AU2017100652A4 - A system and method for facilitating the secure delivery of a parcel - Google Patents
A system and method for facilitating the secure delivery of a parcel Download PDFInfo
- Publication number
- AU2017100652A4 AU2017100652A4 AU2017100652A AU2017100652A AU2017100652A4 AU 2017100652 A4 AU2017100652 A4 AU 2017100652A4 AU 2017100652 A AU2017100652 A AU 2017100652A AU 2017100652 A AU2017100652 A AU 2017100652A AU 2017100652 A4 AU2017100652 A4 AU 2017100652A4
- Authority
- AU
- Australia
- Prior art keywords
- delivery
- access
- access control
- code
- receptacle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A method for facilitating the secure delivery of an order placed through an online transaction. The method comprises generating 5 an access code for the secure delivery. The access code is stored in a data store accessible by an access control apparatus which controls access to a delivery receptacle. The access code is also communicated to a delivery agent as part of the online transaction. The delivery agent enters the access code into a 10 code input interface implemented by the access control apparatus to gain access to the delivery receptacle for completing the secure delivery. (FIGURE 1) . n i - - - --- - -- r: LIo w I I C Il -- --- ---- ---- --
Description
2017100652 05 Jun2017
AUSTRALIA
Patents Act 1990 (Cth)
SPECIFICATION
APPLICANT
PRECISION METALS (QUEANBEYAN) PTY LTD
TITLE
A SYSTEM AND METHOD FOR FACILITATING THE SECURE DELIVERY OF A PARCEL
The invention is described in the following statement:
A SYSTEM AND METHOD FOR FACILITATING THE SECURE DELIVERY OF A 2017100652 05 Jun2017
PARCEL
Field of the Invention 5 The present invention relates generally to systems, methods and locking arrangements for facilitating the secure delivery of a parcel.
Background of the Invention 10 The past decade has seen an exponential increase in the amount of trade done over the Internet, generally referred to as e-commerce. Some notable factors responsible for this increase include the sheer convenience of ordering goods from home, the cost savings that can be passed on by e-merchants and the 15 innovations which allow users to securely pay for their purchases .
While there have been numerous innovations relating to ease and security of ordering goods online, there have been few advances 20 in the way that these goods are securely delivered. For example, where a purchaser is not at home to collect/sign for purchased goods the delivery agent (e.g. courier, postal worker) will typically leave a note advising that they were unable to complete the delivery and take the goods to a collection office 25 for the purchaser to collect at a later time. This is clearly inefficient for both the delivery agent and purchaser.
Summary of the Invention
In accordance with a first aspect there is provided a method for 30 facilitating the secure delivery of a parcel by a delivery agent, comprising the steps of: implementing an access control program for controlling access to a delivery receptacle, the access control program being further operable to receive information generated by a delivery agent computer system that 35 is associated with the secure delivery; determining an access code from the information generated by the delivery agent computer system and storing the access code in a data store 2017100652 05 Jun2017 3 accessible by the program, the access code being automatically determined by at least one of the access control program and delivery agent computer system; wherein the access control program is operable to enable access to the delivery receptacle 5 for completing the secure delivery responsive to the delivery agent entering the access code into a code input interface controlled by the access control program.
In an embodiment the information generated by the delivery agent 10 system is parcel related information available to the delivery agent when making the secure delivery.
In an embodiment the delivery agent computer system comprises a hand held device utilised by the delivery agent, and wherein 15 both the hand held device and access control program determine the same access code from the parcel related information using a public/private key, or a shared code generation algorithm.
In an embodiment, prior to determining an access code, the 20 delivery agent computer system queries a database to determine if a recipient of the parcel has a registered delivery receptacle and responsive to making a positive determination books the secure delivery. 25 In an embodiment the access control program is further operable to communicate with a data store which stores a record of scheduled secure deliveries and responsive to determining that there is a booking for the corresponding recipient retrieves the corresponding information. 30
In an embodiment the method further comprises generating and storing access control conditions in association with the access code and wherein the access control conditions are evaluated by the access control program to determine whether to allow access 35 to the receptacle. 4 2017100652 05 Jun2017
In an embodiment the access control conditions comprise one or more periods during which the receptacle is accessible/not accessible using the access code. 5 In an embodiment the access control apparatus is further operable to control one or more peripheral devices for the receptacle.
