/or the storage device 160 to the cache 122 for quickaccess by the processor 120. In this way, the cache provides aperformance boost that avoids processor 120 delays while waiting fordata. These and other modules can control or be configured to controlthe processor 120 to perform various operations or actions. Other systemmemory 130 may be available for use as well. The memory 130 can includemultiple different types of memory with different performancecharacteristics. It can be appreciated that the disclosure may operateon a computing device 100 with more than one processor 120 or on a groupor cluster of computing devices networked together to provide greaterprocessing capability. The processor 120 can include any general purposeprocessor and a hardware module or software module, such as module 1162, module 2 164, and module 3 166 stored in storage device 160,configured to control the processor 120 as well as a special-purposeprocessor where software instructions are incorporated into theprocessor. The processor 120 may be a self-contained computing system,containing multiple cores or processors, a bus, memory controller,cache, etc. A multi-core processor may be symmetric or asymmetric. Theprocessor 120 can include multiple processors, such as a system havingmultiple, physically separate processors in different sockets, or asystem having multiple processor cores on a single physical chip.Similarly, the processor 120 can include multiple distributed processorslocated in multiple separate computing devices, but working togethersuch as via a communications network. Multiple processors or processorcores can share resources such as memory 130 or the cache 122, or canoperate using independent resources. The processor 120 can include oneor more of a state machine, an application specific integrated circuit(ASIC), or a programmable gate array (PGA) including a field PGA.

The system bus 110 may be any of several types of bus structuresincluding a memory bus or memory controller, a peripheral bus, and alocal bus using any of a variety of bus architectures. A basicinput/output (BIOS) stored in ROM 140 or the like, may provide the basicroutine that helps to transfer information between elements within thecomputing device 100, such as during start-up. The computing device 100further includes storage devices 160 or computer-readable storage mediasuch as a hard disk drive, a magnetic disk drive, an optical disk drive,tape drive, solid-state drive, RAM drive, removable storage devices, aredundant array of inexpensive disks (RAID), hybrid storage device, orthe like. The storage device 160 can include software modules 162, 164,166 for controlling the processor 120. The system 100 can include otherhardware or software modules. The storage device 160 is connected to thesystem bus 110 by a drive interface. The drives and the associatedcomputer-readable storage devices provide nonvolatile storage ofcomputer-readable instructions, data structures, program modules andother data for the computing device 100. In one aspect, a hardwaremodule that performs a particular function includes the softwarecomponent stored in a tangible computer-readable storage device inconnection with the necessary hardware components, such as the processor120, bus 110, display 170, and so forth, to carry out a particularfunction. In another aspect, the system can use a processor andcomputer-readable storage device to store instructions which, whenexecuted by the processor, cause the processor to perform operations, amethod or other specific actions. The basic components and appropriatevariations can be modified depending on the type of device, such aswhether the device 100 is a small, handheld computing device, a desktopcomputer, or a computer server. When the processor 120 executesinstructions to perform “operations”, the processor 120 can perform theoperations directly and/or facilitate, direct, or cooperate with anotherdevice or component to perform the operations.

Although the exemplary embodiment(s) described herein employs the harddisk 160, other types of computer-readable storage devices which canstore data that are accessible by a computer, such as magneticcassettes, flash memory cards, digital versatile disks (DVDs),cartridges, random access memories (RAMs) 150, read only memory (ROM)140, a cable containing a bit stream and the like, may also be used inthe exemplary operating environment. Tangible computer-readable storagemedia, computer-readable storage devices, or computer-readable memorydevices, expressly exclude media such as transitory waves, energy,carrier signals, electromagnetic waves, and signals per se.

To enable user interaction with the computing device 100, an inputdevice 190 represents any number of input mechanisms, such as amicrophone for speech, a touch-sensitive screen for gesture or graphicalinput, keyboard, mouse, motion input, speech and so forth. An outputdevice 170 can also be one or more of a number of output mechanismsknown to those of skill in the art. In some instances, multimodalsystems enable a user to provide multiple types of input to communicatewith the computing device 100. The communications interface 180generally governs and manages the user input and system output. There isno restriction on operating on any particular hardware arrangement andtherefore the basic hardware depicted may easily be substituted forimproved hardware or firmware arrangements as they are developed.

For clarity of explanation, the illustrative system embodiment ispresented as including individual functional blocks including functionalblocks labeled as a “processor” or processor 120. The functions theseblocks represent may be provided through the use of either shared ordedicated hardware, including, but not limited to, hardware capable ofexecuting software and hardware, such as a processor 120, that ispurpose-built to operate as an equivalent to software executing on ageneral purpose processor. For example the functions of one or moreprocessors presented in FIG. 1 may be provided by a single sharedprocessor or multiple processors. (Use of the term “processor” shouldnot be construed to refer exclusively to hardware capable of executingsoftware.) Illustrative embodiments may include microprocessor and/ordigital signal processor (DSP) hardware, read-only memory (ROM) 140 forstoring software performing the operations described below, and randomaccess memory (RAM) 150 for storing results. Very large scaleintegration (VLSI) hardware embodiments, as well as custom VLSIcircuitry in combination with a general purpose DSP circuit, may also beprovided.

The logical operations of the various embodiments are implemented as:(1) a sequence of computer implemented steps, operations, or proceduresrunning on a programmable circuit within a general use computer, (2) asequence of computer implemented steps, operations, or proceduresrunning on a specific-use programmable circuit; and/or (3)interconnected machine modules or program engines within theprogrammable circuits. The system 100 shown in FIG. 1 can practice allor part of the recited methods, can be a part of the recited systems,and/or can operate according to instructions in the recited tangiblecomputer-readable storage devices. Such logical operations can beimplemented as modules configured to control the processor 120 toperform particular functions according to the programming of the module.For example, FIG. 1 illustrates three modules Mod1 162, Mod2 164 andMod3 166 which are modules configured to control the processor 120.These modules may be stored on the storage device 160 and loaded intoRAM 150 or memory 130 at runtime or may be stored in othercomputer-readable memory locations.

One or more parts of the example computing device 100, up to andincluding the entire computing device 100, can be virtualized. Forexample, a virtual processor can be a software object that executesaccording to a particular instruction set, even when a physicalprocessor of the same type as the virtual processor is unavailable. Avirtualization layer or a virtual “host” can enable virtualizedcomponents of one or more different computing devices or device types bytranslating virtualized operations to actual operations. Ultimatelyhowever, virtualized hardware of every type is implemented or executedby some underlying physical hardware. Thus, a virtualization computelayer can operate on top of a physical compute layer. The virtualizationcompute layer can include one or more of a virtual machine, an overlaynetwork, a hypervisor, virtual switching, and any other virtualizationapplication.

The processor 120 can include all types of processors disclosed herein,including a virtual processor. However, when referring to a virtualprocessor, the processor 120 includes the software components associatedwith executing the virtual processor in a virtualization layer andunderlying hardware necessary to execute the virtualization layer. Thesystem 100 can include a physical or virtual processor 120 that receiveinstructions stored in a computer-readable storage device, which causethe processor 120 to perform certain operations. When referring to avirtual processor 120, the system also includes the underlying physicalhardware executing the virtual processor 120.

Having disclosed some components of a computing system, the disclosurenow turns to FIG. 2, which illustrates an exemplary architecture forcontrolling electrically-powered compactors both locally and remotelyvia a network. Receptacle 204 can be an electrically-powered receptaclefor collecting waste, such as trash and recyclables, for example.Receptacle 204 can be, for example, a solar or battery-poweredreceptacle and/or compactor. Moreover, receptacle 204 can include amotor 226 for performing various operations, such as compactionoperations. Further, receptacle 204 can be remotely controlled using aremote control device (RCD) 244 via a network 202 or an air interface.To this end, receptacle 204 can include transmitter 206 and receiver 208for communicating with RCD 244. In particular, transmitter 206 andreceiver 208 can communicate with transmitter 240 and receiver 242 onRCD 244, and vice versa. Here, transmitters 206 and 240 can transmitinformation, and receivers 208 and 242 can receive information. Thisway, receptacle 204 and RCD 244 can be connected to transmit and receiveinformation, such as instructions, commands, statistics, alerts,notifications, files, software, data, and so forth. Receptacle 204 canalso communicate with other devices, such as a server and/or acollection vehicle, via transmitter 206 and receiver 208. Similarly, RCD244 can communicate with other devices, such as a server and/or a userdevice 246, 252, via transmitter 240 and receiver 242. A protocol, suchas Bluetooth, can be used in which no network other than the airinterface is between the receptacle 204 and RCD 244. Thus, a user with aportable device 244 can simply get within a range for a Bluetoothcommunication and send a command to turn off an alarm as the user viewsthat no-one is trying to breach into the receptacle 204.

Moreover, receptacle 204 and RCD 244 can communicate with each otherand/or other devices via network 202. The network 202 can include apublic network, such as the Internet, but can also include a private orquasi-private network, such as an intranet, a home network, a virtualprivate network (VPN), a shared collaboration network between separateentities, etc. Indeed, the network 202 can include many types ofnetworks, such as local area networks (LANs), virtual LANs (VLANs),corporate networks, wide area networks, a cell phone transmitter andreceiver, a WiFi network, a Bluetooth network, and virtually any otherform of network.

Transmitter 206 and receiver 208 can be connected to printed circuitboard (PCB) 210, which controls various functions on receptacle 204. Insome embodiments, the RCD 244 can be incorporated within the PCB 210. InFIG. 2, the RCD 244 is electrically connected to the PCB 210 viatransmitters 206, 240 and receivers 208, 242. The RCD 244 can beconnected to transmitter 240 and receiver 242 via a two-waycommunication port, which includes transmitter 240 and receiver 242. ThePCB 210 can control electrical functions performed by the receptacle204. Electrical functions can include, for example, running compactionsby actuating a motor 226; sensing waste or recyclables volume inside thereceptacle 204 using a sensor at regular or programmable intervals, suchas a sonar-based sensor 222A, a proximity sensor, and/or photoeyesensors 222B-C; changing status lamps 230 at regular and/or programmablethresholds to/from a color indicating that the receptacle 204 is notfull (e.g., green), to/from a color indicating that the receptacle 204is almost full (e.g., yellow), to/from a color indicating that thereceptacle 204 is full (e.g., red); etc.

The RCD 244 can enable remote control and/or alteration of the functionsperformed or operated by the PCB 210. The RCD 244 can also provideaccess to, and control over, the various components 206, 208, 210, 212,214A-B, 216, 218, 220, 222A-G, 224, 226, 228, 230, 232, 234, 236, 238 ofthe receptacle 204. Users can use a networked device, such as smartphone246 and/or remote device 252, to communicate with the RCD 244 in orderto manage and/or control the receptacle 204. For example, a user cancommunicate with the RCD 244 via the remote device 252 to change athreshold value on the PCB 210, which can control, for example, acollection timing; the compaction motor 226; the use of energy on alighted advertising display, such as display 232; the status lamps 230;the sensors 222A-H; the camera 224; etc. The remote device 252 caninclude virtually any device with networking capabilities, such as alaptop, a portable media player, a tablet computer, a gaming system, asmartphone, a global positioning system (GPS), a smart television, adesktop, etc. In some embodiments, the remote device 252 can also be inother forms, such as a watch, imaging eyeglasses, an earpiece, etc.

The remote device 252 and RCD 204 can be configured to automaticallymodify the PCB's 210 operating parameters. However, users can alsomanually modify the PCB's 210 operating parameters via the remote device252 and RCD 204. The operating parameters can be modified in responseto, for example, evolving industry benchmarks; user inputs; historicaldata, such as the data gathered from a separate database 250A-B;forecasted data, such as upcoming weather characteristics; trafficconditions; a collection schedule; a collection route; a proximity of acollection vehicle; a time and/or date; a location; a capacity, such asa capacity of the receptacle 204 and/or a capacity of a collectionvehicle; a fullness state of the receptacle 204; lapsed time betweencollections; lapsed time between compactions; usage conditions of thereceptacle 204; energy usage; battery conditions; statistics; a policy;regulations; a detected movement of an object, such as an object insideor outside of the receptacle 204; collection trends; industry and/orgeographical standards; zoning policies and characteristics; real-timeinformation; user preferences; and other data. The data from the remotedevice 252 can be relayed to the RCD 244, and the data from the RCD 244can be relayed, via the network 202, to the receptacle 204 and/or theremote device 252 for presentation to the user.

The user can control the RCD 244 and/or access and modify information onthe RCD 244 via a user interface, such as a web page, an application254, a monitor 256, and/or via voice messages and commands, textmessages, etc. The remote device 252 can include a user interface, whichcan display, for example, graphs of collection statistics and trends(e.g., collection frequency, usage, temperature, etc.), collectionreports, device settings, collection schedules, collectionconfigurations, historical data, status information, collectionpolicies, configuration options, device information, collection routesand information, alerts, etc. This way, users can access information tomake educated decisions about how to set and/or reset operatingparameters on the PCB 210; to control, for example, which sensors areused to gather data, which thresholds to set; to control outputs fromthe status lamps 230 and other components; etc. User can change settingson the receptacle 204, such as optimal collection timing, timing ofsensor actuation; and/or modify parameters, such as desired capacity andfullness thresholds; using a scroll down menu, click-and-slide tools,interactive maps displayed on the remote device 252, touch screens,forms, icons, text entries, audio inputs, text inputs, etc. In response,the RCD 244 can automatically reconfigure the PCB 210 settings,recalibrate sensors and displays, change operating parameters, etc.

The RCD 244 can include a two-way communication port that includestransmitter 240 and receiver 242, which can wirelessly communicate withthe PCB 210 of the receptacle 204, via the transmitter 206 and receiver208 on the receptacle 204, which are connected electrically to the PCB210. On scheduled and/or programmable intervals, the PCB's 210transmitter 206 can send data to a central server, such as data server248, via the network 202. Moreover, the RCD's 244 receiver 242 can beconfigured to query the data server 248, which can also be connected tothe remote device 252, for incoming data. The data server 248 cancommunicate data from databases 250A-B. If there is no data to bereceived by the receiver 208, the PCB 210 can be configured to promptlyreturn to a low-power mode, where the transmitter 206 and receiver 208circuits are turned off, until another scheduled, received, initiated,and/or programmed communication event. If there is data to be receivedby the receiver 208, such as a command to turn the receptacle 204 offand then back on, a command to change the thresholds upon whichcompactions are operated, a command to change the thresholds forproviding status updates and/or determining fullness states, etc., thenthe RCD receiver 242 can download the new data from the data server 248,via the RCD 244, to the PCB 210, altering its operating configuration.The RCD receiver 242 can also be configured to send data to the dataserver 248 to acknowledge the receipt of data from the PCB 210, and tosend selected data to the remote device 252, the smartphone 246, and/orany other device, for presentation to a user.

The data server 248 can also display the data to a user on remote device252, smartphone 246, or any other device. The data can be apassword-protected web page, a display on the smartphone 246, a displayon the monitor 256, etc. Remote control using the RCD 244 to reconfigureoperating thresholds, sensor use, sensor hierarchy, energy usage, etc.,can enable the receptacle 204 to alter characteristics that control itsenergy generation, energy consumption, and/or the collection andmanagement logistics, further enabling sound operation of the receptacle204.

The RCD 244 can be configured to communicate over a wireless networkwith the PCB 210, and transmit data to the data server 248, so the datacan be stored for viewing and manipulation by a user via anyweb-connected computer, phone, or device. The RCD 244 can also beconfigured to receive data from the data server 248, and transmit thedata back to the PCB 210. The PCB 210 can be electrically connected to avariety of sensors, such as sensors 222A-H, within the receptacle 204.Through the RCD 244, the PCB 210 can also be wirelessly connected to thedatabases 250A-B, and/or other external databases, such as a weatherdatabase, which may, for example, reside on a National Oceanographic andAtmospheric (NOAA) server, a database of trucks and locations andschedules, which may reside on a waste hauler's server, a database oftraffic conditions, etc. A user can also change which of the sensors222A-H are used in setting thresholds, among other things, in responseto, for example, user commands and/or changes in outside data, such asweather data or truck location data.

The PCB 210 can also communicate with a temperature sensor 222G togather temperature information, which can be transmitted to the RCD 244via the PCB transmitter 206. The temperature information can be used,among other things, to fine tune operational functions and energyconsumption of the receptacle 204. For example, the PCB 210 can bereconfigured to run less compaction per day, such as four to eightcompactions, in cold weather, since batteries are less powerful in coldweather. Coinciding with cold weather, the winter days are shorter, thussolar energy and battery power is limited. In order to conserve power onlow-sunlight days, the RCD 244 can adjust the PCB's 210 normal fullnesssensitivity levels, so that collections are prompted to be made earlier.For example, if the PCB 210 typically runs 20 compactions beforechanging status lamps from green to yellow, a signal that suggestsoptimal collection time, the RCD 244 can adjust the thresholds of thePCB 210 to run 10 compactions before changing from a green state to ayellow state, thus changing the total energy consumption of thecompactor between collections. In a busy location, the PCB 210 can beconfigured to sense receptacle fullness every minute, whereas in a lessbusy location, the PCB 210 can be configured to sense fullness once aday.