In an embodiment the access control apparatus is operable to 10 control a heater or cooler for controlling temperature within the receptacle suitable for storing the parcel.
In an embodiment the method further comprises providing a recipient of the parcel with a delivery confirmation that the 15 secure delivery has been made.
In an embodiment the delivery confirmation is automatically generated either in response to the receptacle being left securely locked after the delivery has been made or in response 20 to entry of the correct code into the code input interface.
In accordance with a second aspect there is provided an apparatus for facilitating the secure delivery of a parcel by a delivery agent, comprising: an electronically controllable 25 locking device comprising a code input interface and operable to provide coded access to a delivery receptacle; and an access control computer implementing a processor which is communicable with the locking device and operable to validate access codes entered into the code input interface and being further operable 30 to output an unlock signal causing the electronically controllable locking device to unlock responsive to determining that the access code is valid, wherein the access code is determined by at least one of the access control computer and a delivery agent computer system using information generated by 35 the delivery agent computer system which is associated with the secure delivery; and wherein the delivery agent enters the 5 2017100652 05 Jun2017 access code into the code input interface to gain access to the delivery receptacle for completing the secure delivery.
In an embodiment the electronically controllable locking device 5 further comprises a microcontroller operable to communicate with the access control computer over a communications network for communicating the access code and receiving the unlock signal.
In accordance with a third aspect there is provided a delivery 10 agent computer system which is operable to communicate with an access control apparatus implementing an access control program as described in accordance with the first aspect.
Brief Description of the Drawings 15 Features and advantages of the present invention will become apparent from the following description of embodiments thereof, by way of example only, with reference to the accompanying drawings, in which: 20 Figure 1 depicts a system architecture capable of implementing an embodiment of the present invention;
Figure 2 is an example integrated access control device, in accordance with an embodiment; and 25
Figure 3 is a process flow diagram of an embodiment.
Detailed Description of Preferred Embodiments 30 In a broad form, the present invention comprises an access control system operable to communicate with a delivery agent system for automatically determining an access code. The access code is derived from information associated with the secure delivery and used by a delivery agent for accessing a secure 35 delivery receptacle for receiving the parcel. It will be understood that the term "delivery agent" as used to herein 6 2017100652 05 Jun2017 refers to couriers, postal agents or any other entity providing a delivery service.
Embodiments of the present invention advantageously allow 5 delivery agents controlled access to a secure delivery receptacle using an access code which is generated without any input by the parcel sender or recipient, and which can be readily determined by the delivery agent on site without requiring any communication with a remote system or operator. 10
System Architecture
With reference to Fig. 1, there is shown a schematic of a system 10 in accordance with a particular embodiment. 15 The system 10 comprises a delivery agent system 12 implementing a web server 14 (hereafter "delivery server"). The delivery system may, for example, take the form of a freight, mail or logistics system. The delivery server 14 is programmed to maintain a record for all parcel deliveries (scheduled or 20 20 completed) that have been entered into the system. At a minimum, each record will include a unique identifier assigned to the parcel (e.g. a consignment number, tracking number or the like) and a delivery address for the parcel recipient. 25 The system 10 further comprises an external secure service system 16 which also implements a web server 18 (hereafter "secure server"). The secure server 18 implements an application programming interface API 19 which includes identification information for each access control apparatus 22 that is 35 30 registered with the system 16. For ease of reference, only one access control apparatus 16 is shown in the drawings, although it will be appreciated that it is within the scope of the invention that any number of apparatuses could be registered with the system 16. According to the illustrated embodiment, the identification information includes a physical address for the corresponding apparatus, a unique identifier for the receptacle 7 2017100652 05 Jun2017 and a receptacle classifier. The receptacle classifier is utilised by the secure service system 16 for determining whether a parcel will fit in the receptacle, as will be described in more detail in subsequent paragraphs. 5
The delivery server 12 is configured to query the API 19 to check if an address for a scheduled delivery is listed and therefore can be sent using a secure delivery method, as described herein. If the delivery server 12 finds a match, it 10 sends corresponding parcel related information to the secure server 18 for storing in a register (or other suitable data store), for reasons which will become evident in subsequent paragraphs . 15 According to the illustrated embodiment, each access control apparatus 22 consists of a number of individual modules as will now be described. A first of the modules is a network-enabled access control 20 computer 24, which according to the presently described embodiment takes the form of a single board computer configured as a web server (hereafter "apparatus server"). The apparatus server 24 implements a data store in the form of an SQL database (not shown) for storing access codes, access schemes and parcel 25 related information for scheduled deliveries. The apparatus server 24 is also operable to generate (if required) and subsequently validate access codes entered into a code input device, as described in more detail below. According to the illustrated embodiment, the apparatus server 24 implements an 30 application (hereafter code management application) for carrying out the aforementioned functionality.