In some embodiments, the RCD 244 can also alter the timing of eventsusing algorithms based on the results of historical events. For example,the RCD 244 can be initially configured to sense fullness once perminute, but based on resulting readings, it can then alter the timing offuture readings. Thus, if three consecutive readings taken at one-minuteintervals yield a result of no trash accumulation, the RCD 244 canincrease the timing between readings to two minutes, then three minutes,etc., based on the various readings. The RCD 244 can also be configuredto adjust sensing intervals based on the level of fullness of thereceptacle 204, so it would sense more frequently as the receptacle 204fills, in order to reduce the margin of error at a critical time, beforethe receptacle 204 overflows. This “learning feature” can save energy byultimately synchronizing the sensor readings with actual need to sense.The RCD 244 can also alter thresholds of status lamps 230 based oncollection history, the need for capacity as determined by the frequencyof red or yellow lights on the receptacle 204, temperatures, expectedweather and light conditions, expected usage conditions, etc. The statuslamps 230 can be LED lights, for example.

In FIG. 2, the RCD 244 can be enabled, via the PCB 210, to read, forexample, a temperature sensor 222G; an encoder sensor 222D, which canmeasure movement of a compaction ram by utilizing an “encoder wheel”which is mounted on a motor shaft; one or more photoeye sensors 222B-C;door sensors; a sensor which measures current from the solar panel and asensor which can measure current from the battery 236 to the motor 226;a hall effect sensor 222F, which can detect movement of, for example, adoor; an infrared (IR) sensor 222E, a camera 224, etc. In addition, thethresholds set by the RCD 244 can be based on historical and real-timeinformation, user preferences, industry norms, weather patterns andforecasts, and other information. The RCD 244 can reset the PCB's 210normal thresholds hourly, daily, weekly, monthly, yearly, or atadjustable intervals, based on a variety of information and userdecisions.

The RCD 244 can also alter the PCB's 210 normal hierarchy of sensorusage. For example, if the PCB 210 is configured to run a compactioncycle when one or more of the photoeyes 222B-C located inside thereceptacle 204 are blocked, the RCD 244 can reconfigure the sensorhierarchy by reconfiguring the PCB 210 to run compaction cycles after acertain amount of time has passed, by reading the position of theencoder sensor 222D at the end of a cycle, by reading one or morephotoeye sensors 222B-C, by calculating a sensor hierarchy based onhistorical filling rates, by a change in user preferences, etc. Using anaggregate of data from other receptacles located worldwide in a varietyof settings, the RCD's 244 configurations can depend on constantlyevolving parameters for optimizing energy utilization, capacityoptimization, and operational behavior, among other things. The RCD 244innovation and growing database of benchmarks, best practices andsolutions to inefficiency, enables the receptacle 204 to adapt andevolve.

Based on the data from the PCB 210, the sensors, inputs by the users(e.g., the customer or the manufacturer) via the RCD 244, and/or basedon other data, such as historical or weather data, the RCD 244 canchange the PCB 210 thresholds, operational parameters, and/orconfiguration, to improve the performance of the receptacle 204 indifferent geographies or seasons, or based on different usercharacteristics or changing parameters. Thus, the system andarchitecture can be self-healing.

The RCD 244 can also be configured to change the PCB's 210 normaloperating parameters. For example, the RCD 244 can be configured tocause the PCB 210 to run multiple compaction cycles in a row, to runenergy through a resistor 220 to apply a strong load upon the battery236, which can supply the energy. The RCD 244 can measure batteryvoltage at predetermined or programmable intervals, to measure the“rebound” of the battery 236. A strong battery will gain voltage quickly(e.g., the battery will almost fully recover within 15 minutes or so). Aweak battery will drop significantly in voltage (e.g., 3-5 volts), willrecover slowly, or will not recover to a substantial portion of itsoriginal voltage. By changing the normal parameters of the PCB 210, thebattery 236 can be subjected to a heavy load during a test period, whichwill determine the battery's strength without jeopardizing operations.The RCD 244 can then be configured to relay a message to the user that abattery is needed, or to use the battery differently, for example, byspacing out compactions in time, reducing the degree of voltage declinewithin a certain time period, etc. Based on the message and anyadditional information from the RCD 244, the user can then order a newbattery by simply clicking on a button on a web page, for example. TheRCD 244 can also alter the PCB 210 to do more compactions or otherenergy-using functions (like downloading software) during the daytime,when solar energy is available to replenish the battery 236 as it usesenergy.

Since the RCD 244 can be connected to databases, and can be informed bythe PCB 210 on each receptacle of conditions or status information atthe respective receptacle, the RCD 244 can also be used to relay datacollected from the databases or PCB 210 for other types of servicingevents. In other words, the RCD 244 can obtain, collect, maintain, oranalyze status, operating, or conditions information received from thePCB 210 of one or more receptacles and/or one or more databases storingsuch information, and relay such data to a separate or remote device,such as a remote server or control center. For example, the RCD 244 canbe configured to relay a message to a waste hauler to collect thereceptacle 204 if two or more parameters are met simultaneously. Toillustrate, the RCD 244 can relay a message to a waste hauler to collectthe receptacle 204 if the receptacle 204 is over 70% full and acollection truck is within 1 mile of the receptacle 204. The RCD 244 canthen send a message to the remote device 252 to alert a user that acollection had been made, and the cost of the collection will be billedto the user's account.

In addition, the RCD 244 can change the circuitry between the solarpanel 234 and the battery 236, so that solar strength can be measuredand an optimal charging configuration can be selected. The chargingcircuitry 214A-B is illustrated as two circuitries; however, one ofordinary skill in the art will readily recognize that some embodimentscan include more or less circuitries. Charging circuits 214A-B can bedesigned to be optimized for low light or bright light, and can beswitched by the RCD 244 based on programmable or pre-determinedthresholds. Also, while solar information can be readily available(e.g., Farmers' Almanac), solar energy at a particular location can varywidely based on the characteristics of the site. For example, light willbe weaker if reflected off a black building, and if the building istall, blocking refracted light. For this reason, it can be useful tomeasure solar energy on site, as it can be an accurate determinant ofactual energy availability at a particular location. To do this, thebattery 236 and solar panel 234 can be decoupled using one or morecharging relays 212. In other aspects, a very high load can be placed onthe battery 236 to diminish its voltage, so that all available currentfrom the solar panel 234 flows through a measureable point. This can bedone, for example, by causing the receptacle 204 to run compactioncycles, or by routing electricity through a resistor, or both.

There are a variety of other methods which can be used to create a load.However, putting a load on the battery 236 can cause permanent damage.Thus, the RCD 244 can also be configured to disconnect the battery 236from the solar panel 234, instead routing electricity through a resistor220. This can allow for an accurate measurement of solar intensity at aparticular location, without depleting the battery 236, which can helpassess the potential for running compactions, communicating, poweringilluminated advertisements, and powering other operations. In someembodiments, the PCB 210 can be reconfigured by the RCD 244 to runcontinuous compaction cycles for a period of time, measure solar panelcharging current, relay the data, and then resume normal operations.Different configurations or combinations of circuits can be used to testsolar intensity, battery state or lifecycle, and/or predict solar orbattery conditions in the future.

The RCD 244 can also track voltage or light conditions for a period ofdays, and alter the state of load and charging based on constantlychanging input data. For example, the RCD 244 can configure the timer218 of the PCB 210 to turn on the display 232 for advertising for anumber of days in a row, starting at a specific time and ending atanother specific time. However, if the battery voltage declines overthis period of time, the RCD 244 can then reduce the time of the load(the display 232) to every other day, and/or may shorten the time periodof the load each day. Further, the RCD 244 can collect information onusage and weather patterns and reconfigure the PCB's 210 normaloperating regimen to increase or reduce the load (for example, theadvertisement on the display 232) placed on the battery 236, based onthe information collected. For example, if it is a Saturday, andexpected to be a busy shopping day, the RCD 244 can allow a decliningstate of the battery 236, and can schedule a period on the near futurewhere a smaller load will be placed on the battery 236, by, for example,not running the advertisement on the coming Monday. In doing so, the RCD244 can optimize the advertising value and energy availability to useenergy when it is most valuable, and recharge (use less energy) when itis less valuable. In order to maximize solar energy gained from avariety of locations, the RCD 244 can cause the PCB 210 to selectbetween one of several charging circuits. For example, if it isanticipated that cloudy conditions are imminent, the RCD 244 can changethe circuit that is used for battery charging, in order to make thecharger more sensitive to lower light conditions. In a sunnyenvironment, the charger circuit used can be one with poor low-lightsensitivity, which would yield more wattage in direct sunlight.