The code management application is programmable to communicate with the secure sever 18 (via Internet 20, or other suitable 35 network environment) for receiving the parcel related information. In an alternative embodiment, the code management 2017100652 05 Jun2017 35 8 application may be configured to communicate directly with the delivery server 14 for receiving the same. The code management application also provides authorised users with various functions (in this instance via a browser based application, 5 although any suitable user interface, browser based or otherwise, may equally be utilised), including the ability to set access control schemes associated with the deliveries, and any peripheral functions that occur when the access codes are created. In this regard, the application may include PHP 10 functionality and also be provided with SMS, e-mail alert and "push" capabilities, as will be understood by persons skilled in the art. Further, the application may be device sensitive allowing screen optimisation for the type of user device accessing the application. Still further, the code management 15 application may communicate with the delivery server 14 for delivery verification purposes, as will be described in subsequent paragraphs .
The access control apparatus 22 also implements a code input 20 device 26. The code input device 26 comprises a microcontroller 28 communicable with a code input interface in the form of an electronic keypad 30. The microcontroller 28 and keypad 30 are communicable with an electronically lockable handle 32 which controls access to a receptacle 33 for storing 25 parcels.
With reference to Figure 2 there is shown an example consolidated handle unit containing a keypad, battery, lock mechanism, radio module (i.e. for wireless communication with 30 the apparatus server 14) and a low cost open source "Arduino" microcontroller (see http ://www,arduino.cc/) . It will be understood that this form of consolidated unit is suited, but not limited to, application where only external access to the delivery receptacle is required. Other forms of electronically lockable arrangement (which may or may not be integrated with 2017100652 05 Jun2017 9 the other input device components) may also be utilised, depending only on the desired implementation.
The microcontroller 28 is programmed to communicate access codes 5 entered into the electronic keypad 30 to the apparatus server 24 for validation, as well as for event logging and delivery alert purposes. According to the illustrated embodiment, the codes are transmitted via wireless communications of which there are several standards available such as bluetooth, Zigbee, Xbee 10 among others. In addition, the apparatus server 24 may communicate with the microcontroller 28 to transmit commands for controlling peripheral devices, e.g. for managing relays that control the functionality of lights, chiller compartments, heater compartments, video cameras etc. provided for the 15 delivery receptacle 33.
Process Flow
With additional reference to Figure 3, there is shown a basic process flow for facilitating secure delivery of a parcel. 20
At step SI a sender packs the goods to be sent to the recipient and writes the delivery address on the parcel.
At step S2 the sender arranges collection by the delivery agent 25 or drops the parcel at a parcel drop off point administered by the delivery agent.
At step S3, the delivery agent creates a record of the parcel in the delivery agent system 12, including: 30 a. Assigning the parcel a unique identifier (e.g. a consignment number, tracking number, or other unique identifier as per industry convention); and b. Associating the receiver address to the unique parcel identifier using manual data entry or automatic scanning. 35 10 2017100652 05 Jun2017
At step S4, the delivery server 14 queries the API 19 implemented by the secure system 16 to determine if the recipient address is registered therewith. If the address is not registered, the usual method of delivering parcels is used. 5
If the address is registered, at step S5 the delivery server 14 determines whether the parcel will fit inside the receptacle 33 of the corresponding apparatus 22. The determination is based on the physical dimensions of the parcel (known from the parcel 10 delivery information) and the internal dimensions of the receptacle 33 which can be determined from the receptacle classifier (e.g. Class A receptacle has dimensions (Rxl, Ryl, Rzl), class B receptacle has dimensions (Rx2, Ry2, Rz2) and so on). According to the illustrated embodiment, both the parcel 15 shape and interior dimensions of the receptacle 33 are assumed to be in the form of a rectangular prism. Parcels of irregular shape may be assigned an arbitrarily oriented minimum bounding box. In some circumstances parcels are required to remain in a certain orientation and would be recorded as such in the parcel 20 delivery information (with such stipulations usually determined by the sending party).
As such the following data is known: • The internal dimensions of the receptacle: 25 Rx, Ry, Rz • The minimum bounding box dimensions of the parcel:
Px, Py, Pz 30 · Acceptable Horizontal Planes:
Pxy, Pyz, Pzx
Utilising the above information, the delivery server 14 then determines which parcel positions are valid (i.e. where there 35 are two parcel positions available per acceptable horizontal plane). If all the dimensions of the minimum bounding box of the 11 2017100652 05 Jun2017 parcel are less than the internal dimensions of the receptacle 33 in any of the valid parcel positions then the parcel is deemed to be able to fit. 5 A specific example for determining whether a parcel will fit in a delivery receptacle 33 will now be given. In this example, the internal dimensions of the receptacle (Rx, Ry, and Rz) are 40 cm, 30cm, and 90cm respectively. The minimum bounding box dimensions of the parcel (Px, Py, and Pz) are 10 cm, 50cm, and 10 20cm respectively.
The algorithm implemented by the delivery server 14 will iteratively check through all of the allowable orientations based on the allowable horizontal planes to 15 ensure that all dimensions fit. For example: DO (original position)
Px 10 cm < Rx 4 0 cm TRUE Py 5 0 cm < Ry 30 cm FALSE Pz 2 0 cm < Rz 90 cm TRUE
Since Py is greater than Ry, the parcel cannot fit in this orientation. The next orientation is checked.
D1 (original position rotated 90 on the XY plane (Z-axis)) Px 50 cm < Rx 4 0 cm FALSE Py 10 cm < Ry 3 0 cm TRUE Pz 2 0 cm < Rz 90 cm TRUE 20
Since Px is greater than Rx, the parcel cannot fit in this orientation. The next orientation is checked. D2 (original position rotated 90 on the YZ plane (X-axis))
Px 10 cm < Rx 4 0 cm TRUE Py 2 0 cm < Ry 3 0 cm TRUE Pz 50 cm < Rz 90 cm TRUE 12 2017100652 05 Jun2017
Since all parcel dimensions are smaller than the corresponding receptacle dimension for the third orientation, the parcel is deemed to fit. 5 Returning to the process flow of Figure 3, if the parcel is deemed to be a fit, the server 14 books a secure delivery for the parcel (step S6). According to the illustrated embodiment, this involves recoding the following non limiting information for the delivery: 10 i. A unique identifier for the delivery agent
ii. The unique parcel ID iii. A date range for delivery iv. The unique identifier for the access control apparatus 22 15 (i.e. as determined from the identification information received from the API 19, as aforedescribed)
At step S7 the parcel is routed through the necessary systems and processes to arrive at the depot ready for dispatch. 20
At step S8 the access server 24 polls the secure server 18 to check if any new deliveries for the address at which the apparatus 22 are recorded in the register. 25 a. If no new deliveries are registered no action is taken. b. If a new delivery exists, the apparatus server 24 records the corresponding parcel related information locally. According to a particular embodiment, the information includes the delivery agent ID, the date range of the delivery and the unique 30 parcel ID. 35
At step S9, when the delivery agent arrives at the parcel recipient's address, a deterministic access code generation algorithm is used to determine the access code for accessing the apparatus 22. Upon entry of this access code into the keypad 30, the apparatus server 24 will use the same 2017100652 05 Jun2017 13 deterministic access code generation algorithm to also generate an access code. If the access code entered into the keypad 30 matches the access code generated by the server 24 then a command is issued to unlock the secure receptacle 33. 5
Upon the opening of the secure receptacle 33, the apparatus server 24 updates a register with the time and date of the delivery and sends a communication to the secure server 18 for making the same updates to a corresponding register 10 (step S10).