The architecture 200 can also be used for monitoring functions, whichcan enable users to access information about the receptacle 204 andcollection process. With this information, users can make judgments thatfacilitate their decision-making, helping them remotely adjust settingson the receptacle 204 to improve performance and communication. Forexample, the RCD 244 can be configured to enable users to easily adjustcallback time, which is the normal time interval for communication thatis configured in the PCB 210. The RCD 244 can enable the user to alterthis time setting, so that the receptacle 204 communicates at shorter orlonger intervals. Once the PCB 210 initiates communication, otherparameters can be reconfigured, such as awake time, which is the amountof time the receiver is in receiving mode. This enables users to make“on the fly” changes. In some cases, the PCB 210 can shut down aftersending a message and listening for messages to be received. In thesecases, it can be difficult to send instructions, wait for a response,send more instructions and wait for response, because the time lapsebetween normal communications can be a full day. However, by remotelyadjusting the setting through the RCD 244, the user can make continuousadjustments while testing out the downloaded parameters in real time,and/or close to real time. This can enhance the ability of the user toremotely control the receptacle 204.

Further, the RCD 244 can alter the current of the photoeyes 222B-C, in atest to determine whether there is dirt or grime covering the lens.Here, the RCD 244 can reconfigure the normal operating current of thephotoeyes 222B-C. If the lens is dirty, the signal emitter photoeye willsend and the signal receiver will receive a signal on high power, butnot on low power. In this way, a service call can be avoided or delayedby changing the normal operating current to the photoeyes 222B-C. Thiscan be a useful diagnostic tool.

In some embodiments, regular maintenance intervals can be scheduled, butcan also be altered via information from the RCD 244. The RCD 244 can beconfigured to run a cycle while testing motor current. If motor currentdeviates from a normal range (i.e., 2 amps or so), then a maintenancetechnician can be scheduled earlier than normal. The RCD 244 can send amessage to the user by posting an alert on the users web page associatedwith the receptacle 204.

Other settings can be embodied in the receptacle 204 as well. Forexample, the PCB 210 can sense that the receptacle 204 is full. The RCD244 can then configure the PCB 210 to have a web page, or anotherdisplay, present a full signal. The RCD 244 can alter when the fullsignal should be presented to the user. For example, after accessing adatabase with historical collection intervals, the RCD 244 canreconfigure the PCB 210 to wait for a period of time, e.g., one hour,before displaying a full signal at the web page. This can be helpfulbecause, in some cases, a “false positive” full signal can be signaledby the PCB 210, but this can be avoided based on historical informationthat indicates that a collection only a few minutes after the lastcollection would be highly aberrational. The RCD 244 can thus beconfigured to override data from the PCB 210. Instead of sending a fullsignal to the user, the RCD 244 reconfigures the PCB 210 to ignore thefull signal temporarily, and delay the display of a full-signal on theusers' web page or smart phone, in order for time to go by andadditional information to be gathered about the receptacle's actualfullness status. For example, when a collection is made and ten minuteslater, the fullness sensor detects the receptacle 204 is full, thefullness display message on the web page can be prevented fromdisplaying a full status. In some cases, the bag can be full of air,causing the proximity sensor in the receptacle 204 to detect a full bin.Within a certain time period, e.g., twenty minutes in a busy location, afew hours in a less busy location, as determined based on the historicalwaste generation rate at the site, the bag can lose its air, and theproximity sensor can sense that the bin is less full than it was twentyminutes prior, which would not be the case if the bin was full withtrash instead of air. Thus, “false positive” information can be filteredout.

Likewise, tests and checks can be performed so that false negativeinformation is avoided as well. For example, if a bin regularly fills updaily, and there is no message that it is full after two or three days,an alert can appear on the users' web page indicating an aberration.Thresholds for normal operating parameters and adjustments to normal canbe set or reset using the RCD 244, or they can be programmed to evolvethrough pattern recognition. Although many operating parameteradjustments can be made through the web portal, adjustments can also bemade automatically. This can be controlled by a software program thataggregates data and uses patterns in an aggregate of enclosures to alterPCB 210 settings on a single enclosure. For example, if the collectiondata from 1,000 enclosures indicates that collection personnel collectfrom bins too early 50% of the time when compaction threshold setting isset to “high”, compared to 10% of the time when compaction settings areset at “medium,” then the RCD 244 can reprogram the compactionthresholds to the medium setting automatically, so that collectionpersonnel can be managed better, limiting the amount of enclosures thatare collected prematurely. Automatic reprogramming, governed by softwareprograms, can be applied to other aspects, such as user response todynamic elements of the receptacle 204, such as lighted or interactiveadvertising media displayed on the receptacle 204. For example, if usersrespond to an LCD-displayed advertisement shown on the receptacle 204for “discounted local coffee” 80% of the time, the RCD 244 can configureall receptacles within a certain distance, from participating coffeeshops, to display the message: “discounted local coffee.”

In some embodiments, the RCD 244 can include a data receiving portal forthe user with information displays about an aggregate of receptacles.Here, the user can access real-time and historical information of, forexample, receptacles on a route, and/or receptacles in a givengeography. The data can be displayed for the user on apassword-protected web page associated with the aggregate of receptacleswithin a user group. The receptacle 204 can also display, for example,bin fullness, collections made, the time of collections, batteryvoltage, motor current, number and time of compaction cycles run, graphsand charts, lists and maps, etc. This data can be viewed in differentsegments of time and geography in order to assess receptacle and/orfleet status, usage, and/or trends. The users' web page can show, forexample, a pie chart showing percentage of bins collected when their LEDwas blinking yellow, red and green, or a histogram showing thesepercentages as a function of time. These statistics can be categorizedusing pull down menus and single-click features. A single click mapfeature, for example, is where summary data for a particular receptacleis displayed after the user clicks on a dot displayed on a map whichrepresents that receptacle. This can allow the user to easily view andinteract with a visual map in an external application.

The RCD 244 can be configured to display calculated data, such as“collection efficiency,” which is a comparison of collections made tocollections required, as measured by the utilized capacity of thereceptacle 204 divided by the total capacity of the receptacle 204(Collection Efficiency=utilized capacity/total capacity). The user canuse this information to increase or decrease collections, increase ordecrease the aggregate capacity across an area, etc. Typically, theusers' goal is to collect the receptacle 204 when it is full—not beforeor after. The user can click buttons on their web page to showhistorical trends, such as collection efficiency over time, vehiclecosts, a comparison of vehicle usage in one time period versus vehicleusage in another time period, diversion rates, a comparison of materialquantity deposited in a recycling bin versus the quantity of materialdeposited into a trash bin. Other statistics can be automaticallygenerated and can include carbon dioxide emissions from trucks, whichcan be highly correlated to vehicle usage. Labor hours can also behighly correlated with vehicle usage, so the web page can display alabor cost statistic automatically using information generated from thevehicle usage monitor. As the user clicks on buttons or otherwise makescommands in their web portal, the RCD 244 can change the PCB's 210operating parameters, usage of sensors, etc., and/or measurementthresholds in response. The RCD 244 can also be configured toautomatically display suggested alterations to the fleet, such assuggestions to move receptacles to a new position, to increase ordecrease the quantity of receptacles in a given area, to recommend a newsize receptacle based on its programmed thresholds, resulting in animprovement in costs to service the fleet of receptacles.