Deterministic Access Code Generation Algorithm
It will be appreciated that delivery agents will not always have 15 an Internet connection for remotely accessing the delivery server 14. This is often the case when making deliveries to rural locations. Accordingly, it is desirable for the access code to be determinable by the delivery agent on site and without requiring access to an Internet connection. As such, 20 according to embodiments described herein, the access code is generated from information that is always available to delivery agent and which can be readily determined by the apparatus server 24. Some non limiting options for the deterministic access code generation are (arranged from simplest to most 25 complex): 1. Using the last X digits of a parcel ID (generally printed or barcoded on the parcel - hence available to the delivery agent at time of delivery without Internet connection) 30 2. A hashing algorithm based on some combination of parcel related information, e.g. including the courier ID, delivery agent ID, parcel ID, GPS location and the such - all data available by the delivery agent at the recipient address without 35 requiring an Internet connection. 14 2017100652 05 Jun2017 3. A public/private key encryption algorithm that provides the delivery agent with only the public key on their hand-held device and using data only available without an Internet connection. 5
In an alternative embodiment to that described above, an additional step 5a of the method is carried out to determine if the parcel will fit in a recipient's access control apparatus 22 (and more particularly the receptacle) taking into consideration 10 the existing and anticipated contents for securely storing therein. According to such an embodiment, if the system 12 determines that the parcel will not fit, the delivery system may hold off booking the delivery until the next day, or until the apparatus is emptied/accessed (as determined from communications 15 previously sent by the apparatus server 24 at step S10 of the method as previously described).
In more detail, the delivery server 14 would make use of the following information: 20 1. The internal dimensions of the receptacle; 2. The size of all parcels delivered to the receptacle since it was last emptied/accessed by the recipient; 3. The size of all parcels that have been booked but 25 not yet delivered; 4. The size of the new parcel being booked for delivery.
Persons skilled in the art will appreciate that there is a 30 general problem in computer science called the "3D bin packing problem" which has defined solutions and commercially available APIs (see URL: https://en.wikipedia.org/wiki/Bin_packing_problem). Since the existing and booked parcels are known to be able to fit in the 35 receptacle, the server 14 may run a suitable 3D bin packing algorithm which takes into consideration the four items of 15 2017100652 05 Jun2017 information outlined above (i.e. receptacle dimensions, size of parcels currently being stored, size of parcels that are booked but yet to be delivered and size of the new parcel to be booked). If the output of the algorithm indicates that the new 5 parcel will fit, the server 14 proceeds to the next step of the method (i.e. step 6) and schedules the booking.
Examples of 3D bin packing algorithms that can be used can be found in the following published papers which are incorporated 10 herein by reference: Optimizing Three-Dimensional Bin Packing Through Simulation (see URL: http://www.cs.ukzn.ac.za/publications/erick_dube_507-034.pdf) and An Efficient Algorithm for 3D Rectangular Box Packing (see URL: 15 https ://www. google. com.au/url?sa=t&rct=j &q=&esrc=s&source=web&cd =2 &cad=rj a&uact=8 &ved=0ahUKEwi2p5zunerNAhWGj ZQKHdiSCeOQFggoMAE&u rl=https%3A%2F%2Fwww.drupal.org%2Ffiles%2FAn%2520Efficient%2520A lgorithm%2520for%25203D%2520Rectangular%2520Box%2520Packing.pdf& usg=AFQjCNE5GnKc8QvVcmblRVW16B8FWORfhQ). 20
In yet another alternative embodiment, a delivery verification function may be employed by the system. As persons skilled in the art will appreciate, delivery agents currently use signatures from the receiving party as a proof of delivery. 25 These are generally captured directly by a mobile handheld device that records the signature for upload into the delivery agent system 12. Failure to capture a signature results in a moral hazard since it is the delivery agent that effectively takes sole responsibility of the parcel, once delivered, instead 30 of the recipient. In the event of a disputed delivery (i.e. where the recipient raises a dispute with the delivery system) the delivery agent may be held responsible. 35
The delivery verification function proposed addresses the potential for the recipient to dispute that the delivery agent did not in fact deliver the parcel. In an embodiment, the 16 2017100652 05 Jun2017 apparatus additionally comprises a display which visible only when the access control apparatus door is opened. The display may, for example, be a low-powered LCD display. The apparatus server 24 would be programmed to cause an n-digit number to be 5 displayed on the LCD display for recording by the delivery agent (e.g. in place of the signature on their handheld device), whereby the number is generated by a deterministic algorithm taking the following inputs: 10 · Current time (quantised to provide enough time to write the number down) and • Unique ID for the receptacle
An appropriately configured third party system can subsequently 15 verify if the delivery agent had indeed opened the access control apparatus by taking the time of delivery, the unique ID (which is linked to the apparatus 22 address and accessible from the API 19) and the n-digit number that was written as the signature. The third party system would then be able to use the 20 same deterministic algorithm to determine the n-digit number and confirm that it equals the n-digit number provided for verification. Upon a successful match, the third party system would be able to confirm that the delivery agent opened the access control apparatus to deliver the parcel. 25 35
In a still further embodiment, the access control apparatus 22 is incorporated into the chain of custody in the parcel delivery. According to such an embodiment, when a parcel is placed into the access control apparatus 22, a notification is 30 sent to the recipient by the apparatus server 24 advising that a delivery has been made. The notification is received by a recipient's computing device (e.g. mobile phone, tablet, personal computer, etc.), via a suitable communication channel (e.g. SMS, e-mail, etc.). The recipient is then asked to accept responsibility of the parcel by providing a "signature". The signature may be in the form of a conventional signature entered 17 2017100652 05 Jun2017 via their device display screen (i.e. signing on the screen of their mobile device), or by accepting the delivery through some positive action taken on their device (e.g. selecting a button). The signature would be required before the recipient is allowed 5 access to the apparatus 22. Upon the recipient opening the access control apparatus 22, the signature would then be provided to the delivery agent system 12 as the proof of delivery. 10 Further Detail of System Configuration
It will be understood that the web servers 14, 18, 24 can be any form of suitable computer that is capable of communicating with the respective computer elements described herein. The servers 14, 18, 24 may include typical web server hardware 15 including a processor, motherboard, memory, hard disk and a power supply. The server also includes an operating system which co-operates with the hardware to provide an environment in which software applications can be executed. 20 Authorised users can access a web application implemented by one of the apparatus server 24 or secure server 18 (e.g. via a browser on their network-enabled computing device 12) for setting access control functions for the receptacle, as afore-described. 25
It will be understood that in an alternative embodiment to that described above, the code management application may be implemented by the secure server 18 (i.e. as opposed to the apparatus server 24), depending on the desired implementation. 30 In another embodiment, the secure server 18 and apparatus server 24 may be implemented as a distributed architecture, i.e. such that they jointly implement the code management application and associated functions. 35
In yet another embodiment, the access control apparatus 22 may incorporate a video camera within the receptacle 33. In order 2017100652 05 Jun2017 18 to maximise the visibility of the contents of the access control apparatus 22 it is important to optimise the position of the camera. There are several factors that affect the visibility of the contents from various locations on the access control 5 apparatus 22, including the presence of shelves and parcels. In order to solve this problem, the camera may be: • Located on the non-hinged or opening side of a swinging door 10 · Located at the vertical centre • Angled to the centre of the receptacle 33 when the door is at a right angle to the front face of the access control apparatus . 15 Such placement provides the following advantages: (a) the camera has an unobstructed view of the contents of the access control apparatus and is largely unhindered by other parcels and shelves (b) a video feed captures the contents of the access control apparatus from multiple directions as the door opens. 20
In another alternative embodiment the delivery agent may generate the access code independently of the parcel related information and without involvement of the secure server or apparatus server. In this instance, the access code will be 25 communicated to the delivery agent (preferably prior to dispatch) and subsequently to the access control apparatus (either directly or via the secure server).