Heat mapping can also be used to provide a graphical representation ofdata for a user. Heat mapping can show the user the level of capacity ineach part of an area, for example a city block, or it can be used toshow collection frequency in an area. In each case, the heat map can begenerated by associating different colors with different values of datain a cross sectional, comparative data set, including data from aplurality of enclosures. The heat map can be a graphical representationof comparative data sets. In some embodiments, red can be associatedwith a high number of a given characteristic, and “cooler” colors, likeorange, yellow and blue, can be used to depict areas with less of agiven characteristic. For example, a heat map showing collectionfrequency or compaction frequency across 500 receptacles can be usefulto determine areas where capacity is lacking in the aggregate ofenclosures—a relative measure of capacity. In this case, the highestfrequency receptacle can assigned a value of red. Each number can beassigned progressively cooler colors. In other embodiments, the redvalue can be associated with a deviation from the average or median, forexample, a darker red for each standard deviation. The heat maps can beshown as a visual aid on the user's web page, and can color-code regionswhere “bottlenecks” restrict vehicle and labor efficiency. A small redregion can show graphically, for example, that if the user were toreplace only ten receptacles with higher-capacity compactors, thecollection frequency to a larger area could be reduced, saving traveltime. Heat maps can be a helpful visual tool for showing data including,but not limited to, data showing “most collections” in a given timeperiod, “most green collections,” which can visually demonstrate thenumber of bins collected too early (before they are actually full),“most compactions,” which can show on a more granular level the usagelevel of the bin, “most uses,” which can represent how many times theinsertion door of the bin is opened or utilized, “most alerts,” whichcan show visually the number of “door open alerts,” which can show whendoors were not closed properly, “voltage alerts,” which can showvisually which receptacles are of low power, etc. While specificmeasurements are described herein to demonstrate the usefulness of heatmapping, there are other sets of data that can be represented by theheat maps, which are within the scope and spirit of this invention.

The heat map can also be used to present a population density in one ormore areas, as well as a representation of any other activity orcharacteristic of the area, such as current traffic or congestion, forexample. This information can also be shared with other businesses ordevices. For example, the RCD 244 can analyze the heat map and sharepopulation statistics or activity with nearby businesses ormunicipalities. The RCD 244 can, for example, determine a highpopulation density in Area A on Saturday mornings and transmit thatinformation to a nearby locale to help the nearby locale prepare for theadditional activity. As another example, if the receptacle is placed ina park, the RCD 244 can determine population and activity levels atspecific times and alert park officials of the expected high levels ofactivity so the park officials and/or those managing the receptacle canplan accordingly.

The RCD 244 can also be used for dynamic vehicle routing and compactionand/or receptacle management. Because the RCD 244 can be a two-waycommunicator, it can both send and receive information between variousreceptacles and databases. This can allow the user to cross-correlatedata between the fleet of receptacles and the fleet of collectionvehicles. The RCD 244 can receive data from the user and/or the user'svehicle. For example, the RCD 244 can receive GPS data or availabilitydata, and use it to change parameters on a given receptacle or aggregateof receptacles. The RCD 244 can receive this data from the users'GPS-enabled smartphone, for example. Similarly, the RCD 244 can senddata to the user, a user device, a smartphone, etc., about the status ofthe receptacle 204. With this two-way data stream, collectionoptimization can be calculated in real time or close to real time. Forexample, a collection truck is traveling to the east side of a city andhas 30 minutes of spare time. The RCD 244 can receive information aboutthe truck's whereabouts, availability and direction, and query adatabase for receptacle real time and historical fullness informationand determine that the truck can accommodate collections of twentyreceptacle locations. The RCD 244 can then display a list of twentyreceptacle locations that the truck can accommodate. The user can view amap of the twenty recommended locations, see a list of drivingdirections, etc. The map of driving directions can be optimized byadding other input data, such as traffic lights, traffic conditions,average speed along each route, etc. At the same time, as the truckheads to the east side of the city, the RCD 244 can reconfigurereceptacles on the west side to change compaction thresholds, so thatcapacity is temporarily increased, freeing up additional time for thetruck to spend in the east section. Alternatively, the RCD 244 canreconfigure a receptacle to temporarily display a “full” message topedestrians, helping them find a nearby receptacle with capacityremaining. The RCD 244 can, in the case where the receptacle requirespayment, increase pricing to the almost-full receptacle, reducing demandby pedestrians or other users. This same logic can be effective insituations where trucks are not used, for example, indoors at a mall orairport. The demand for waste capacity can vary, so having remotecontrol over the receptacle 204 can allow users to change settings,parameters, and/or prices to make the collection of waste dynamic andefficient.

The location of the receptacle 204 and other receptacles can bedetermined via triangulation and/or GPS, for example, and placed on amap in the interactive mapping features. Moreover, the location of anindoor receptacle can be obtained from indoor WiFi hot spots, and theindoor receptacle can be placed on a map in the interactive mappingfeatures. As a staff member accomplishes tasks (i.e., cleaning abathroom) and moves inside a facility, the staff member's location canbe tracked, and the fullness and location of nearby receptacles can beplotted on a map or given to the staff member by other means, asinstructions to add a collection activity to the list of tasks. Whetherby GPS, Wifi, Bluetooth, etc., triangulation between communication nodescan serve to locate a receptacle on a map, and measurements of fullnessof receptacles can be used to create work instructions for staff membersor truck drivers, so that efficient routes and schedules can be createdto save time.

To better manage the collection process, user groups can be separatedbetween trash and recycling personnel. In many cities, there areseparate trucks used to collect separate streams of waste, such as trashand recyclables. For this reason, it can be helpful to configure theuser's web page to display data based on a waste stream. The data canalso be divided in this fashion and displayed differently on asmartphone, hand-held computer, and/or other user device. In addition,data can be displayed differently to different users. For example, themanager of an operation can have “administrative privileges,” and thuscan change the location of a particular receptacle in the system, viewcollection efficiency of a particular waste collector, view loginhistory, and/or view industry or subgroup benchmarks, while a wastecollector with lower privileges can only view receptacle fullness, forexample. The RCD 244 or another device can also be configured to print alist of receptacles to collect next, a list of full or partially fullbins, etc. For example, the remote device 252 can be configured to printa list of receptacles to collect in the remaining portion of a route.

FIG. 3 illustrates an example storage receptacle 300. The storagereceptacle 300 includes a bin 302 for storing content items, and a door306 for opening the storage receptacle 300 to throw items in the bin302. The storage receptacle 300 can have one or more sensors 304A-B,such as photoeye sensors, placed above the bin 302 for detecting thefullness state of the bin 302. The storage receptacle 300 can alsoinclude a sonar sensor 308 to detect objects in the receptacle 300 andcalculate the fullness state of the receptacle 300. As one of ordinaryskill in the art will readily recognize, the sonar sensor 308 andsensors 304A-B can also be placed in other locations based on the sizeand/or capacity of the receptacle 300, storage requirements, storageconditions, etc. The storage receptacle 300 can also include other typesof sensors, such as an infrared sensor, a temperature sensor, a halleffect sensor, an encoder sensor, a motion sensor, a proximity sensor,etc. The sonar sensor 308 and sensors 304A-B can sense fullness atregular intervals, and/or based on manual inputs and/or a pre-programmedschedule, for example. Moreover, the sonar sensor 308 and sensors 304A-Bare electrically connected to the printed circuit board (PCB) 316.Further, the sonar sensor 308 and sensors 304A-B can be actuated by thePCB 316, which can be configured to control the various operations ofthe storage receptacle 300.

The PCB 316 can control electrical functions performed by the storagereceptacle 300. The electrical functions controlled by the PCB 316 caninclude, for example, running compactions by actuating a motor; sensingwaste or recyclables volume inside the receptacle 300 using a sensor atregular or programmable intervals, such as sensors 304A-B; changingstatus lamps 318 at regular and/or programmable thresholds to/from acolor indicating that the receptacle 300 is not full (e.g., green),to/from a color indicating that the receptacle 300 is almost full (e.g.,yellow), to/from a color indicating that the receptacle 300 is full(e.g., red); collecting data and transmitting the data to anotherdevice; receiving data from another device; managing a power mode;measuring and managing a current; performing diagnostics tests; managinga power source; etc. The motor controller 310 can enable voltage to beapplied across a load in either direction. The PCB 316 can use the motorcontroller 310 to enable a DC motor in the receptacle 300 to runforwards and backwards, to speed or slow, to “brake” the motor, etc.

The storage receptacle 300 includes a transmitter 312 and a receiver 314for sending and receiving data to and from other devices, such as aserver or a remote control device. Accordingly, the storage receptacle300 can transmit and receive information such as instructions, commands,statistics, alerts, notifications, files, software, data, and so forth.The transmitter 312 and receiver 314 can be electrically connected tothe PCB 316. This way, the transmitter 312 can transmit data from thePCB 316 to other devices, and the receiver 314 can receive data fromother devices and pass the data for use by the PCB 316. In this regard,a user who is checking the status of the receptacle could drive down thestreet near the device (say within a wireless range, such as Bluetoothor WIFI, for example), not even get out of their vehicle, but receive asignal indicating that all is well, that the trash needs to be emptied,or that a repair or cleaning is needed.

Status lamps 318 can provide an indication of the status of the storagereceptacle 300. For example, the status lamps 318 can indicate thefullness state of the storage receptacle 300. To this end, the statuslamps 318 can be configured to display a respective color or patternwhen the storage receptacle 300 is full, almost full, not full, etc. Forexample, the status lamps 318 can be configured to flash red when thestorage receptacle 300 is full, yellow when the storage receptacle 300is almost full, and green when the storage receptacle 300 is not full.Moreover, the status lamps 318 can be LED lights, for example.

The status lamps 318 can also be configured to flash in various patternsto indicate various other conditions. For example, the status lamps 318can be configured to flash at the same time and in combination to showthat the receptacle 300 is full. The status lamps 318 can also beconfigured to flash in different patterns or times or colors to showtroubleshooting status information for example. In some cases, thestatus lamps 318 can be configured to flash in a predetermined manner toshow that a door of the receptacle is open, a component is damaged, anobstacle is stuck, an operation is currently active, etc.

As one of ordinary skill in the art will readily recognize, thereceptacle 300 can include other components, such as motors, sensors,batteries, solar panels, displays, relays, chargers, GPS devices,timers, fuses, resistors, remote control devices, cameras, etc. However,for the sake of clarity, the receptacle 300 is illustrated without someof these components.

Referring now to FIGS. 4A and 4B, unsecured receptacle 400A illustratesa storage receptacle, such as receptacle 300 in FIG. 3, operating undernormal security conditions. The door 402 is shown in which a user canopen the door and put in trash. The larger door 406 houses the door 402.A hinge 408 can be positioned along a right side edge of the door 406and enable the door 406 to be opened exposing the interior of thereceptacle and the security plate 404 to be installed. On the otherhand, secured receptacle 400B illustrates the receptacle operating undera security condition with the security plate 404 installed on the door406 to prevent the door 402 from being opened. The security conditioncan include a circumstance where there is a potential for a securitybreach, a terrorist attack or attempt, a conspiracy, a legal order, acrime condition, a heightened state of security, a lock-down state, acrime scene, a vandalism, a conspiracy, an unauthorized access, etc.Under the security condition, the system in the receptacle 400B isengaged and monitoring of the receptacle occurs so as to sense whether asecurity breach is being attempted.

Receptacles 400A-B can include a door 402, which can serve as aninsertion point to allow users to dispose materials for storage in thebin on the receptacles 400A-B. When operating under a securitycondition, the receptacle can be fitted with a security plate 404 toblock or limit movement of the door 402 to prevent users from openingthe door 402 to insert or dispose materials into the receptacle. In someaspects, the security plate 404 can cover at least a portion of the door402 and at least partially immobilize the door to prevent opening orforced entry. The security plate 404 can prevent movement of the door ineither direction: either forward movement, backward movement, or both.This way, a user cannot open the door 402 by pushing inward or pullingoutward.

The security plate 404 can also serve as a notice to nearby users thatthe receptacle 400B is locked, “out-of-order,” or otherwise operatingunder a security condition. For example, when a user walks to receptacle400B to dispose of a waste item, she can quickly determine that thesecure receptacle 400B is currently not in use when she sees thesecurity plate 404 over the door 402. In some cases, the security plate404 can also display a message to the users, such as an “out-of-order”message.

In some embodiments, the security plate 404 can be installed upon anotification or alert of a security condition at the unsecuredreceptacle 400A or a surrounding area. For example, the unsecuredreceptacle 400A can send an alert to a remote device, such as a server,indicating that the unsecured receptacle 400A is operating in a normalmode. The unsecured receptacle 400A can also send a signal indicating adetected security condition to the remote device. Upon receipt of thealert(s) or signal(s) from the unsecured receptacle 400A, a user can bedispatched to the unsecured receptacle 400A to install the securityplate 404, according to secured receptacle 400B for example, and anyother necessary security features. Once the security condition is over,the secured receptacle 400B can again send a signal indicating that thesecurity condition is over or that the security plate 404 should beremoved.

In some embodiments, the secured receptacle 404B can also include asecurity pin (not shown) fitted or attached inside the securedreceptacle 404B to further prevent the door 402 from being opened by auser. The security pin can limit movement of the door and block the doorfrom being opened. The security pin can provide a second layer ofsecurity when combined with the security plate 404 by further securingor locking the door 402 to prevent insertion of content items into thesecured receptacle 400B. In some aspects, the security pin can becoupled to a hinge mechanism of the door 402 to prevent opening of thedoor 402.

The security plate 404 can be attached, secured, or installed in a topedge of the secured receptacle 400B. However, in some embodiments, thesecurity plate 404 can be attached, secured, or installed in a differentposition or location on the secured receptacle 400B. For example, thesecurity plate 404 can be installed on an opening side of the door 402,the inside of the secured receptacle 400B, etc. Moreover, while FIG. 4Billustrates one security plate, one of ordinary skill in the art willreadily recognize that additional security plates can also be installedin some cases. For example, a security plate can be installed in thefront of the secured receptacle 400B and a second security plate can beinstalled in the inside of the secured receptacle 400B.

Further, while FIG. 4B illustrates a use of a security plate forsecuring or locking the receptacle, one of ordinary skill in the artwill recognize the other means can be used in addition to, or in lieuof, the security plate 404. For example, the secured receptacle 400B canbe secured or locked down using the security pin previously describedwith or without the security plate. As another example, the securedreceptacle 400B can be locked down using a lock or any other lockingmechanism or hardware, such as a deadbolt or a lock set. Such securitymechanisms can be implemented under a security condition, which can bedetected and/or monitored by the receptacle as previously described.

As further described herein, the secured receptacle 400B can also detectand monitor events and transmit such data to a remote device, such as aserver, to be collected or displayed for future or current analysis. Forexample, the secured receptacle 400B can monitor and detect any attemptsto open the door 402, remove the security plate 404, or tamper with thesecurity receptacle 400B. The secured receptacle 400B can monitor anddetect such events using one or more sensors, such as photoeye sensors,cameras, defect detector sensors, water sensors, pressure sensors, noisesensors, chemical or particle sensors, motion sensors, gyroscopes, imagesensors, etc. In some cases, the receptacle can be configured to monitorand detect hazardous or illegal materials, such as explosive materials,being deposited into the receptacle. The receptacle can also detect if aportion of the receptacle, such as a door or a handle, comes intocontact with specific substances, such as explosives. For example, if auser having gun powder residue in her hands attempts to open the door onthe receptacle or otherwise come in contact with the receptacle, thereceptacle can be configured to detect the gun powder residue andgenerate a signal, alarm, or notification.

Once the secured receptacle 400B has detected a breach attempt or ahazardous substance, for example, the secured receptacle 400B cantransmit any sensed or monitored data to a remote device. The remotedevice can then collect the data, present the data via a display orinterface, analyze the data, and/or use the data in a remote control andanalysis software application, for example. The remote device can alsotransmit the data to another device, such as a server, or anotherentity, such as a law enforcement agency.

Referring now to FIGS. 5A-D, receptacle 500 can include a door 502 whichcan be accessible to nearby users and serve as an insertion point forusers to insert materials into the receptacle 500. The door 502 can bepushed or pulled by a user to provide an opening that allows a user toplace items inside the receptacle 500. In some aspects, the door 502 canswing backwards when pushed by a user in order to create an opening intothe receptacle 500 for storing or disposing materials into thereceptacle 500.

When a security condition is detected or otherwise signaled, a user caninstall security plate 504 to secure and/or protect the receptacle 500as illustrated in the secured receptacle 500 in FIG. 5B. The receptacle500 can then monitor or detect any attempts to open the security plate504 or tamper with the receptacle 500 and/or transmit any sensed data,information, or alerts to a remote device, as previously described inFIGS. 2 and 4.

The receptacle 500 can also include an access door 506 which can beopened from outside of the receptacle 500 to access the inside 508 ofthe receptacle 500. When opened, the access door 506 also providesaccess to the door 502 and allows a user to install the security plate504 over the door 502, as previously described. Once the security plate504 is installed over the door 502, the access door 506 can be closedand locked to prevent unauthorized access to the inside 508 of thereceptacle.

In some embodiments, the security plate 504 can be placed to cover atleast a portion of the door 502 by opening the access door 506 andsecuring the security plate 504 on the outside of the access door 506.In some cases, a user installing the security plate 504 can simply slideor attach the security plate 504 to the outside of the access door 506and/or the top of the door 502, as illustrated in FIG. 5D. When theaccess door 506 is closed and/or locked, the security plate 504 canbecome further constrained or secured on the receptacle 500 to preventunauthorized removal of the security plate 504. This way, a user isrequired to open the access door 506 in order to remove the securityplate 504. Thus, a user cannot properly remove the security plate 504without the corresponding means, such as a key or a code, for unlockingand opening the access door 506. In some cases, the security plate 504can also be configured to include one or more latches or additionallocking mechanisms to snap or attach to the receptacle 500 foradditional support, locking, and security.