It will also be understood that access control apparatus 22 may 30 be configured to work with any suitable type of receptacle and electronically controllable lock. For example, a smaller implementation may comprise a domestic letter box, while larger scale implementations may comprise a delivery room within a house or building. Further, it will be understood the receptacle 35 can be located at any desired location (e.g. front door, letter 19 2017100652 05 Jun2017 box, etc.) provided that the corresponding microcontroller 28 has network access.
It will also be understood that the control access apparatus may 5 advantageously readily be retro-fitted to existing receptacles, e.g. letter boxes, door handles, etc.
It will also be understood that in an alternative embodiment to that described above, the functions of the access control 10 computer 24 and microcontroller 28 may be implemented by a single computing device provided with the necessary hardware and software .
While the invention has been described with reference to the 15 present embodiment, it will be understood by those skilled in the art that alterations, changes and improvements may be made and equivalents may be substituted for the elements thereof and steps thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt the 20 invention to a particular situation or material to the teachings of the invention without departing from the central scope thereof. Such alterations, changes, modifications and improvements, though not expressly described above, are nevertheless intended and implied to be within the scope and 25 spirit of the invention. Therefore, it is intended that the invention not be limited to the particular embodiment described herein and will include all embodiments falling within the scope of the independent claims. 30 In the claims which follow and in the preceding description of the invention, except where the context requires otherwise due to express language or necessary implication, the word "comprise" or variations such as "comprises" or "comprising" is used in an inclusive sense, i.e. to specify the presence of the 35 stated features but not to preclude the presence or addition of further features in various embodiments of the invention.
Claims (13)
- THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS:1. A method for facilitating the secure delivery of a parcel by a delivery agent, comprising the steps of: implementing an access control program for controlling access to a delivery receptacle, the access control program being further operable to receive information generated by a delivery agent computer system that is associated with the secure delivery; determining an access code from the information generated by the delivery agent computer system and storing the access code in a data store accessible by the program, the access code being automatically determined by at least one of the access control program and delivery agent computer system; wherein the access control program is operable to enable access to the delivery receptacle for completing the secure delivery responsive to the delivery agent entering the access code into a code input interface controlled by the access control program.
- 2. A method in accordance with claim 1, wherein the information generated by the delivery agent system is available to the delivery agent when making the secure delivery.
- 3. A method in accordance with claim 2, wherein the delivery agent computer system comprises a hand held device utilised by the delivery agent, and wherein both the hand held device and access control program determine the same access code from the information generated by the delivery agent system using a public/private key or a shared code generation algorithm.
- 4. A method in accordance with any one of the preceding claims, wherein, prior to determining an access code, the delivery agent computer system queries a database to determine if a recipient of the parcel has a registered delivery receptacle and responsive to making a positive determination books the secure delivery.
- 5. A method in accordance with claim 4, wherein the access control program is further operable to communicate with a data store which stores a record of secure deliveries that have been booked by the delivery agent computer system and responsive to determining that there is a booking for the corresponding recipient retrieves the corresponding information
- 6. A method in accordance with any one of the preceding claims, further comprising generating and storing access control conditions in association with the access code and wherein the access control conditions are evaluated by the access control program to determine whether to allow access to the receptacle.