FIG. 6 illustrates a backside view 600 of the security plate 504. Thesecurity plate 504 in the backside view 600 is shown removed from thereceptacle 500. The security plate 504 can be designed for coupling to acorresponding portion of the receptacle 500 for securing the securityplate 504 to the receptacle 500. As shown in FIG. 6, the security plateas a clean surface along a bottom portion of the plate, and a raisedflange on a right hand portion of the plate, which, when the plate isinstalled, will cover the left hand portion of the door 406. The topportion of the plate 502 also includes a first flange 602 that protrudesfrom at least a portion of the top edge of the plate 504. The firstflange 602 has a second flange 602 that protrudes out of a portion ofthe surface of the first flange 602. The second flange 604 is generallyparallel to the plate 504. Screw holes can be placed in the secondflange 604 for securing the plate 504 in place on the door 406. Thestructure of these flanges enable a top portion of the plate 504 to besecured on the door 406 in a secure manner such that a person cannoteasily pull the plate off. FIGS. 5C and 5D illustrate the installationof the plate on the door 406.

FIG. 7 illustrates an exemplary inside locking mechanism for areceptacle 700. The receptacle 700 can include a door 706 which canprovide an opening or insertion point similar to the door 502 in FIGS.5A-D. The security pin 702 can be used to lock the door 706 from beingopened by a user from the outside. The security pin 702 can be attachedthrough a whole on the receptacle 700 via a card 704 that is attached tothe door 706, to prevent the door 706 from being opened. The securitypin 702 can thus provide a locking mechanism to secure the door 706 andprevent access to the inside of the receptacle through the insertionpoint on the door 702. The security pin 702 can be of varying length andsize based on the size of the receptacle 700 and/or the door 706, thesecurity requirements, the weight and materials of the receptacle 700and/or the door 706, or any other factor according to conventionalmethods.

Having disclosed some basic system components and concepts, thedisclosure now turns to the example method embodiments shown in FIGS. 8and 9. For the sake of clarity, the method in FIG. 8 is described interms of example system 100, as shown in FIG. 1, configured to practicethe methods. Moreover, for the sake of clarity, the method in FIG. 9 isdescribed in terms of example receptacle 300, as shown in FIG. 3,configured to practice the methods. The steps outlined herein areillustrative and can be implemented in any combination thereof,including combinations that exclude, add, or modify certain steps.

Referring first to FIG. 8, the system 100 can monitor, under a securitycondition, a storage receptacle having a security plate being positionedover a door on the storage receptacle, the door including an insertionpoint for storing contents on the storage receptacle, and the securityplate being configured to block an opening of the door to preventinsertion of additional contents in the storage receptacle (800). Thesystem 100 can monitor the storage receptacle using sensors, dataconnections, algorithms, user feedback, news information, usage andperformance data, device statistics, and so forth. For example, thesystem 100 can monitor a data connection of the storage receptacle, aswell as sensed data collected by sensors at the storage receptacle andtransmitted to the system via the data connection. Through the dataconnection, the system 100 can also receive, from the storagereceptacle, a current status of the storage receptacle, a current usage,information about running services at the storage receptacle, errors atthe storage receptacle, logged information, etc.

The storage receptacle can also be configured to detect dangeroussubstances that come in contact with one or more components of thestorage receptacle. For example, the storage receptacle can beconfigured to detect if explosive materials are inserted into thestorage receptacle. To this end, the storage receptacle can beconfigured to use one or more sensors for detecting specific types ofsubstances, such as chemical or particle sensors, scanners, chemicaltesting materials, etc.

In some cases, the storage receptacle can be configured with a sensor orscanner capable of detecting if a person that has touched a portion ofthe storage receptacle, such as the handle, has left any traces of anexplosive substance, such as gun powder, on the touched portion of thestorage receptacle. For example, if an individual with traces of gunpowder or bomb making materials on his or her hand grabs the handle ofthe storage receptacle to open the door, the storage receptacle candetect the traces of gun powder or bomb making materials, and generate asignal or alarm. The storage receptacle can then send the signal to aremote server or another entity, such as a police department, to alertothers of the detected traces of explosive materials.

Next, the system 100 can receive a signal indicating a security breachat the storage receptacle, the security breach including at least one ofan attempt to open the door and an attempt to remove the security plate(802). The system might sense for a series of actions such as first anattempt to open the door (either the smaller door for entering trash, orthe larger door for getting to the interior of the receptacle.) and thena second attempt to remove the security plate. The system 100 canreceive the signal from a transmitter at the storage receptacle, forexample. Moreover, the storage receptacle can generate the signal basedon sensed data, performance logs, errors, current usage information,etc., as previously described. Other breaches could be sensed for aswell, such as a movement of the entire receptacle, or any attempt toobtain access to the inside such as through the back or the top of thereceptacle.

In response to the signal, the system 100 can then generate anotification of the security breach (804). The notification can be analert, a report, an alarm, a message, another signal, etc. The system100 can also send the notification to another user or device, such as aremote server or a device associated with a security official. Thesystem may provide a series of notifications such as an eventcoordinator or security officer as well as police or fire officials.Participants in an event may also be stored in the system such thatnotifications could go out. In some aspects, the system 100 can alsostore the notification in a database or storage to maintain statistics,evidence, logs, and data relating to the security breach and any otherprevious security breach. The system 100 can also analyze the signal ornotification and generate a recommendation, such as a recommended orsuggested response. Thus, in once example, if a marathon is going on,and a security event or condition occurs at one of the receptacles, oneor more of the following people could get a notification or an alert:Marathon officials, police/fire officials, runners in the marathon,spectators, etc. Thus, notification could immediately go out withparticular information about the location of the receptacle andinstructions.

Referring to FIG. 9, the receptacle 300 can detect a security conditionassociated with at least one of a storage receptacle and an area aroundthe storage receptacle (900). The security condition can include, forexample, criminal activity, a terrorist attempt, a terrorist plot, alock-down period, a heightened state of security, a conspiracy, asecurity breach, vandalism, a police situation, an enforcementcondition, a crime scene, a security request, etc. Moreover, thereceptacle 300 can detect the security condition using one or moresensors as previously described. In some aspects, the receptacle 300 canbe configured to monitor events, such as nearby movements, externalforces, data events (e.g., network alerts or data connections),surrounding conditions, environment parameters, usage events, newsevents, etc.

Next, based on the security condition, a security plate is installedover a door on the receptacle 300, the door including an insertion pointfor storing contents on the receptacle 300, and the security plate beingconfigured to block an opening of the door to prevent insertion ofadditional contents in the receptacle 300 (902). The security plate canbe installed by a user in response to the security condition. In someaspects, the receptacle 300 can generate a signal, alarm, message, ornotification relating to the security condition or a security request totrigger the installation of the security plate. For example, thereceptacle 300 can transmit a security-plate installation request alongwith a location associated with the receptacle 300, a timestamp, and/orany other information.

In some aspects, the receptacle 300 can also be configured toautomatically install the security plate in response to the securitycondition. For example, the receptacle 300 can be designed to maintainthe security plate in an open position, and configure the security plateto automatically shut or close over the door (and/or any other openingin the receptacle 300) in response to the security condition. Here, thereceptacle can include a locking or closing mechanism coupled to thesecurity plate which can be triggered by a signal from a processorassociated with the receptacle 300. The receptacle 300 can then send asignal to a remote device indicating that the security plate has beeninstalled, locked, or secured, as well as any other additional detailsregarding the security plate, the receptacle 300, or the securitycondition.

Then, based on the security condition, the receptacle 300 can lock thedoor in a closed position using a locking pin located inside the storagereceptacle, the locking pin limiting movement of the door on the storagereceptacle to further prevent insertion of additional contents in thestorage receptacle (904). The locking pin can be automatically placed ina locked position by the receptacle 300 using a locking mechanismconfigured to respond to a signal from the processor. In other cases,the locking pin can be manually inserted into the receptacle 300 and/orplaced in a locked position by a user in response to the securitycondition or a request from the receptacle 300.

Next, the receptacle 300 can monitor the storage receptacle via a sensorconfigured to detect a security breach associated with at least one ofthe door on the storage device and the security plate (906). The sensorcan include one or more sensors as previously described. Moreover, thereceptacle 300 can transmit any sensed data to a remote device, such asa server, to be stored, collected, forwarded, analyzed, or manipulatedby the remote device. In some cases, the receptacle 300 can transmitsensed data to be used on an application at the remote device to controland/or monitor the receptacle 300.

In some cases, the receptacle 300 can also be configured to maintainand/or monitor a data connection to a network or a server. For example,the receptacle 300 can maintain a wireless connection to a server via anetwork, and detect any loss of data connection. If the data connectionis lost, the receptacle 300 can trigger an alarm indicating a securityissue. Similarly, the server can trigger an alarm or notificationindicating that the receptacle 300 has lost the data connection. Inresponse, the server, or a user receiving the indication from theserver, can respond to the loss of connection appropriately. Forexample, the user can contact the authorities if he or she suspects thatthe receptacle 300 lost the data connection as a result of a criminalact or event.

In some configurations, the receptacle 300 can also be configured todetect dangerous substances that come in contact with one or morecomponents of the receptacle 300. For example, the receptacle 300 can beconfigured to detect if explosive materials are inserted into thereceptacle 300. In some cases, the receptacle 300 can be configured witha sensor or scanner capable of detecting if a person that has touched aportion of the receptacle 300, such as the handle, has left any tracesof an explosive substance, such as gun powder, on the touched portion ofthe receptacle 300. For example, if an individual with traces of gunpowder or bomb making materials on his or her hand grabs the handle ofthe receptacle 300 to open the door, the receptacle 300 can detect thetraces of gun powder or bomb making materials, and generate a signal oralarm. The storage receptacle can then send the signal to a remoteserver or another entity, such as a police department, to alert othersof the detected traces of explosive materials.

Embodiments within the scope of the present disclosure may also includetangible and/or non-transitory computer-readable storage devices forcarrying or having computer-executable instructions or data structuresstored thereon. Such tangible computer-readable storage devices can beany available device that can be accessed by a general purpose orspecial purpose computer, including the functional design of any specialpurpose processor as described above. By way of example, and notlimitation, such tangible computer-readable devices can include RAM,ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storageor other magnetic storage devices, or any other device which can be usedto carry or store desired program code in the form ofcomputer-executable instructions, data structures, or processor chipdesign. When information or instructions are provided via a network oranother communications connection (either hardwired, wireless, orcombination thereof) to a computer, the computer properly views theconnection as a computer-readable medium. Thus, any such connection isproperly termed a computer-readable medium. Combinations of the aboveshould also be included within the scope of the computer-readablestorage devices.

Computer-executable instructions include, for example, instructions anddata which cause a general purpose computer, special purpose computer,or special purpose processing device to perform a certain function orgroup of functions. Computer-executable instructions also includeprogram modules that are executed by computers in stand-alone or networkenvironments. Generally, program modules include routines, programs,components, data structures, objects, and the functions inherent in thedesign of special-purpose processors, etc. that perform particular tasksor implement particular abstract data types. Computer-executableinstructions, associated data structures, and program modules representexamples of the program code means for executing steps of the methodsdisclosed herein. The particular sequence of such executableinstructions or associated data structures represents examples ofcorresponding acts for implementing the functions described in suchsteps.

Other embodiments of the disclosure may be practiced in networkcomputing environments with many types of computer systemconfigurations, including personal computers, hand-held devices,multi-processor systems, microprocessor-based or programmable consumerelectronics, network PCs, minicomputers, mainframe computers, and thelike. Embodiments may also be practiced in distributed computingenvironments where tasks are performed by local and remote processingdevices that are linked (either by hardwired links, wireless links, orby a combination thereof) through a communications network. In adistributed computing environment, program modules may be located inboth local and remote memory storage devices.

The various embodiments described above are provided by way ofillustration only and should not be construed to limit the scope of thedisclosure. Various modifications and changes may be made to theprinciples described herein without following the example embodimentsand applications illustrated and described herein, and without departingfrom the spirit and scope of the disclosure. Claim language reciting “atleast one of” a set indicates that one member of the set or multiplemembers of the set satisfy the claim.

We claim:
 1. A method comprising: monitoring, under a securitycondition, a storage receptacle having a security plate being positionedover a door on the storage receptacle, the door comprising an insertionpoint for storing contents on the storage receptacle, and the securityplate being configured to block an opening of the door to preventinsertion of additional contents in the storage receptacle; receiving asignal indicating a security breach at the storage receptacle, thesecurity breach comprising at least one of a first attempt to open thedoor and a second attempt to remove the security plate; and in responseto the signal indicating the security breach, generating, via aprocessor, a notification of the security breach.
 2. The method of claim1, further comprising transmitting the notification to a remote device.3. The method of claim 1, wherein the notification comprises informationregarding at least one of the security breach and the securitycondition.
 4. The method of claim 1, wherein the security conditioncomprises a security threat, and wherein the signal comprises senseddata collected from a sensor at the storage receptacle.
 5. The method ofclaim 1, further comprising generating an alarm based on the indicationof the security breach, the alarm comprising at least one of a visualalarm and an audio alarm.
 6. The method of claim 1, further comprisingmonitoring a data connection associated with a communications device atthe storage receptacle to detect a connection state of the dataconnection, the communications device comprising at least one of acommunications interface, an antenna, a receiver, and a transmitter. 7.A method comprising: detecting a security condition associated with atleast one of a storage receptacle and an area around the storagereceptacle; based on the security condition, installing a security plateover a door on the storage receptacle, the door comprising an insertionpoint for storing contents on the storage receptacle, and the securityplate being configured to block an opening of the door to preventinsertion of additional contents in the storage receptacle; based on thesecurity condition, locking the door in a closed position using alocking pin located inside the storage receptacle, the locking pinlimiting movement of the door on the storage receptacle to furtherprevent insertion of additional contents in the storage receptacle; andmonitoring the storage receptacle via a sensor configured to detect asecurity breach associated with at least one of the door on the storagedevice and the security plate.
 8. The method of claim 7, wherein thesecurity breach comprises at least one of a first attempt to open thedoor, a second attempt to remove the security plate, and a detection ofa predetermined substance making contact with the storage receptacle. 9.The method of claim 8, further comprising: detecting the securitybreach; and sending, via a transmitter on the storage receptacle, asignal to a remote device indicating that the security breach wasdetected.
 10. The method of claim 9, further comprising establishing adata connection between the remote device and the storage receptacle,wherein the data connection is used to send the signal.
 11. The methodof claim 10, further comprising monitoring the data connection to detecta connection state of the data connection.
 12. The method of claim 11,wherein the storage receptacle is configured to send a security breachsignal to the remote device when a disconnection state of the dataconnection is detected.
 13. The method of claim 12, wherein thedisconnection state triggers the transmitter on the storage device tosend the signal after a threshold period of interruption.
 14. The methodof claim 7, wherein the security plate is installed over a top edge ofthe door to block the opening of the door.
 15. The method of claim 7,further comprising installing a second security plate over a secondopening on the storage receptacle, the second opening comprising asecond insertion point for storing contents in the storage receptacle.16. The method of claim 15, wherein at least one of the security plateand the second security plate are configured to display an indicationthat the storage receptacle is out of order.
 17. A receptaclecomprising: a processor; a transmitter for transmitting information to aremote device via a network; a storage for storing content items; asensor for detecting a security condition associated with at least oneof the receptacle and an area around the receptacle; a security plateinstalled over a door on the receptacle, the door comprising aninsertion point for storing contents on the storage of the receptacle,and the security plate being configured to block an opening of the doorto prevent insertion of additional contents in the storage of thereceptacle; a locking pin for locking the door in a closed position, thelocking pin limiting movement of the door on the receptacle to furtherprevent insertion of additional contents in the storage of thereceptacle; and a computer-readable storage medium having stored thereininstructions which, when executed by the processor, cause the processorto perform operations comprising: detecting the security condition; andgenerating a signal indicating that the security condition has beendetected.
 18. The receptacle of claim 17, the computer-readable storagemedium having stored therein instructions which, when executed by theprocessor, result in an operation further comprising sending the signalto a remote device via the transmitter, wherein an installation of thesecurity plate is triggered by a detection of the security condition.19. The receptacle of claim 17, wherein the security condition comprisesat least one of a first attempt to open the door and a second attempt toremove the security plate.
 20. The receptacle of claim 17, furthercomprising an energy storage for powering operational functionsperformed by the receptacle and a receiver for receiving informationtransmitted to the receptacle via the network, the computer-readablestorage medium having stored therein instructions which, when executedby the processor, result in operations further comprising: activatingthe sensor on the receptacle; and receiving a measurement from thesensor.