- 7. A method in accordance with claim 6, wherein the access control conditions comprise one or more periods during which the receptacle is accessible/not accessible using the access code.
- 8. A method in accordance with any one of the preceding claims, wherein the access control apparatus is further operable to control one or more peripheral devices for the receptacle.
- 9. A method in accordance with claim 8, wherein the access control apparatus is operable to control a heater or cooler for controlling temperature within the receptacle suitable for storing the parcel.
- 10. A method in accordance with any one of the preceding claims, further comprising providing a recipient of the parcel with a delivery confirmation that the secure delivery has been made .
- 11. A method in accordance with claim 10, wherein the delivery confirmation is automatically generated either in response to the receptacle being left securely locked after the delivery has been made or in response to entry of the correct code into the code input interface.
- 12. An apparatus for facilitating the secure delivery of a parcel by a delivery agent, comprising: an electronically controllable locking device comprising a code input interface and operable to provide coded access to a delivery receptacle; and an access control computer implementing a processor which is communicable with the locking device and operable to validate access codes entered into the code input interface and being further operable to output an unlock signal causing the electronically controllable locking device to unlock responsive to determining that the access code is valid, wherein the access code is determined by at least one of the access control computer and a delivery agent computer system using information generated by the delivery agent computer system which is associated with the secure delivery; and wherein the delivery agent enters the access code into the code input interface to gain access to the delivery receptacle for completing the secure delivery.
- 13. An apparatus in accordance with claim 12, wherein the electronically controllable locking device further comprises a microcontroller operable to communicate with the access control computer over a communications network for communicating the access code and receiving the unlock signal.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2016902177A AU2016902177A0 (en) | 2016-06-05 | A system and method for facilitating the secure delivery of a parcel | |
AU2016902177 | 2016-06-05 | ||
AU2016902873 | 2016-07-21 | ||
AU2016902873A AU2016902873A0 (en) | 2016-07-21 | A system and method for facilitating the secure delivery of a parcel |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2017100652A4 true AU2017100652A4 (en) | 2017-07-06 |
Family
ID=59249054
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2017100652A Ceased AU2017100652A4 (en) | 2016-06-05 | 2017-06-05 | A system and method for facilitating the secure delivery of a parcel |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2017100652A4 (en) |
-
2017
- 2017-06-05 AU AU2017100652A patent/AU2017100652A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7464350B2 (en) | Secure Electronic Locker System | |
US11798333B2 (en) | Access control system with local mobile key distribution | |
US9619955B2 (en) | Systems and methods for facilitating package delivery or pickup | |
US20200092676A1 (en) | Access control system with messaging | |
JP6613748B2 (en) | Delivery system and delivery method | |
US20150379464A1 (en) | Automated Collection Points and Method of Operation | |
JP2016095782A (en) | Home delivery box management system | |
KR20200019685A (en) | Systems and methods that facilitate parcel pickup | |
US10497192B2 (en) | Notifying an individual about an item in a secure mailbox | |
JP2015092959A (en) | Article receiving system | |
JP2015048236A (en) | Article receiving system | |
KR101496296B1 (en) | Unmanned transport method using unmanned delibery system | |
JP2021504617A (en) | Systems, methods, and equipment to secure deliveries | |
US20160292945A1 (en) | Urban logistics platform | |
US20220044506A1 (en) | System and method for accessing secure storage lockers | |
US10949795B1 (en) | Secure transfer of items | |
JP2021177431A (en) | Stocker-related device | |
JP7194463B2 (en) | Storage device | |
JP6618091B1 (en) | Information processing apparatus and program | |
JP2017021398A (en) | Stocker management device and program | |
AU2017100652A4 (en) | A system and method for facilitating the secure delivery of a parcel | |
KR20080109276A (en) | Method for providing delivery service and computer-readable recording medium thereof | |
KR20230129346A (en) | Smart system for unmanned delivery of couriers and method therefor | |
KR20160052249A (en) | Method and system for delivering postal matter automatically | |
JP6595171B2 (en) | Delivery box management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |